• Was my Viber account hacked?

    How is my account hacked? How can I find out?

    Tomprasad20 pointsBadges:
  • Multiple logins in Internet Explorer

    This might be an odd question but it's necessary for me. I have two accounts for a specific website. Would I be able to login with both accounts if I used two different tabs (I'm using Internet Explorer)?

    ITKE829,010 pointsBadges:
  • Benefits of Configuration Management in Change Management

    How does Configuration Management benefit when trying to do Impact Analysis of a change request or request for change?

    hknanda5 pointsBadges:
  • How to stop a person from hacking my phone

    How can I stop a person from hacking my phone?

    Animelover1015 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,535 pointsBadges:
  • Has my phone been hacked?

    Okay. I am not what you would call a "techy" at all. In all reality I am actually not that phone smart. I know the basics pretty much with just a very few secrets here & there but honestly not much! I have recently had all kinds of problems with my phone, it's an iPhone 6 Plus. I have suspected...

    SuspectedHackVictim10 pointsBadges:
  • Does my husband have a virus on his phone?

    Okay so I have a question, I recently started looking at my husband's phone and I went to his google search and there is a bunch of adult sites in the search. He also has adult sites saved in his phone memo. He said its a virus and his phone got hacked and why I'm concerned is because we have a lot...

    Alicia987915 pointsBadges:
  • Is it possible to ‘decode’ a sensored image?

    I recently covered a picture of mine with a really heavy digital stickers with an app called 'LINE photo' and a guy said that he could remove the stickers if he wanted to. Which I said it'd be impossible, but he said he can do it with some kind of program. Do any of you guys know what kind of...

    clara1212125 pointsBadges:
  • Is there an easy to use tool for me to check the security of my router?

    I checked the logs on my home router and found port attack form Russia, China, Spain, Brazil etc on my home router. Is there an easy to use tool for me to check the security of my router to ward off these attacks, or is there a way I can make my IP 'invisible' so the perpetrators of these attacks...

    ColinEssex5 pointsBadges:
  • Authentication and Identity Management

    Does a web services portal need a federated login, if the data accessible as at most Business Only?

    wsimpson5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Tools for analyzing honeypots data

    What tools are available to analysis honeypots data?

    mazizytambo5 pointsBadges:
  • Java security project for small organization

    As part of learning and implementing Java, I would like to work on security aspects. How can I build a project in Java that works on security features for my small organization (10 employees)?

    nitudshah25 pointsBadges:
  • VTC and Audio Conference Hacking

    I work in the audiovisual integration and technology industry and have very little knowledge regarding network and IT security. My boss has asked that I research the potential security risk that our integrated systems face and what we can do to mitigate those risks. Primarily our concern is whether...

    darennest1215 pointsBadges:
  • Exchange 2007 error 12019

    Hi guys, After installing new SSL certificate, I start getting error 12019 on Exchange 2007 and 12014 12015 on edge its all related to certificate. Can anyone help me resolving this?

    samary200915 pointsBadges:
  • Trend Micro Exams

    Hey guys going to do the Trend Micro Exams they sound pretty easy ,but the foundation exam seems a bit strange any ideas ??

    Maurice15 pointsBadges:
  • How can I access my files?

    I downloaded a zip folder which was supposed to generate its password from https://magafiles.com/329953?password=ea998f30656755cb940d1448d3c801e1 But it keeps saying there is no offer available. So I would like help on how to bypass the password and access my files.

    Grim1015 pointsBadges:
  • How to change password to open PC

    Can anyone tell me how to change my password so I can open my PC?

    YWH4ever5 pointsBadges:
  • Is my computer keeping me safe by having the network sharing option off?

    I am unable to go on websites I use to go on, my computer says they are not certified, yet earlier this year I didn't have any trouble going on them. No signs that I was unable to go on them. I used to have network sharing, I am not sure how it got turned off.

    dgdenisemedspec15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following