• Securing PHP script on FTP server

    I have a PHP script and it will be connected to my FTP server. Is there a good way I can secure my script so I can login in multiple times without having to worry? To clarify - this is for the FTP server. I'm worried about a bruteforce attack.

    ITKE971,545 pointsBadges:
  • The limits of privacy protection for social media

    Hello, this is Muhannad Battikhi from Jordan. Sometimes the legal procedures need to race the personal and secrecy information of the networks participants to know the cyber crimes doers and that require some cooperation from the social networks companies to know some important and necessary...

    Muhannad5 pointsBadges:
  • Program to stop spam

    I need a spam program that works every well. Can anyone help?

    cogginscl310 pointsBadges:
  • Hack into phone through Google+ Stream

    Can someone hack into your phone through Google + Stream?

    melodyamara5 pointsBadges:
  • How to recover ACCDB database password recovery

    How do I recover password of ACCDB database in Windows 7?

    sallooz5 pointsBadges:
  • Phone hacking remotely

    Can a phone be hacked and controlled from a remote location? Like from a laptop? Can you hack it and send and receive text from that phone but not be on it and not actually have it or access to it?

    Bsmith198835 pointsBadges:
  • Cyberbulling detection

    Is cyberbulling detection based on semantic enhancement?

    anuradha10410 pointsBadges:
  • Prevent users from saving PDF file locally

    On my website - obviously users view different information and documents. But on one PDF file - there's a bit of sensitive information on it. Would there be a way for me to prevent these users from saving it locally? Thank you.

    ITKE971,545 pointsBadges:
  • Bypass activation lock on iOS

    Can anyone help me find the link to bypass the activation lock on iOS?

    megnant1235 pointsBadges:
  • Recover Windows 10 password

    I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?

    tracy695 pointsBadges:
  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:
  • How to recover laptop password

    My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.

    mogrov25 pointsBadges:
  • Outlook not storing passwords for extra accounts

    Microsoft Outlook is not storing passwords for extra accounts. What should I do?

    BiGDee765 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • Can a text message be sent from landline that is out of service

    An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...

    trishtgu5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following