• Unable to access Internet on Surface tablet

    I am able to use Wi-Fi on my surface tablet but unable to access the internet. Keep getting unexpected error has occurred and that troubleshoot is unable to complete task. Have checked with Vodafone and the modem is connecting. Also states that on the tablet. Tablet was working perfectly until...

    Jocelynb5 pointsBadges:
  • Security for SELinux

    What are the securities provided by SELinux and How?

    AnpuAnn1235 pointsBadges:
  • Add security file for updated Firefox version

    When I try to install an updated version of Firefox, I get a notice that I need to add a security file or get permission from security. What are they talking about?

    Snakefoot5 pointsBadges:
  • Cybersecurity courses for my career

    I am an undergraduate student of computer science from India and I am currently studying Bachelor of Computer Application. For further studies now I want to study cybersecurity. I want to be a cybersecurity expert or specialist. But I don't know from where I start to learn will you please provide...

    karanjoshi5 pointsBadges:
  • Which IT security certification should I choose?

    I have overall 17 Years of IT experience on application development and Project / Program Management. In the recent years, my focus is more in to the program management. I am very much interested to get certified on the Information Security / CyberSecurity side, as the focus on the information...

    Jerish5 pointsBadges:
  • Why we require DAST and SAST, if secure design review is in place?

    I have a query what does Secure Design review don't cover? Why we require DAST and SAST if secure design review is in place (due to low budget this question is raised).

    Rithin5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Is PING.EXE a virus?

    I saw in my procceses a procces name ping.exe for 2 seconds. Is it a virus?

    8mmppp5 pointsBadges:
  • Apply SFTP on AS/400

    How can we apply SFTP on IBM AS/400 I720?

    BadarMateen5 pointsBadges:
  • Database for insurance auditing system

    Hi everybody, I'm an Oracle developer working on an insurance auditing system. I'm looking for a database that includes the International classification of diseases (ICD10, ICD11) for each diagnosis all of the associated procedures, lab tests and medicines to make the system automatically approve...

    Ahmad0065 pointsBadges:
  • Change Visual Basic security settings

    On Visual Basic, I have several processes running at the moment. Now, I saw that I'm able to change the security settings through Process Explorer but I'm wondering if there's a chance I can do it using the command line.

    ITKE978,175 pointsBadges:
  • Is this the right BYOD security plan?

    Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...

    Elyassalman5 pointsBadges:
  • Cybersecurity

    What is cybersecurity?

    MONIKABHATHEJA5 pointsBadges:
  • Which certs should I take first?

    Hi everyone, completely new here so.. Here goes my question. I'm currently taking a diploma of Cyber and Digital Security, which covers on networking and ethical hacking (all very lightly). After this Diploma, I'm planning to head more into the network and security side (following the steps of my...

    Benjilee5 pointsBadges:
  • Business analyst role/job description

    Hi, What is the standard business analyst role/job description according to COBIT? Thanks and regards,

    cellepel5 pointsBadges:
  • csrss.exe

    Csrss.exe - I looked at this in my task manager, but I cannot click right and find its properties, everything else is fine and all have 'user name' But not this one. I found several copies in other folders but none in system 32 where it is supposed to be. The ones in the other folders all have...

    fcuku210 pointsBadges:
  • Is someone hacking me?

    I am not a technological expert. Through hacking test, I found this IP address 192.168.1.65 and 192.168.1.64 intervening with my privacy however it is shown as private network. No location found. How do we find the hacker?

    Samacha5 pointsBadges:
  • Who hacked my wife’s phone?

    My wife's phone has been hacked. We go to bed and her phone will have new apps downloaded when we wake up. What should we do?

    ShannonRichards10015 pointsBadges:
  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • How to stop a person from hacking my phone

    How can I stop a person from hacking my phone?

    Animelover1015 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following