• MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • Can a text message be sent from landline that is out of service

    An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...

    trishtgu5 pointsBadges:
  • IFS Authority for symbolic links

    I have a problem with IFS security, I’m allowing users to create symbolic links to IFS files which they then cannot remove. I try to use CHGAUT on the link after creating it so the user have sufficient authority but this does not work, I am guessing this is because if you create a symbolic link...

    TMcNeil5 pointsBadges:
  • Was my Viber account hacked?

    How is my account hacked? How can I find out?

    Tomprasad20 pointsBadges:
  • Multiple logins in Internet Explorer

    This might be an odd question but it's necessary for me. I have two accounts for a specific website. Would I be able to login with both accounts if I used two different tabs (I'm using Internet Explorer)?

    ITKE977,175 pointsBadges:
  • Benefits of Configuration Management in Change Management

    How does Configuration Management benefit when trying to do Impact Analysis of a change request or request for change?

    hknanda5 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,535 pointsBadges:
  • Does my husband have a virus on his phone?

    Okay so I have a question, I recently started looking at my husband's phone and I went to his google search and there is a bunch of adult sites in the search. He also has adult sites saved in his phone memo. He said its a virus and his phone got hacked and why I'm concerned is because we have a lot...

    Alicia987915 pointsBadges:
  • Is it possible to ‘decode’ a sensored image?

    I recently covered a picture of mine with a really heavy digital stickers with an app called 'LINE photo' and a guy said that he could remove the stickers if he wanted to. Which I said it'd be impossible, but he said he can do it with some kind of program. Do any of you guys know what kind of...

    clara1212125 pointsBadges:
  • Is there an easy to use tool for me to check the security of my router?

    I checked the logs on my home router and found port attack form Russia, China, Spain, Brazil etc on my home router. Is there an easy to use tool for me to check the security of my router to ward off these attacks, or is there a way I can make my IP 'invisible' so the perpetrators of these attacks...

    ColinEssex5 pointsBadges:
  • Tools for analyzing honeypots data

    What tools are available to analysis honeypots data?

    mazizytambo5 pointsBadges:
  • Java security project for small organization

    As part of learning and implementing Java, I would like to work on security aspects. How can I build a project in Java that works on security features for my small organization (10 employees)?

    nitudshah25 pointsBadges:
  • VTC and Audio Conference Hacking

    I work in the audiovisual integration and technology industry and have very little knowledge regarding network and IT security. My boss has asked that I research the potential security risk that our integrated systems face and what we can do to mitigate those risks. Primarily our concern is whether...

    darennest1215 pointsBadges:
  • Exchange 2007 error 12019

    Hi guys, After installing new SSL certificate, I start getting error 12019 on Exchange 2007 and 12014 12015 on edge its all related to certificate. Can anyone help me resolving this?

    samary200915 pointsBadges:
  • Trend Micro Exams

    Hey guys going to do the Trend Micro Exams they sound pretty easy ,but the foundation exam seems a bit strange any ideas ??

    Maurice15 pointsBadges:
  • How can I access my files?

    I downloaded a zip folder which was supposed to generate its password from https://magafiles.com/329953?password=ea998f30656755cb940d1448d3c801e1 But it keeps saying there is no offer available. So I would like help on how to bypass the password and access my files.

    Grim1015 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following