• Design biometric system using VB.NET

    How do I design a biometric system using VB.NET?

    cundie5 pointsBadges:
  • Web project setup

    I am new the Linux servers but will be using CentOS servers. I have a web application that was created in Java using a NoSQL database. This application will give users the ability to create there own drag and drop web sites. Very similar to , Web.com, wixs.com, suarespace.com and weekly.com. We...

    sstepky60 pointsBadges:
  • Lotus Notes: Restrict users to change received or sent mails

    I'm no administrator, but want to know if it's been possible to restrict Lotus Notes (Mail) users to change or alter received or sent mails. It should been impossible to alter these mails after sent or received. Nevertheless it should been possible to delete them. Background: We'd like to archive...

    notesrights5 pointsBadges:
  • Cannot find my password in my Gmail account

    I tried to find my password but it was too hard. Can you help me?

    zaekira1575 pointsBadges:
  • Why can’t I set a fingerprint in Windows 10?

    Hi - until recently a user in our domain could access her laptop running Windows 10 by using the fingerprint swipe under the 'Hello' options. Her domain password changed yesterday, so I removed all registered fingerprints from the laptop and registered her finger again from scratch. We tried to...

    nix10304520 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Best way to secure a tablet

    I'll get straight to my point! What is the best way to secure my tablet? Security, internet, video conference.

    Silumtau5 pointsBadges:
  • Hacked Android Galaxy Phone & Verizon Ellipsis 8

    I believe that I've been experiencing targeted bullying and hacking for the past year. I believe that a laptop and another computer may have had a keylogger installed that seems to have avoided detection by AVG and Malwarebytes updates/scans. On my Android Galaxy phone I installed an app that...

    GlowBug655 pointsBadges:
  • Applying packet switching and binary systems to user accounts

    If you applied packet switching and binary systems to user accounts and content upload, what do you think would happen?

    Wyrdom30 pointsBadges:
  • Clear emails after allowing a spoof

    How do I clear my emails after inadvertently allowing a spoof?

    baylee35 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Crack a .c file password using gdb

    How do I crack a .C file password using GDB?

    Anhdat25 pointsBadges:
  • Can ECC be an alternative to RSA algorithm?

    ECC is much stronger algorithm than RSA, but still RSA is widely used public key algorithm. What are the issues that are in front of ECC to become commercialized?

    kaushalChavan15 pointsBadges:
  • Why should I use a cloud antivirus for my PC?

    What is the difference between antivirus and cloud antivirus. Why should I use a cloud antivirus for my PC?

    matthewsstacey30 pointsBadges:
  • How to become ISO 27002 compliant

    We are being asked by a key customer to be ISO 27002 compliant. We have already provided all of the items to them related to 27002 including SSO enabled, Security Test and IDM. We need to turn a certification quickly - what is the scope and timing and cost of such audit?

    steveragan5 pointsBadges:
  • How can I keep a Windows folder from being moved accidentally

    Is it possible to lock down the folders (or directories) within Windows, so they can't be accidentally dragged and dropped into some unknown location? With multiple users using the same files, we are finding that the Windows folders are disappearing. I was wondering if there is a way of locking the...

    Jbercsik5 pointsBadges:
  • Security for the Internet of Things

    If I want to put security on Internet of Things, then which type of security should I choose?

    slathhiya45 pointsBadges:
  • Is antivirus needed for Windows 8 devices?

    antivirus is needed for windows 8 or not.

    khadka5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following