• Audit program for call center

    Is there an audit program specific to revenue assurance for a call center?

    bamba125765 pointsBadges:
  • Remove antivirus from Windows 10 computer

    I have a Windows 10 computer and recently installed a new antivirus. It's AVG. But now this is stopped me from playing my computer games. Now, I want to delete it. I went into the Control Panel and deleted it but it's still there (and I can access it). How can I remove it completely?

    ITKE1,042,780 pointsBadges:
  • How to remove Avast from Windows 10 desktop

    I just bought a new anti-virus so I want to uninstall Avast from my desktop. It was successful but the popup is still appearing in the bottom right of the screen. I have searched everywhere and it's not appearing anywhere else except there. Can I get rid of this altogether?

    ITKE1,042,780 pointsBadges:
  • PCI DSS Scoping – Create new LLC

    I had a customer ask me if they can setup an LLC to reduce PCI scope for a specific product. I told them that the issue is shared resources (people, processes, and technology) and that the work to setup and isolate network, people roles, process for this would be significant. My answer is really...

    JPSECGUY0015 pointsBadges:
  • Find ISO files creation date

    Hi, would anyone know if ISO files include their creation date? I need to know when it was created. How can I do that?

    ITKE1,042,780 pointsBadges:
  • Google Chrome is reporting website as not secure

    This is more of a general question but I need information ASAP. I usually work in Google Chrome and it's reporting a website that I usually go on as 'not secure'. In Chrome, can I find a more detailed explanation? Basically, I want to know why it's being reported as not secure. Appreciate the help.

    ITKE1,042,780 pointsBadges:
  • How to decrypt a SHA1 hash value?

    SHA= 2fd4e1c6 7a2d28fc ed849ee1 bb76e739 1b93eb12. How can I decrypt (to ASCII) the string using RPG/400? What is its coding scheme?

    rajat01110 pointsBadges:
  • CVE-2015-6834 Usage

    How can I use CVE-2015-6834 exploit? It's not a ready script and not listed in metasploit so I don't know how to use it. GHDB description makes no sense to me. Can anyone explain usage of this exploit? A demo would be helpful.

    slkdmr15 pointsBadges:
  • How to know if someone can see my web history

    This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?

    ITKE1,042,780 pointsBadges:
  • Can we dumb down what net neutrality means?

    We all hear a lot about it but most definitions are over the common users head. Some think it may be good in helping them get what they want without having to pay for. In some cases that won't help the guy paying $50mo for 25meg service where the next town over, with another carrier his friend...

    ToddN200084,775 pointsBadges:
  • What antivirus should I buy?

    If I want to buy an antivirus, what should I do? Meaning which one should I buy?

    helenhelen5 pointsBadges:
  • Has my PC been affected by the WannaCry virus?

    My main PC at my home still runs Windows 7. For some reason, I can't get to Windows Update from IE. I'm worried that I've been hacked or been affected by the WannaCry virus. Should I be worried? I ran a scan but didn't see anything (I think I'm just being paranoid). Can anyone reassure me?

    ITKE1,042,780 pointsBadges:
  • Testing patches for vulnerabilties

    Before installing a patch on any environment, a patch should be tested amongst other things for application testing and other conflicts. Should a patch not be tested for vulnerabilities to assess whether it is worth  the risk of applying the patch? I know patches tend to close a bigger whole that...

    Andanim5 pointsBadges:
  • How to do a full network system audit check

    We require a full network system audit check at workplace - our IT department personnel had a conflict of interest so to confirm data is secure and private we require a comprehensive check for any backdoors; passwords need to be changed; back ups required. Work at a personal injury law firm...

    anonymous10005 pointsBadges:
  • What type of medical data requires encryption?

    I want to know an example of medical data collected through sensors which require encryption.

    revaneshm01515 pointsBadges:
  • Firefox keeps asking to restart

    I'm running into a bizarre FireFox issue that I can't even find on their help pages. I updated to Firefox 53. Everything was fine and it asked me to reboot FF so I did. It launched again but now it keeps asking me to install it again. I tried to install / reinstall FF all over again but that didn't...

    ITKE1,042,780 pointsBadges:
  • dualCi bypassing code on iPhone

    Hi everyone! I want to use dualCi to to bypass the code on my iPhone. Does my PC become vulnerable if I access that server? Can the hackers that manage the server can steal docs or pass codes from my computer? Do I risk to get a virus? Thanks guys!

    jollythesmart5 pointsBadges:
  • Who has hacked my cell phone?

    My cell phone has been hacked. Who can I contact that will be able to find out who has done this?

    Jojo032325 pointsBadges:
  • Maximum amount of URLs in Firefox browsing history

    I'm using the latest updated version of Firefox. Is there a specific maximum amount of URLs that I can store in my browsing history? I looked in the settings and didn't see anything. Thanks so much for the help.

    ITKE1,042,780 pointsBadges:
  • How to make an application for Android and iOS

    I an owner of an immigration law firm, and have my website. But, now mobile users are increasing rapidly. So I want to make an application for Android and iOS. In this application, a customer gets every information regarding Canadian immigrating to US and find an immigration lawyer in London...

    rosannaberardi25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following