• Who hacked my iPhone and Facebook?

    Is there any way I can see who hacked my phone and Facebook?

    mblanco025 pointsBadges:
  • Was my computer hacked?

    Hi, I have a question. I applied to topica via upwork, had my skype interview, and the interviewer asked me to run a couple of tests to check my internet speed. I want to know if these tests are legit or if he managed to hack my computer? The tests were as follows: First he made me run the run...

    Notsure0015 pointsBadges:
  • Malware using extension .CFG

    My virus scanner isolates files with a .CFG extension. It parks them in a subfile labeled cfgall. I understand this is another name for W97M-ORTANT.A. I can't find anything with that name or W97 anywhere on the affected computer. This computer is running Windows XP. How do I get rid of this?

    Bennycat5 pointsBadges:
  • Open .JS files in my Outlook 2013 inbox

    How can I open .JS files in my Outlook 2013 inbox?

    thart0015 pointsBadges:
  • Implementation of password security and management system using shell script source code?

    I want to know the implementation of password security and management systems using shell script along with the source code.

    Charan265 pointsBadges:
  • PGP inconsistency

    Any chain is as week as its weakest link. So, what is PGP's point of using 2048+ bit key pairs and 100+ character passphrases while using a 256 bit key to encrypt the message?

    Carlindo120 pointsBadges:
  • Admin access for Access Control Salto

    How do I gain admin access for Salto access control?

    DonnVl5 pointsBadges:
  • Design biometric system using VB.NET

    How do I design a biometric system using VB.NET?

    cundie5 pointsBadges:
  • Web project setup

    I am new the Linux servers but will be using CentOS servers. I have a web application that was created in Java using a NoSQL database. This application will give users the ability to create there own drag and drop web sites. Very similar to , Web.com, wixs.com, suarespace.com and weekly.com. We...

    sstepky60 pointsBadges:
  • Lotus Notes: Restrict users to change received or sent mails

    I'm no administrator, but want to know if it's been possible to restrict Lotus Notes (Mail) users to change or alter received or sent mails. It should been impossible to alter these mails after sent or received. Nevertheless it should been possible to delete them. Background: We'd like to archive...

    notesrights5 pointsBadges:
  • Cannot find my password in my Gmail account

    I tried to find my password but it was too hard. Can you help me?

    zaekira1575 pointsBadges:
  • Why can’t I set a fingerprint in Windows 10?

    Hi - until recently a user in our domain could access her laptop running Windows 10 by using the fingerprint swipe under the 'Hello' options. Her domain password changed yesterday, so I removed all registered fingerprints from the laptop and registered her finger again from scratch. We tried to...

    nix10304520 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Best way to secure a tablet

    I'll get straight to my point! What is the best way to secure my tablet? Security, internet, video conference.

    Silumtau5 pointsBadges:
  • Hacked Android Galaxy Phone & Verizon Ellipsis 8

    I believe that I've been experiencing targeted bullying and hacking for the past year. I believe that a laptop and another computer may have had a keylogger installed that seems to have avoided detection by AVG and Malwarebytes updates/scans. On my Android Galaxy phone I installed an app that...

    GlowBug655 pointsBadges:
  • Applying packet switching and binary systems to user accounts

    If you applied packet switching and binary systems to user accounts and content upload, what do you think would happen?

    Wyrdom30 pointsBadges:
  • Clear emails after allowing a spoof

    How do I clear my emails after inadvertently allowing a spoof?

    baylee35 pointsBadges:
  • Creating a DMZ for remote desktop

    I'm working on a project where I need to create a DMZ for remote desktop access. Unfortunately, I was not in on the planning and can't order any hardware or software that wasn't already purchased. I was able to convince the team to use a dual firewall DMZ but they purchased two ASA 5515-x instead...

    JAliCO5 pointsBadges:
  • Crack a .c file password using gdb

    How do I crack a .C file password using GDB?

    Anhdat25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following