Importing image and saving it to storage in Windows Phone 7
Our department is currently working on a project for when a user selects an image from a photo gallery and imports it. Here’s our code but we’re struggling with a couple few things. using System; using System.Collections.Generic; using System.Linq; using System.Net; using System.Windows; using System.Windows.Controls; using System.Windows.Documents; using System.Windows.Input; using System.Windows.Media; using System.Windows.Media.Animation; using System.Windows.Shapes;...
| March 27, 2014 4:00 PM
, WIndows Phone
Sony Vaio administrator
I bought a used Sony Vaio and it had a lot of school work in it that I had to take out. While I was doing that, it asks if I wanted to change the Administrator and told me how to remove the present one. After I did that, it did not tell me how...
| January 28, 2014 4:00 PM
, Sony Vaio
Which is more vulnerable among IBM, MS, Apple, Samsung?
Between these companies, which are more vulnerable? Why would they be vulnerable?
| January 27, 2014 7:00 PM
, Vulnerability Assessment & Audit
, vulnerability management
Best Smartphone in terms of Signal and Call Quality?
Hey Guys! I have used a Nokia Lumia 710, but it was horrible. A lot of signal drops, and the signal itself wasn’t stable. Also, the signal bar reaches 3/5 maximum at home, and the funny part is that Calls don’t connect at signal 2/5 ! Even if calls were connected, A LOT of voice...
| January 24, 2014 9:11 PM
, Smart phones
, Voice calls
, Voice clarity
Android tablet PC
I have a new Android 7” tablet PC and my son put some username and password in now. I don’t know it is so the tablet is locked. I have tried too many attempts. I don’t know what to do. Someone please help.
| January 9, 2014 5:54 PM
, Tablet PCs
Intercepting two-factor authentication (SMS)
I’m trying to learn more about “IT Security” and I’ve come across two-factor authentication. I understand two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. But how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile networks use encryptions on SMS?
| November 22, 2013 6:12 PM
Password encryption: WEP, WPA and WPA2
I’m pretty much a beginner when it comes to security but I do know that there are pretty much three different methods when it comes to Wi-Fi security: WEP, WPA and WPA2. My question is this: Does one method have better “strength” when it comes password encryption? Or are they pretty much all the same?
| November 19, 2013 1:11 PM
How do I remove SDN that has been implemented on my home computer?
(SDN may be good for businesses and the people implementing them, but if you are the user, its hard to regain control.) Seems like SDN has been implemented on my own home network. We have Cisco E2000, an ISP Provider set up. Now it seems, Either intruders or practicing IT family members have taken over...
| November 15, 2013 11:21 AM
cell phone access
, remote modems