Questions & Answers

  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Who hacked my phone?

    How can I find out who hacked my phone?

    Debbiew20 pointsBadges:
  • How to find out who hacked my phone

    I just found out that my phone was hacked. How do I find out who it was?

    mandymae315 pointsBadges:
  • How can I catch the person who hacked my accounts?

    All my accounts were hacked and manipulated by someone who had access to my email username and passwords, my Verizon account (he could actually read all my texts). Also he started a Google voice account and synced my number to to read texts then used the hangout dialer to get transcripts of my...

    acbucciarelli15 pointsBadges:
  • My ex-husband is accessing my laptop remotely

    My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...

    thesabrina65 pointsBadges:
  • Facebook, email and phone hacked

    Any info greatly appreciated. I know I am going to have to pay an IT person for any specific help but someone on here may be able to assist. So 2 weeks ago my phone email and FB was hacked. I first noticed when i couldn't log into my email account, I sent a forgotten password link to a different...

    randomblogger5 pointsBadges:
  • Is connecting my laptop to Wi-Fi extender with ethernet cable same as connecting it to the router?

    Is connecting my laptop to Wi-Fi extender with ethernet cable same as connecting it to the router (with ethernet cable as well) or is it gonna give me worse connection if no is there any difference? If there is what is it?

    Reda135 pointsBadges:
  • Name in alphanumeric letters

    How to write my name in alphanumeric letters?

    vijaykumar20155 pointsBadges:
  • How to prevent phone eavesdropping

    How do I prevent eavesdropping from a handphone if somebody knows my handphone number?

    winniesuan5 pointsBadges:
  • Linux servers alerting

    How to configure alerting for Linux servers in the tool. Can we get the document or the steps?

    Pradeepprao2920 pointsBadges:
  • Email Access – D0R00DR

    Hello, My email has frozen, and I am unable to get access. I kept receiving a message to say my inbox is almost full, I tried to delete some items, but it has stopped working. Can you help please?

    D0R00DR5 pointsBadges:
  • How can I change my password for ComputerWeekly?

    Does anyone know how I can change my password for ComputerWeekly?

    verdaidealisto25 pointsBadges:
  • VMware vSphere Client

    If my VMware vSphere Client gets a power failure, or dip, does this affect all the ESI hosts, including the backup hosts.

    willyctmpt20185 pointsBadges:
  • What is TCP/IP model?

    Can someone please explain the concept of the TCP/IP model?

    zakoye5 pointsBadges:
  • Can I recover a deleted Checkpoint in Hyper-V Manager?

    I deleted a checkpoint using Hyper-V Manager. The files no longer reside in the repository folder. Can this checkpoint be recovered?

    epcobb5 pointsBadges:
  • Creating Java program in V7R2

    As CRTJVAPGM is no longer supported (with V7R2), how should we create a Java program? I have some Java programs written in eclipse tool. My RPGLE procedures invoke the java programs. I want to debug the Java program, and hence like to create Java program in iSeries. Is that possible?

    sri8707165 pointsBadges:
  • List of approved hand tools to be used inside of data centers

    Is there a list of approved hand tools that should be used inside of a data center?

    simonbeck5 pointsBadges:
  • Set of tapes backed up in BRMS

    I have to set a control group which performs the below: I have a set of 10 lib to be backed up by BRMS in a volume. But next set of 10 tapes should be backed up in another random volume in BRMS. How do I achieve this?

    hesujama15 pointsBadges:
  • Include original email in NDR – just like Gmail.

    Hi, is there any way that Exchange can associate and include the original sent email with the NDR that has been returned? A working example of this is with Gmail, if you send an email to a non-existent address, the resulting NDR will have the original email underneath the non-delivery text....

    OJ19745 pointsBadges:
  • QWCRDTAA on iASP

    Problem: I am trying to access a data area on a library that is in an iASP partition via a java program. I am using jt400 to create a jdbc connection to access the said data area. then getcharacterdataarea.class to basically access the data area, with the filepath paramater pointed to the iASP...

    Jpjawili165 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following