• How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Wiping data from my phone

    I have a Samsung j7 prime and there's no option to encrypt the device only the SD card before factory reset so Is it because the phone is already encrypted and if needed t please suggest any apps that may help to encrypt my device. Thank you.

    NotTech5 pointsBadges:
  • Is it possible for someone to have hacked my phone plan/number and be using it?

    So about a couple years ago I got a phone, new company, new contract, and new phone number. I got a decent amount of texts at first for a person who we’ll say is named Gary. Not super unusual for a new number though. As time went on the amount of texts and calls for Gary from friends and family...

    JustConfused5 pointsBadges:
  • password resetting

    hp lj 600

    tibebu5 pointsBadges:
  • How to prepare for CISA certification

    Hi Team, I am a senior Quality analyst looking after the QMS and ISMS audit in my organization. I am planning to do CISA and need guidance to prepare. How can I get myself equipped with the contents and materials to prepare and clear the CISA certification at one shot.

    Sanggokul5 pointsBadges:
  • Is it possible to bypass an Internet blackout?

    Please, I would like to know if there is any possibility off bypassing an Internet blackout?

    mbindealen50 pointsBadges:
  • Resetting password for DST Mobile Broadband

    How do I reset my password for DST Mobile Broadband?

    Maldini65 pointsBadges:
  • Recurring audio ads on windows 10

    How do I get rid of these audio ads from my computers? Task manager shows ( Nicely) and ( Probus ). What are they? I can not delete them and it is two of each of them that continue to annoy and disrupt the working programs on the pc.

    Darbitry5 pointsBadges:
  • FOXPRO 2.6 FOR MS DOS DATABASE CONVERSION

    I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPAA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has...

    Cephid5 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,695 pointsBadges:
  • Can android mobile hotspot be attacked

    After allowing the use of my android 8.1 hotspot for people that I know steal identities and financial information I notice phone configuration changes. Such as USB configuration being set to MTP or PTP when it was originally set to CHARGING. Unless I clear data for MTP HOST I cannot reset it to...

    Chakathebird15 pointsBadges:
  • Victim of Cell Phone Hacking Knowledge After the fact.

    My cell phone, and possibly a 3rd party gps was added to my car by a neighbor. I am not certain of their motive other than to be certain of my location and distance as well as to gain information exchanged between conversations had in my home person to person as well as conversations had via the...

    sikaddaiisonmmeh5 pointsBadges:
  • Login to Instagram(bypassing “ip secrurity”)

    My problem is that i cant login to instagram accounts, because you can only login to them if you were logged in with the same ip once and i cant access the mail.

    Lolo555 pointsBadges:
  • What is a .jpg!d file?

    I'm looking for free CC0 photos and found a website Maxpixels.  Their photos have a file extension I've never seen before: .jpg!d What is that?

    della125 pointsBadges:
  • how credit card information is skimmed through rfid

    I keep seeing these links that say credit cards with wireless signals can easily be stolen from up to 3 feet away. is this true? if so how is it possible for hackers to see all the information? the news I see says that they steal our information with card readers. from what I know not all the...

    joe1005 pointsBadges:
  • File extension of the files normally added to uTorrent?

    I tried to join the forum and they asked me this question to complete the registration - what is the file extension of the files normally added to uTorrent?

    mohammad515 pointsBadges:
  • Can you answer these questions about cyber security?

    I think some low-life is paying some other low-life some money to target my computer so I want to keep it secure. Can you tell me if the following is correct? The basic concept of hacking a computer over the Internet involves scanning the target's computer for open ports, then searching for...

    X29WW510 pointsBadges:
  • malware

    is there a malware on mobile devices specifically on android that can leak all of your photos in a site?

    jenzel5 pointsBadges:
  • How do I recover deleted files on a server?

    A user deleted a file on our server from his workstation. I tried to recover this file but I can't find it and I don't have shadow copy on my server. How can I recover this file?

    Windows Security ATE160 pointsBadges:
  • PC protection

    I have Kapersky & Windows Defender on my PC, Kapersky is due for renewal;DO I NEED IT?

    4Johnat5005 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following