• How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • File extension of the files normally added to uTorrent?

    I tried to join the forum and they asked me this question to complete the registration - what is the file extension of the files normally added to uTorrent?

    mohammad515 pointsBadges:
  • Can you answer these questions about cyber security?

    I think some low-life is paying some other low-life some money to target my computer so I want to keep it secure. Can you tell me if the following is correct? The basic concept of hacking a computer over the Internet involves scanning the target's computer for open ports, then searching for...

    X29WW510 pointsBadges:
  • malware

    is there a malware on mobile devices specifically on android that can leak all of your photos in a site?

    jenzel5 pointsBadges:
  • How do I recover deleted files on a server?

    A user deleted a file on our server from his workstation. I tried to recover this file but I can't find it and I don't have shadow copy on my server. How can I recover this file?

    Windows Security ATE160 pointsBadges:
  • PC protection

    I have Kapersky & Windows Defender on my PC, Kapersky is due for renewal;DO I NEED IT?

    4Johnat5005 pointsBadges:
  • I\’m looking for mobile nfc Bluetooth hotspot jamming 4 my OP 6T

    I've had to have my OnePlus 6T McLaren reflashed with all new y firmware by factory repair facility after being hacked to the point I could reset not do a factory reset nor use the 911 system ( I've had some very close calls because I'm currently very ill) and I would like to either jam or disable...

    Skindonor5 pointsBadges:
  • Can someone use my data sim’s phone number to hack into my computer?

    If I am using a 4g usb modem with a data sim, is it of any use to a potential hacker to know the number of my data sim? Can it help him in any way if he wants to access my computer?

    X29WW510 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,680 pointsBadges:
  • Digiboard, Inc on my home network and I didn’t put it on there

    I did a security scan on my home network and found out this digiboard, inc was listed on my network. I have no idea why it is on there, who put it there, and I want it off my network.

    Firecraker5 pointsBadges:
  • Computer powers on for a moment, then shuts off :(

    Hello,I've been having a problem with a desktop computer.What's strange is that this computer has a history of issues, but after reseating and tinkering with a couple things, I've always managed to get it to work again.Not this time.What'll happen is, upon hitting the power on button, the lights on...

    Galapagew5 pointsBadges:
  • What is a .jpg!d file?

    I'm looking for free CC0 photos and found a website Maxpixels.  Their photos have a file extension I've never seen before: .jpg!d What is that?

    della125 pointsBadges:
  • Need help with Cisco ASA 5505

    I have Cisco ASA 5505 that was working fine until I updated the firmware to 9.2.4 and ASDM to 7.8.2. I still have console access but I lost using ASDM. When I try to access it with ASDM, I get "certificate validation failure" from the launcher. Does anyone know how to fix this? I'm stumped at this...

    awshirley5 pointsBadges:
  • Benefits of VLANs?

    What are virtual lans or vlans? What are they used for and will they allow me to increase my networks overall speed and throughput ratio?

    ITKE1,128,005 pointsBadges:
  • USB drive virus on Windows XP SP2

    When you earlier used to insert my pen drive in the USB port, a virus called autorun.inf used to pop up and none of the folders used to be visible only their shortcuts were visible and they didn't work. Now the different files appear with different random icons though they stay in the same format....

    Panks5 pointsBadges:
  • Firewalls active/active stretched across different sites

    Can a pair of clustered checkpoint firewalls running active/active function correctly when spanned across two different sites with either a layer 2 or 3 fibre link between. Does the same apply when using a pair of ASA 5540s. 

    Coop2765 pointsBadges:
  • Is is possible to hack WhatsApp?

    Someone who is threatening my friend say that they hacked a guy's phone and know what they are talking about. She says that she gets all his messages and can read what he sends to several contacts on his phone. Is it possible to hack whatsapp and get duplicates of his messages?

    Caramell5 pointsBadges:
  • Decrypt UFD2 hash

    Hello, I have recently forgotten my Facebook password and my account settings in Facebook for password reset is to send a link to my yahoo account. That account has been unfortunately deactivated so I tried to get my hash password instead. Could someone help me decrypt it please? I have read that...

    pkchurox715 pointsBadges:
  • CAT4 approval

    In CAT4 after approved the timesheet where can manager able to see his subordinates only whether he approved or rejected???Is there any tcode for that???help me for this.....Thanks

    umatulluri15 pointsBadges:
  • Someone hacked into my Chromebook

    So I was just searching my bookmarks on my Chromebook and the I saw 5 bookmarks of pages I have never been to! How can I track the person down by myself?

    MelissaL5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following