• Do we need our Sonicwall

    Hi,  We are trying to cut costs and have been looking at our IT set up.  We have a small business server that is only accessible from the office, office 365 for mail and the future use of SharePoint. We have a dedicated leased line in the office. Both of these have there own security attached...

    CFFCDanni10 pointsBadges:
  • Can I use a managed switch to run two LTE Routers at different times?

    Hi, I have a 3COM Superstack 3 4200 28 port manged switch.I also have two Huawei B315 LTE Routers with different sim cards on different networks. Basically I use the one router between 11PM-6PM and the other between 6PM-11PM because of the data plans I have.Is there a way I could set it up to...

    gouwsie695 pointsBadges:
  • How to make a bot Network and spread it?

    I need help learning on how to make a bot network/net and how to spread it. Be very specifec on the code and everything

    sloppyat5 pointsBadges:
  • All windows 10 file sharing programs?

    What are all the file sharing programs i wanna disable them all and block all there ports.right now i know SMB netbios and a few more. can someone tell me a list of all the file sharing features that come with windows 10.

    usernameeeee20 pointsBadges:
  • whatsapp hacking

    is it possible to hack someone whatsapp account

    junaid3415 pointsBadges:
  • Receiving undeliverable email we did not send

    Hi everyone, One of our users keeps getting undeliverable email messages. It looks like someone out there is sending mail and making it look like it is coming from him. Is there anyway to stop this? We are running Exchange 2007. I don't think it is relaying or a virus. It does this even when his PC...

    Fuddstud0 pointsBadges:
  • How do I recover deleted files on a server?

    A user deleted a file on our server from his workstation. I tried to recover this file but I can't find it and I don't have shadow copy on my server. How can I recover this file?

    Windows Security ATE160 pointsBadges:
  • How can I catch the person who hacked my accounts?

    All my accounts were hacked and manipulated by someone who had access to my email username and passwords, my Verizon account (he could actually read all my texts). Also he started a Google voice account and synced my number to to read texts then used the hangout dialer to get transcripts of my...

    acbucciarelli15 pointsBadges:
  • How to find out who hacked my phone

    I just found out that my phone was hacked. How do I find out who it was?

    mandymae315 pointsBadges:
  • What security challenges do you contend with and what do you think can be done about them?

    What do you see as the biggest impediment to good security across your network? Furthermore, what do you think can be done to get past where you're currently at? More technology? Fewer users? More regulations? Better management buy-in? I'm putting this out there as a discussion piece for...

    Kevin Beaver27,340 pointsBadges:
  • risks

    risks

    MMMZAAA5 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,630 pointsBadges:
  • What is a .jpg!d file?

    I'm looking for free CC0 photos and found a website Maxpixels.  Their photos have a file extension I've never seen before: .jpg!d What is that?

    della125 pointsBadges:
  • Email Phishing

    I use Outlook 10 with Microsoft exchange. I have one of my email accounts that looks like it is is being phished with emails from the this address 'Postmaster@msg.strl.va.charter.net' indicating I have emails that are undelieverable because other server is not reachable. I have blocked this sender...

    johntaft25 pointsBadges:
  • AS/400 – (IBM i) FTP to port 990 (Secure FTP)

    Greetings,This is about FTPing from an AS/400 (aka iBMi, iSeries, Power6, etc.) to Port(990) - aka - SFTP - Secure FTP.Receiving an error when switching to a new target FTP site that requires using port 990. "-23 Certificate is not signed by a trusted certificate authority." Need to know how to get...

    Klipster5 pointsBadges:
  • Is outsourcing a thing of the past?

    With more and more companies retracting from their outsourcing strategy to bring core technical skills back in house what is the future model of outsourcing professional services? Additionally, with the ease cloud computing and automation services is outsourcing a concept of the past? I am working...

    Cdel12245 pointsBadges:
  • How to find out who hacked my Facebook

    Today I saw a nude post on my Facebook wall saying inappropriate comments. I want to know who did this. Someone hacked my ID and posted that from my ID. How can I know that who had posted that post?

    KajalSharma5 pointsBadges:
  • Network Protection

    Is Network Protection a necessity? Will it prevent others from accessing my IP address and my computer?

    genendawn5 pointsBadges:
  • Resetting user password in SAP

    How we can reset the user password in SAP?

    929650296965 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following