• Security breaches in the healthcare industry

    I'm curious to find out more on security breaches in the healthcare industry. Can anyone point me in the right direction?

    suvarnalatha65 pointsBadges:
  • Has someone hacked my Whatsapp account?

    Once I finished or end my whatsaap video call, I received a notification (you are using whatsaap video call). I didn't read until end. I was shocked. Because this is first time I received this kind notification. Is a third person hacking my whatsaap account or phone?

    Jeans8035 pointsBadges:
  • Open Source Key Management Server

    I'm looking for recommendations/reviews on an Open Source Key Management Server platform to handle storage array Data At Rest Encryption (DARE). If no open source recommendations are available, what is the consensus on COTS products?

    jimmygove5 pointsBadges:
  • Can I trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Would I be able to trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Dsb20175 pointsBadges:
  • How to track my phone

    Hi, I have a serious problem here. An unknown person can hack, steal & copy ALL my Samsung Note data. What I mean by all is that unknown person can read my Whatsapp, wechat, kakaotalk, Line chats, SMS/phone calls, gallery photos, videos, web history, and even can come in person by tracking my...

    plshelpfast50 pointsBadges:
  • Is it possible I was hacked through my VPN?

    I have a hacker problem. I am using a VPN that specifies it is USA on an iPAD, and is Apple approved. When I log into my email it always gives a California or Texas IP address, with one exception: Once a week it says I have logged  in from Dubai. I was actually logged in when this happened and the...

    ITKE1,071,430 pointsBadges:
  • Protect my phone from hackers/spyware

    Hi Sir, I have been reading through a lot of articles on your website, very glad to go through websites that teach us security issues. I am facing a cyber security issue since four years and till date I have spent hundreds of dollars trying to protect myself when using Wi-Fi and internet but I have...

    ShahadSidek5 pointsBadges:
  • Phishing an account

    Many hacking sites have a step by step tutorial about phishing someone's Facebook, Gmail and Hotmail account. Those steps include creating a free account on web hosting site. So you can upload the fake log in pages to it. That's what I don't understand. I save index.html etc pages in notepad but...

    amberdecember5 pointsBadges:
  • What is a TMP chip?

    In physical security, what is a TPM chip?

    deenbandhu5 pointsBadges:
  • Force Google Chrome to type in password daily

    Unfortunately - my mind isn't what it used to be so I have to remember my passwords on a daily basis. So in order to do that, I have to type it frequently. But when I'm in Google Chrome, it usually keeps me logged in. Is there a way to setup Chrome so that I have to type my password in once a day...

    ITKE1,071,430 pointsBadges:
  • Custom Windows 10 ISO error

    I created a custom Windows 10 x64 ISO using a guide, I found here on TT. When I tried to use the ISO to install the OS, it is unable to move pass the OS selection because no items show up there. A message displays saying that "windows could not display the images available for installation" then...

    EpicureanTech25 pointsBadges:
  • Is the vulnerability found in IDS a false positive or negative?

    If a new vulnerability was found, but the IDS didn't detect it. Is this a false positive or false negative?

    stubabygm5 pointsBadges:
  • Private Cloud Audit Check list

    We want to audit a private cloud. Is there any check list?

    kashifjeelani5 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE1,071,430 pointsBadges:
  • Does Windows Hello support IRIS scanning?

    Hello, I'm a security nerd and I'm looking to learn even more about biometric authentication (particularly IRIS scanning). And my machine is running Windows 10. So here's my question: Does Windows Hello support this type of scanning? Can anyone tell me where it's located? Thanks again!

    ITKE1,071,430 pointsBadges:
  • Can the admin of my school account still see what I have browsed?

    Can the admin of my school account still see what I have browsed even though my web activity was paused during the time of my searching? (When web activity is paused it shouldn't be recording anything) It says there is no activity to see, however I am concerned the school admin has some type of...

    KFCisthebomb5 pointsBadges:
  • How to determine password expiration

    Recently this iSeries user wrote in with a question about password expiration. He writes, "How can I tell if a user's password does not expire? I've used the user profile report, but all it gives me for expiration values are 0's or -1's for all of the users." Can you help? Michelle Davidson Editor...

    MichelleDavidson515 pointsBadges:
  • Tracking sensitive table access

    How can I track the number of Read's users perform on specific tables on an iSeries?

    LarryH6015 pointsBadges:
  • Layer 2 vs. Layer 3 generic routing encapsulation (GRE)

    What is the difference between Layer 2 GRE and Layer 3 GRE?

    NetworkingATE1,545 pointsBadges:
  • Major differences in the up gradation from EHP 6 TO EHP 8 in SAP?

    Can anyone explain the the major differences in the up gradation from EHP 6 TO EHP 8 in SAP?

    suzilpanjwani5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following