- Strength to Increase Rep
- +0
- Strength to Decrease Rep
- -0
- Upvotes Received
- 6
- Posts with Upvotes
- 5
- Upvoting Members
- 4
- Downvotes Received
- 1
- Posts with Downvotes
- 1
- Downvoting Members
- 1
Ive had all the Knight Rider jokes about black cars, talking into my watch and going out crime fighting... so please don't flood my inbox with KR jokes lol Am a previous MSN (Microsoft) Technical Support Professional, now working for my self as a Forensic…
- Interests
- Movies, Music, Walking, Reading scary books / Tech manuals, Computer Forensics.
Re:
Has anyone heard of or better yet have experience with these programs? I am starting a computer repair business, I live in MT and I have a big truck. A program like these could save me a ton in gas and mileage since my customers can be up to 100mi … |
|
Re:
I've seen this on a few sites, though I can't think of one right now. I would like my server to be able to get a URL, then take a screenshot (picture) of it. I really hope there is a Perl module for this. Anyone know what I am talking … |
|
Re:
Hi everyone, I am only new here, and quite looking forward to getting to meet with a lot of you. But right now, I have a very frustrating problem that has only started today. Every time I start my Firefox browser, it starts to open up multiple tabs by itself, … |
|
Re:
Hi all, I want to enter to my computer trough network , for example when I go to -start - run - and type [code]\\80.242.118.7\c[/code] He ask me for the password . How can i set a password for a network . I have a username and password for my … |
|
Re:
Whenever I want to boot system mechanic 7 I get this pop up window that reads: [QUOTE][B][U]-Internet Explorer Script error[/U][/B] -:icon_exclaim: An error has occurred in the script on this page: Line: Char: Error: Code: URL: Do you want to continue running scripts on this page: (Yes) (No)[/QUOTE] Clicking on … |
|
|
Re:
The problem that I am facing is that Word 2007 is adding spaces in a mail merge when there isn't a value from an excel document. <<FirstName>> <<MiddleName>> <<LastName>> I've placed spaces in between the template place holders to seperate the names. However, when a record doesn't have a middle … |
Re:
WoW is a pretty good game. I downloaded the free trail but the trail's over and i have no space on my hard drive to download a game. please help me find a game. |
|
Re:
I am using Windows XP with Outlook 2003. I have a very frustrating problem with Outlook. I periodically toggle between sending in plain text and html. However, I know that any incoming html mail is supposed to default to be viewed in html. Every message that comes to me is … |
|
Hey everyone. It seem's this is the place to post anything we want (within reason) so I thought I would start a thread to find out what your favorite quotes are. I'll start with one of mine (though I have loads more): [B]People always turn away from the eyes of … |
|
Re:
Hi, I'm getting a BSOD when I try to boot into Safe Mode :/ The reason I've been trying to boot into Safe Mode is because I want to delete and replace some fonts with a newer version of them, and I can't do so in normal Windows because my … |
|
Re:
hi im trying to create a small excel addin in VS2008 byt i cant figure out how to write lika a string or an int to a specific cell? for example: i want to write something in cell B1? how do i do that in the C# code? it must … |
|
Re:
Hello all.. I am a new user of Windows Vista (came installed on my new laptop). Which Microsoft Office Suite is the best version to run with Vista. I want to install one that does not hog all my resources and take up too much space. Also, when you install … |
|
Re:
Hi! My System Restore is not working.. I would like to try to go back. I click System Restore, choose a date, but when it reboots, it says that it didn't restore? |
|
Re:
I have been having this problem with windows defender for a very long time. Whenever I click the update definitions on Windows Defender I get an error code and it is unable to update. My AVG antivirus and Comodo firewall have no problems updating. Even my windows update works properly. … |
|
The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this … |
|
How long before [URL="http://www.skype.com"]Skype Ltd[/URL]. ends up as an item for bid on eBay? Ever since its acquisition by the Internet auction site, Skype has been a rudderless boat — and without a captain, following the departure of cofounder Niklas Zennstrom, who took £2.8 billion of Skype’s £5.2 billion value … |
|
Every year sees a fresh crop of security breaches. Most go unreported, unless they involve consumers' personal data, at which point companies are required to give timely public notice of security breaches. The following list of 2007's worst security breaches consists mainly of such reportable incidents. The incidents are sorted … |
|
For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, … |
|
[B]A picture may be worth a thousand words, but it could also hide something more treacherous. [/B] Today, businesses wanting to guard against the potentially ultra-serious hazard of vitally important data being deliberately leaked to unauthorised people outside or even inside the organisation, need to get to grips with an … |
|
[B]Rumors and speculation about why five undersea cables to the Middle East have been severed — and what it means for IT security[/B]. Since [B]Jan. 30, 2008,[/B] there has been a troubling pattern of underwater anarchy. At first, it was reported that two, then three, then five undersea [URL="http://en.wikipedia.org/wiki/Fiber-optic"]fiber-optic[/URL] cables … |
|
When you think of security, it's a good bet that some of your thinking drifts to hackers and crackers. These are both security threats that you have to take into account. But do you know the difference? Well, some people do, and although many of them don't want their names … |
|
[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It … |
|
If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question … |
|
[B]The Problem[/B] With the availability of chat rooms and groups on Internet Web sites, the temptation to meet new people online increases, according to research. Online relationships provide individuals with an outlet to tell secrets and express themselves to a stranger anonymously, while allowing for the creation of another persona. … |
|
Over time, spammers have changed their spamming tactics in their bid to gain access to people's mailboxes. The latest tactic is to use the common [B]PDF [/B]file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, … |
|
In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and … |
|
What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among … |
|
[B]Overview[/B]: The lack of sensory information on the Internet (like too many teenagers and younger kids with a [URL="http://www.facebook.com"]Facebook[/URL] or [URL="http://www.myspace.com"]Myspace[/URL] page) may have a significant impact on cyberstalkers, as described by Meloy ("The Psychology of Stalking," Meloy, J.R) "The absence of sensory-perceptual stimuli from a real person means that … |
|
Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is … |
|
Re:
I invented an encryption algorhythm today and used it to "hide" the information in an unused password I came up with. This was done on paper, not with a program. However, I am planning to start laying some code down for this today (in Haskell, partly as an exercise to … |