Posts
 
Reputation
Joined
Last Seen
Ranked #2K
Strength to Increase Rep
+0
Strength to Decrease Rep
-0
86% Quality Score
Upvotes Received
6
Posts with Upvotes
5
Upvoting Members
4
Downvotes Received
1
Posts with Downvotes
1
Downvoting Members
1
6 Commented Posts
~34.3K People Reached
About Me

Ive had all the Knight Rider jokes about black cars, talking into my watch and going out crime fighting... so please don't flood my inbox with KR jokes lol Am a previous MSN (Microsoft) Technical Support Professional, now working for my self as a Forensic…

Interests
Movies, Music, Walking, Reading scary books / Tech manuals, Computer Forensics.
Member Avatar for Roebuc

Has anyone heard of or better yet have experience with these programs? I am starting a computer repair business, I live in MT and I have a big truck. A program like these could save me a ton in gas and mileage since my customers can be up to 100mi …

Member Avatar for Craig_4
0
178
Member Avatar for SergioQ

I've seen this on a few sites, though I can't think of one right now. I would like my server to be able to get a URL, then take a screenshot (picture) of it. I really hope there is a Perl module for this. Anyone know what I am talking …

Member Avatar for cyberkingz
0
186
Member Avatar for richie513

Hi everyone, I am only new here, and quite looking forward to getting to meet with a lot of you. But right now, I have a very frustrating problem that has only started today. Every time I start my Firefox browser, it starts to open up multiple tabs by itself, …

Member Avatar for Rik_
0
1K
Member Avatar for kv79

Hi all, I want to enter to my computer trough network , for example when I go to -start - run - and type [code]\\80.242.118.7\c[/code] He ask me for the password . How can i set a password for a network . I have a username and password for my …

Member Avatar for nur alam
0
171
Member Avatar for mcefreak

Whenever I want to boot system mechanic 7 I get this pop up window that reads: [QUOTE][B][U]-Internet Explorer Script error[/U][/B] -:icon_exclaim: An error has occurred in the script on this page: Line: Char: Error: Code: URL: Do you want to continue running scripts on this page: (Yes) (No)[/QUOTE] Clicking on …

Member Avatar for crunchie
0
406
Member Avatar for Geek-Master

The problem that I am facing is that Word 2007 is adding spaces in a mail merge when there isn't a value from an excel document. <<FirstName>> <<MiddleName>> <<LastName>> I've placed spaces in between the template place holders to seperate the names. However, when a record doesn't have a middle …

Member Avatar for Lisa Mayberrry
0
4K
Member Avatar for brasileiro

WoW is a pretty good game. I downloaded the free trail but the trail's over and i have no space on my hard drive to download a game. please help me find a game.

Member Avatar for Maywyn
0
584
Member Avatar for manouche

I am using Windows XP with Outlook 2003. I have a very frustrating problem with Outlook. I periodically toggle between sending in plain text and html. However, I know that any incoming html mail is supposed to default to be viewed in html. Every message that comes to me is …

Member Avatar for jingda
0
485
Member Avatar for Michael_Knight

Hey everyone. It seem's this is the place to post anything we want (within reason) so I thought I would start a thread to find out what your favorite quotes are. I'll start with one of mine (though I have loads more): [B]People always turn away from the eyes of …

Member Avatar for happygeek
0
1K
Member Avatar for delphine

Hi, I'm getting a BSOD when I try to boot into Safe Mode :/ The reason I've been trying to boot into Safe Mode is because I want to delete and replace some fonts with a newer version of them, and I can't do so in normal Windows because my …

Member Avatar for jholland1964
0
439
Member Avatar for Krimi

hi im trying to create a small excel addin in VS2008 byt i cant figure out how to write lika a string or an int to a specific cell? for example: i want to write something in cell B1? how do i do that in the C# code? it must …

Member Avatar for SuperSid
0
330
Member Avatar for elove

Hello all.. I am a new user of Windows Vista (came installed on my new laptop). Which Microsoft Office Suite is the best version to run with Vista. I want to install one that does not hog all my resources and take up too much space. Also, when you install …

Member Avatar for caperjack
0
2K
Member Avatar for Isonis

Hi! My System Restore is not working.. I would like to try to go back. I click System Restore, choose a date, but when it reboots, it says that it didn't restore?

Member Avatar for caperjack
-1
107
Member Avatar for number87

I have been having this problem with windows defender for a very long time. Whenever I click the update definitions on Windows Defender I get an error code and it is unable to update. My AVG antivirus and Comodo firewall have no problems updating. Even my windows update works properly. …

Member Avatar for Technocrate25
0
481
Member Avatar for Michael_Knight

The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this …

Member Avatar for iwallet
0
237
Member Avatar for Michael_Knight

How long before [URL="http://www.skype.com"]Skype Ltd[/URL]. ends up as an item for bid on eBay? Ever since its acquisition by the Internet auction site, Skype has been a rudderless boat — and without a captain, following the departure of cofounder Niklas Zennstrom, who took £2.8 billion of Skype’s £5.2 billion value …

Member Avatar for sistie23
0
141
Member Avatar for Michael_Knight

Every year sees a fresh crop of security breaches. Most go unreported, unless they involve consumers' personal data, at which point companies are required to give timely public notice of security breaches. The following list of 2007's worst security breaches consists mainly of such reportable incidents. The incidents are sorted …

0
75
Member Avatar for Michael_Knight

For many people, the word "[B]encryption[/B]" invokes images of spies, clandestine operations and World War II, or [URL="http://en.wikipedia.org/wiki/Nsa"]NSA[/URL] code breakers feverishly working to decipher enemy messages. Actually, encryption is a priceless security tool that any business can easily use to keep sensitive information confidential and safe from prying eyes. Unfortunately, …

Member Avatar for kris2000
0
183
Member Avatar for Michael_Knight

[B]A picture may be worth a thousand words, but it could also hide something more treacherous. [/B] Today, businesses wanting to guard against the potentially ultra-serious hazard of vitally important data being deliberately leaked to unauthorised people outside or even inside the organisation, need to get to grips with an …

0
69
Member Avatar for Michael_Knight

[B]Rumors and speculation about why five undersea cables to the Middle East have been severed — and what it means for IT security[/B]. Since [B]Jan. 30, 2008,[/B] there has been a troubling pattern of underwater anarchy. At first, it was reported that two, then three, then five undersea [URL="http://en.wikipedia.org/wiki/Fiber-optic"]fiber-optic[/URL] cables …

0
339
Member Avatar for Michael_Knight

When you think of security, it's a good bet that some of your thinking drifts to hackers and crackers. These are both security threats that you have to take into account. But do you know the difference? Well, some people do, and although many of them don't want their names …

Member Avatar for Mhammond7
0
165
Member Avatar for Michael_Knight

[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It …

Member Avatar for Elina Tsai
0
353
Member Avatar for Michael_Knight

If we're honest every one of us imagine what we'd do with a few million in the bank. The yacht in Cannes, the private jet in Nice, possibly our own football team, and maybe a few other high maintenance accessories top our list of must-haves. But of course the question …

0
136
Member Avatar for Michael_Knight

[B]The Problem[/B] With the availability of chat rooms and groups on Internet Web sites, the temptation to meet new people online increases, according to research. Online relationships provide individuals with an outlet to tell secrets and express themselves to a stranger anonymously, while allowing for the creation of another persona. …

0
55
Member Avatar for Michael_Knight

Over time, spammers have changed their spamming tactics in their bid to gain access to people's mailboxes. The latest tactic is to use the common [B]PDF [/B]file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, …

0
86
Member Avatar for Michael_Knight

In today's heightened threat environment, it is a constant battle for IT security departments to stay on top of all possible attacks and vulnerabilities they could encounter. With insider threats on the rise and the continuous danger posed by external hackers, coupled with the alarmingly quick development of stronger and …

0
280
Member Avatar for Michael_Knight

What is Malware? Malware, is short for [B]MALicious softWARE[/B] and is a term used to broadly classify a form of software which is installed in a computer system mostly without the owners permission with malicious intentions. It includes Trojans, viruses, key loggers, malicious active content, rogue programs and diallers among …

0
57
Member Avatar for Michael_Knight

[B]Overview[/B]: The lack of sensory information on the Internet (like too many teenagers and younger kids with a [URL="http://www.facebook.com"]Facebook[/URL] or [URL="http://www.myspace.com"]Myspace[/URL] page) may have a significant impact on cyberstalkers, as described by Meloy ("The Psychology of Stalking," Meloy, J.R) "The absence of sensory-perceptual stimuli from a real person means that …

0
73
Member Avatar for Michael_Knight

Data is used in almost everything we do these days, there are many more ways for companies, people at home or the government to lose data. But it keeps happening. Banks, the 100+ departments of local councils, (including libraries) and every website you buy or register on. The list is …

0
50
Member Avatar for Mushy-pea

I invented an encryption algorhythm today and used it to "hide" the information in an unused password I came up with. This was done on paper, not with a program. However, I am planning to start laying some code down for this today (in Haskell, partly as an exercise to …

Member Avatar for Michael_Knight
0
117