It seems that mdcomputers site has been compromised so don't make any purchase for now from there & change any passoword you used on their site which you also use on other sites because most probably your email & password details along with name/address details are also...
I've got an Acer E5-575G mainstream laptop with a 7th gen i5, 8GB RAM and 940MX graphics.
And I had Kaspersky Antivirus installed on it, which had started to bogg the laptop down ever since it was installed. It made the laptop stick in boot loops and considerably slowed down its performance. I...
Hi everyone! My name is Margot and I would like to know what do you think of a security smartphone that works based on its hardware. It has switches that allow the user to physically disconnect the GPS, the camera, the microphone, and the gallery of photos and videos.
Is there any way to setup a 2X night vision camera setup by using a laptop as a DVR ?
I want those cameras to run directly by using the laptop's USB power, so that there will be no need for a UPS/invertor.
If I use a WiFi Camera like this, is it going to work ?
Buy Sricam SP007 Wireless...
Bitdefender is offering 50% discount on Total Security 2017 and 3 yr license for 10 devices is available @ ₹5,099.5
Cost: Rs 509.95 per person (i.e Rs 170 per year)
The final cost will vary after payment of taxes but still it will be an awesome deal.
I've i ball andi 4.5 d royale previousely my antivirus is cm security, but now I turned to 360 security. After checking for virus scan it shows com.sts vulnerablity Which indicates it need to "Force stop" But I don't know what is com.sts Do i STOP IT OR NOT. Is it a malware???
I live in Kolkata and use a Wishnet Unlimited Plan from my LCO - *www.wishnet.in/priceing.html
for the past few days whenever I try to access a few sites, I have to pass the cloudflare security check
One more step
Please complete the security check to access"
The page also says - "If...
I am planning to buy a laptop for my daily use.. I Might play mid range games but nothing high profile... Not a fan.
My objective is to learn Virtulization and Security concepts
For training on virtualization (ESXi nested under Workstation) and security, what Configurations would you...
Hi, I'm Jayeed a cyber security especialist. I came to know about this forum from Google search result. I'm new in this forum. I will try to my best for better contribution. Writing on cyber security problem is my favorite hobby.
What are the Applications which you use (often)on your PC?
Let me share mine.
PC maintenance/Health - CCleaner/Glary Utilities/Tuneup/Defraggler/HD Sentinel
Media - WMP/VLC/Bsplayer
Security - 360 Total Security
Search - Instant File Find, Everything
Media editing - Photoshop
Outdoor security cameras are the most important in our security..outdoor security is perfect for preventing assaults and false claims of misconduct (ideal for schools, hospitals etc). CCTV helps to ensure adherence to health and safety policies and can be invaluable in staff training.outdoor...
I work in a small analytics setup of 10-15 people, and I need to share a drive present on the master computer (a desktop) so that all the people on the network (wifi connection) can use that shared drive using given credentials for retrieving files (large datasets). The drive size is over...
Hii guys, I'm looking for a working internet security suite for windows 10 Insider Preview Build 10130 . I already have a 3 year subscription with Kaspersky but it doesn't work with windows 10. So I'm looking for a good internet security suite(atleast give a 30 day trial since windows 10...
I'm in last year of electronics and tele-communication engineering, BE (EXTC).
I want to join cyber cell or make career in cyber security.
So what I need to do for making career in this, certification? or diploma? or anything else?
And 1 friend of mine done 12th, and have interest in this but...
I attempted to sign into my E-Bay account on E-Bay India, but surprisingly, the succeeding page displayed a message stating; something on the lines that 'my login attempt was detected using another/different computer'. Consequently, the security process initially...