security
- Filter:
- Most Recent
- Greatest
- Orphans
-
Non-password authentication methods: theoretical advantages?
Asked by BeeePollen | 4 responses -
Will iPhone Face ID (and Android Face Unlock) work if you are dead?
Asked by elbanditoroso | 8 responses -
How do those door cameras (e.g., Ring) work? Do they require a smartphone?
Asked by Jeruba | 13 responses -
How did the air line industry ever come to the conclusion that nail clippers are a deadly weapon?
Asked by SQUEEKY2 | 13 responses -
Should I read "The Sword and the Shield," or something else?
Asked by capet | 5 responses -
Semi-urgent - What is a trusted site that would tell me if a file I have is a virus, keylogger, trojan, etc?
Asked by smudges | 13 responses -
How to sell "security" technologies to banks, insurance companies or FinTechs (tips and tricks)?
Asked by squirro | 6 responses -
What’s better for home voice and security systems?
Asked by JLeslie from iPhone | 2 responses -
Do you have any suggestions for a cheap, managed PostgreSQL hosting solution for a tiny database?
Asked by gorillapaws | 1 response -
Had anyone received a Google Message about Google security drive update for July 26 2021 and how this will affect one's Files ?
Asked by Inspired_2write | 5 responses -
Do you trust the cloud as a storage place?
Asked by Jeruba | 26 responses -
What is a good way to get rid of a whole lot of paper that might contain confidential information?
Asked by Jeruba | 24 responses -
How long do Microsoft accounts stay locked due to too many unsuccessful login attempts?
Asked by capet | 6 responses -
How do I find out the domain name registration and web hosting for my husband's two websites?
Asked by Jeruba | 22 responses -
Was it outside of reason for walls to be put up around the White House when BLM protests were in full swing in Washington?
Asked by JLeslie from iPhone | 2 responses -
If you were in charge, how would you get control of a massive building that has been breached by an angry mob?
Asked by jca2 | 13 responses -
Do you shred documents that contain private information before you dispose of them? Do you even worry about stuff like this?
Asked by Jeruba | 17 responses -
Is this information realistic or am I most probably missing something?
Asked by luigirovatti | 6 responses -
Security about mobile camera?
Asked by Ash034 | 3 responses -
Email security: what is the actual risk level of sending one's govt ID as an email attachment?
Asked by marmoset | 4 responses -
Where can I go to order customized security uniforms?
Asked by emorris25 | 2 responses -
What are the latest trends in clandestine photography in present-day cyber and digital domains?
Asked by ahmedkamaltahir | 1 response -
How do you feel about Congress authorizing millions in federal grants for churches and nonprofits security?
Asked by KNOWITALL | 88 responses -
Some tech Companies are asking that their employees have an implant that has all the pass codes required to enter and use devices within that company. Would you consent to this ,why or why not?
Asked by Inspired_2write | 14 responses -
Can you explain this quote from Benjamin Franklin? (details inside)
Asked by RedDeerGuy1 | 12 responses