RSS

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a question

Join Now or Sign In to ask a question.
bmahne
7 min ago

I want to replace the string "IDG" with "IDGE" in a sting fieldHow do I do that?

1 Answer |
tswayne
21 hours ago

Avast released a report saying that they were able to recover data, including rather compromising personal photos, from used Android devices that had been “...

TheCount
1 day ago

Microsoft has announced that Windows 7 will enter Extended Support status in January 2015. How will this affect Windows 7 users? Will there be any changes...

jluppino
1 day ago

I’m about to head out to Europe and will spending time both on the continent and in Wales. Obviously I will at least need a European and British AC adapters...

PaxProSe
1 day ago

I am familiar with and use the Tor browser when on my Windows laptop to try to maintain some semblance of online privacy. Is Tor sufficient to ensure...

catamount
1 day ago

We were looking at changes in our website’s traffic over the past few months and have a disagreement. One member of our staff claims that a forum is...

Phil Johnson
1 day ago
TRUSTED VOICE

Are you a software developer who was a particular attachment to a keyboard? What's your keyboard of choice for writing code and why?

2 Answers |
landon
1 day ago

How can I try a preview version of the upcoming version L of Android?

Tags: android, Android OS |
2 Answers |
LolaBelle
1 day ago

I know that Microsoft is a big company with lots of capabilities, but how did they take down all of No-IP.com’s domains? From what I’ve read, that wasn’t...

Tags: malware, Microsoft, no-IP |
2 Answers |
jack12
1 day ago

How do FTP and HTTP differ in the manner in which they transfer files? Does one offer any significant advantage over the other?

Tags: file transfer, FTP, http |
2 Answers |
The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.
But Wzor acknowledges that the case prompted move to go underground and break off communication with sources.
Microsoft is coming out with new hardware and cloud management features for its StorSimple hybrid storage offering that promises lower costs and better data protection.
Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock.
Amazon Web Services is offering a new document sharing service with management and security features designed to appeal to businesses.
Amazon.com has billed parents for millions of dollars' worth of unauthorized in-app purchases made by their children, the FTC said in a complaint filed Thursday in a U.S. court.
Apple fans may not be the only ones waiting for a new iPhone later this year -- semiconductor industry revenue will get a boost from it too, according to Gartner.
The U.S. Senate Judiciary Committee has voted to approve legislation that would allow mobile phone owners to unlock their devices for the purposes of switching carriers.
The scope of a recent security breach at a digital certificate authority (CA) controlled by the Indian government is bigger than initially thought and also targeted domain names owned by Yahoo, in addition to several owned by Google.
The top American intelligence officer in Germany has been asked to leave the country in the wake of revelations about National Security Agency spying and two recent cases in which the U.S. reportedly recruited German spies.
Today's question
How prevalent is 'private power generation' for data centers becoming?

Answer this question now!
Submitted by nrichmond
randomness