answersLogoWhite

0

Yes. Any opening you leave in your computer will increase it's vulnerability to a certain extent. If you enable file and print sharing, it is possible for other computers to access those shares from the internet.

User Avatar

Wiki User

8y ago

What else can I help you with?

Related Questions

Which of these is a crime the computer has been used for?

Cyberstalking, hacking, and identity theft are crimes that involve the use of a computer.


How does Computer identity theft differs from theft in the real world in what major?

Identity theft can affect your credit without your knowledge!


How can parents protect their children from identity theft?

Parents can protect their children from identity theft by monitoring their personal information, teaching them about online safety, and being cautious about sharing sensitive information.


What does the Protect My Identity software do?

Protect My Identity software can accomplish many things for your computer. Primarily, it is used to protect the information stored in your computer, which helps prevent identity theft and other forms of security breaches.


What is a computer viurs?

A computer virus is a bad piece of code meant to do destruction to your computer or identity theft. It hides itself as a fake antivirus or in file mainly.


What are the risks associated with sharing bank account numbers with others?

Sharing bank account numbers with others can lead to unauthorized access to your funds, potential fraud, identity theft, and compromised financial security.


What laws does a hacker break?

Hackers can break various laws, including unauthorized access to computer systems (Computer Fraud and Abuse Act), theft of data (Data Protection Act), identity theft (Identity Theft and Assumption Deterrence Act), and distributing malware (Computer Misuse Act). Additionally, laws regarding intellectual property rights, privacy, and cybersecurity can also be violated by hackers.


Where do computer viruses and worms come from?

They can be made by pranksters that just want a laugh. Sometimes they can be made for more malicious reasons like hacking and identity theft. They end up being spread through the internet through file sharing and sometimes even visiting a website can lodge one in your computer.


Where can I purchase identity theft protection online?

There are several websites where identity theft protection is offered as free software to download. But how do you choose just one when any of them could also install a virus on your computer that is difficult to get rid of? Go to trusted sites such as www.lifelock.com or the government upheld website www.ftc.gov for the best identity theft options and tips.


One of the biggest dangers of oversharing online is?

Identity theft.


How common is corporate identity theft?

corporate identity theft is becoming more and more common. The identity theft is no longer only restricted to individuals only. Due the this , FACT act 2003 is also amended to check and prevent corporate identity theft


When did identity theft become a law?

Identity theft began to be addressed through laws in the 1990s. The Identity Theft and Assumption Deterrence Act was enacted in the United States in 1998, making it a federal crime to knowingly transfer or use another person's identity with intent to commit unlawful activity.