Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

3,959 Questions
Computer Terminology
Internet Security and Privacy
Web Browsers

What is a browser cookie?

Browser CookiesAn HTTP cookie is a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server. HTTP cookies are used for user authentication, user tracking, and maintaining user-specific information such as site preferences and electronic shopping carts.

Cookies have been of concern for Internet privacy, since they can be used for tracking the browsing of a user. As a result, they have been subject to legislation in various countries such as the United States, as well as the European Union. Cookies have also been criticized because the identification of users they provide is not always accurate and because they can be used for network attacks. Some alternatives to cookies exist, but have their own drawbacks.

On the other hand, cookies have been subject to a number of misconceptions, mostly based on the erroneous notion that they are computer programs. In fact, cookies are simple pieces of data unable to perform any operation by themselves. In particular, they are neither spyware nor viruses, despite the detection of cookies from certain sites by many anti-spyware products.

Most modern browsers allow users to decide whether to accept cookies, but rejection makes some Web sites unusable. For example, shopping baskets implemented using cookies do not work if cookies are rejected.

More Information:

A cookie is a piece of data that can be stored in a browser's cache. If you visit a web site and then revisit it, the cookie data can be used to identify you as a return visitor. It remembers the visited pages in your system each and every time by holding data for a single web session, that is, until you close the browser data.

A cookie is a bit of electronic information that can be placed on your computer when you visit a Web site to track what you look at there, recognize you when you return, and in some cases, track where else you go on the Internet. You can set your online preferences to prohibit, limit, or let you know about "cookies" that a Web site places on your computer.

Most cookies are not bad things - you may get the impression that cookies are spying devices ("track what you view") - but for the most part they are harmless and quite useful; for example, a cookie might store your login information for a website or a forum, allowing you to visit that website/forum without logging in again each time. This is all the Wiki s cookie does.

601602603
Operating Systems
Internet Security and Privacy

What is an access matrix in an operating system?

Is a matrix that shows the protection level accross several domains.

447448449
Microsoft Windows
iPhone
Internet Security and Privacy
Microsoft Outlook and Live Hotmail

How can you bypass a Smartfilter to access your Hotmail account from work?

:You should not, the Smart Filter is there for a reason and if you attempt to bypass it you will most likely be violating policy which could lead to negative action being taken against you.
351352353
Computer Viruses
Droppers
Internet Security and Privacy

What does Dropper Funweb A do and how can you get rid of it?

It happened to me too.I have AVG Anti-Virus...I ran it and it took care of it.You can get a free version at:

komando.com

This site might help explain what it is and what it does:

f-secure.com

Good luck!

I also got this Trojan Horse when downloading the Smiley Center. I have AVG anti virus and this said it has got rid of the virus but when I tried to download Smiley Centre again I get an error message stating that the virus is in my Local Settings Local Settings\Temp\ICD1.temp\f3setup1.exe and to run AVG. Any suggestions how to solve this problem would be appreciated.

My advice is DON'T try & d/load Smiley Central again, you'll just get the Trojan again, as I did.

If you like smilies, you,ll like "EMOTICONS", just enter it on your search engine & download it, it's very good, plus it has extra features; animation, e-cards etc.It isn't the easiest thing I have downloaded, but you'll get there in the end, & NO virus!!

The virus has been found in Temporary Internet Files folder, in thecache of Internet Exporer. The easiest way how to remove this virusis to empty Internet Explorer cache.Please run Internet Explorer, select menu Tools -> Internet Options.Approximately in the middle of the dialog window is button "Deletefiles...". Press this button, check the "Delete all offline content"option and press OK.This operation will remove all viruses located in Temporary InternetFiles.

I also got this yesterday when I clicked on a link to get a birthday e card from a friend. Inadvertently, I clicked on the smiley icon on the screen and Trojan horse came up and I immediately shut everything down, then I downloaded an updated AVG and then ran AVG, which told me I had it and that AVG had gotten rid of it. That seemed to have done it. I also did a scandisk and defragged, so far so good!

317318319
Internet Security and Privacy
Web Browsers
Social Media

What is CavalryLogger?

It is a script connected to having the "Like this" functionality on a page. It seems to be related to FB badge.

311312313
Internet Security and Privacy
Computer Security

Can police track an IP address after it has been changed?

Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this system as usual, it can generally be tracked. If the user uses a proxy service to make their IP address appear as if it is located in some random other part of the world, it may be more difficult to track.

273274275
Downloader Viruses
Internet
Internet Security and Privacy

How can you best protect your privacy on the internet?

  • 1. Use a password manager 2. Disable GPS and Wi-Fi on your mobile device until you need them3. Read the access privileges for apps carefully, and make good choices 4. Guard your date of birth and telephone number 5. Make yourself more difficult to find on social media 6. Keep your work and personal presences separate 7. Encrypt your connection
  • 8. Collective action 9. Clean browsers before and after browsing from any one of these software Privazer or Soft Cleaner. Always detach internet connection when it is not needed,even it broadband or WiFi.
  • 10. Always visit on SSL encrypted (HTTPS) Website.
262263264
Computer Viruses
Internet Security and Privacy
Computer Security

What do you do if Spybot will not 'Immunize'?

redownload spybot.

261262263
Computers
Internet Security and Privacy
Artificial Intelligence

How are computers useful in daily life?

With ever increasing availability of more complex and dynamic operating systems, the primary use of a computer is only limited to the imagination and technical know how of the user.

Some examples of use in the home:

  • Network attached storage (Linux distribution named FreeNAS)
  • Media Server (Hewlett-Packard makes a dedicated version of this)
  • Graphics design (Adobe is the forefront in design software)
  • Architectural design (AutoCAD leads this category)
  • On-line banking (savings, loans, insurance, credit, mutual funds...)
  • Gaming (always fun, sometimes aggravating)
  • Social Networking (Myspace, Facebook, Twitter).
  • Knowledge sharing (WikiAnswers, Wikipedia, Lifehacker, Gizmodo)
  • Science (Folding at Home is a great example of home-based cloud computing)

The list goes on. These are just a few examples. Use your imagination, and chances are someone is using a computer in their home somewhere for that purpose.

247248249
Miscellaneous
Internet Security and Privacy

Are password managers effective and safe?

THEY ARE EXTREMELY EFFECTIVE AND SAFE! use it!!! Yes why not? If need any assistant regarding this contact Techvedic ExpertCrew. They will definitely help you over the phone.

249250251
Computer Networking
Broadband Internet
Internet Security and Privacy

What device connect one network to another?

A Router for the consumer type networks.

DSL/Cable modem to Router then everything else connects to Router---computers, printers, BlueRay players, HDTV, etc. The Router is in charge of distributing everything to where it needs to go.

227228229
Internet Security and Privacy

How do you protect yourself on the Internet?

First you are going to need to make sure that you keep your computer updated. Microsoft and Apple regularly release updates to patch any problems that have been found with the operating system that could be attacked by hackers. You will also want to keep your web browser updated. Internet Explorer is updated by Windows Update and Firefox and Chrome are updated automatically each time you run them. Next you will want to make sure that all of the browser plugins are updated. A browser plugin is a program that allows you to do things that your browser alone can't do. Some examples of browser plugins include Adobe Flash, Adobe Shockwave, Adobe Reader, Java and Microsoft Silverlight. It is becoming very common for cyber criminals to attack browser plugins. This is because generally people keep their computers updated and browsers are becoming easier to keep updated but not many people keep their browser plugins updated. It works with all browsers and they provide links for your out dated plugins so that you can update them. Last but certainly not least, YOU MUST HAVE SECURITY SOFTWARE ON YOUR COMPUTER.

213214215
Internet Security and Privacy

Does cheat engine put a virus on your computer?

  • In my opinion, DONT GET IT. unless you want a virus.
  • In my opinion, cheat engine is not a virus but a false positive but it is the easiest to detect if playing a multilayer game. If you really wish to use it, use it with simple flash games.
  • (false positive is a program that if marked as a malicious program because of the coding it uses but it's not aka the word: false positive)
  • Cheat Engine 5.5 doesn't have a virus. I suggest you use the good Anti Virus Software.
205206207
Internet
Internet Security and Privacy

What is a web debugging proxy?

A web debugging proxy is software that intercepts and logs all HTTP and HTTPS traffic including requests, responses and the HTTP headers which contain the cookies and caching information. Software developers use a web debugging proxy to diagnose and debug web traffic between a web application and a web server.

Examples: Fiddler, Charles.

193194195
Computer Viruses
Internet Security and Privacy

Does metin 2 give viruses?

Metin2 does not give viruses i have been playing for 3 years now and haven't got a single virus since but i only know for Metin2 us I'm not sure about the rest but Metin2 us is clean no viruses. Have an antivirus install in your PC .so that antivirus shows up if any antivirus exist.

191192193
Internet Security and Privacy
Web Browsers

Logmein is an example of a?

remote access service for mobile devices.

It can also be used by technical support agents to remotely take control of your computer, with your permission, to troubleshoot and fix problems on your computer.

187188189
Internet Security and Privacy
Social Network Websites
Facebook

My wired Internet connection keeps getting hacked and people I do not know send me friend requests how is this happening and what can I do to stop it my isp says impossible?

  • If you are on Facebook then you will get emails asking you if you want to accept certain people as friends and most of them you will not know. Facebook is a way of making new Internet friends. If you are on Facebook then either cancel it or check off that you do not want to receive emails.
181182183
Internet Security and Privacy
Facebook
Email and IM
Yahoo Mail and Messenger

What can you do if someone is using your Hotmail account to send junk email?

Nothing

175176177
Computer Viruses
Internet Security and Privacy
Child Internet Safety

What are the problems with the Internet and security and how are people trying to resolve these problems?

Most of the security problems encountered on the Internet are due to human mistakes.

The first level of security "leaks" usually occurs during the developpement of the website. If a website developper doesn't correctly plan or proof test his scripts, an eventual hacker could extract confidential information from the website itself. This is usually done by exploiting particular errors or by inserting some particular code snippets into an input field or website URL.

The usual way to fix this problem is to make better planning when coding your website and to further test your scripts, especially those dealing with private datas.

Another kind of security problem are problems due to users neglecting their own private informations. A good example of this kind of neglection is when someone gives away his or her email address on a public forum. Some "crawler bots" (small programs coded to collect email addresses) could find the address and add it to a mass-mail list, sending spam to the user. This may not be a dangerous "security" problem but the same can also happen with user names and passwords. Most of the big hacking cases occure simply because an important user of a particular network gave away his private information.

The main way to fix this problem is to be very careful to who and how you display confidential datas. The best thing being simply not to display them.

Another big security problem is the download of virus-infected files. Most of the virus will usually not affect your computer, still, some of them might contain damageable programs for your computer or even allow a distant user to take control of your computer. These programs are called a "Trojan Horse". While some people may believe the opposite, it is impossible for someone to download potentially damaging files to your computer without your content, as long as you don't let your computer filter your downloads. At the same time, it is barely impossible to simply "get a virus" by surfing on the Internet. Virus mostly come with downloaded files that you usually consented to download or in attached email files that you opened without previously checking it.

That being said, the trick here is again to be extremely careful when you download a file. Peer-to-peer networks are also good virus hives and it is preferable to stay away from them.

The last and probably most uncommon internet security problem is hacking itself. True hacking usually means that the hacker had no or few information on his target and does most of the breakthrough with his own knowledge. Common users are usually not the target of hackers, hackers will usually try to get through security barrier of big organisation's Internet servers or try to hack Website Servers. They usually get to do so by using some software engineering flaws that have yet to be fixed (most of Windows Xp auto patching aims to fix these flaws for example).

At large, there is no particular way to help in this case, unless you're the developper of that software. Simply report the case to the developper and wait for a security fix or a new version with better security.

Hopefully, some companies actively work at the elimination of all these problems. For example, Norton provides users with a whole array of security tools (e.g: Norton AntiVirus) that do make a difference when it comes to clean up (virus-wise) your computer. Microsoft is also developping a software called "Microsoft AntiSpyware" that aims to help the users keep their privacy, eliminating history datas and Spywares.

What you need to keep in mind is that most of the security problems on the Internet are due to the users misunderstanding of the media or human mistakes. You need to be extremely careful when transfering files or displaying private information and pay close attention to new kinds of virus or security leaks. It's best to also keep in mind that the Internet is not the only network, local or wireless networks are as much vulnerable than is the Net.

168169170
Science
Internet Security and Privacy
Architecture

What does the first gear made look like?

There have been several early mechanical constructions which have employed gears. Some of these used wooden rods for the teeth of the gears.

See the related link for an image.

157158159
Internet Security and Privacy
Vandal Patrol Program

What IP addresses should WikiAnswers supervisors be cautious about blocking?

WikiAnswers Supervisors should check the "Who Is" function of all IP addresses before blocking. IP addresses that belong to AOL users are shared. Blocking an AOL IP can result denying in dozens if not hundreds of undeserving users access to WikiAnswers.

Additionally, many schools permit and encourage students to use WikiAnswers. Most students access the site as unregistered users, and blocking an IP that belongs to a school also denies access to all other users who use the same IP. Check the IP in the IP mapper function linked below. Schools are relatively easy to identify from an overhead view (look for the sports fields and play grounds). IP Mapper is relatively accurate, however it is not pin-point accurate, so caution must still be used.

Finally, WikiAnswers supervisors should not be over-cautious about blocking IP addresses that are not schools, libraries, or AOL. When an IP Address is blocked, the user is forced to sign up with a Username and Password, so they are still able to access the site.

If you are unsure whether to block or not, please speak with a Mentor, Teen Mentor, or Senior Mentor.

157158159
Computer Viruses
Internet Security and Privacy

What computer virus has done the most damage?

Earthworms are a boon to the backyard gardener and healers still use leeches to thin a sick patient's blood, but no good has ever come from a computer worm or virus. Computer viruses have become increasingly dangerous and quick-spreading in the last couple of years, wildly proliferating through cyberspace and causing billions of dollars in damage.So try to use good anti virus software like Comodo ,Avast,etc...

157158159
Internet Security and Privacy

Does a virus make your computer screen go blank then come back?

Yup this may be due to virus also .

144145146
Computer Networking
Internet Security and Privacy
Facebook
Local Area Network

What IP is equifax using?

OrgName: Equifax - Electronic Commerce OrgID: EEC-7

Address: MailStop 42M, PO Box 740006

City: Atlanta

StateProv: GA

PostalCode: 30374

Country: US

NetRange: 216.46.96.0 - 216.46.127.255

CIDR: 216.46.96.0/19

NetName: EFXSECURE-1

NetHandle: NET-216-46-96-0-1

Parent: NET-216-0-0-0-0

NetType: Direct Assignment

NameServer: AUTH0.ATL.EQUIFAX.COM

NameServer: AUTH1.ATL.EQUIFAX.COM

Comment:

RegDate: 1998-08-24

Updated: 1999-11-29

RTechHandle: DG108-ARIN

RTechName: Galas, David F.

RTechPhone: +1-770-740-7343

RTechEmail: david.galas@equifax.com

139140141
Internet Security and Privacy
AOL Mail and AIM IM
YouTube

How can you find out who someone is from their screen name?

blkliberal888

117118119

Copyright © 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.