answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Are there any social networks that arent blocked at school?

Hi!

It depends on the firewall and the school district/college. The easiest way to bypass all of this would be to use AirProxy. Google "Air Proxy" and choose SSL Mode from the top result on Google if the normal AirProxy site is blocked.

-- tylerb1996

What is a browser cookie?

Browser CookiesAn HTTP cookie is a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server. HTTP cookies are used for user authentication, user tracking, and maintaining user-specific information such as site preferences and electronic shopping carts.

Cookies have been of concern for Internet privacy, since they can be used for tracking the browsing of a user. As a result, they have been subject to legislation in various countries such as the United States, as well as the European Union. Cookies have also been criticized because the identification of users they provide is not always accurate and because they can be used for network attacks. Some alternatives to cookies exist, but have their own drawbacks.

On the other hand, cookies have been subject to a number of misconceptions, mostly based on the erroneous notion that they are computer programs. In fact, cookies are simple pieces of data unable to perform any operation by themselves. In particular, they are neither spyware nor viruses, despite the detection of cookies from certain sites by many anti-spyware products.

Most modern browsers allow users to decide whether to accept cookies, but rejection makes some Web sites unusable. For example, shopping baskets implemented using cookies do not work if cookies are rejected.

More Information:

A cookie is a piece of data that can be stored in a browser's cache. If you visit a web site and then revisit it, the cookie data can be used to identify you as a return visitor. It remembers the visited pages in your system each and every time by holding data for a single web session, that is, until you close the browser data.

A cookie is a bit of electronic information that can be placed on your computer when you visit a Web site to track what you look at there, recognize you when you return, and in some cases, track where else you go on the Internet. You can set your online preferences to prohibit, limit, or let you know about "cookies" that a Web site places on your computer.

Most cookies are not bad things - you may get the impression that cookies are spying devices ("track what you view") - but for the most part they are harmless and quite useful; for example, a cookie might store your login information for a website or a forum, allowing you to visit that website/forum without logging in again each time. This is all the Wiki s cookie does.

How can you use internet safely?

First you are going to need to make sure that you keep your computer updated. Microsoft and Apple regularly release updates to patch any problems that have been found with the operating system that could be attacked by hackers. You will also want to keep your web browser updated. Internet Explorer is updated by Windows Update and Firefox and Chrome are updated automatically each time you run them. Next you will want to make sure that all of the browser plugins are updated. A browser plugin is a program that allows you to do things that your browser alone can't do. Some examples of browser plugins include Adobe Flash, Adobe Shockwave, Adobe Reader, Java and Microsoft Silverlight. It is becoming very common for cyber criminals to attack browser plugins. This is because generally people keep their computers updated and browsers are becoming easier to keep updated but not many people keep their browser plugins updated. It works with all browsers and they provide links for your out dated plugins so that you can update them. Last but certainly not least, YOU MUST HAVE SECURITY SOFTWARE ON YOUR COMPUTER.

How does a firewall effectively control traffic?

A firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy.

What is difference between web server and proxy server?

What is the difference between a packet filter and a proxy?

Preface

So you think you know what a proxy is? Well if you are familiar with the old Web Proxy servers please forget everything you thought you knew about proxies. We are talking about something very different. The old proxy servers took web requests from clients and checked to see if it had that page already cached, and if not, it would then redirect the client request to the internet, if the request was allowed. A linear flowchart would look something like:

  • Client request for KnowtheNetwork.com -> Proxy checks cache -> Not found, forward request
  • Client request for Google.com -> Proxy checks cache -> Cached page found, replies w/ cached page
  • Client request for badwebsite.com -> Proxy checks cache -> Proxy denies the request based on policy

A modern day proxies are entirely different.

What is a common password vulnerability?

There are many things that can make your password vulnerable. Some examples of password vulnerability are not changing the default password on a router, using common words or words that can be easily guessed by someone that knows you, and using the same password for all of your accounts.

How do you get onto game websites in school?

here people I have a answer for some people. 1 way to get past the blocked websites is 2 use Bing I tried it and it worked. If that does not work use microse.com scroll all the way down type the website and there that will get you into it. hope that help bye.

Can a wireless user be monitored in an unsecured wireless network?

If you do not set password for your wireless network you will get unsecured network. If you mean that you want use your router to connect to another unsecured wireless network and create so called "bridge" the answer is yes. But! Router from different manufactures usually do not work together in the bridge configuration. There are some exceptions but just few.

How secure is Secure hosting?

Bluehost

Bluehost is a leading web hosting solutions company. Since our founding in 2003, Bluehost has continually innovated new ways to deliver on our mission: to empower people to fully harness the web. Based in Orem, Utah, we provide comprehensive tools to millions of users throughout the world so anyone, novice or pro, can get on the web and thrive with our web hosting packages.

2003

Bluehost hosting services was founded by Matt Heaton and Danny Ashworth in Provo, Utah.

+2M

We power websites all over the world and support thousands more every day.

750+

Our vast team is dedicated to helping our customers around the clock, 24/7 so we can be the best web hosting company to our customers at all times.

CHECK NOW WHAT THEY OFFER AND SAVE IN BELOW LINK:

SALE ON WORDPRESS HOSTING AS LOW AS $3.95 PER MONTH.

&

PREMIUM VPS HOSTING.

cutt.ly/1h0AobB

How do you create password in hard drive?

You need to go to your System BIOS. When you boot up your computer, you will have to press Alt-F2 or something similar. This depends on your computer model. In the BIOS, there should be a section called "Security" or "Passwords" or something of that nature. There should be an option to ask for a "Password on Boot". The default should be all zeroes. You can put in a password which should force the user to enter a password before the operating system even boots up. DO NOT forget this password, otherwise you will be permanently locked out of that hard drive. You can obtain the master password from the manufacturer if you were the original purchaser.

How do you delete the history on internet explorer?

In order to delete your history, you need to go to Internet Options. This can be found on the Command Bar, which is found on the IE toolbar, under the Tools tab.

Once you click on the Tools tab, go down to Internet Options, and click on it. This will open the Internet Options area.

On the General tab (the first one you see) go down until you see Browsing History. Make sure the "delete browsing history on exit"* box isn't checked.

You will see two options; one is delete, the other is Settings. Click on the delete button (don't worry, it won't just automatically delete anything). Once you click on the Delete button, another box will open. This area gives you several options of files that can be deleted.

If the only thing that you want to delete is your History, you can do so. However, temporary Internet files, and cookies can take up alot of space on your hard drive as well. You can safely delete Temporary Internet Files, and Cookies that are on your hard drive, without losing the speed in which your favorite websites are loaded.

This is simple to do. Go to the top of the page, and make sure that the box next to: Preserve Favorites Websites...is checked.

The box next to InPrivate Data Filtering should always be checked.

Make sure that you have checked, or unchecked all of the boxes next to the files that you want deleted. Then go to the bottom of the page, and click Delete.

If this is the first time that you have deleted these files, it will most likely take a long while for this process to complete.

Enjoy your lighter hard drive, and IE!

(There is another way in which to access the Internet Options files. If you open your Control Panel, you will see Internet Options listed there as well).

* If you decide that you want your Browsing History deleted every time that you exit Internet Explorer, you can check that box once you have finished deleting your History.

What do you do if you can't get on a website?

go to the internet archive and look it up or sometimes google has the cached version of the page just check to the right of the search result and it says cached.

http://www.archive.org/index.php --Internet Archive.

Which would be the best and cheap SSL Certificate in 2013?

COMODO POSITIVE SSL Certificate is the cheapest SSL Certificate. Starting at only $49.00 per year, Positive SSL is one the most cost effective SSL Certificate available today. SSL certificates can be purchased for a term of up to 10 years. See the related link.

Issued in minutes, Positive SSL certificates provide the highest levels of protection for business websites.

What are the Disadvantages of management information systems?

Disadvantages of management information system

Unemployment - While information technology may have streamlined the business process it has also crated job redundancies, downsizing and outsourcing. This means that a lot of lower and middle level jobs have been done away with causing more people to become unemployed.

Privacy - Though information technology may have made communication quicker, easier and more convenient, it has also bought along privacy issues. From cell phone signal interceptions to email hacking, people are now worried about their once private information becoming public knowledge.

Lack of job security - Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure.

Dominant culture - While information technology may have made the world a global village, it has also contributed to one culture dominating another weaker one. For example it is now argued that US influences how most young teenagers all over the world now act, dress and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else.

Which intermediary devices could be used to implement security between networks?

Security between networks is implemented in an intermediary device (a router or firewall appliance) at the perimeter of the network. The firewall function performed by this device permits only known, trusted data to access the network.

Are there games websites for school computers?

Every school blocks different sites. Remember: your school blocks sites that they think are not helpful or distracting. You go to school to learn and spend time with friends. There is plenty of time to play games when you go home.

Is digital signature a digital certificate?

A Digital Signature establishes the identity of the sender or signee electronically while filing documents through the internet. The Ministry of Corporate Affairs (MCA) mandates that the Directors sign some of the application documents using their Digital Signature. Hence, a Digital Signature is required for all Directors of a proposed Company.

What would you do if you receive an email telling you that you've won 500 pounds in a competion you did not enter?

Do not open it. Do not click on any links if you did open it. Delete the email.

More thoughts

you ignore the email as if you did not enter the competition then the people are not who they said they are and are trying to hack your computer or find out personal information

How do you unblock addresses blocked by NOD32 Antivirus?

advanced setup -> web access -> https -> address management -> add domain name to list of excluded from filter using * (eg *www.domain.com*)

Are slender proxies real?

well yes he is real because he is a Marble hornets and Tim sutton (aka Masky) has been seeing him and call slenderman the 'creature'

What do you do if you think your Facebook account has been hacked?

Eliminate him/her from your contacts (so the hacker wont have access to your information ;)

~

Block the hacked page and inform others to do the same. Also inform others that the facebook page is not your friend but indeed a hacker.

Then change your password so the same doesn't happen to you

What is the most efficient Internet security Software?

Many internet security softwares exist nowadays making it rather complicated to determine which one would be the best. In my opinion, Norton fits the bill. It is very efficient and simple to install. It is also very simple to keep it up to date and renew it once it has been installed.

How do you unpoke someone?

You can't "Unpoke" But when they poke you, you can choose to ignore their poke. They can also do the same for you.

How do you provide security for VPN?

VPN is a security measure of the data transmission. So the weak point would be :

1. How strong is the data transmission encryption.

2. How adequate is the endpoint security.

3. Overall how good is the policy Protection of networks & their services from unauthorized modification,destruction, or disclosure , & provision of assurance that the network performs its critical functions correctly & there are no harmful side-effects.Network security includes providing of data integrity.

Answer Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.

Even the owner of the VPN server can not physically see what information is held on its server - as for me it's pretty good security.

However, this does not mean that you should use unverified VPN services.

I use this: boxpn.com and I'm satisfacted- speed and cost is very ok.

And if we talk about security, OpenVPN protocol will help you (by the way, in boxpn, he is present).