answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Is there a proxy that can't be blocked?

Theoretically, no.

However, most are not.

Try setting up a ssh connection with a SOCKS proxy.

If you want something simpler, try using https:// if the filters are really bad or even using google cache. You can also get a free webhost and setup glype.

What are the advantages to using long passwords?

Most thiefs use a program which tries all the common words to steal your password. A long password which contains numbers in it is not common, and is difficult to duplicate with such programs. Any password with more than seven letter-number combination, foreign words, and scrambled words are much more difficult than the standard six letter words.

What is the purpose of a proxy server?

A proxy server has a large variety of potential purposes, including:

  • To keep machines behind it anonymous (mainly for security).
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content for malware before delivery.
  • To scan outbound content, e.g., for data leak protection.
  • To circumvent regional restrictions.

What is the best method for a company to secure data being transmitted across the Internet between remote sites?

Company and personal security are two things all internet users should always be aware of. If your company deals with sensitive information that must be transmitted between locations one of the safest ways to transmit is by encrypting it.

What are different types of firewalls?

Types of Firewalls :-

Packet Filtering - Blocks selected network packets.

Circuit Level Relay - SOCKS is an example of this type of firewall. This type of proxy is not aware of applications but just cross links your connects to another outside connection. It can log activity, but not as detailed as an application proxy. It only works with TCP connections, and doesn't provide for user authentication.

Application Proxy Gateway - The users connect to the outside using the proxy. The proxy gets the information and returns it to the user. The proxy can record everything that is done. This type of proxy may require a user login to use it. Rules may be set to allow some functions of an application to be done and other functions denied. The "get" function may be allowed in the FTP application, but the "put" function may not.

Proxy Servers can be used to perform the following functions.

Control outbound connections and data.

Monitor outbound connections and data.

Cache requested data which can increase system bandwidth performance and decrease the time it takes for other users to read the same data.

Application proxy servers can perform the following additional functions:-

Provide for user authentication.

Allow and deny application specific functions.

Apply stronger authentication mechanisms to some applications Fore More information you can visit website:http://www.iyogibusiness.com

What is an example of an application service provider?

An Application Service Provider (ASP) manages and delivers software to individuals or companies who rent the use of a software application for a specified period of time. In other words, one rents the use of software from an owner and one accesses it via the internet.

Why is it illegal to download music from the internet?

People can download music from the internet legally, if they go through a legitimate site or program such as I Tunes. People illegally downloading music from illegal websites or using illegal programs if not ethically right, and rips off copyrighted material. However this question can only be answered by personal opinion.

How do you give your computer a virus?

Well let's get a few things straight a worm and a virus are not the same. The phrase virus is a term that is commonly misused. A virus is malicious code that has the ability to replicate and send itself to another computer through a host or the computer that is already infected. A worm however behaves similar to a virus but it has the ability to copy itself from computer to computer without any human interaction. Worms unlike viruses have the ability to infect one computer and then find and infect other computers connected to the host via a network. As such you can become infected by a computer worm if another computer that has access to yours becomes infected. Worms are dangerous because it only takes one computer to set off the chain. That means a profitalble company that probably as atleast a hundred computers has a greater chance of being comprised by a worm than a virus. Worms are usually the first malware out. For they find and open holes for other malware such as trojans, spyware and adware to operate without detection. To keep your network safe configure your network to either restrict access of a computer to another computer or make it so in order for on computer to access your information it needs the go ahead from you. People don't realize that their actions can affect many other people.

What are good po rn sites not blocked by schools?

Use google to search for a proxy. You can connect to sites usually blocked by using one of these proxy sites.

Are there any social networks that arent blocked at school?

Hi!

It depends on the firewall and the school district/college. The easiest way to bypass all of this would be to use AirProxy. Google "Air Proxy" and choose SSL Mode from the top result on Google if the normal AirProxy site is blocked.

-- tylerb1996

What is a browser cookie?

Browser CookiesAn HTTP cookie is a packet of information sent by a server to a World Wide Web browser and then sent back by the browser each time it accesses that server. HTTP cookies are used for user authentication, user tracking, and maintaining user-specific information such as site preferences and electronic shopping carts.

Cookies have been of concern for Internet privacy, since they can be used for tracking the browsing of a user. As a result, they have been subject to legislation in various countries such as the United States, as well as the European Union. Cookies have also been criticized because the identification of users they provide is not always accurate and because they can be used for network attacks. Some alternatives to cookies exist, but have their own drawbacks.

On the other hand, cookies have been subject to a number of misconceptions, mostly based on the erroneous notion that they are computer programs. In fact, cookies are simple pieces of data unable to perform any operation by themselves. In particular, they are neither spyware nor viruses, despite the detection of cookies from certain sites by many anti-spyware products.

Most modern browsers allow users to decide whether to accept cookies, but rejection makes some Web sites unusable. For example, shopping baskets implemented using cookies do not work if cookies are rejected.

More Information:

A cookie is a piece of data that can be stored in a browser's cache. If you visit a web site and then revisit it, the cookie data can be used to identify you as a return visitor. It remembers the visited pages in your system each and every time by holding data for a single web session, that is, until you close the browser data.

A cookie is a bit of electronic information that can be placed on your computer when you visit a Web site to track what you look at there, recognize you when you return, and in some cases, track where else you go on the Internet. You can set your online preferences to prohibit, limit, or let you know about "cookies" that a Web site places on your computer.

Most cookies are not bad things - you may get the impression that cookies are spying devices ("track what you view") - but for the most part they are harmless and quite useful; for example, a cookie might store your login information for a website or a forum, allowing you to visit that website/forum without logging in again each time. This is all the Wiki s cookie does.

How can you use internet safely?

First you are going to need to make sure that you keep your computer updated. Microsoft and Apple regularly release updates to patch any problems that have been found with the operating system that could be attacked by hackers. You will also want to keep your web browser updated. Internet Explorer is updated by Windows Update and Firefox and Chrome are updated automatically each time you run them. Next you will want to make sure that all of the browser plugins are updated. A browser plugin is a program that allows you to do things that your browser alone can't do. Some examples of browser plugins include Adobe Flash, Adobe Shockwave, Adobe Reader, Java and Microsoft Silverlight. It is becoming very common for cyber criminals to attack browser plugins. This is because generally people keep their computers updated and browsers are becoming easier to keep updated but not many people keep their browser plugins updated. It works with all browsers and they provide links for your out dated plugins so that you can update them. Last but certainly not least, YOU MUST HAVE SECURITY SOFTWARE ON YOUR COMPUTER.

How does a firewall effectively control traffic?

A firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy.

What is difference between web server and proxy server?

What is the difference between a packet filter and a proxy?

Preface

So you think you know what a proxy is? Well if you are familiar with the old Web Proxy servers please forget everything you thought you knew about proxies. We are talking about something very different. The old proxy servers took web requests from clients and checked to see if it had that page already cached, and if not, it would then redirect the client request to the internet, if the request was allowed. A linear flowchart would look something like:

  • Client request for KnowtheNetwork.com -> Proxy checks cache -> Not found, forward request
  • Client request for Google.com -> Proxy checks cache -> Cached page found, replies w/ cached page
  • Client request for badwebsite.com -> Proxy checks cache -> Proxy denies the request based on policy

A modern day proxies are entirely different.

What is a common password vulnerability?

There are many things that can make your password vulnerable. Some examples of password vulnerability are not changing the default password on a router, using common words or words that can be easily guessed by someone that knows you, and using the same password for all of your accounts.

How do you get onto game websites in school?

here people I have a answer for some people. 1 way to get past the blocked websites is 2 use Bing I tried it and it worked. If that does not work use microse.com scroll all the way down type the website and there that will get you into it. hope that help bye.

Can a wireless user be monitored in an unsecured wireless network?

If you do not set password for your wireless network you will get unsecured network. If you mean that you want use your router to connect to another unsecured wireless network and create so called "bridge" the answer is yes. But! Router from different manufactures usually do not work together in the bridge configuration. There are some exceptions but just few.

How secure is Secure hosting?

Bluehost

Bluehost is a leading web hosting solutions company. Since our founding in 2003, Bluehost has continually innovated new ways to deliver on our mission: to empower people to fully harness the web. Based in Orem, Utah, we provide comprehensive tools to millions of users throughout the world so anyone, novice or pro, can get on the web and thrive with our web hosting packages.

2003

Bluehost hosting services was founded by Matt Heaton and Danny Ashworth in Provo, Utah.

+2M

We power websites all over the world and support thousands more every day.

750+

Our vast team is dedicated to helping our customers around the clock, 24/7 so we can be the best web hosting company to our customers at all times.

CHECK NOW WHAT THEY OFFER AND SAVE IN BELOW LINK:

SALE ON WORDPRESS HOSTING AS LOW AS $3.95 PER MONTH.

&

PREMIUM VPS HOSTING.

cutt.ly/1h0AobB

How do you create password in hard drive?

You need to go to your System BIOS. When you boot up your computer, you will have to press Alt-F2 or something similar. This depends on your computer model. In the BIOS, there should be a section called "Security" or "Passwords" or something of that nature. There should be an option to ask for a "Password on Boot". The default should be all zeroes. You can put in a password which should force the user to enter a password before the operating system even boots up. DO NOT forget this password, otherwise you will be permanently locked out of that hard drive. You can obtain the master password from the manufacturer if you were the original purchaser.

What do you do if you can't get on a website?

go to the internet archive and look it up or sometimes google has the cached version of the page just check to the right of the search result and it says cached.

http://www.archive.org/index.php --Internet Archive.

How do you delete the history on internet explorer?

In order to delete your history, you need to go to Internet Options. This can be found on the Command Bar, which is found on the IE toolbar, under the Tools tab.

Once you click on the Tools tab, go down to Internet Options, and click on it. This will open the Internet Options area.

On the General tab (the first one you see) go down until you see Browsing History. Make sure the "delete browsing history on exit"* box isn't checked.

You will see two options; one is delete, the other is Settings. Click on the delete button (don't worry, it won't just automatically delete anything). Once you click on the Delete button, another box will open. This area gives you several options of files that can be deleted.

If the only thing that you want to delete is your History, you can do so. However, temporary Internet files, and cookies can take up alot of space on your hard drive as well. You can safely delete Temporary Internet Files, and Cookies that are on your hard drive, without losing the speed in which your favorite websites are loaded.

This is simple to do. Go to the top of the page, and make sure that the box next to: Preserve Favorites Websites...is checked.

The box next to InPrivate Data Filtering should always be checked.

Make sure that you have checked, or unchecked all of the boxes next to the files that you want deleted. Then go to the bottom of the page, and click Delete.

If this is the first time that you have deleted these files, it will most likely take a long while for this process to complete.

Enjoy your lighter hard drive, and IE!

(There is another way in which to access the Internet Options files. If you open your Control Panel, you will see Internet Options listed there as well).

* If you decide that you want your Browsing History deleted every time that you exit Internet Explorer, you can check that box once you have finished deleting your History.

Which would be the best and cheap SSL Certificate in 2013?

COMODO POSITIVE SSL Certificate is the cheapest SSL Certificate. Starting at only $49.00 per year, Positive SSL is one the most cost effective SSL Certificate available today. SSL certificates can be purchased for a term of up to 10 years. See the related link.

Issued in minutes, Positive SSL certificates provide the highest levels of protection for business websites.

What are the Disadvantages of management information systems?

Disadvantages of management information system

Unemployment - While information technology may have streamlined the business process it has also crated job redundancies, downsizing and outsourcing. This means that a lot of lower and middle level jobs have been done away with causing more people to become unemployed.

Privacy - Though information technology may have made communication quicker, easier and more convenient, it has also bought along privacy issues. From cell phone signal interceptions to email hacking, people are now worried about their once private information becoming public knowledge.

Lack of job security - Industry experts believe that the internet has made job security a big issue as since technology keeps on changing with each day. This means that one has to be in a constant learning mode, if he or she wishes for their job to be secure.

Dominant culture - While information technology may have made the world a global village, it has also contributed to one culture dominating another weaker one. For example it is now argued that US influences how most young teenagers all over the world now act, dress and behave. Languages too have become overshadowed, with English becoming the primary mode of communication for business and everything else.