answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How do you block websites on iPad?

There are several Child-Safe Safari-like apps in the App Store.

One is McGruff SafeGuard (in the App Store).

Details at GoMcGruff.com/browser and GoMcGruff.com/BrowserVideo

You might remember McGruff - The Crime Dog - Take A Bite Out Of Crime - from your childhood.

How do you post on a blog using someone else username?

Blog (short form for Web Logs) is a free service which enables you to write your content about your daily needs and daily events or about something which you like to share with other people.

Follow the following steps to create another blog

1. Go to www.blogger.com

2. Click on create a blog.

3. Click on sign in with Google Account.

4. Type your email id and password of the previous blog that you have created or the email address that your first blog consists.

5. Provide the necessary info and you are done!

Yours,
Kiran
website: www.blogshut.com

What are the effects of internet security?

There are tons of bad effects of the internet. You risk a computer virus, spam, or other online threats. If you shop, your at risk for identity theft. Most kids can see anything they want with the click of a button, unless activity is closely monitored.

What are the dangers of online chat rooms?

There are threats to your computer, like viruses, that can damage your computer and delete a lot of files from your harddrive. These viruses can be caught from e-mails, bad sites, advertisements and malware (maliscious software).

There is also a lot of questional material on the Internet. For example violence and pornography that can cause trauma on sensitive viewers. That is why it is important for parents to know what activities their children are involved with online. Usually it is enough to just ask and guide children on their web browsing, but blocking adult sites can be a good idea if that is an option and the children are young.

Other dangers include people that have hidden motives. For example stalkers, pedophiles and other harmful people, that might ask for personal information for unknown reasons. That is why it is important to give away as little personal information as possible. And it is also important that parents inform their children on not giving away private info on the net.

Other than this, the Internet can be a valuable source of learning, information, entertainment and a part of your social life. The Internet is relatively safe as long as you know what to avoid and what threats there are.

Internet could also be used as a weapon to hack into other peoples computers and their networks which means personal information's can be found easily.

yes exactly it can also be very dangerous to young kids

What are the disadvantages of browsing?

There are a number of disadvantages of using internet cafes for browsing.

Public computers may have keylogger software, or there could be the threat of the computer carrying any number of viruses or trojans. In addition, anyone in the cafe could be looking over your shoulder to see what information you type in.

Therefore, you should avoid making financial transactions and should not enter any personal information, even your email address and password, when you are using public computers.

How do you Tell if your computer being monitored?

several ways, The easiest is too close all open programs on the start bar and in the icon box, then Press Control Alt Delete at the same time, click open Task Manager, Click the tab "Networking", If the graph has activity, (not at 0), Then either you didn't close all your programs, your computer is updating its self, or its being used by someone alts.

Another easy way too tell, and too fix it is intall AVG Plus, or Avast PRO. Then run full scans.

Is it possible to view your own webcam on a Mac?

Applications>Photo Booth. The Photo Booth app will allow you to take pictures and gives the option to use filters also.

What are three concerns dealing with Internet security and privacy?

Malware, phishing, and botnets. Answer: Information security solutions have focused on preventing external threats such as viruses, hackers and worms through perimeter solutions that include firewalls and antivirus software. While still aware of outside threats, companies are now coming to understand they can no longer ignore inside violations concerning data at rest. So information security and privacy is of atmost importance whether it is internal or external.

Today's employees are able to easily export sensitive files and information via email or by copying to file shares and portable media without concerning about data security and data privacy. Many companies simply do not have the resources or appropriate policies in place to identify NPI and PII and avoid inadvertent, accidental mis-steps or malicious actions from within. As companies continue to accumulate NPI and PII, they are under enormous pressure to mitigate risk and to provide data security to sensitive information before an undesirable loss occurs. Whether you call it data security, Content Loss Prevention or simply Information Security solutions & Privacy, the time has come to take steps to protect your company's data privacy.

What is the word blog short for?

Blog is an abbreviation of the words Web Log.

The first postings on web sites on the Internet at the very beginning of the World Wide Web were lists of cool or interesting sites that people wanted to share with their friends.

So a web log or 'blog started out as a page of 'look what I've found'.

from Beano in the UK

What is the meaning of boot sector viruses?

A boot sector virus is a virus that's located in or directly modifies a special part of the hard disk in a computer called the boot sector. The boot sector, in basic terms, directs the computer to the things it needs to load the operating system and user interface so you can use it. Viruses that modify the boot sector can be loaded into memory at the same time or even before the operating system, and can prevent the computer from starting up correctly in some cases.

Boot sector viruses were more common during the days of DOS, when such viruses had easier access to the boot sector and other sensitive parts of the system. Today, these viruses are not very common because it is more difficult for them to spread and infect.

How is your computer protected from a virus?

Virus - and malware protection in general usually requires both technical and behavioral solutions.

From a technical standpoint, having a good email filter installed, using network and host-based firewalls, and installing a good anti-malware program that has both signature-based and heuristic malware detection capabilities (and keeping it up-to-date) will help.

From a behavioral standpoint, educating the users about good practices can reduce the incidents of malware infecting a computer.

Good practices include (but are not limited to) - not clicking on links in emails without knowing for a FACT what is on the other end, resisting the temptation to download that really neat "free" program (that may come with hidden malware), not falling for social engineering attacks, and not plugging in random flash drives that you found lying around.

How can you get your stuff back from your parents?

beg:if ur parents dont go by begging throw a tantrum or something >_> or get some fake monoply cards or something and ask ur mom each job u do you put in money and each monoply dollar that they give you is worth 1 dollar in the real world

Safe chat games for 10 year old?

The good websites are:

  • Animal Jam
  • Club Penguin
  • Zwinky
  • WeeWorld
  • Gaia
  • Habbo
  • Wolfquest
  • Jumpstart
  • Fantage

What is packet-sniffing?

Packet sniffing is usually sniffs wireless transmissions. Sniffing is the interception of data or packets. The person who is suppose to receive the information still does but a third party has the ability to eavesdrop read the data. Packets can range from harmless info like your latest homework assignment or other more sensitive information like your Bank statement. The method to avoid a person sniffing your data sent wirelessly is to encrypt the data with modern day encryption algorithms.

How do you change your firewall settings on the computer?

You can first check that your windows firewall is running

Press your windows Key

Type Firewall.cpl (brings up control panel Firewall applet)

In the left hand side column, select 'Turn Windows Firewall on or off'

under 'Private network settings' select the radio button called [Turn on Windws Firewall]

also

under 'Public network settings' select the radio button called [Turn on Windws Firewall]

next

You can manage your windows firewall using

Press your windows Key Type Firewall.cpl (brings up control panel Firewall applet)

In the left hand side column, select 'Advanced settings'

This will launch a program to allow you to configure your firewall

This requires menium level computer experiance and will require some technical understanding which is outside the scope of this question.

Suggestions are you select the [Help] menu

Then select 'Help Topics'

in the right pane, scroll down until you find an entry like

Windows Firewall with Advanced SecurityWindows Firewall with Advanced Security Overview

Then select that item to bring up some reading material to help you better understand how to configure your windows firewall. https : / / technet.microsoft.com/library/hh831365.aspx

Recommend that you get a second firewall to supplement what your windows firewall is doing.

You should also know that many routers also contain a simplified firewall that you should also configure.

2) Download a good firewall use https : / / av-comparatives.org / firewall-reviews

to help you choose a good one, use some computer reviews; the best firewall does change from time to time

What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt it

Answer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.

Hacking is it a crime?

That depends on what you hacked and what way you hacked it. Did you know it's actually illegal to add/remove a user account on a computer that's not yours, if you on a limited account. In a court of law, this is considered hacking.

In Ireland there was a case a while back in which a person ended up in court for the above reason being tried as a computer hacker.

Yet about 3 months later somebody happened to stumble upon a flaw in a prominent politicions website, he published his findings, got caught, and was told "he was nothing more than a router with too much time on his hands who got lucky" and this particular man had studied IT in one of the best colleges in the country.

Why is making strong passwords important?

Without some way of authenticating a user, anyone may use the resources of a network or system. Only authorized users should have access to a system, and passwords are one way of authenticating a valid user.

If you block an email address will that person be informed?

No, he does not. In most cases, your email service is going to ignore or delete the emails you block. If your email service rejects the email in a heavier way, the sender might get an error message, but that's not very likely to happen.*

*Not necessarily true. Some ISP's, such as AOL have integrated a voluntary notification system into their email service, though it only works with email from OTHER MEMBERS.

Some spam filters (some free, some not) offer this capability as an option, but depending on the filter, it can be confusing to configure. Perhaps the easiest way to notify the sender, then, is to use the free Windows Live email client, though you must have a POP/SMTP account (in other words, an email account you can access with desktop email applications such as Outlook Express, Mozilla Thunderbird, etc.). If you're uncertain about this, refer to the help section of your email service or contact your ISP.

To set up sender notification in the Windows Live email client, use the menu bar at the top of the screen and select as follows: Actions->Junk Email->Safety Options...then select the Blocked Senders tab. At the bottom of the screen under the phrase "When I delete and block" is a check box next to the option "Bounce the blocked message back to the sender". Check this box.

After that, any time you block a sender using the Windows Live email client (while highlighting email from the sender you'd like to block go to: Actions->Junk Email->Add sender to blocked senders list), the sender's email will be moved to the Junk email folder where you can delete it, thus bouncing the email back to the sender.
No, Services like GMAIL, Windows live, yahoo and Facebook do not notify when someone blocked you.

What port does http use?

HTTP is the hyper text transfer protocol . The port used by HTTP is port 80 . The HTTP is the protocol of application layer.