answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

What is the penalty for hackers?

Yes and no. If you mean hackers by someone who does something that the average person doesn't do on a computer, no. If you mean someone who maliciously causes trouble or lost revenue, yes. There's also jail time. It's like any other law-breaking: there are penalties for harming others.

The diffence between human virus and computer viruses?

Human viruses take over human cellular functions. These human viruses have either RNA or DNA instruction sets surrounded by a protein coat. After these instructions enter the human cell, they co-opt cell functions to perform duties the virus wants done. Computer viruses take over computer functions. Computer viruses are programs created by humans and have a series of 1's and 0's to make up instruction sets. After these instructions enter the computer, they co-opt computer functions to perform duties the virus wants done. So, the biggest difference is that the human virus instruction set is encoded in biological molecules of RNA or DNA, and the computer virus instruction set is encoded in 1's and 0's that the computer sees as a program to run.

Why do people think schools should not block websites?

people think that schools should not block websites cause they are one of the many that gets on inapropriate sites and have no respect for the schools. If they did they would not want to get on the blocked websites. now i agree that people should not block the ones that give good information but they should block they bad ones.

How do you access your email from another computer?

The way I can access another Gmail account, I can't access the Gmail account unless I need that Gmail and user ID to access another Gmail account. And yes there is another alternative way to access the gmail account and in that case i need to have the phone number of the gmail account then i can easily access the gmail account

Are there any unblocked proxy servers for school computers?

If you are in MPS, you shouldn't go on blocked sites. But some sites are blocked and they are safe. Talk to a administrator about this idea. MPs head board may be contacted you never know!

-MPS Board

What should you do if someone is impersonating you on Facebook?

If they're giving out personal information, call them on it! You wouldn't want your friend to give out information to other people. If its harmless, then you can tell then (and maybe they'll laugh), or not. And if he/she is flirting with you, then you should definitely stop it before it goes anywhere.

What is best proxy site?

Hi, There's no "best proxy site", there's best proxy category: speed, options, non-blocked ip etc. If you have the right to use proxy, cause probably if you are at school or in some country this is illegal. If you are not sure of using a proxy is legal or not consult a local lawyer or your school director for ensure that you have the right to do so. Hope this will be helpful and please do not attempt something illegal.

How do you erase history of websites on a mac computer?

In Safari, go to History | Clear History. Or go to History | Show History, click on a specific date, highlight the history you wish to delete and press the delete key (or CTRL click to bring up the menu and choose the delete option)

How do you stop browser redirects?

Under Tools -> Internet Options -> Security settings for the zone you want to disable browser redirects, you can do so by selecting Custom level... In the Miscellaneous section you can disable META REFRESH which will prevent your browser from redirecting

What requires port based authentication?

Port-based authentication is a form of "security by obscurity" wherein any device connecting to a system via the selected port is assumed to have authority to access said system. This can be dangerous if the port is randomly guessed, or shared by an someone who has previously been authorized. In this way, port-based authentication is equivalent to using a weak (or even default) password.

What are the disadvantages of blowfish encryption?

The advantages of blowfish encryption is that it is one of the strongest algorithms available and the speed of the algorithms and key strength is also very good.

To get out of Facebook group?

if you go to the page of the group you get out of, there's a button that says leave group under the picture of the group.

What is the purpose and function of IIS?

Purposes for the IIS web server include managing web sites and pages. Also, serves request and sends replies back to the client, it runs and executes server side scripts, and provides different types of security.

How do you hack blue coat k9 protection?

Ok first go to the bluecoat website and get a license key go to my computer, drive c, program files, bluecoat and delete everything in there that you can if anything is left try to delte it again until just the folder is left. the type in regedit and go to software, bluecoat and delete everything you can in there. then hit ctrl, alt, delte go to the second tab on the top and stop bluecoat from running. then go download the version of bluecoat after everything you can delete is deleted then it should ask you for your license key and it will tell you to set a admin password bluecoat is now yours.

Does cheat engine 5.3 have a virus?

i have been using cheat engine for 4 years and it has not given any viruses

Can you still get on a website that's blocked by my school?

You just need to type the following URL: http://www.google.com/translate?langpair=en|en&u=www.forbiddensite.com

(www.forbiddensite.com stands for the URL you need to go to...)

What is Difference between firewall and personal firewall?

A firewall is a security system—hardware, software, or both—that controls and filters network traffic between different networks, usually protecting an entire organization or network.

A personal firewall is software installed on an individual device (like a PC or laptop) to monitor and control its incoming and outgoing traffic, protecting that single device rather than a whole network.

In short:

Firewall → Protects a network

Personal firewall → Protects a single computer or device

Does miniclip give viruses?

No, but it will make your computer slower because of cookies

Are proxies illegal?

In the USA proxy sites, servers, or similar is 100% legal, so long as what your doing on it is legal.

However, it may be agent some schools, or works rules to.

Jpn.ent and speed IP network

Speedip.info

What happens when you get a computer virus?

When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on. use norton 360 this hardly works on xp but is perfect for vista.

How do you tell if your computer is being accessed remotely?

If it is running slower than usual, usually says if your are being monitored or not. If you think it is spyware, run a full computer scan with something like norton. If you think you are being monitored over a network, check how much data your computer is transferring by using task manager (CTRL+SHIFT+ESC) and clicking on the network tab. If you are not downloading any files or using the internet and the graph shows above 5% for more than a few seconds you might be being monitored

What happens if you tell someone your password?

Do not write your password down and leave it near your computer on your monitor makes it very easy for people who regularly steal passwords to obtain You don't leave important, sensitive, or confidential material lying around the office.

How do you protect PC against hacking?

Make sure all accounts are password protected, especially the Administrator account. Have a strong password on your router. Use a good firewall and anti-virus software, and update them regularly.

Where can you find a free proxy server that will allow you to post anonymously?

It is easy to find proxy lists cited on other websites and forums. Typically, you can find various websites that give you access. Also, if you have any concerns regarding anonymity, you can find out whether these sites are indeed anonymous and can protect your identity.

What is the difference between Norton Antivirus and Norton Security Scan?

Norton Antivirus is Symantec's full version antivirus program. Norton Security Scan is offered by Symantec & Google and is a free version of Norton's popular antivirus, however, it does not include real-time scanning. Norton Security Scan does receive free Virus Definition updates and will scan & remove any existing viruses on your computer, however, you still will not have any real-time protection.