answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

What is an electronic signature?

This term can mean different things in different places. Some states recognize that facsimile and email transmissions can be used as "proof" of signature, and have adopted the "electronic signature" definition to refer to these sorts of transmissions and allow them (or restrict them) as evidence of (for example) intent to contract or authentication of official orders.

Other definitions mean an "electronic signature" is the electronic capturing of a physical, handwritten signature, as where you use a scribe at a point-of-sale terminal to "sign" a credit card transaction. Again, the regulations authorize this sort of paperless record as evidence of an intent to be bound by some agreement.

Without such statutes or regulations, the standards would still require a physical piece of paper (or other physical substrate) with a hand-written "signature" before a document would be admissible as proof of an original signature.

In other places, where the concern is for a more robust authentication and non-deniability, the "electronic signature" may be distinguished from a "digital signature", which uses sophisticated encryption techniques for security. There are many interesting uses for digital signatures, including anti-virus protection in critical software.

One effect of using electronic signatures (or digital signatures) is to shift the burden of proof. "You deny you signed, yet I have this electronic record showing you signed, now you have to prove this record is false."

What is meaning of homepage URL?

an URL is basicly a website example www.Google.com so if your on the internet settings you can change your homepage by entering the URL you want !

What actions must be taken for an eviction?

According to the Relocation, Foreclosure and Eviction page on HUD's website: You should contact a local legal assistance provider for advice. More advice from FAQ Farmers: * Having been in the eviction business for 30 years now helping landlords evict tenants who refuse to pay has taught me one thing I would like to pass on to tenants; first, don't ignore the notice. If it is for non-payment of rent, figure out how you can pay and immediately contact your landlord to make arrangements to pay the rent. If the notice does not state a reason, then you should still contact your landlord and ask why you were given the notice. Landlords do NOT arbitrarily give eviction notices out. Most all have a legitimate reason (and you as the tenant probably know or have a good hunch why). Sometimes you can negotiate with the landlord and he will withdraw the eviction notice. However, if the tenant has caused too many problems and they are good reasons (not improper ones) for eviction, the tenant needs to immediately start looking for another place to live. Sure you can contact legal aid, but you must qualify (most tenants don't), or you could pay a small fee to a local attorney for some legal advice. The bottom line is that the landlord owns the rental and can ask a tenant to vacate as long as he is in compliance with state and any local (city) laws. Additionally, it is important to keep your landlord as an ally; you probably need him to give you a reference for your next landlord.

Is there a website that is similar to youtube but kids 10 through 12 can join and upload videos?

It really depends on what type of video your trying to post. There's always my favorite, youtube.com, then there's animemusicvideos.org, if your posting something like that. movavi.com is also a very good site. But I still strongly recommend going to youtube first, because if anything, that's where you'll find your answer. Just make sure you have a account on it--signing up is completely free.

What is illegal on the Internet?

The amount of illegal Internet crimes is legion. What follows are some of the most common types of illegal internet crimes. It is illegal to use the internet to steal another person's identity and then use that information to steal money from that person's bank accounts. It is also illegal to shop with credit cards after a person's card number has been stolen. In fact any type of identity theft is a crime.Also it is possible and illegal to still classified information from a hacked government PC or server. Espionage has serious consequences. Using the internet to bully or threaten anyone is also illegal. And, it's illegal to use the internet to download of transfer files of child pornography.

How can you find your pasword?

Well, if you are talking about your MSN password, you can go to your hotmail account and select "Forget your password?" and then it will ask you for your e-mail address and the answer to a secret question you made up when you first made your account.

What are three different types of computer related crime?

  • Computer Crime, or "Cybercrime" refers to a type of crime in which a computer or a computer network generally played a vital role in the commission of the crime. Cyber-criminals can use the computer to attack other people or computers, or they can simply keep illegal content on their computers. There are many categories of computer-crime, but three categories serve as the bulk of computer crimes that are committed.
  • Spamming
  • The sending of bulk Emails to a countless number of computers is known as "Spamming" and is considered illegal, depending on the country where the spanning originates from. Because spamming can be perfectly legal depending on the country, spammers are difficult to prosecute.
  • Fraud
  • Computer Fraud has many forms, including altering computer input and output, altering or deleting stored data, and altering or misusing system tools and software packages for fraudulent purposes. Additionally, computers can be misused to perform various other types of fraud, such as bank fraud or theft (of information).
  • Obscene/Offensive Content
  • Any illegal content that is stored on a computer is also considered a computer crime. While the kind of content considered "illegal" will vary from country to country,child pornography is considered illegal worldwide, and makes up the majority of this category of computer crime. Many task forces have been created across the country to deal with this specific violation.

What is the effect of a computer virus?

When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.

Is proxy illegal?

The sole use of a proxy is not illegal however people use proxys to download/torrent illegal material and stay hidden, so it depends on what your using it for.

How does digital signature work?

public-private keys are used to pass sensitive information however it can also be used to provide authentication that a sender is who they say they are. It does not protect the contents of the message, it only proves it is from who it says its from. It provides authentication and integrity but does not provide confidentiality, data is sent as normal but acts like a normal signature we use on a letter. A digital signature works by creating a message digest which ranges from between a 128-bit and a 256-bit number which is generated by running the entire message through a hash algorithm. This generated number is then encrypted with the senders private key and added to the end of the message. When the recipient receives the message they run the message through the same hash algorithm and generate the message digest number. They then decrypt the signature using the senders public key and providing the two numbers match they know the message is from who it says its from AND that is has not been modified. A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. Digital signatures rely on certain types of encryption to ensure authentication. Encryption is the process of taking all the data that one computer is sending to another and encoding it into a form that only the other computer will be able to decode. Authentication is the process of verifying that information is coming from a trusted source. These two processes work hand in hand for digital signatures.

What is the maximum penalty for a hacker taken to court?

That all depends on the charge. If you hack into the WiFi of your local Subway that requires you pay for it first, then you might be facing petty theft, a misdemeanor. Although, if you (somehow) hack into the files of the pentagon and edit everything you can get your cursor on to pictures of Nyan Cat, then your looking at...well, a lot more time in prison than you have for living.

Where did cyber-terrorism start?

The cyber-terrorism has not begun in full-scale yet. We have seen some minor attempts to threaten functionality of certain servers, but what we really fear are attacks on critical infrastructure (such as water structures, food supplies, health care institutions), that could not only cost money, but also human lives. For example, imagine an outcome of a situation in which a terrorist succeeds in opening dams valve control.

What is invasion of privacy on a computer?

Invasion of privacy can be a number of things such as spyware, hacking, your ISP interfering with your connection. Software you download you should be wary of it can include spyware which is not all legal, this records your actions and such like to usually get you to buy things. Invasion of privacy is not arguing with a point you make in a forum. Or someone wanting to get to know you in a forum or something similar. I do not know all of the implications but these are just a few.

Who wrote the HIPAA?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104-191, 110 Stat. 1936, enacted August 21, 1996) was enacted by the United States Congress and signed by President Bill Clinton in 1996. It has been known as the Kennedy-Kassebaum Act or Kassebaum-Kennedy Act after two of its leading sponsors. Title I of HIPAA protects health insurance coverage for workers and their families when they change or lose their jobs. Title II of HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans, and employers.

Opsfolio, a HIPAA compliant risk assessment software from Netspective might be helpful for you!

Is it against the law to hack into someone's email account?

It is illegal to read someone's mail because that is their property. However, it is probably not a crime that will be actively prosecuted except in extreme situations. It is definitely illegal to take mail out of someone's box.

Who needs an SSL certificate?

If your answers for below questions are "YES" then you need ssl certificate.

  1. Is my site an e-commerce site that collects credit card information?
  2. Do I use a 3rd party payment processor?
  3. Do I have a login form?

in short if you are collecting any short of customer information you need that for customer TRUST

What are the penalties for hacking?

depends on what you are hacking. if it is something for like a school website to change grades or look at your hotties profile or something like that, maybe a talk with a police officer and suspension of computer use in the school. but if it is hacking a major place like a bank or something, then i would suspect higher penalties.

How do you change the language in your computer?

  • Click Start
  • Control Panel
  • Region and language
  • in upper tabs click Keyboard and Language settings
  • Change Keyboards
  • Add your own languages
  • OK
  • close everything
  • open word pad
  • u can see blue bar docked up of desktop or in taskbar showing EN
  • click it
  • you will see a list of selected languages
  • Type it in word pad
  • Done

How do you find the date of access of a website?

You can see that information - in your Internet history. In Google Chrome - the History option is accessed by clicking the 'Customize' button (three horizontal bars to the top-right of the screen) - it shows the date & time each website is accessed. In Internet explorer - click the star button (again, top-right of the screen).

What does a captcha encoder do?

A Captcha encoder generates tests that most humans can pass, in aim to prevent bot spam of any kind.

In other words, the captcha encoder develops test that computer programs fail to pass.