answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How do exploits relate to vulnerabilities?

A vulnerability indicates that a system has a flaw which can be used to circumvent the security of a system. An exploit is the way in which someone can use a vulnerability to their advantage.

What is air proxy?

air proxy provides you with a way to surf the internet anonymously for free from school, work or home

A Security Plan should address to what?

A Security Plan should address the identification and assessment of potential risks and vulnerabilities to assets, personnel, and information. It should outline specific security measures and protocols to mitigate these risks, including physical security, cybersecurity, and employee training. Additionally, the plan should include incident response procedures and a framework for regular review and updates to ensure ongoing effectiveness. Finally, it should establish roles and responsibilities for personnel involved in security management.

Has there been a lot of coumper hacking?

All I can tell you is that the issue is fraught with hype. A lot of people make a lot of money by making out that computer hacking ('cracking') is a bigger problem than it really is.

'hacking' and 'cracking' are two different things. Technically it would be impossible to be arrested for 'hacking' because hacking is completely legal. 'Cracking' is illegal.

Reverse look up by address?

Let's say you type in the host name, "www.google.com" into your browser. The browser will contact the DNS (Domain Name Server) and ask it for the ip address (192.117.0.1 for example) for www.google.com. This is what's called a forward lookup. The reverse lookup then is when the browser has the ip address but needs to find the host name for that address. So the browser contacts the DNS using the ip address and asks for the host name.

Looking at IPSec-encrypted traffic with a sniffer What packet types do you see?

You can see the packages to pass, but you can not see its contents

IPSec Packet Types

IPSec packet types include the authentication header (AH) for data integrity and the encapsulating security payload (ESP) for data confidentiality and integrity.

The authentication header (AH) protocol creates an envelope that provides integrity, data origin identification and protection against replay attacks. It authenticates every packet as a defense against session-stealing attacks. Although the IP header itself is outside the AH header, AH also provides limited verification of it by not allowing changes to the IP header after packet creation (note that this usually precludes the use of AH in NAT environments, which modify packet headers at the point of NAT). AH packets use IP protocol 51.

The encapsulating security payload (ESP) protocol provides the features of AH (except for IP header authentication), plus encryption. It can also be used in a null encryption mode that provides the AH protection against replay attacks and other such attacks, without encryption or IP header authentication. This can allow for achieving some of the benefits of IPSec in a NAT environment that would not ordinarily work well with IPSec. ESP packets use IP protocol 50.

What is the privacy law in the Philippines?

It is found in Article III Sec 2 of the 1987 Constituition:

"The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall issue except upon probable cause to be determined personally by the judge after examination under oath or affirmation of the complaianant and the witnesses he may produce, and particulary describing the place to be searched and the persons or things to be seized."

What are the implications of the cloud for individual privacy?

an individual now has to be very careful in what they share on the cloud. once a document is shared on the cloud, there is always the eventuality of unauthorized or unintended access.

the best course is not to trust any software that offers protection of this sort. the user must screen the data and information themselves.

The maximum size of an IP datagram including the header is?

The datagram length field in an IP header is 16 bits in length. Therefore, the maximum datagram size an IP datagram can support is 2^16 - 1 = 65,535 bytes

How can cyber attacks be prevented?

While cyber attacks cannot be completely avoided, there are many things you can proactively do to not look like low-lying fruit to a cyber criminal.


These are things we do at Lazarus Alliance when helping organizations with proactive cyber security services such as IT Audit & Compliance (FedRAMP, PCI, HIPAA, SOX, SSAE 16, ISO 27001), IT Risk Management, IT Governance & Policies and Cybervisor services. Since 2000 Many good service providors remained on the cutting edge of IT security, risk, audit, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. Lazarus Alliance's primary purpose is to help organizations attain, maintain, and demonstrate Proactive Cyber Security compliance and information security excellence, in any jurisdiction.

What is the relation of the internet on world wide web?

They are the two different words which mean the same thing But actually they are a little different. Many people use the terms Internet and World Wide Web (aka. the Web) interchangeably, but in fact the two terms are not synonymous. The Internet and the Web are two separate but related things.

The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused.

Is there an in-private browser that the administrater cannot get into we are on a shared computer?

It depends on the administrator's network settings and security.

You can use the private browsing option available within the web browser but that may be limited to browser only which want keep your access data.

But the network admin can get those details depending on their security and privacy settings and tracing strength.

How do you break through china GFW?

Hotspotsheild is work, but many of my friends said it's kind of inturrupting other programs in use. Some said if u like to use this one, use it after chating msn. One more, it's slow.

They recommend fbvpn $5 per month fast as strongvpn but much more cheap... try it!

How do you uninstall blue coat k9 web protection because i forgot the password?

Check your installed program files for Blue Coat to see if there isn't an uninstall option hidden in the folder. A second option is to edit the registry and remove all mention of Blue Coat. This forum posting gives instructions for both methods. I'd look for a program folder first as it's safer than editing he registry.