answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

500 Questions

Is flight deal online a safe site?

User Avatar

Asked by Wiki User

Various Experiencesbought a ticket, was a nice price, recceived a ticket on time, confirmed it with the airline

I have been Duped USD.910 today by Flightbuddyonline.After booking ticket when I tried paying throgh credit card .A message apperared infroming that due to some problem with their account they cannot accept credit cards and either bak trasfer or payment thru Western union was OK.

they asked me to edit the payment mode in my order.I did so by selecting Bank transfer.

Then I got an email to my personal Email ID with bank details in UK.

After transferring they gave me a fake e-Ticket which I realised only when I approached the Airline for confirmation.

Then I could not trace them either by email or phone.

I knew I was duped.

Please do not even think of using Fight buddyonline they are Fraudsters.

The same thing happened to me. First they say they receive credit cards. When that did not work I tried paying with Paypal. Then they said they had problems with Paypal and I should send them money by wire.

If they don't take credit cards or Paypal they must be a fraud. I least I did not fall for it.

ohh I am feeling so foolish that why I didnt research about them before buying a ticket from them. they are complete fraud and I lost $1115. they issued me a fake ticket. Please do complaint to the concern authorities and also inform your friends to be aware of such day light robbers.

Thank you

How you get beat internet filtering?

User Avatar

Asked by Wiki User

search google for vtunnel.com dont type vtunnel.com above because it might be blocked, just click on the link for vtunnel.com that google gives after searching and type the link you want in vtunnel.com hoppefully it will open without any blocking.

What is the avg 9.0 license key?

User Avatar

Asked by Wiki User

You don't need one. as long as you download the Free version any way.

This wont give you the full version but it will still give you protection. It will give you components like;

  • anti-virus
  • email scanner
  • resident shield.

Suggest the best Anonymous web surfing software?

User Avatar

Asked by Wiki User

for me,this ios the best>>>http://www.anonymizer.com/ I installed anonymizer and got A keylogger and unable to use firefox...I can't knock it....It's A legit program. The best of the best is getting an ssh tunel. You could get A free trial and has A very great price....The description is from http://www.intl-alliance.com/

from there you could join the forum, or go to the store. I purchase one and the support is unbelievable. Hope this helped

What is SSH and how can I use it ? Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary. An SSH tunnel is an encrypted network tunnel created through an SSH connection. SSH is frequently used to tunnel insecure traffic over the Internet in a secure way. In order to create an SSH tunnel, the SSH client is configured to forward a specified remote port and IP address (that is accessible on the SSH server) to a port on the local machine. Once the SSH connection has been established, the user can connect to the specified local port to access the network services that would otherwise only be available at the remote IP address and port. SSH tunnels provide a means to bypass firewalls that prohibit certain Internet services provided that outgoing connections on port 22 are allowed. For example, many institutions prohibit users from accessing Internet web pages (port 80) directly without first being examined by a proxy/filter device. However, if users are able to connect to an external SSH server, it is possible for them to create an ssh tunnel to forward port 80 on an external web server to a given port (probably port 80) on their local machine. More commonly, users may setup their own proxy server at home, using free software such as Squid, and construct a tunnel from their workstation to the proxy. Next, by configuring their browser to use localhost rather than the corporate proxy server, users can access any web page they want, bypassing their company's filters and firewalls. Another HTTP-based tunneling method uses the HTTP CONNECT method/command. This command tells an HTTP proxy to make a TCP connection to the specified server:port, and relay data back and forth between that connection and the client connection. Therefore, for security reasons, CONNECT-capable HTTP proxies commonly restrict access to the CONNECT method to accessing TLS/SSL-based HTTPS services only. Server locations available for SSH Proxy Services: United States, United Kingdom, Germany, Malaysia, Czech Republic, The Netherlands, and Hong Kong. We can issue you a completely anonymous ip address from any of these locations.;

Is it illegal to trace an IP address?

User Avatar

Asked by Wiki User

Nope. Just do it. It's the same as looking in the phone book for someone's street address. Just use the information wisely.

3 How can you ensure that you have minimised your security risks while using the Internet from your home computer?

User Avatar

Asked by Wiki User

3 things you can do to ensure safety on the Internet are:

1. Make sure you have a anti virus and never click on ads or popups.

2. Only go to websites that are secure.

3. Never give out personal information

( Safety on the Internet could mean protecting you computer or protecting your identity so i did a combination of both)

How do you remove k9 web protection without the password?

User Avatar

Asked by Brokentoenail770

First go to start

Then go to computer

Click on Local Disk (C:)

Then click Program Files

Click on K9

Click on the license

Right click

then press delete

Then shut down

Finally turn your computer on and at the bottom right corner the k9 dog thing will say k9 web protection has been uninstalled

How will you ensure that information remains confidential?

User Avatar

Asked by Wiki User

This is a very broad question. Please edit the question so that it is more specific -- what sort of information do you wish to keep confidential?

Another Answer

Information remains confidential if you tell no one, never write it down and never think about it so that it could slip out of your mouth. Otherwise all information is subject to breach of confidentiality.

Confidentiality agreements may serve to protect certain kinds of communication and its information, but these agreements can be breached.

Electronic information will never be totally confidential, since once the details become concretized in electronic characters, they are subject to discovery and revelation.

Who is the owner of Gmail?

User Avatar

Asked by Wiki User

Google is the owner of Gmail. Larry Page is Google CEO.

What is in a proxy record?

User Avatar

Asked by Wiki User

Stores of information found in natural materials that give clues to what the climate was in the past

What does the less than sign mean on Facebook?

User Avatar

Asked by Wiki User

If someone types: sleep <

It means sleep is less than everything. Normally the less than signs institutes a comparison such as: sleep < food. However the new internet trend is to just put a word like sleep and then the less than sign. As stated, this means that sleep is less than everything. So the ambiguous blankness after the less than sign represents "everything." Why people can't just write the word everything is unbeknownst to me...

People also use the greater than signs which work the same as the less than signs.

ie: sleep >

Which means sleep is greater than everything.

It really is all quite pointless, but it is just another internet trend.

Is there a proxy site that works for YouTube?

User Avatar

Asked by Wiki User

Yes, there are many proxy sites that work for YouTube e.g. Hide Me, Ninja Cloak and Surf Hidden. Nonetheless, having to shuttle data through a proxy can reduce the loading speed of your YouTube videos.

How do you delete viruses when the antivirus doesn't work?

User Avatar

Asked by Wiki User

Update the virus protection software and if that doesn't help get another program. Sometime you can work with the anti-virus people and they will come up with a fix. Maybe they dont know about it yet. Doesnt cost anything usually. Worth a try. Good luck.

Which virus uses both boot-sector and executable functions?

User Avatar

Asked by Wiki User

A virus that uses both boot-sector and executable functions is a multipartite virus. This type of virus attacks a variety of platforms, and continually re-infects each platform until it is removed.

If your using some one's wifi can they see all of your history?

User Avatar

Asked by Wiki User

It depends on how good their router is. If hey hav a goos router, then they will probably be able to see who used their wifi and what they used it for.

What is the impact of cryptography?

User Avatar

Asked by Mollinator27

One might need cryptography in any situation which warrants privacy or secrecy to protect data, trade secrets, or embarrassing situations. Examples include business transactions, ecommerce, extramarital affairs, political campaigns, and government actions.

What is Website URL?

User Avatar

Asked by Wiki User

Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web. The first part of the address is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name are separated by a colon and two forward slashes. For example, the two URLs below point to two different files at the domain pcwebopedia.com. The first specifies an executable file that should be fetched using the FTP protocol; the second specifies a Web page that should be fetched using the HTTP protocol: * ftp://www.pcwebopedia.com/stuff.exe * http://www.pcwebopedia.com/index.html

Does it mess up your PC to have more than one firewall?

User Avatar

Asked by Wiki User

Not really. One antivirus and one firewall is enough. Some people may recommend that you have more than one AV or firewall but they will only trip each other up. That said, that only applies to real-time scanning programs. Programs like Spybot and the free version of SUPERAntiSpyware which only have on-demand scanning are a valuable addition to your computer security.

Melissa computer virus?

User Avatar

Asked by Wiki User

it is not a virus but a worm, if you have the proper anti virus software, you will be just fine!!!

sexysk8trgirl on Quizilla

How do you remove a virus without switching on the computer?

User Avatar

Asked by Wiki User

How to delete virus w/o using any antivirus programs !!One of the ways by which a virus can infect your PC is through USB/Flash drives. Common viruses such as 'Ravmon' , 'New Folder.exe', 'Orkut is banned' etc are spreading through USB drive . Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB drives or harddisk. Whenever you plug a USB DRIVE in your system, a window will appear similar to the one shown below…

Don't click on Ok , just choose 'Cancel'. Open the Command Prompt by typing 'cmd' in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

This will display a list of the files in the Flash drive or Hardisk. Check whether the following files are there or not

  • Autorun.inf
  • Ravmon.exe
  • New Folder.exe
  • svchost.exe
  • Heap41a
  • or any other .exe which may be suspicious.

If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command delfilename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like McAfee or TrendMicro's PCCillin to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the "Autorun.inf" file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread…

Should Theo click the link when he receives an email from his bank while at work that emphatically states he must verify his personal information immediately or his account will be closed?

User Avatar

Asked by Wiki User

This is one of the most common forms of Phishing. Luring customers to think that their account is closed and making them enter their account information in a fake site where they get registered and then these people will access your account using the details you provided and steal your money.

Beware!!! No bank would send such emails.