answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Why do you use passwords?

People use passwords to protect their security. By the use of passwords you can restrict assess to something to people that know the password. This also allows you to keep some privacy.

How do you proxy on L inux?

#!/bin/sh # IPTABLES PROXY script for the Linux 2.4 kernel. # This script is a derivitive of the script presented in # the IP Masquerade HOWTO page at: # www.tldp.org/HOWTO/IP-Masquerade-HOWTO/firewall-examples.html # It was simplified to coincide with the configuration of # the sample system presented in the Guides section of # www.aboutdebian.com # # This script is presented as an example for testing ONLY # and should not be used on a production proxy server. # # PLEASE SET THE USER VARIABLES # IN SECTIONS A AND B OR C echo -e "\n\nSETTING UP IPTABLES PROXY..." # === SECTION A # ----------- FOR EVERYONE # SET THE INTERFACE DESIGNATION FOR THE NIC CONNECTED TO YOUR INTERNAL NETWORK # The default value below is for "eth0". This value # could also be "eth1" if you have TWO NICs in your system. # You can use the ifconfig command to list the interfaces # on your system. The internal interface will likely have # have an address that is in one of the private IP address # ranges. # Note that this is an interface DESIGNATION - not # the IP address of the interface. # Enter the internal interface's designation for the # INTIF variable: INTIF="eth0" # SET THE INTERFACE DESIGNATION FOR YOUR "EXTERNAL" (INTERNET) CONNECTION # The default value below is "ppp0" which is appropriate # for a MODEM connection. # If you have two NICs in your system change this value # to "eth0" or "eth1" (whichever is opposite of the value # set for INTIF above). This would be the NIC connected # to your cable or DSL modem (WITHOUT a cable/DSL router). # Note that this is an interface DESIGNATION - not # the IP address of the interface. # Enter the external interface's designation for the # EXTIF variable: EXTIF="ppp0" # ! ! ! ! ! Use ONLY Section B *OR* Section C depending on # ! ! ! ! the type of Internet connection you have. # === SECTION B # ----------- FOR THOSE WITH STATIC PUBLIC IP ADDRESSES # SET YOUR EXTERNAL IP ADDRESS # If you specified a NIC (i.e. "eth0" or "eth1" for # the external interface (EXTIF) variable above, # AND if that external NIC is configured with a # static, public IP address (assigned by your ISP), # UNCOMMENT the following EXTIP line and enter the # IP address for the EXTIP variable: #EXTIP="your.static.IP.address" # === SECTION C # ---------- DIAL-UP MODEM, AND RESIDENTIAL CABLE-MODEM/DSL (Dynamic IP) USERS # SET YOUR EXTERNAL INTERFACE FOR DYNAMIC IP ADDRESSING # If you get your IP address dynamically from SLIP, PPP, # BOOTP, or DHCP, UNCOMMENT the command below. # (No values have to be entered.) # Note that if you are uncommenting these lines then # the EXTIP line in Section B must be commented out. #EXTIP="`/sbin/ifconfig ppp0 | grep 'inet addr' | awk '{print $2}' | sed -e 's/.*://'`" # -------- No more variable setting beyond this point -------- echo "Loading required stateful/NAT kernel modules..." /sbin/depmod -a /sbin/modprobe ip_tables /sbin/modprobe ip_conntrack /sbin/modprobe ip_conntrack_ftp /sbin/modprobe ip_conntrack_irc /sbin/modprobe iptable_nat /sbin/modprobe ip_nat_ftp /sbin/modprobe ip_nat_irc echo " Enabling IP forwarding..." echo "1" > /proc/sys/net/ipv4/ip_forward echo "1" > /proc/sys/net/ipv4/ip_dynaddr echo " External interface: $EXTIF" echo " External interface IP address is: $EXTIP" echo " Loading proxy server rules..." # Clearing any existing rules and setting default policy iptables -P INPUT ACCEPT iptables -F INPUT iptables -P OUTPUT ACCEPT iptables -F OUTPUT iptables -P FORWARD DROP iptables -F FORWARD iptables -t nat -F # FWD: Allow all connections OUT and only existing and related ones IN iptables -A FORWARD -i $EXTIF -o $INTIF -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT # Enabling SNAT (MASQUERADE) functionality on $EXTIF iptables -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE echo -e " Proxy server rule loading complete\n\n"

How do you remove blue coat?

if you kill someone with your blue coat it will become a red coat. see no more blue coat

Are proxies dangerous?

i guess it all depends, but until you get more reserch, i would stay away from the stuff as much as possable.

If you go an extended period say two months without showing any sings of virus or spyware can you be reasonably certain your PC is clean or is too soon to tell?

No.

You may have a rootkit installed. Your computer becomes a virtual computer, with the real computer being completely owned by the owner of the rootkit.

There are no known detection or removal techniques. Even MicroSoft's rootkit detection tool urges you to contact them if you detect a rootkit.

Most viruses and spyware is tested against the available anti-virus and anti-spyware systems. You won't be able to detect a new virus with ANY anti-* program.

Can you access a site that is blocked by your organization or school and if so how?

No, this is not possible. The reason for this is because whatever web filter they are using it runs through your network and it will block any attempt to access certain sites. Schools and other organizations block websites to help keep the users safe and on track with whatever work they need to have done. If you needed a website unblocked you would need to contact your organizations staff members.

What is personal information?

Tesla was the brightest genius this earth has had. Nikola Tesla once lit 200 light bulbs from a power source 26 miles away, and he did it in 1899 with a machine he built from spare parts in the middle of the desert. To this day, nobody can really figure out how did that because two-thirds of the schematics only existed in the darkest recesses of Tesla's all-powerful brain. As early as 1892, Nikola Tesla created a basic design for radio. This was before Marconi. As a mystery his lab caught fire and Marconi was the first to be awarded the patent. Authorities realized that Marconi used Tesla's patent to make his radio and it was granted back to Tesla in 1943. OCD, or obsessive-compulsive disorder, was first named in the late 19th century, but it has probably existed throughout human history. It is normal that brain with high IQ would develop it sometime in the life. Tesla caught a bad case of cholera as a child and almost died. He became celibate and most historians believe that it came for an obsessive-compulsive disorder.

How do you remove a proxy password from Internet Explorer?

Go to Control panel\User Accounts\Advanced\Manage passwords.

Remove the entry for the site or network location.

Who was nessus?

Security scanner for Oracle and various flavors of Unix. Performs over 900 remote security checks, and suggests solutions for security problems.
www.nessus.org/

Nessus was a centaur who was killed by Hercules and in turn deceived Hercule's wife, Deianeira, into putting the blood of Nessus on his shirt which in turn killed Hercules eventually. Son of Ixion and Nephele.

Is it illegal to provide links of other sites in your own websites or blog?

No, it is not illegal unless specified (for example, linking to an insider's page on a government site may be illegal if the address is considered confidential). In most cases it is not illegal, and may in fact be encouraged.

It really depends on the administrator of the website you want to link to - he may, for example, restrict you to linking to certain pages instead of just to resources within them (hot-linking), but probably won't disallow you to link in general.

In most cases, linking to other websites concerning similar material, further reading, or citing your sources is encouraged as a good practice - no web server is an island, so to speak. Also, citing your sources and giving credit where credit is due is always a good thing to do, and others will think better of those that do it. In the end, the article/post/information will have to stand on its own merit, and hiding your sources (except in cases where it may be prudent) is generally considered an act of fear, a weakness, a discredit to the author.

The Internet is a "network of networks", but it's also a network of information-bearing services. If you believe that reading what you're trying to link to would be beneficial to the reader in some way, and the author has not disallowed linking to their posting, go ahead and link away.

Curious note: linking to what some people would call "questionable material" like .torrent files, or even hosting them, is legal as well, no matter what the media lobbyists will say about it - these files are just descriptors for other files (say, a map and a city plan, in a manner of speaking), and contain no copyright-infringing material on their own.

Is winplaywin a safe website?

If the site has a HTTPS it is summited to secure unhackable connections

What can you do if you are unable to read Captcha characters?

Captchas have an audio assist that should play whatever the Captcha characters are in audio format.

Is Stop Sign virus protection reliable?

I would recommend other Anti Virus protection. Because the last thing you want Russians to have is your personal information on your computer. Their claims of 'Wirus Protection' seems sketchy.

What is advanced data encryption standard?

AES is an encryption algorithm that is largely used in a lot of places where security is a must. The algorithm is based on Rijndael (named after the creators) which had the winning design when the US government sent out an invite for people to create secure algorithms that would replace DES.

Should proxy form be sent out with Agenda for AGM?

Yes, the proxy form should be sent out with the agenda for the Annual General Meeting (AGM). This ensures that shareholders have the necessary information to make informed decisions and participate in the meeting, even if they cannot attend in person. Including the proxy form with the agenda facilitates a smooth voting process and encourages greater participation from shareholders.

What are the advantages of a honey pot site?

Some of the advantages of a honeypot site are:

- brings money to the local economy

- Creates jobs for the local people, bringing them money (which then can link into the MULTIPLYER EFFECT)

- It'll boost the publicity for the area so that more tourists revisit the area in the future

- Because the area has more money they can reinvest

How can one protect his or her privacy without complete web anonymity?

* Use an Internet Security Suite with a Privacy Protection module (BitDefender and Kaspersky are good examples)

* Turn off Cookies in your browser (this may limit browser functionality though)

* Use a free anti-spyware scanner and scan your PC on a regular basis * Do not use your real name in your e-mail address or on the web (where possible)

* Do not open or respond to spam e-mails * Do not click on un-subscribe links in e-mails you didn't sign up for