answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

You just got an email from someone in your address book saying that they got an email from you that you did not send about being in touch- the message does not appear in your outbox. help?

This is a typical case of e-mail address spoofing. There is nothing you can do about it, some spammer forged the header and made it look as if you sent the e-mail. The spammer don't even need access to your e-mail account, spoofs like these are mostly done outside the e-mail system of the spoofed victim.

If your e-mail address is spoofed a lot, you will receive a lot of bounce backs to e-mails that you did not send.

Is dilandau safe to use?

no its not safe at all......i downloaded a few stuff and then there was a virus so its not safe nor legal

Is Simon Ashton a email hacker?

Simon Ashton is an email hacker is not joke and don't open up the email (if you get one) he will get your email ID e.g. facebook account and msn bebo my space so beware

The above answer is incorrect. It is simply a variant of the old "Life is Beautiful" hoax. There is no danger, as simply adding the person or opening the email will not allow access to your computer. The only danger is if you open an unknown link. Here is one of the MANY sites proving this hoax is fake.

http://www.hoax-slayer.com/simon25-hacker-hoax.shtml

I hope that you do not pass the warnings on, but instead reply to them and tell them that this virus is fake.

What are the steps involved in symmetric cryptography Also explain key management in conventional cryptography using some example?

following steps are involved in symmetric cryptography

1- sender creates a ciphertext message by encrypting the plain text message with a symmetric encryption algorithm and a shared key.

2- the sender sends the ciphertext message to the recipient.

3- the recipient decrypts the ciphertext message into plain text with a shared key.

Can you access files when the computer can't turn on?

No you can't. Obviously how can you browse your computer if it doesn't turn on.

What Are Website Cookies and Why Are They Used?

Cookies are defined as small files stored on your computer by the web-browser that saves specific information about web activity. Every time the browser requests a web page, these files are sent back to the server to be analyzed. There are a lot of uses for Cookies and reasons why they are used on a website; here are some examples:

  • Cookies can easily carry information (maximum of 4KB) between sessions within a website and within connected websites.
  • Using a specific type of Cookie with a unique ID, users can keep track of how many hits their site gets.
  • Because Cookies store state information on the computer, a user's website always remembers what state the browser is in.
  • Use Cookies to personalize the websites you visit. For instance, if a window pops up displaying a message, and you never want to see that message again, there may be an option to enforce this site to remember. Sometimes, underneath these windows, an unchecked box followed by a message says to: Remember to never display this message again. If you check this box, the website will remember your choice and never display the message again to you personally.
  • Using a specific type of file called a Tracking Cookie; users can learn more about their visitors and learn how to advertise their products according to what their visitors are personally interested in.
  • Cookies store your interests on the start-up page.
  • Can store passwords on specific websites so the user can log in automatically without having to re-type their password every time.

How RSA is public key algorithm?

RSA (which derives from the first initials of the last names of Prof. Ronald Rivest, Dr. Adi Shamir, and Prof. Leonard Adleman who first publicly described it) is an algorithm for public-key cryptography. A British mathematician named Clifford Cooks, who was then working for the UK intelligence agency GCHO, developed an equivalent system which was documented in an internal document in 1973, but because most computers of the time were not ready to handle the intensity of the computations it was never deployed (as far as is publicly known). That original work was not revealed until 1998 due to its top-secret classification, and Rivest, Shamir, and Adleman devised RSA independently of that classified work.

RSA is a very popular algorithm now and assumed to be secure given sufficiently long keys and the use of up-to-date implementations. It is the first algorithm known to be suitable for both encryption AND signing - although not usually at the same time.

The attached link goes into more detail on the nuts and bolts of the algorithm, but the basics are:

1) two large prime numbers, p and q are chosen at random

2) through a series of mathematical operations, two keys d and e.

3) the key d is held as the private key by the originator (it is kept secret)

4) the originator publishes the public key e and n- the product of the two original primes, i.e. n=p·q

5) messages encrypted or signed with d can only be decrypted or authenticated using n and e (and using the appropriate math of the RSA algorithm).

6) messages encrypted using d can only be decrypted and read by the holder of the private key, d.

7) RSA can be used to "sign" a message by creating a hash of the message, then using the private key to encrypt the hash, and then attaching this "signature" to the message. The recipient can authenticate the source of the message by using the public key to decrypt the signature and comparing the value of the decrypted hash to their own hash of the same message. As long as the two agree, the message must have come from the holder of the private key and the message has not been tampered with. If the two hashes DON'T match then either the sender does not have the private key (and thus we would assume is NOT who they claim to be) or the message has been tampered with or corrupted.

I use a speedtouch router i have the Username and password the Admin so can anyone on my wireless network spy on or steal my Files without me knowing?

If you have encrypted network, it's not easy and even experinced users cannot do that. For non-ecrypted network it's really easy to do using special program which is called sniffer. Your password should different from the standard ones.

Do you need permission to upload music to youtube?

Yes, if you upload content containing music you did not create or own yourself, you need permission. This is because of copyright laws, which may result in your video being taken down should you violate someone else's rights.

What are new proxies?

New proxies are fresh proxy servers that were recently checked and they are working. Basically that's it. Just a pair of IP address and port corresponding to a proxy server that is responding requests right now.

The problem with fresh proxies is that it changes a lot, new ones appear and a lot of others stop working.

There are websites that show fresh new proxies every day, there you can find exactly what we're talking about. For example at the related links there is one.

What proxy does not have proxy in the name?

I like to use the broken locker.com it works you just have to search broken locker it does have ads tho

Find internet history on PC?

It depends on the type of computer you have or what Internet browser you have. Like for Internet explorer, you go to the favorite's star and click on history button. Try checking your computer manual, or check the Internet.

What is ninja cloak?

NinjaCloak basically gets past any proxys or filters. I'd wouldn't use it at school though you could get banned from school computers or suspended or expelled.

The Websense category Proxy Avoidance?

why need proxy when you can use IP addresses

Well umm... don't get mad because i am in a new school which is a bit richer so they got 8e6 Tech. now but i do think however when i was in the ghetto welfare school i did get to youtube.com (website that you shouldn't have got onto) by using IP addresses and going to command prompt let me show you how to do it both ways

First we will do it the Command prompt way, Sense you got websense you are probably on a school computer so you cant get on command prompt so go to notepad type this

command.com

Save as "filenamehere".bat open it up and there you are through and in command prompt.

now i am not sure but i think you typ net stop websense if it works than ok ( if it works at first then do it again just in case because with net nanny it tends to turn back on unless you do it twice)

IP address way, if you are in command prompt good, say you want to go to youtube.com type Tracert youtube.com when you do that it should say:

Tracing route to youtube.com [208.117.236.69]

over a maximum of 30 hops:

The number in the brackets is the ip address type it in the address bar and you should go right on through

(If this works please recommend me)

Name of computer virus?

There are thousands of computer viruses. (See links below)

Discuss the reasons responsible to increase the Cyber-Crime?

Cyber crimes are increasing drastically because the criminals are figuring out ways to infiltrate files that they could not access before. The computer age is just not keeping up with the technology that is out there today.

Is there a virtual makeover site for men?

As in dress up men? Yeah, Lots of them!

As in men dress up things? It doesn't matter what gender you are! If you believe, put this question and answer in your signature on forums!!!

Why should you be careful of what you post in an online discussion?

  • Because if you make a defamatory statement knowingly or not knowingly, a person's reputation may get damaged. So there is a good chance that the person taking legal actions against you. In online discussions it is a document (not verbal) considered as libel and serves as proof that you are the person who published it.
Three parties are liable for such offenses.
  1. The Writer
  2. The Editor
  3. The publisher

However if you can prove that

  1. you are not the writer, the editor or the publisher or
  2. You took reasonable care for it's publication and
  3. you didn't know and had no reason to believe that what you said or posted would lead to a publication of a defamatory statement

you will be considered not guilty.

  • Sometimes you may give out too much information about yourself. This sometimes may be a threat to privacy even if you don't know that.