answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Is there a certification in Information privacy?

There is a certification in Information privacy called the Certified Information Privacy Professional (CIPP) provides a strong foundation in a broad range of corporate privacy issues, laws etc. It was created by the International Association of Privacy Professionals (IAPP).

_________________________________________

The CIPP... From an IT perspective, the problem of managing compliance issues is most acute for unstructured information - the data that resides in files and file systems. Some organizations have deployed applications for email archival and enterprise content management (ECM) to address risk & compliance requirements.

The problem of managing information that presents a risk and is subject to regulation is difficult not so much in terms of enforcing access control and managing retention, rather it is the determination of which information should be subject to more rigorous access control and managed retention that is the most difficult task.

The IAPP website may be found at: http://www.privacyassociation.org

If you are interested in taking the CIPP exam, privacy information, learning products and test preparation tools may be found at either the IAPP website at: http://www.privacyassociation.org/certification or on the CIPP Guide website at: http://www.cippguide.org

How do you fix a security problem on a 1997 Monte Carlo Z34?

To fix a security problem on a 1997 Monte Carlo Z34, first, check the vehicle's key and ignition system, as issues with the ignition cylinder or key transponder can cause security lockout. Inspect the wiring and connections related to the anti-theft system, as frayed wires or loose connections can disrupt functionality. If the problem persists, consider resetting the vehicle's security system by disconnecting the battery for a few minutes, then reconnecting it. If these steps do not resolve the issue, consult a professional mechanic or dealership for further diagnosis and repair.

What are the disadvantages of a statefull packet inspection firewalls?

Stateful packet inspection firewalls can introduce latency due to their need to track the state of active connections, which may slow down network performance. They also require more resources, such as memory and processing power, to maintain connection states, potentially increasing costs. Additionally, they may not be as effective against sophisticated attacks, such as those using encrypted traffic or application-layer threats, as they primarily focus on the transport layer. Lastly, misconfigurations can lead to vulnerabilities, exposing the network to security risks.

How do you configure a proxy server in Windows XP?

As a prerequisite you need to have set up Group Policy and an Active Directory structure, you also need to have installed the GPMC. Open GPMC and right click policy to edit

This should bring up "Group Policy Editor"

Expand "User Configuration"

Expand "Windows Settings"

Expand "Internet Explorer Maintainace"

Select "Connection"

Double click "Proxy Settings"

Enter proxy server details in top box. This change would apply to all users that share the policy. Solution: Enable Web Proxy Automatic Discovery in Internet Explorer

On Web Proxy client computers running Internet Explorer 5 or later, do the following:

On the Tools menu, click Internet Options.

Click the Connections tab.

Click LAN Settings.

Click to select the Automatically detect settings check box, and then click OK two times.

Enable Web Proxy Automatic Discovery on Firewall Client for ISA Server 2004 Computers

To enable Web Proxy automatic discovery on a Firewall client, do the following:

In the Web Browser tab of the Microsoft Firewall Client for ISA Server 2004 dialog box, select Enable Web browser automatic configuration.

To apply settings immediately, click Configure now.

Enable Automatic Discovery for Firewall Clients in ISA Server 2004

To enable automatic discovery for Firewall clients for ISA Server 2004, do the following:

In the console tree of ISA Server Management, click Configuration, and then click Networks. In the details pane, click the Networks tab.

On the Tasks tab, click Edit Selected Network.

On the Firewall Client tab, select Automatically detect settings, if the client computer should automatically attempt to find the ISA Server computer. Enable Automatic Discovery for Firewall Clients in ISA Server 2000

To enable automatic discovery for Firewall clients for ISA Server 2000, do the following:

In ISA Server Management, click the ISA Server computer name, and then click Client Configuration.

In the details pane, right-click Firewall Client and then click Properties.

On the General tab, select Enable automatic discovery in Firewall Clients.

Create an Option 252 Entry in DHCP

To create an Option 252 entry in DHCP, do the following:

Click Start, point to Programs, point to Administrative Tools, and then click DHCP.

In the console tree, right-click the applicable DHCP server, click Set Predefined Options, and then click Add.

In Name, type WPAD.

In Code, type 252.

In Data type, select String, and then click OK.

In String, type http://Computer_Name:Port/wpad.dat where:

Computer_Name is the fully qualified domain name of the ISA Server computer.

Port is the port number on which automatic discovery

\information is published. You can specify any port number. By default ISA Server publishes automatic discovery information on port 8080.

Right-click Server options, and then click Configure options.

Confirm that the Option 252 check box is selected.

Configure Option 252 for a DHCP Scope

To configure an Option 252 entry for a DCHP scope, do the following:

Click Start, point to Programs, point to Administrative Tools, and then click DHCP. Right-click Scope Options, and then click Configure Options.

Click Advanced, and then in Vendor Class, click Standard Options.

In Available Options, select the 252 Proxy Autodiscovery check box, and then click OK.

Create a WPAD Entry in DNS

To create a WPAD entry in DNS, do the following:

Click Start, point to Programs, point to Administrative Tools, and then click DNS.

In the console tree, right-click the applicable forward lookup zone and click New Alias.

In Alias name, type WPAD.

In Fully qualified name for target host, type the fully qualified domain name (FQDN) of the WPAD

Enable and Configure ISA Server 2004 to Listen for Automatic Discovery Requests

To enable and configure ISA Server 2004 to listen for automatic discovery requests, do the following:

In the console tree of ISA Server Management, click Firewall Policy.

In the details pane, select the applicable network (usually Internal).

On the Tasks tab, click Edit Selected Network.

On the Auto Discovery tab, select Publish automatic discovery information.

Enable and Configure ISA Server 2000 to Listen for Automatic Discovery Requests

To enable and configure ISA Server 2000 to listen for automatic discovery requests, do the following:

In the console tree of ISA Server Management, right-click the ISA Server computer name, and then click Properties.

On the Auto Discovery tab, select the Publish automatic discovery information check box.

In Use this port for automatic discovery requests, type the appropriate port number. Note: If you want more information. so you can visit http://www.iyogibusiness.com/

What is the procediour of verefing of digital signature on smartphoner?

To verify a digital signature on a smartphone, the user typically needs to have the public key associated with the signer. The verification process involves using a digital signature verification app or built-in functionality, where the user inputs the signed document and the public key. The app then checks the signature against the data using cryptographic algorithms to confirm its authenticity and integrity. If the signature is valid, it indicates that the document has not been altered and comes from a legitimate source.

The track record for proxy fights suggests they are?

The track record for proxy fights suggests they are often contentious and can lead to significant changes in corporate governance and management. While some proxy fights result in the successful election of dissident directors and strategic shifts, many do not achieve their intended outcomes due to the complexity of shareholder interests and the potential for management to rally support. Overall, the effectiveness of proxy fights varies widely depending on the specific circumstances of the company involved.

Why do we need safety rules for using the internet?

Safety rules for using the internet are essential to protect users from various threats, including cyberbullying, identity theft, and online predators. These guidelines help individuals navigate the vast online landscape responsibly, ensuring their personal information remains secure. Additionally, safety rules promote respectful interactions and foster a safer digital environment for everyone, especially vulnerable populations like children. Overall, they empower users to engage with technology confidently and wisely.

Who is the best hacker in the world?

Well there is no proper way to tell but every year worlds largest hackers meet is kept also known has DEF CON hacker's convention . Where even the makers of Backtrack participate . Each year a new person Wins the contest

WHAT IS downsizing client server computing?

"http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing" "http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing" "http://wiki.answers.com/Q/What_is_downsizing_and_client_server_computing"

What is the punishment in the US for accessing email accounts illegally?

THERE IS NO PUNISHMENT FOR ACCESSING E-MAILS. THERE SHOULD BE A PUNISHMENT ON CONGRESS, FOR ALL THE RAISES IT GIVES IT SELF FOR A NO WORK JOB. RADAR O'REILLY

How do you mask email address?

One way is to use an anonymous remailer. You can find more info on these here:

http://www.emailprivacy.info/remailers

And here's an example of a web-based UK anonymous remailing service:

http://www.sharpmail.co.uk/

Can a website open on one browser tab steal or retrieve a password you supply on another tab?

Not likely, the website open in the one tab has to install some kind of key-logging software on your system and load it into the memory before it can intercept anything you enter on another tab. In order to do that, it has to exploit a vulnerability in your browser and get past your firewall (if you have one installed).

Websites showing common malicious behaviour, is likely to be detected by behaviour-based anti-malware systems using heuristic analysis to detect threats like these.

How do you remove or restrict an internet blocker?

Ask the person that installed it. WikiAnswers does not supply information that can bypass web filters.

In the Linksys Security menu what does the SPI Firewall Protection option Enabled provide?

Stateful Packet Inspection of the traffic entering the device. It cannot inspect on outbound traffic.

Can disreputable Internet sites sniff out my personal information such as my street address if I have given it to reputable sites online?

No, reputable sites will most likely use a system such as PayPal or Verisign to encrypt and code the information you provide. That does not however stop sites from "giving" away info, such as your email address. Although if it is a reputable site, they will not do that.

What is a cyber terrorist?

A terrorist that uses or threatens to use computers to harm others, instead of bombs, guns, etc. Usually their attacks are via the Internet.