answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Does the recipient of an email see your address if sent by Bcc?

Nope It is not possible for the recepient to see your id. Recepient will however be able to know who the sender is ;-)

What does comfirm mean?

Well it is probably a name that doesn't have any specific meaning.

Or they meant confirm rather than comfirm.

Why are you getting so much filthy spam on your gmail all of the sudden?

Hopefully it is going directly to your spam folder where it can quickly be deleted. If it is going to your in box check your spam settings

How long can a digital certificates be valid?

Depending on what was set during the certificate signing process, a certificate can last a short amount of time to an indefinite one. However, digital certificates can be revoked before their expiration date.

Can you erase an IP address from a site that you already visited?

Not unless it explicitly allows you to, which isn't likely. The Web server has a log of connections made, and only an administrator* of that machine would be able to modify it.

(*"Administrator" in this context refers to any entity who has administrative privileges)

Don't try to erase your IP; instead, visit the target site from a proxy. It's easy to find Web proxies with a simple Web search, and the target site will record the proxy's IP address instead of your own.

Could one WikiAnswers account be accessed in two different computers at the same time?

Yes, it is actually possible. You can be on one account on two different computers at the same time, and you can also make contributions on both computers at the same time if you wish.

Do you have reviews on the Lightspeed writer steno machine?

I don't have one yet, but I have written on it, and it's amazing. Your best bet would be to go to depoman.com and join the LS Addicts groups there. They are an amazing bunch and are willing to answer the good and the bad. Good luck, Aleece DePuey

Where can you download the newton virus for mac?

The Newton Virus was an application that you ran from a USB flash drive. It was an art project created by Troika. Copies of the Newton Virus can be purchased from Troika via the links below.

What is LAN proxy mean?

If the internet is directly connected to the PC if the internet is connected to servers then the other pc's are connected in a LAN then the users in a LAN must change their LAN proxy settings in a browser

Does Tor block your ISP from logging your websites?

Yes, in fact, the only place where your actions can be logged is at the exit node. However, if you don't perform any actions that can reveal your identity to the exit node, nobody should know who you really are.

What are the characteristics of Munchausen by proxy?

Munchausen by proxy is the name given to factitious disorders in children produced by parents or other caregivers. The parent may falsify the child's medical history or tamper with laboratory tests in order to make the child.

What is stateful inspection firewalls?

Stateful inspection firewalls monitor the state of active connections and use this information to determine which network packets to allow through the firewall.

This is in contrast to static packet filtering where only the headers of packets are checked. Attackers can exploit this property of static filters to sometimes get information through the firewall by doing something like indicating "reply" in the header.

Stateful inspection, on the other hand, analyzes packets all the way down to the application layer of the OSI model. Stateful inspection can monitor communications packets over a period of time and examine both incoming and outgoing packets. Outgoing packets that request specific types of incoming packets are tracked and only incoming packets that are proper responses are allowed through the firewall.

In a firewall that uses stateful inspection, the network administrator can set the parameters to meet specific needs, for example ports can be closed unless an incoming packet requests connection to a specific port and then only that port is opened. This practice prevents port scanning, a well-known hacking technique.

If I forgot my user name AND password How do you get them back because you cannot re-register because your email addy is taken now?

Click on the link "Forget password". Flow the instructions and full fill all the requred fields. click LOST PASSWORD and type in your email address and it should come up on your ipod/iphone or whatever email u have

What are web proxy and ftp servers?

Web proxys allow you to surf the internet without someone being able to trace what sites you've visited. They can also be used to hide from parental blocks.

Web proxy:-

A web proxy is becoming more and more important in today's internet. Schools and Companys tend to block sites pretty quickly nowadays.It is especially irritating when the ban is directed towards just a few websites and not every website in that category. A Web Proxy might be able to sneak past this policies and display the site in your browser even though it is banned in the network.

FTP server:-

An FTP server is a software.html application running the File Transfer Protocol (FTP), which is the protocol for exchanging files over the Internet.

Using a LAN computer how you can hide your internet activities to your administrator?

If they have installed firewall and monitoring software, there is little you can do. They have access to the PC and everything it connects to. In the workplace or school, this can be grounds for dismissal. --You can install proxy software for http content and or tunnel your information through ports that admin may not be logging. --You can try arp spoofing. or carefully gaining admin access and use it to your benefit. Often lazy administrators leave routers and webservers open to attack because they leave the default passwords.

This answer depends on how much you want to learn about networking and information security etc....

Is buffer overload a computer virus?

No, a buffer overload is not a computer virus. A buffer overload is an error that occurs when a program on your computer is writing data to a buffer and exceeds the buffer's capacity. This can cause problems and will usually cause the program which caused the buffer overload to crash.

How do you hack your gmail account after it was hacked and you need to get back into it?

There is no need to try to "hack" your own account. To get back an account that you owned all you must do is follow the reset password phase and get a password via the backup method you selected when registering either by a secondary email or phone. If you did not setup a backup method, then it is unlikely you will recover the account as there is no customer support for gmail accounts.

Is there any software solution for recording IP Phones?

Yes. Dialog voip software is purely software based system which uses latest technology called port mirroring which makes the software less costly.

What data is encrypted using a single key that only the sender and the recriver know?

The data itself does not matter in this scenario. The type of encryption used is symmetric encryption, meaning that the sender and receiver have the same key to lock and unlock the data.

What is HIPAA personally identifiable information?

HIPAA is the Health Insurance Portability and Accountability Act of 1996. It was passed to require "covered entities" (businesses that treat patients using health insurance or offering health-care services) to work with personally identifiable information in a confidential manner. All agencies that provide health-care must be sure to keep all patient information secure and confidential in email, fax, conversation, phone, and other forms of transferring patient information. HIPAA also protects patient files from being accessed from "outsiders" (individuals who are not documented on a patient's file to receive information). In cases such as these, the patient must complete a form known as an "authorization of release of information" form, which entitles a family member, friend, caregiver, or spouse to the patient file. The family member, friend, caregiver, or spouse does not have access to the patients file unless this form is signed and dated. These forms are usually abbreviated ROI or AROI.

HIPAA has afforded a lot of people confidentiality and security over their medical and mental health records. However, this Act has also created a lot of barriers to proper care, primarily mental health care. When an individual is being treated for severe mental health and a family member needs information on where a loved one has been hospitalized or cared for, a health-care provider cannot give this information to a family member unless they are documented on that patients file. HIPAA covers all individuals 18 and older, including 14 year olds in some states such as Pennsylvania.

How do you turn on Hotspot Shield?

Go here for more information: http://hotspotshield.com/clientless/iphone/get_started.php