answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

500 Questions

Advantages and disadvantages of quick heal antivirus software?

User Avatar

Asked by Wiki User

I used many anti-viruses and i suggest you to buy Quick Heal. I'm telling you the advantages and disadvantages of all anti-viruses. Bitdeffender's detection is good but it decrease your internet speed. Bitdeffender is recommend only for high speed users. Kespersky is the worst anti-virus. Virus detection is very bad and it is very risky as it delete the System file also it kill very much computer resource. Norton is a anti virus that only scan for viruses but didn't delete completely as it is mentioned in the official website of symentic(Norton) and the daily update of this anti virus is too big. AVG is a good anti-virus but the main problem is that if are about to download videos from youtube via IDM or DAP, you cant and the daily update of AVG is very big. I recommend this anti-virus only for high speed internet users. Panda has amazing cloud security but the detection is not good at all. Avast has low property of detection and healing. Avira detect very well but cant heal properly. Microsoft Security is now become very popular. The update of Microsoft Security Essential takes low time but it cant heal properly and the scanning of 1.5 gb takes more than 2 hour.

I recommend you to buy Quick Heal with amazing scanning,detection and healing property. Update is low and it don't hamper your internet speed.

It is my favorite anti virus since i'm using. Quick heal is not so popular but it is the best anti virus. It have also mobile scanner which scan your mobile

Which port is used by ICMP?

User Avatar

Asked by Wiki User

There really is no "port" for icmp but there is a icmp code. If you are looking for the icmp code for echo-reply it is 0 and the echo is 8 For an access list you could do the following: permit icmp any any echo-reply

permit icmp any any echo Or the same using the icmp code permit icmp any any 0

permit icmp any any 8

What is the difference between a router and a firewall?

User Avatar

Asked by Wiki User

A router (a piece of hardware) is just a way to move/share a connection with several other computers (i.e. using a router so that all three computers in your house can use the same internet connection) - while a firewall (usually a piece of software) is meant to block unauthorized access (hackers) to your computer/network and help protect you from viruses, spam, etc. ----- Put this way---- With a router (with default settings) in between two or more networks, hosts from any two networks can communicate accross, because router has to entertain them (no security zoning) With a firewall (with default settings) in between two or more networks, hosts from any two networks CANNOT communicate accross, because firewall MUST NOT entertain them (Security Zones) ----BTW Read these lines if you are getting interviewed----- ;)

How do you get the password for your internet connection?

User Avatar

Asked by Wiki User

if it is not changed it should be admin

user name on linksys admin

password password

user name on netgear admin

password admin

user name on Motorola admin

password Motorola

user name on smc smc

password smcpassword

that is once agin if not changed and to accesses the login screen type 192.168.1.1 on routers and 192.168.100.1 on modems specific to cable modems

The KRESV test should be used to program your firewall?

User Avatar

Asked by Wiki User

False, the KRESV is used to check workstation security measures. Also, stop looking on WikiAnswers for DOD and DA cert answers...

How do networks impact on daily lives?

User Avatar

Asked by Wiki User

Networks impact the daily lives of humans by allowing them access to the Internet. The Internet allows people to connect via social sites, learn new information, and help them track data.

What is a privacy impact assessment under HIPAA?

User Avatar

Asked by Wiki User

This is essentially a NIST 800-66 audit conducted by a qualified assessor. The objective is to find violations and other risks to your organization before criminals do.

These are things we do at Lazarus Alliance when helping organizations with proactive cyber security services such as IT Audit & Compliance (FedRAMP, PCI, HIPAA, SOX, SSAE 16, ISO 27001), IT Risk Management, IT Governance & Policies and Cybervisor services.

Since 2000, Lazarus Alliance has remained on the cutting edge of IT security, risk, audit, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. Lazarus Alliance's primary purpose is to help organizations attain, maintain, and demonstrate Proactive Cyber Security compliance and information security excellence, in any jurisdiction.

Hope this helped!

Is there any way to hunt down a person's cell phone number online?

User Avatar

Asked by Wiki User

you will need the persons 1st and last name or their address to find them...but all you need to do is go to directoryassistanceplus.com

What does a firewall use to effectively control traffic flow?

User Avatar

Asked by Wiki User

In the physical world, businesses rely on several layers of security. First, they rely on their country's government and military forces to keep order. Then, they trust their local police to patrol the streets and respond to any crimes that occur. They further supplement these public security mechanisms by using locks on doors and windows, employee badges, and security systems. If all these defenses fail and a business is a victim of a crime, the business's insurance agency absorbs part of the impact by compensating the business for a portion of the loss.

Unfortunately, the state of networking today lacks these multiple levels of protection. Federal and local governments do what they can to slow network crime, but they're far from 100 percent effective. Beyond prevention, law enforcement generally only responds to the most serious network intrusions. The average Internet-connected home or business is attacked dozens of times per day, and no police force is equipped to handle that volume of complaints. Losses from computer crime are hard to quantify and predict, and as a result most business insurance policies do little to compensate for the losses that result from a successful attack.

The one aspect of physical security, however, that isn't missing from network security is the equivalent of door locks, employee badges, and security systems: firewalls. Just as you lock your car and home, you need to protect your computers and networks. Firewalls are these locks, and just like in the physical world, they come in different shapes and sizes to suit different needs. The famous Jargon Dictionary has a great definition for firewall: "a dedicated gateway machine with special security precautions on it, used to service outside network connections and dial-in lines." Firewalls serve two useful purposes: they filter what traffic comes into your network from the outside world, and they control what computers on your network may send there.

It's important to understand one thing, however. No firewall-whether a small, free host-based firewall or a multiple-thousand-dollar enterprise firewall array-will make your computers impervious to attack. Firewalls, like locks and walls and moats and dragons, create barriers to attack-they get in the way of someone trying to take control. By making it difficult for attackers to get into your computer, by making them invest lots of time, you become less attractive. Firewalls very effectively block most bad guys from compromising an individual computer. But it's impossible to fully prevent every intrusion: All software has bugs, and someone might find an obscure bug in your firewall that allows them to pass through. In a nutshell, there's no such thing as absolute security. How much you invest in firewalls should be a function of how much you have to lose if an attack is successful.

I Forgot my Password for outlook account what do I do?

User Avatar

Asked by Wiki User

Method 1: Reset your forgotten password with another administrator account

1. Start your computer, Log on to another administrator account or account which has administration privilege you will use to reset password.

2. Open Local Users and Groups by clicking the Start button, typing lusrmgr.msc into the Search box, and then pressing ENTER.‌ Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Double-click Local Users and Groups, and then click Users.

4. Right-click the account that you need to reset the password for, and then click Set Password.

5. Type and confirm the new password.

Method 2: Reset the lost password with a Windows password reset disk

A password reset disk is really helpful when you realize you have lost password. Insert the password reset disk to your drive then follow these steps:

1. If you enter the wrong password when you attempt to log on, Windows displays a message that the password is incorrect. Click OK to close the message.

2. Click Reset password, and then insert Windows password reset disk (or other removable media).

3. Follow the steps in the Password Reset Wizard to create a new password.

4. Log on with the new password. If you forget your password again, you can use the same password reset disk. You don't need to make a new one.

Method 3: Reset the password with Windows Password Key

Step 1: Login any available computer and download Windows Password Key.

Step 2: Install it and Burt the ISO image to a blank CD or USB flash diver.

Step 3: Set BIOS to boot from CD or USB

Step 4: Reset the password with the burned CD or USB flash drive.

Do cursors give you viruses?

User Avatar

Asked by Wiki User

sometimes, yeah, you should never trust a proper site or an add, if you click on something that says on the hyperlink double click then that means what you have clicked on is most likely a virus. If however, you do go on it just click the red X in the right hand corner. thanks.

What are four methods for increasing data security in a computer system?

User Avatar

Asked by Wiki User

Data encryption is one good method of information security for computers. Another good method is anti-virus software. Intrusion detection systems are sometimes used along with access control lists.

What is the worlds hardest password?

User Avatar

Asked by Wiki User

TsEhGUOt. This is the world's toughest Password ever created. By Mr. Vivek Joshi Indore (M.P.)INDIA You can Get him on tanishq237@rediffmail.com.His Educational Qualification is MCA.

What are dynamic websites?

User Avatar

Asked by Adityamutharaju

We are living in a new age of webdesgin and 'client' side scripting isn't enough for everyday use. Any website that has a login feature is dynamic. Therefore any website that you create a account or signup is dynamic.

A Dynamic Website - a website that connects to a server and generates a clientside webpage from results - often from a database

Breakdown - the following is dynamic

* Login/Join feature * Comment Feature * Search Feature

What is email address for Microsoft support?

User Avatar

Asked by Wiki User

Looking at their website, I could not see an email address, however, there is a postal address, phone number and it allows you to start a chat with an agent online, depending on the matter you are seeking support with.

http://support.microsoft.com/contactus/?ws=support

How do you Create a Master Password in Firefox?

User Avatar

Asked by Wiki User

Master Password+ extension let's you "log out" your master password without closing Firefox.

What is the difference between static packet filter firewall operation and stateful firewall operation?

User Avatar

Asked by Wiki User

Stateful firewall checks more than just the ACK flag;it inspects the sequence numbers to ensure the correct state of the TCP session.

What is the best web browser that suit with my computer?

User Avatar

Asked by Wiki User

If you want Speed and the choice for many features and addons try

Mozilla FireFox

List two security issues when using the internet?

User Avatar

Asked by Wiki User

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

Is there security on the Internet?

User Avatar

Asked by Wiki User

For the typical user the answer is most certainly no but it depends entirely on how you define "sent via the internet." If you connect to a web site using the standard http protocol then it is an unsecured connection. If you are using the https (SSL) connection then it is encrypted and gives some degree of security however there are man in the middle attacks that can defeat SSL connections.

If you are talking about sending email then there is no security as the message crosses the internet unless you encrypt it with something like PGP. You can have TLS encrypted connections between mail servers that will protect the message as it crosses the internet but once it is received by the mail server it is unprotected. Thus the network connection between your client and the mail server is not secure. The message can be sniffed off the network and read.

The same goes for your user name and password for a typical POP3 mail account (most ISP accounts), it can be sniffed off the network and stolen. So bottom line is for the most part information sent via the internet is not secure unless specific measures are taken to secure it.

Which symbol represents a secure website?

User Avatar

Asked by Wiki User

there is a padlock icon in the address bar

another way to insure is by looking at the address bar if it has HTTPS rather then the standard HTTP. this means the data is encrypted and has an security certificate.

hope it helped :)

What is a good website that talks about girls problems?

User Avatar

Asked by Wiki User

I know a great website! You can talk with other girls about problems or e-mail the maker of the website anything you want! It has free contests and music and pictures of the most recent fashions and I've heard its a lot of fun! http://www.itsjustgirltalk.webs.com <--- there you go(:

Does a fingerprint portray authentication based upon something known?

User Avatar

Asked by Wiki User

Not always. Authentication is based upon one or more of the following:

  1. Something the user knows (such as a PIN).
  2. Something the user has (such as an ID card).
  3. Something the user is (such as a fingerprint).