answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How do you bypass opendns?

Just use UltraSurf. Download to your thumb drive and launch from their. It will open ie for you, so all you have to do is double click and that's it.

What is the difference between thin client and thick client?

Thick Client : Processing is done on client side. eg: Applets.

Thin client : Processing is done on server side.

eg: Yahoo, hotmail, etc.

Why can't I delete viruses in my computer even after I press delete?

Most viruses are embedded in various files (such as images and programs) and when you open those files, the virus, which is actually a program embedded within the file is executed and create files on your computer which cause various problems (the problems are very specific to what type of virus you get). So deleting the file in which the virus was embedded will not remove the virus. The files created by the virus are often created in "secure" locations on your hard-drive, locations which are responsible for maintaining your operating system (Windows) and can not be deleted by hand (unless you have admin rights for your user). Here is where Anti Virus software comes in. This type of software have the ability to remove viruses from these locations, and if they cant, they "quarantine" them (shield them, making them unable to do harm).

Is love-shopping.org a real shopping website or a scam?

This is one of 1,000 web sites owned by an operator from China.

The web site, like all of theirs, is promoted by spamming web sites and forums all over the world.

They seem to operate their spamming as a family business.

If you want to see for yourself, just do a google search on the web site.

You will see hundreds and hundreds of the same pasted comment posted on hundreds of web sites. These are also only the ones that the owners have not deleted. The number of comments that they actually leave is infinitely higher.

It's time to help put these spammers out of business, or at least to make them advertise legitimately.

Is internet scamming illegal?

Depending on where you live, yes. In most countries he would be able to make a police report and the police should be able to find out who you are. You can find more information else where but no matter what you are a scum, mutt and shmuck

Is dishTVforPc genuine software?

hi everyone i have poested this Question and i m answering as i have paid 17 something euro for one year subscription, but wht i got is a software which assembles all the tv channels which are already there on their website, i mean which are already free on their own website or on itv.com,, it means it u wont get any extra channel other than u already can watch free on channel's official website. i m really so regret to pay for it. dont pay for these partenrs site even, they called ziggytv,, and few more. search b4 wht u pay for.

What is maximum penalty for persons taken to court for hacking in England?

The Computer Misuse laws were changed in 2006 by adding stiffer penalties for hacking. The maximum penalty for hacking in England is 6 months in prison and a fine of at least 2,000 pounds.

How do you insert an SSL certificate in a cert7.db file You have an LDAP server running with SSL. You need a cert7.db file with the LDAP's certificate on the client box. How do you do that?

Creating a cert7.db could be really tricky in some case.

Basically there is two way you can obtain one:

* By installing a old Netscape browser (v.4.79 would do the trick) and to fetch it in your user profile (please complete this procedure if you choose to do so). * Use the Netscape Network Security Service (NSS) tool set (currently maintained by mozilla).

The NSS tools include a utility called certutil, which is able (among other things), to translate a traditional security certificate (in PEM or CER format) into a cert7.db file... sounds like exactly what you need. The problem is that version newer than 3.2 of the nss toolkits only create cert8.db file, which are not compatible with some ldap client. You can still try to use one of those but you may ran into problems.

If you intend to use a package from your Linux distribution (like libnss3-tool for debian) in order to generate a cert7.db file, you have to make sure that it's old enough (take note that the current description of the libnss3-tool package for debian wrongly describe it as being able to generate cert7.db).

Alternatively you can grab a older version of the toolkit on this FTP site (successfully tested with version 3.2.2):

ftp.mozilla.org/pub/mozilla.org/security/nss/releases Once extracted, simply copy the libraries in the ./lib subdir into a place where you system can found them (for example /usr/lib). Then you can run the certutil utililty located in the /bin subdir. You'll also need a working installation of the NetScape Portable Runtime Library (NPSR). Your distribution maybe provide it (as long as you have a version >= 4, there should be no problem).

If you're ready, you can proceed with the first step: creating the empty database for storing the certificates. First, you'll have to create the directory to store the database (the default is $home/.netscape):

mkdir /home/user/.netscape

(if you don't do so, you'll get a very clear error message saying: certutil: NSS_Initialize failed: security library: bad database.) Once it's done you can add your CA certificate by executing something like that:

: certutil -A -n "certificateName" -t "C,C,C" -a -i certFile -d path

:

; -A says that we want to add a certificate to the database. -n tell the nickname related to this certificate (for example "CACert Org."), this is not a critical parameter, -t provide the "Trust attributes" of the certificate (we'll see this later), -a say that the certificate is in ASCII format (PEM), do not use it if you're certificate is in CER format, -i gives the path to the certificate file and finally -d should be the path to directory containing the database ($home/.netscape, by default). If your certificate has been signed by a root CA, your database we'll need to include your server certificate AND the certificate of the Root CA.

The certificate of the root CA (or from your server certificate if self-signed), should contains at least the following trust attribute: "C,,". It's says that this CA provide trusted server certificates for SSL connection. You can expand this attribute to "C,C,C" if it the CA you're using also authenticate certificate intended to be used for S/MIME content (ie: email) or cryptographic operation on generic objects. The attribute "T" does the same but considering client certificates. If you want to trust all content signed by your CA may specify: "CT,CT,CT".

If your server certificate is not self signed, you have to separately add it by using the p attribute which will specify that he's a trusted peer (=server, by opposition to the 'u' attribute for client certificate), so at least: "p,,,".

In this way you cert7.db file should be complete.

It's very difficult to unterstand why, for such a critical feature, LDAP clients still use a certificate database in this old and non-open format, without providing any utility to create simply such database.

If you want to learn more about trust attributes:

http://docs.sun.com/source/816-6732-10/authctn.html Or about the cert7.db format: http://www.mozilla.org/projects/security/pki/nss/db_formats.html

Why do schools block sites?

Why Schools Block SitesSchools block sites for many reasons. Some of them include blocking adult sites, which is both noneducational and illegal for children to view, noneducational sites because children are in school to learn, not to play, etc.

I am going to have to STRONGLY disagree with the statement above. Half the sites that schools block, are most likely educational. Do you really think the school goes through every site in the entire Web? No, all they do is look at the URL and don't really get a chance to look at the site. I have learned that there are going to be sites out there that will be educational and schools have blocked them. Do schools really think that they did a really good job on blocking sites? I certainly do not think so. Yeah some sites are not very educational, but shouldn't schools make the day for their students fun, as well as educational? And I bet some people don't even realize, that a lot of adult sites out there ARE run by our own government? So if adult sites are so called illegal then why would they be ran by our government? Oh I guess you could really put some thought into this, and maybe someday people will realize, that government runs those sites, because we as American citizens, are too dull and dense to realize that we are just getting scammed out of our pockets. Just because the AMERICAN government failed, doesn't mean that the rest of the world should.

Sites are blocked at school because students can go on inappropriate websites.

i understand why they block most of the adult sites......but in my school the only websites u can get is google....yahoo...study island.....etc.u know what i mean but to me the whole idea is stupid because most kids around the world learn through technology and if u block most of the sites .........well there goes a good 65% of kids learning.....so actually idk why they choose to block sites

yes i agree i think they just don't want 1 ounce of fun in their school.

What is the Babylon browser?

It is a browser that seems to get installed on everyone's computer when they are downloading another program and haven't read the fine print--something which we all do. Once installed, it hijacks internet explorer, firefox and chrome and is extremely difficult to get rid of. Just google the issue and you will find hundreds upon hundreds of searches for how do I get rid of Babylon. If you accidentally install it on your computer, prepare to spend hours getting rid of it. Unfortunately, there are no criminal statutes applicable to Babylon's activities.

What is the process of acknowledging multiple data packets?

ACK (also known as an acknowledgment code) is a signal passed between communicating processes or computers to signify acknowledgement

What websites are scams?

Anything that requires you to pay money for information of any kind is a scam. Just about all online jobs are SCAMS. Jobs as a "financial agent", or "payment processor"...things of that nature that offer a hefty monthly salary for very little input from you is a money laundering SCAM that will land you nowhere but with hefty fines and/or imprisonment. Survey sites, shadow/mystery shopper sites, casting call sites, etc. that charge you for their "service" are scams. There are so many new ones out there each day, it's hard to keep up with them all but just remember, if it sounds to good to be true, it is. Business opportunities claiming they will teach you how to make millions for a certain fee is a pyramid scheme SCAM and ILLEGAL. Of course as with any business, there are expenses associated with being a business owner...but the benefits should be clearly outlined and outweigh the costs infinitely, exponentially.

You want to look for a home based business (as opposed to a job) that won't hesitate to answer all of your questions up front, demonstrates an actual product or service, doesn't promise you the universe but rather encourages your success, and that has some form of credentials. Testimonials here are LEGIT, these are real people really making that amount of money.

Can you get in trouble with the law for making false profiles on social networking websites where false pics and misleading info is given?

No. As long as you're not soliciting minors or trying to retrieve information from another, you shouldn't get in trouble.

Another view: I DISAGREE with the above response with the exception of the part about soliciting minors. It has EVERYTHING to do with the reasons you are doing this. What is your intent? If you are using this method to conceal your identity and commit any offense, or acts which could be described as offensive (i.e.: stalking, harassment, extorting money, solicitation, etc, etc), you ARE in violation of the law. REMEMBER: You may think you are anonymous, but your URL identifier clearly shows who and where you are. Consider carefully if you wish to continue on this course of action.

Several laws have recently been passed about misrepresenting your ID on the interent. You may get into trouble even if your intent is not bad. Of course, doing it with mal intent is much more likely to get you noticed.

Is Internet Relay Chatting with strangers more dangerous than texting with strangers?

Internet Relay Chatting with strangers is not more dangerous than texting with strangers. While both have risks, texting allows a stranger to have access to your cell phone number, and that will allow en to be able to search for your location more easier than chatting online.

Is it possible to check someone's personal internet data?

Checking some elses personal data would mean you are breaching privacy laws

How can a security framework assist in the design and implementation of a security infrastructure?

The security framework provides strategic direction to design and implement the security infrastructure. It also ensures the accomplishment of objectives.

Games sites not blocked by nmci?

  • best-flashgames
  • bgsstudents.webs
  • games.nerdynerdnerdz.com

Are pop-up ads based on cookies?

Popup ads be directed based on your cookies, but not caused by them. Your cookies may be read by the ad manager to show ads based on what you seem to be interested in. Popups themselves, however, are caused by either scripts on websites you are visiting, or locally installed software.

If you always receive popups, regardless of the website you are on, which look to be from the same ad company, than you probably have adware on your computer. Check you installed program list (Revo Unistaller is good, but you can use almost anything, including Add/Remove programs in the Windows Control Panel) to check for any programs you do not recognize. IF you are unsure about a program, you can always run a web search on the program name to find out what it is. Now uninstall anything you did not intentionally install.

Also check you browser extensions, addons, and toolbars for anything odd. If all else fails, disable everything, and see if that helps.

If you only seem to get popups on specific websites, or most but not all sites, then try visiting a number of more reputable websites (it doesn't matter what they are--anything works, like Bing, BestBuy, or Staples.) Reputable stores tend to be an especially better thing to try, since they are trying to make money by selling products, rather than through ads. If you do not get popups on these other sites, you can be fairly sure that the popups are coming directly from the websites you visit.

Try installing a free browser addon to block ads, like AdBlock or Ghostery, or even NoScript to solve this problem. The only other thing you can do is stop visiting these websites.

How long do universities keep the internet logs of students?

The length of time that system owners retain logs depends on the policies of the organization. The recommended length of time is 1 year.