answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Can someone get a virus from using the website cokeandpopcorn to watch TV episodes?

I have gotten a virus after using websites. Some helpful tips include:

  • Be aware of the web extension - a 2 letter extension indicates a country abbreviation - be aware of using webs originating in countries where spam, viruses, and hacking are well known problems
  • Read reputable web forums about computing. They often post warnings about particular problems in countries where spam, viruses, and hacking are well known.
  • Use well-known websites with high reputations.
  • Avoid clicking on Advertisements or Links for websites you do not know.
  • If an Ad or Link looks interesting, Google the Company's Name to see if other users posted in forums about problems.
  • Use a good Antivirus Program. Many FREE programs have surfing protection that will alert you to Sites that might harm your computer. One good Free AV is AVG -- research it and decide.
  • Do NOT open or click links in Email, even from Friends.
  • Avoid clicking on Video Links from email. Go to youtube directly and search for the video.
  • Be cautious about what you download.
  • Know which file extensions are executable - which ones execute action - on your computer. Avoid exe file extensions.
  • Run antivirus on anything you download, even pictures, songs, videos, Word and other text files.
  • Run antivirus every week, and keep it updated.
  • Malawarebytes (free) deletes malware and spyware.
  • Spybot Search and Destroy (Free) also finds malware and spyware.
  • Be proactive to keep your computer and web surfing free from viruses, malware, and spyware.
  • If your computer 'catches' a virus, don't ignore it. Fix it quickly.

Info on pop up ads?

They are caused by scripts on the web page either vbscript or Javascript

Discuss the concept of crimes Against the administration of justice Should tougher penlities be imposed for these types of crimes why or why not?

Yes because the administration of justice is important and if there is no tougher penilities for crimes against the administration of justice then people would abuse it.

Are the websites you buy on eBay scams?

eBay is only a marketplace.

Like every marketplace, it contains honest sellers, dishonest ones, thieves and liars. About the only thing that you will not find in an online marketplace are armed robbers and pickpockets... but sooner or later, they too may figure out a way of abusing online marketplaces.

The best way to know if a website is honest or not is to be a knowledgeable buyer. Just like when you set out to buy a house or car, you must know what you are buying. In the real estate business, the old adage is the "100 House Rule". That is, before you buy your first house, make sure that you investigate and look at 100 houses... by the time you have walked through the 101st house, you will certainly know if it is a good deal or not!

The same with websites. Start cheap. The Internet is crawling with scamsters. It is diffiicult for a website to make good money with Adsense alone, and even if such a site does, it can be later shut down by Google for dicey content.

There are other sites which specialize in selling websites such as Flippa.com and LazyRevenue.com - Look at 100 sites and pick an inexpensive one to gain experience. This way, your losses will not ruin you.

How do you overcome cyberoam firewall?

Hi,

Your question is very generic. To bypass cyberoam firewall. you need to understand how cyberoam is configured and what kind of rules are created.

If your firewall is configured to block specific IP address and authentication is not enabled you can change IP address of your computer and can bypass restrictions.

What is personal info?

Personal information is listed below:

  • Name
  • Age
  • Password
  • Address
  • Email address
  • Telephone number
  • User names
  • Gender

    Personal information can be found in diaries, social networks like Myspace or Twitter and must also be entered when signing up (registering) for any online services and is usually required to be entered when logging on to Internet pages which require an account or premium membership to use.

Never give out personal information on the Internet! Whatever you say on the Internet must be said in a very careful way. There are people all over the world who listen to what is being said over the Internet and posting personal information can be dangerous as it attracts murderers and other criminals. Be careful.

How can you bypass a Smartfilter to access your Hotmail account from work?

:You should not, the Smart Filter is there for a reason and if you attempt to bypass it you will most likely be violating policy which could lead to negative action being taken against you.

How do you exit from Facebook?

do click on the icon account on the right side of your window and in the bottom of the list click log out

Can you know the place from where are you receiving emails?

Yes look in the details of the email and you will find the information of where you emails are coming from.

How does vaccine relate to the virus that it protect against?

A vaccine is essentially a weakened or dead version of the virus. This essentially "infects" you with the virus and causes the body's immune system to respond and create anti-bodies that will kill the real virus if it does ever get into your system.

What is a stichting?

Stichting is a word meaning (foundation)

A stichting is constituted under the Civil Code; the main characteristics of the stichting are as follows:

  • A stichting must be entered in the commercial register of the Chamber of Commerce.
  • There is no minimum capital requirement (but in practice it is usual to have US$100 as capital).
  • A stichting does not have members or shareholders
  • A stichting is managed by one or more directors who do not share in the profits or assets and who can be individuals or corporations; at least one director must be resident in the Netherlands Antilles.
  • Books of accounts must be kept but do not require auditing.
  • The identity of beneficiaries or holders of certificates of participation need not be disclosed.
  • A stichting may transfer its seat into and out of the Netherlands Antilles provided that the other jurisdiction concerned has suitable legislation (in practice this means that the other jurisdiction is a civil code jurisdiction, which is somewhat limiting since the bulk of offshore jurisdictions apply common law).

Who are the goons that attend defcon?

The goons- British radio comedy programme that was produced by BBC home service from 1951-1960.

Racing games that's not blocked at school?

You are NOT in school to play GAMES on THEIR computers ! WAIT until you get home ! WE will NOT tell you how to bypass your school's internet security - that is HACKING which is ILLEGAL ! On second thoughts... you sit there and play games - McDonalds will ALWAYS need someone to unclog their toilets !

You seethe idiot above is a f-ing retard

F' the System

Play games, you do NOT need Eduaction in highschool, highschool is just a place to talk and f*ck b*tchs ENJOY BRO. f*ck School <3

-Arch

How to block websites in xp?

That all depends on what you're using. If you are only using Internet Explorer, this article explains how to blocks sites in IE:

http://www.ehow.com/how_2178367_block-website-internet-explorer.html

If you are using Firefox, you have to use an external program. Programs like ZoneAlarm or other firewalls can do this, or you can buy an internet filter program like Net Nanny that's made for blocking sites. Of course, these programs work for all internet browsers, so they are probably the way to go.

How do you set up a site to site vpn?

This isn't an easy question to answer; it depends on the hardware/software that you are using to do the actual vpn connections. You would need to be more specific about what equipment you intend to use.

Can you use a wireless computer service from a neighbor?

Yes and No You could you Wireless internet from your neighbor if you can get a signal ,BUT its illegal if they catch you. Wireless Computer service=wireless internet?

Difference between juniper firewall and checkpoint firewall?

Difference between Checkpoint and Juniper Firewalls:

Juniper follows two-tier architecture whereas Checkpoint follows three-tier architecture.

Juniper uses the concept of Deep inspection process where as the checkpoint uses the stateful inspection process.

Juniper uses the concept of Zones whereas Checkpoint do not use.

How do people get into trouble downloading underage pictures?

Such sites are monitored by federal agencies such as the FBI, FCC, and by state agencies such as HTCU and ASACP. The majority of sites offering "kiddie porn" are outside the U.S., this however does not prevent authorities for identifying and prosecuting persons who are involved in the use of and/or contribution and/or distribution. It is illegal and in most cases a felony offense, to view, photograph, distribute or in anyway exploit minor children in such a manner.