answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Who is responsible and accountable for the C-I-A of production web applications and web servers?

The C-I-A of production web application and web servers is the responsibility of a certified information systems security personnel in any given IT project fulfilment environment. The person (with CISO) develop a well structured IT acceptable use policies, that would be embedded into the web development by the website developer/programmer. Then, the system administrator stand in gap to enforce the the standards through ACLs/AD structures and Group security policies in a role based or separation of duties approach to all users.

Solomon

What are two specific approaches toward collective security?

The Nuclear Non-Proliferation Treaty, The treaty not to develop Chemical or biological weapons are two specific approaches toward collective security.

Why some employees use their own proxy server rather the organisation's proxy server?

Organizations proxy servers are probably all compered up with the entire network within its organization. When using your own personal proxy, you have the freedom, privacy, and speed for only your work and the people of your choosing.

How do you bypass blocks without proxy ip or downloads Dont say i shouldn't do that just help if you can?

unfortunately this is a download but it is accessable an quick go on google and type ultrasurf then click on the first thing that comes up after that just run the download and surf. WARNING do not x out of ultrasurf until you are done

Can a good hacker gain personal information from an IP Address that was obtained from a sent eMail Info including exact home address SSN phone number phone serial number full name is that possible?

The vast majority of IP addresses are assigned dynamically and can potentially change for a user on every use. This makes the thing you are asking about almost impossible.

A few IP addresses are assigned statically and never change. There are records of who these IP addresses are assigned to and so some of that information could be easily found by the hacker.

However for either dynamic or static IP addresses there is no single database or even paper records source that one could go to to find all of the information mentioned.

What is an Internet predator?

Generally somebody lurking around in chat rooms, forums or elsewhere online, looking for someone vulnerable to exploit.

The term is perhaps most commonly used for adults looking for sex with minors, but could in principle be used for any sort of abusive behavior.

See related link.

Is it safe to download msn winks off the internet?

I'm not sure about other websites, but I know that kiwee is a very safe and reliable site. You can download loads of winks, backgrounds, display pics ect. all for msn. Copy and paste http://www1.uk.mypersonalexpression.com/index.pd Or you can search Kiwee using google.

What are secured password compromised of?

Generally, a secured password must incorporate a mix of capital letters, lower case letters, symbols, and numerical digits.

What games aren't blocked at birches head high school?

Well not a lot really.

There is :

Snaky 360

Hooked ( and other games on that site )

some quizzes e.g.quizilla

How does Net Nanny internet protection work?

My parents installed Net Nanny internet security, and I'm curious as to how it works. Is it like a proxy, to where it gets the IP address and looks for keywords before you do, or does it look at the returned webpage and then look for keywords?

You want to track a moneygram?

Yes, you can track your money sent through MoneyGram online. To do this, you will need the reference number for your transaction, which was provided to you at the time of sending. You can then go to the MoneyGram website and use their "Track a Transfer" feature to check the status of your transaction. The website will provide you with up-to-date information on the status of your transfer, including whether it has been picked up or if there have been any issues.

Please note that tracking information may not be available for all transactions, and the availability of information may vary depending on the destination country and the service used.

My recomendation: ᴡᴡᴡ.ᴅɪɢɪꜱᴛᴏʀᴇ24.ᴄᴏᴍ/ʀᴇᴅɪʀ/372576/ᴀʀʏᴀɴ2580/

On Gmail how do you make it so that all of your emails go to only you?

firstly you construct the email which you want. after that go to save and it will save your email into your drafts.

What is a digital signature?

Digital Signature is a mechanism for providing an extremely high level of trust that a signed data file is authentic, and tamper-free, typically using PKA. It is believed to be highly resistant to forgery, unlike written, physical signatures.

Users need to have a Digital Certificate (with a public key) issued by the Valid Certifying Authority like Verisign,Thwate etc. Once the user gets the Digital Certificate (and corresponding secret key) then he will have to get the Digital Signature software which will use the details from the Digital Certificate to insert digital signature on the electronic documents(WORD, EXCEL, PDF etc).

Digital signature provides Authentication, Data Integrity, and non-Repudiation to the documents, contents and transactions. It may also be used to support confidentiality (encryption, scrambling), primarily by exchange of symmetric keys used to encrypt and decrypt the data of interest.

How do you delete web addresses visited on Googles home page?

Top menu in Internet Explorer: 1. Tools 2. Internet Options 3. Clear history 4. Clear files (include offline content)

Can someone access my personal files or see me chatting from another computer if they use our internet access--My computer says a wireless computer is trying to access the internet through my hookup?

If someone has access to the data stream from your computer to any servers you connect to, then yes (in the example of wireless connections). Although it's unlikely they can control your computer, it can see what information you are sending or receiving.

You can prevent someone accessing your computer by using a simple firewall, and to prevent someone accessing the data stream, you should use an encryption key. The instructions of how to do so should be on the software manufacturer's website. (microsoft = microsoft.com) Use SSL connections when available to ensure security. And never place personal information over a non-secure connection. The way to identify a secure connection is simple, most web browsers have a logo meaning security is enabled. It is usually a closed padlock. These icons will be found either on the address bar or on the status bar.

I have to routers and I'm using one of them as an access point and how do I forward ports when I am connected to the access point and the first router doesn't find me?

Many consumer routers are actually NAT switches which is a hybrid device. If you want seemless connectivity then the NAT switch secondary device must be configured as a ROUTER and attached directly to your Gateway device. The Gateway device could be a ADSL Modem, Cable Modem, NAT Router (Switch) etc

Is there a legitimate Email lottery or all Email lotteries are scams?

I think they are all scams because if they were not, every one with an email address would be rich. even if they only worked with cents or proportions of cent.

Can you get in trouble by hacking your own network?

No, if you host 100% of the network you are allowed. This is called "Penetration Testing" and is beneficial to help find flaws in your network that you may not be aware about. If you however do not host the internet then yes it would be illegal as you could cause a disruption to other people with the same ISP.

Is selling reports over the Internet a scam?

What you want to do is make sure the reports you are selling are reputable in information and worthy of someone's money. Do your research and make sure you have read each report thoroughly. Ask yourself if you would pay for the same information you are selling. If the answer is yes, then proceed with selling that report. Just remember, don't go selling every report based on price ... it's quality you want to portray and sell.