answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How do you delete internet history permanently.not just through internet explorer.?

Among large number of privacy threats, the Index.dat files are the most dangerous and complicated ones because they are hard to find and delete. In most cases it is impossible to delete Index.dat files manually because Windows keeps them open all the time. How to clean the index.dat files permanently? You may refer to http://www.tuneup360.org/clean-index.dat-internet-explorer-7.html .

You need to use a tool like CCleaner

Solution: 1:

go to your control panel, internet options, delete and delete history and if you want to delete everything it stores as far as your internet transactions do a "delete all"

2:

Start>Find>Files or Folders. Type index.dat

in named. Select Find Now Tab.

Note the locations of the index.dat files.

Start>Programs>MS-DOS Prompt

At C:\Windows> Type del and the path of the index.dat file.

EX.

C:\Windows>del C:\windows\cookies\index.dat

Can usb port attack by virus?

No. Viruses generally attack software It would be nearly impossible for one to destroy hardware. Besides, the point of a virus is to spread, and it can't do that if it destroys the hardware its running on.

What is offline system?

An offline system is one that is not connected to any network. If it has access to the internet or can transfer data to another computer it isn't "offline".

Alternatively, it "offline" could be used to describe a computer that is non-functional. When a computer becomes non-functional, it would certainly not be accessible from any network and would look the same as one that was disconnected as far as other nodes in the network were concerned.

List 5 computer ethics that you should keep in mind while surfing the net?

It depends on the person.

Generally speaking it shall be

1. No abuse

2. Respect privacy

3. Keep hold of moral values

4. Don't trust all the things present on the internet to be true. (I mean not to take them at granted)

5. Help others

How does computer ethics affect people in a legal way?

Type your answer here... computers are for both business and personal use. we use computers in almost eveyrhing that a human being can do now. we use them to be able to communicate. the whole world is computerized. but the difference between personal and professional use of a computer is what is important, and sometimes computer is just for fun or entertainment. others use it for business. the deal with a computer is it is different from a telephone or in person communication or regular mail, because no one has to read their email or receive it and with it being a machine nothing is perfect in communicating that way because noone can see facial expression or anyone of those things when somene is writing with communication on a computer and there is a lot of possiblities for errors or miscommunications to take place.

What are the Basics of Security?

If to speak about Internet security, there some initial ways to protect your private or business conversations.

1) use g-mail;

2) use Skype;

These cervises provide high level of information protection.

Also Windows 8 is a good OS for such purpose.

What is a virus attack?

A virus attack is when your computer's security is penetrated, and someone tries to steal your computer information and documents. Viruses can also try to plant/seed your computer by making a fake program somewhere deep in your un-used documents, which may most likely be called a "Trash bin", or an unneeded file for a game. This is usually because you don't have "Phishing" turned on, on your browser settings, or you don't have an internet and/or computer scanning program. Suggest getting a good anti-virus program, llike Kaspersky Internet Security (Kaspersky), because so far it's supposedly the best anti-virus program, but take note that you have to buy most security programs, and some, like Kaspersky, only last a limited time (Ex. $15.00 for 10 years).

~XSPARTIAN

Is Amy Bruce real?

Amy Bruce is another Internet hoax; it is not real. If you got an email from her or a text message from her they are all a hoax.

Is your credit card information safe when you register for online tutoring?

The security of online tutoring sites can vary, but there are things you can look for to assure that you are on a secure page when you give your credit card information. Look for "https" in place of "http" in the address bar before giving your information. Also, look for logos of Verisign, Norton Security, BBB, and other reliable logos that assure the site is safe. If you have questions about security of the site, contact the site and ask.

If two bullets are fired horizontally from the same place and at the same time which one will hit the ground first - the faster one the slower one both at the same time or does mass play a role?

If you don't take into consideration the curvature of the earth, both should hit the ground at the same time. Both bullets would be affected by gravity at the same rate, (32 ft/sec/sec) even though the horozontal vector is greater, the vertical is identical.

IF you have a bullet that is going fast enough to travel far enough to be affected by earths curvature, the faster bullet would hit the ground later.

What device connect one network to another?

A router allows for internetwork communication.

You can also use a switch implementing VLANs, STP, and VTP. But this method is rather tedious because you have to configure each used port on each switch.

I would go into a full description, but if I did, I would be here for 3 days.

What are beaches of IT security?

An IT Security breach generally has to do with an unauthorized person or process accessing data it does not have rights to.

For example; a malicious attacker capturing credit card data from a database.

Also, a non-intentioned user accessing personnel files. Both are considered breaches in security.

What is babylon software and how does it work?

Babylon is a software that translate languages. It offers over 75 languages and translations. It is a easy to use software that you can download on your computer and use.

Who is Shamsher Terror?

He's a hacker. Hijacked a Pakistan based bank's servers in 2004 and took over orkut in 2005 depriving hundreds of people of their community and profile ownerships.

Is there a way for a company to know if its security measures are sufficient?

There are a lot of firms doing security testing (e.g. stress tests of your network and IT infrastructure, firewall and network penetration testing etc) - you may want to refer to a local yellow pages directory to find one-

How do you test for the con flicker virus?

There appears to be various ways you can tell if you're infected. If you try to go to McAfee or Symantic's website and the website doesn't load, there's a chance you may have conflicker (Conflicker blocks some sites so you aren't able to download a fix). Also, try going to Windows Update. If you can't get the website to load there, you also may have Conflicker.

One other way is to try booting your computer into Safe Mode. You shouldn't be able to boot to Safe Mode if you have Conflicker.

What is a Confidential Information Memorandum?

A Confidential Information Memorandum is put together by a lead bank for a corporate credit facility when they wish to invite other banks to participate in the facility. Typically these memorandums tell you about the company seeking credit, why they want the credit, what it will be used for and how they intend on paying the money back. One thing needs to be kept in mind when reading one of these documents, and that is that the lead bank has put it together and they will describe the company/deal in its best possible light as they want other banks to buy. Banks often look for suiters for a credit facility that they don't want to assume all the risk on. Part of the information they organize is the Corporate Information Memorandum. For example Company A wants $100 million and Bank A likes the company/owners/business etc and feels they could service $100 million. Bank A doesn't want to be the sole lender of the $100 million so they look for other banks to lend a portion say $40 million leaving Bank A's exposure at $60 million.

When chatting on msn my friend sends instant messages to me using my user name How does he do it how do i stop it my password is very secure too I'm sure he doesn't know it?

He is using a cloning program so your password is safe . but you can change the password and also do an online scan to see there are not key loggers in your computer Everyone on MSN has a personal name. Your friend may have changed his name to exactly the same as yours. If this is the case, your password is completely safe, he would be changing his name on his account.

How do you hack gunrox?

use program cyber ghost to change your ip temporarily then you can farm without getting red items and in one day you can farm 3 artifacts.

if you play smart like not grouping your units and throwing a grenade to get xp you can farm forever and the mods will never catch you because the mods can only check for faker who have the same ip when two players with same ip play it notifies the mod automatically.

you can use program sandboxie to open multiple gunrox program so if you have 10 of your accounts you can open all of them in windows using sandboxie.

i did this for a long time and i never had to buy enkrod for silly items lol

all i did was sold the artifacts i collected.

my in game name Death-hunter

What are the disadvantages of using insecticides indiscriminately for a long period of time?

Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body. Insecticides can be toxic to humans. and if used around food, chemicals can enter your food which is unhealthy for the body.

Diabetes is a key public health challenge?

The term diabetes is generic and refers to any inability of the body to metabolize sugar, and so the two common types of diabetes become confused.

The diabetes that is referred to here as a public health challenge is Type II diabetes, not Type I, or Juvenile, diabetes.

Type II diabetes is, for the most part, a self inflicted disease resulting from extremely poor eating habits resulting in obesity. It is not related to Type I diabetes that is an extremely serious condition usually having its onset in youth, and attributed to genetic factors.

Type II diabetes is almost 100% avoidable, like lung and throat cancer from smoking, but will be with us for a long time.

The real challenge, of course, should be the diabetes, Type I, that the victims, mostly young people barely in their teens, had no choice in. But as is typical, the squeeky wheel - the fat gutted gluttons who can't keep their head out of the refrigerator - take the medical research dollars that should be alloted to the genuine cases.

This, unfortunately, is the case, where the Canadian population explodes in its obesity to try to match the beached whales in America, the people we most admire and emulate.