answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How can you remove Facebook Purity?

we can remove fb purity by spending more time with friends and stay in touch with spots

How do you open PTA blocked Sites?

PTA blocked sites are websites that are blocked by Pakistan. It is illegal to get around this, but it is rumored there are some proxy servers that allow this to happen. It is unclear whether this method will truly work or not.

How does McAfee measure severity of threats?

McAfee Labs reports risk levels for threats in order of severity: The risk level assigned to a threat changes as its prevalence changes.

Are user name and user ID the same?

Yes they are same, just to authenticate you, it is unique and it can be a alphabets,numbers, alpha numerals & limited special characters (eg.) _ .

Why is captcha used?

CAPTCHA stands for "Completely Automated PublicTuring test to tell Computers and Humans Apart".

Its purpose is to prevent web sites where users can post content from being flooded with spam. Not all CAPTCHAs are equally effective, though. Programs exist that can decipher a couple of different CAPTCHAs without human interaction. By being pictures with text, they make it harder for automated bots to read and enter text to break the security. They can also ask questions based on photos that again a computer would not be able to answer, but a human can.

Is stop2shop trustable?

NO. I have waited for over 3 months for my order. I have emailed at least 10 times and called them just as many. There is no customer service which the site claims to have.

What are effectsn of invasion of computor privacy?

things you dont want getting out, pictures passwords etc could also lose money, identity theft etc

Are social networking sites for socializing or otherwise?

social networking sites such as facebook are used to socialize with friends share photos and letting people know what you've bin up too

Can you get viruses from the website hulkshare?

I have McAfee and whenever I enter it on Google, there is a green circle around it. So I'm guessing it's safe. I used it for a month now and I haven't got a virus from that website, but that doesn't exactly mean that you won't.

What is securities and what are its securities?

Feeling safe, be anywhere in the world, is a blissful feeling. With the growing number of crimes it became difficult for everyone to breathe without fear. Burglaries, theft, cyber crime or other, you need protection from each aspect.

In todays scenario, where cyber crime has rooted so deeply, is the biggest threat to businesses. While the internet has eased up almost every task. It is a lifeline for businesses today. Industries like banking and insurance or stock markets can not even operate so smoothly if they don't use the internet. Transferring files and data and so on, has become so quick and easy. Not only this, it has provided numerous advantages also and if you discuss them you will have to write a book. While it has mobilized the work it can invite cyber criminals to knock down at your door until you take necessary it security measures.

Can someone hack into live security cameras?

If they had the Technical know how and the equipment to do it yes.

What is the difference between stateful and stateless firewall?

A stateless firewall does not keep information about existing connections, TCP sequence numbers, and other information. It analyzes packets independently, not as part of the packet sequence.

How many different keys will be required to give four people the ability to encrypt and decrypt the message using a symmetric cryptography algorithm?

ONE

Answer Explanation: Only one key would be required for everyone to be able to encrypt and decrypt the message. Symmetric cryptography uses the same "shared secret" key for encrypting and decrypting a message. A message encrypted using a symmetric encryption algorithm can be decrypted by anyone with the key. For this reason it is very important to ensure that the key is protected from unauthorized use. One of the primary security issues surrounding the use of symmetric cryptography is the method used to transport the key to users who need it, as most forms of communication are susceptible to eavesdropping.

What cipher is rsa encryption?

In cryptography, RSA (which stands for the names of the people who first publicly described it; Rivest, Shamir, and Adleman ) is an algorithm for public-key cryptography. Clifford Cocks, a British mathematician working for the British intelligence agency GCHQ described an equivalent system in an internal document in 1973. His discovery, however, was not revealed until 1998 due to its top-secret classification, and Rivest, Shamir, and Adleman devised RSA independently of Cocks' work.

RSA uses asymmetric keys, i.e. key "pairs" for encryption and decryption. The message is converted to an integer using a padding scheme and then encrypted using modulo arithmetic and the one of the keys of the pair. It is decrypted using the same modulo arithmetic and the the other key of the pair.

What firewall keeps track of the state of the state of network connections traveling through the firewall?

The method you are referring to is called SPI - Stateful Packet Inspection. A firewall employing SPI is commonly called a stateful firewall.

What is conclusion of encryption?

The result of encryption of plaintext is cyphertext. When cyphertext is translated back to plaintext, the process is called decryption.

Should the privacy laws governing an email account at your place of work differfrom an account youpurchase from an email service provider?

Employees have no privacy rights at work because it is the company's machines and network that they are allowing us to use. They may offer employees some rights to be agreeable and any conditions you can find in your original employment contract.

As an analogy, if I'm driving in my own car, I can smoke a cigarette if I wish. But not if I get on a Greyhound coach. The owner/operator sets the rules.

What the security of public key asymetric cryptography is based upon?

The security of asymmetric cryptography depends on the difficulty - of determining the private key given the public key. For example: an asymmetric encryption algorithm might rely on the difficulty of factoring a very large number into two prime factors. If the cost of computational power and time to perform the factoring exceeds the value of the encrypted information, then the encryption would be considered sufficiently secure for practical purposes. An asymmetric encryption algorithm may also rely on the difficulty of computing discrete logarithms. Both the "factoring products of primes" and "calculating discrete logarithms" approaches to recovering the "private" key of an asymmetric encryption are assumed to rely on the difficulty of brute force attacks. Sometimes algorithms are improperly implemented, the keys are too short, or an inherent weakness is found that allows faster recovery of the key by restricting the key space that must be searched. In these cases, the security of the asymmetric encryption may be significantly less than would be otherwise assumed - i.e. it may be possible to break the encryption fast enough to make it worth the effort.

What would you do when locked your chat logs but there was a previous chat logs that is not logged how to log these previous chats?

I would say - from memory. If a record of a time-limited event is not made during the event, it is impossible to create a record after the event. You would have to have the exact same conversation, at the exact same time. Since going back in time isn't possible, and you don't seem to remember the conversation, there is no way to get a log of it, unless someone else made a log on their own.

What type of CAPTCHA signs are there and what do they mean?

When you are saying CAPTCHA signs that is a little confusing...CAPTCHA are only going to show up letter and/or symbols for Text-Bases Authentication and RECAPTCHA will show you any random 2 word combinations.

Any website that has a comments/forums/blogs page usually requires some kind of text-based Authentication such a ReCaptcha. Although it is a good tool you still have issues...Cannot tell the difference between a human or BOT -- Hard to read verbiage -- Inappropriate words combined together -- Still receiving SPAM -- Not very secure - etc....

You want to look for Image-Based Authentication products to help make your password more secure and eliminate the risk of SPAM, some companies will allow you to customize these images and even advertise for example Confident Technologies out of California has a really good product.

Should I be allowed to read my girlfriend's mobile inbox messages?

You can want to all day long. That doesn't mean that you should. It doesn't matter if she has anything to hide or not, she has a right to privacy. Either she is doing something to ruin the trust in your relationship, or you are having jealousy/insecurity issues. In either case, that is what needs to be addressed, not what she has on her phone.

Is superpaybyemail a SCAM?

There have been many complaints.

Reviewing their own website tells the tale. They are offering a fabulous amounts of money for little or no effort. Small print shows that they have 6,979 members, and have paid out a total amount of $10,393.59. Even if we assume they are being truthful, that works out to about a $1.40 per member.

Shall we review their sign up costs, membership and other "advance fees"? For I assure you having followed the procedure to join - up to the request for credit card info - that they do have such.

Let me also be the first to assure you that the advance fee you pay will exceed $1.40!

Best bet? Best avoided!