answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

You think someone you dont know has guessed your password what should you do?

Change it immediately. If you are still worried, contact the site's administrators or customer service or whoever and have the account closed. Then open a new one with a more secure password.

Can you copy and paste something of this website please?

From a technical perspective, copy and paste from this website is easy. You just highlight what you want to copy and use whatever copy function works for you, then go to your target location and paste using whatever paste function works for you. From a legal perspective, you need to find the copyright information and read about what your rights are when taking information (See Terms of Use at the bottom of this page). You may be able to use what you copy in a paper if you provide the correct citation, but intellectual property laws are complex and each situation may be unique.

How do you shakspearian swear to get around block on website?

Basically you do not. If the controllers of the website suspect it they will block you anyway.
Nor is it possible to do so in a foreign language as most sites have wither people who are multi-lingual or the bot in use will spotit through the filters.

Can you use AES for encryption and decryption at same hardware?

Using the same (or different) hardware will work with AES as long as the encryption and decryption use the same key. AES relies on the symmetric encryption key which means the same key is used to lock and unlock the data. The hardware that uses it does not matter.

Why do you need privacy?

A person does not NEED privacy. We, as a human beings have a right to privacy.

What attacks come from multiple sources instead of a single source?

  1. Attacks from a single source can be easily defeated with an IP block. Thousands of different IPs make this a much more difficult attack to stop.
  2. More sources means more computers. More computers means more computing power. This is especially useful for DoS attacks, where the more requests you can send out the better your attack is.
  3. It's much harder to find the original source of an attacker when there are many attacks from different physical locations.

What is the most common damage caused by computer virus?

1.erase or corrupt useful data from harddisk

2. affect hardware components

3. slow down the computer

Do all websites use cookies?

No, not every site uses them. Most personal sites don't use them, though any ads inserted onto the page by the web provider or the webmaster will use them. If your Internet browser allows all cookies, then all the websites can use cookies. Many cookies are just stored on your PC so that you don't have to log back into sites or view introductory information the next time you visit that website. But if you block cookies from your Internet browser, there are some websites like Yahoo Mail that won't work without cookies.

What is authentication based upon?

Authentication is based upon either:

  1. Something you know (such as a PIN).
  2. Something you have (such as an ID card).
  3. Something you are (such as a fingerprint, retina scan or DNA sample).

Preferably, authentication will combine two or more of the three.

How many types of threats are there in e-commerce?

1. Threats related to e-commerce

1. Website defacement

2. DoS (Denial of Service) attacks

3. Customer phishing

4. Customer information theft

2. Counterfeit goods

Products:

1. Commercial software

2. DVDs

3. Games

4. Music

5. Clothes

6. Place of counterfeit goods:

7. Online auction sites

8. Car boot sales

9. Classified ads in newspapers

10. Personal contact

11. Peer-to-peer (P2P) networks

3. Trading Standards

1. The Sale of Goods Act 1979 (as amended)

2. The Supply of Goods and Services Act 1982

4. Organisational impact

1. Loss of service

2. Loss of business or income

3. Increased costs

4. Poor image

Can deepfreeze get penetrated with virus?

yes it can..

I am really gone into mess because of this.

How is the Internet regulated?

The internet is entirely unregulated. It is a free-for-all jumble of pornography, social networking sites, blogs, and literally billions of websites.

Will second life bring a virus to my computer if i download it?

The official Second Life viewer released by Linden Lab is reported to be free of any known virus's.

Does a hygiene certificate expire?

Many do, as the hygeine of a restaurant, for example, should be re-inspected every now and then to make sure that it remains clean and safe and up to code standards.

What secures the Internet?

Nothing... The internet 'itself' cannot be secure

You connecting and interacting with the internet can be, like antivirus software, firewalls and network configurations.

Websites use encryption and secure signatures to manage the files being uploaded and downloaded.

What is correct format of advertisement for CBSE?

The formats....

NOTEMAKING :There is No Exact Format as such ...

But U hav to remember to write a TITTLE .... Even if its not asked..

Next U hav to divide your notes Under Headings and subheadings...

Normally this is prefered like :

1.Heading.

1.1.Subheading

*Notes

And so on .

INVITATION:

For eg : Invitation for Founder's day of school :

The principal , staff and students of ............................................

request the pleasure of ur company on

FOUNDERS DAY

Day and date

Time and venue

The chief guests :

RSVP

Name

Ph No.

NOTICE:

SCHOOL NAME

Notice

Date and day

BODY OF THE NOTICE

From..

Name and designation along wid signature.

ARTICLE:

Its just the heading and ur name after that .....then the article.

LETTER:

From...

Date

To

Respected sir/madam

Subject :

BODY OF LETTER

Yours obediently/sincerely...

All d best...

Can you find a stolen ps3 on line?

There are forums on PlayStation's site discussing how Security @ SCEA can access your Stolen PS3's IP address should it be connected to the internet anytime soon.

there are 2 conditions for this to supposedly work.

1. SCEA Security will not disclose this information or even admit they can track IPs to anyone but Law Enforcement (including police, detectives, and court officials like lawyers). So yes, the Officer handling your case needs to be intelligent enough to use modern technology lingo and customer service processes. Oh boy.

2. You will need to either know your PS3's IP address, or the Serial Numbers located on the system and on the reciept / box that you probably threw away the day after you opened it. THESE ARE THINGS EVERYONE SHOULD KEEP ON FILE even if your PS3 is sitting quite not-stolen in your living room. You never know.

* SCEA may be able to use your PlayStation Network Account alone to recover your Serial Number / IP address, but it is unlikely they would be able to tell you about it.

without anything less than this information, it is unlikely you will be able to prove you even had a PS3, let alone find a Stolen one.