answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

Does the Data Encryption Standard DES have perfect secrecy?

DES is a widely-used method of data encryption using a private key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. There are 72,000,000,000,000,000 (72 quadrillion) possible encryption keys that can be used.

For each given message, the key is chosen at random from among this enormous number of keys.

Why are digital and electronic signatures important to FARMS?

Electronic and digital signatures help to authenticate official records

Electronic records con be authenticated by a signature

Digital signatures are based on Public Key Infrastructure

Is it legal to trace an IP address to find someones identity?

Basically yes because it is just out there because I mean you can find sites on Google that are completely free and find someone's IP address at the click of a key.

What technology does ultrasurf use to tunnel through firewalls How exactly is it doing it?

It uses its own technology to pass through all the blocking methods. It is giving a proxy address for us to access internet and it goes through our proxy and gives us the access. I know if you guys do not satisfy with this answer. So dont scold me. If you know the answer please send it to me too. byee. tc.

Will downloading the auditionsea create virus to your computer?

Well. to tell you the truth i really don't know. i'm just in middle school, but my older sister ( she is in college) told me that it has a virus, so i think the answer is a big YES

What is the definition of cyber crime?

Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime.

Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming.

How do you get rid of auto-complete?

There are three ways to do this. 1) Click on the bar that brings up a list of items saved by auto-complete, then, hold your mouse at the top result on that list, hold delete, and it will delete the items on that list, individually. If you want to get rid of a certain cookie, then, just hover the mouse over the cookie, and press delete once. 2) If you want to erase the file history, but still keep auto-complete, then click on the tools menu on the top-right-hand side, and click the top option, Delete Browsing History. It will give you five prompts, to delete Temporary Internet Files, Cookies, a list of websites you've visited, Data that you put into a form, and passwords. If you want to get rid of them all, click delete all at the bottom, if you want to get rid of one or more, but not all of them, erase them individually. If you keep auto-complete on, these will stock up again, but, for now, that will cover your footprints with fresh snow. 3) To get rid of Auto-complete, completely, then, click on the Tools menu in the top-right-hand side, and click Internet Options. Click on the Content Tab, and on the third option down, it presents you with a prompt to stop auto-complete. If you want to activate it again, then just click on it once more, but those old files will still be there, see Option 2 for information on how to delete your file history.

What does Kevin mitnick know about computers?

Kevin Mitnick knows a great deal about computers and how they work. He is touted as one of the greatest computer hackers all time. However if you speak with him you'll realize very quickly that that many of us that have even dozed off for a little while about technology are left behind. Kevin Mitnick, "was" a great computer hacker.

Are messages written on Internet forums ever deleted or are they permanently floating in cyberspace?

It depends on whether the forum stays online and the database remains intact.

Sites like the WaybackMachine keep archives of websites for years. The pages indexed by Google remains in their cache regardless of the availability of the site. It is not really clear how long they keep these cached pages.

Is Norton or Mcaffee or Zone Alarm better?

What category of virus is it?! How it work? The two top anti-virus names are Norton and Mcafee. Two anti-virus are costly, too.

But about Zone Alam we know little about it. We always welcome the new comer. Check it out, too.

Your parents are using K9 web protection to abuse you how do you get past it?

the best workaround is one of the simplest, it contains just 2 steps

1) Get to the screen telling you that K9 is not responding. If you are an administrator, just find the service and stop it. If you're not, just mess around with the installation until it shows you this screen (the registry might be a good place to go, otherwise just delete some files from C:\Program Files\Blue Coat K9 Web Protection).

2) Navigate to a HTTPSsite of your choice. https://facebook.com , https://www.youtube.com/ or https://www.google.com might be good places to start. If the site you want to go on doesn't support https, simply use a https proxy (google it). If it tells you that K9 is not responding you've probably gone to a normal http site. It will ONLY work with HTTPSsites.

Tested on Windows 7 (x64) running K9 web protection 4.2.89 on 02/05/2011

What are cookies in relation to the internet?

cookies, are text files sent by a server to a web client and could be Web cookies or tracking cookies

How do i access my link sys router?

If below does not work you can go to Start>Run . Type cmd into the box and hit ENTER. You will be presented with the Command Prompt Window. Type ipconfig and hit ENTER. Take the number after "Default Gateway" and launch your internet browser. In the address bar type that number and hit ENTER. Launch your browser. In the address bar type 192.168.1.1 (the default gateway IP address for Linksys routers).

How do you block pictures on Piczo?

Not completely sure if I know what you are asking BUT if you mean "how do you make it where people cannot take photos off of your site" then I have an answer for you...right click protection. You can go to the piczo zone for that, just search for right click protection code and plenty options will show up. BUT also keep in mind that if someone really wants a photo all they have to do is get a screen copy of it. Anyone can do this and so your personal pics are never "safe" on the net.

How do you get around Internet rimon. its a new Internet filter that run through a modem and not through the computer and it keeps learning what sites to block?

It's blocked at the provider level, by the ISP, not by the modem itself.

When you go to a blocked site, it asks for a username and password.

These are the same as the PPPoE username and password, that you have to type into the router or network configuration, in order to get internet in the first place.

For example, if you have a Linksys router set to 192.168.1.1:

Set your browser to 192.168.1.1

There, at the Setup page (the first page that comes up), you'll see a drop-down box with PPPoE chosen. Below that, you'll see username and password. Whatever you typed there, is the same as you want to type to get past the filtering.

However, in the PPPoE blank in the router, the username will also include "@XXX"; for getting past the block, omit everything after the "@". For example, in my router, the username is "tehilaeli@Ineto"; to get past the filter, I just type "tehilaeli", minus the "@Ineto".

However, some sites don't give you the option to enter the password; they're completely blocked, period, and even the subscriber whose name is on the Rimon phone bill couldn't get past it, even if (s)he wanted to. This of course makes sense to the subscriber as he is paying to have stuff reliably filtered out and he is not of a mind to have his kids spending their gray cells getting around it.

_________

It's called Server Based Filtering, It's the same as KosherNet.com offers in the US.

Server based filtering is when the filter is located at the ISP's end and the consumer has no access to any connection other then filtered.

What are the advantages of structural programming?

Advantages of Structured Programming

One advantage of structured programming is reduced complexity. Modularity allows the programmer to tackle problems in logical fashion. Also, using logical structures ensures that the flow of control is clear.

Another advantage is an increase in productivity. Modularity allows multiple programmers to work on project at the same time. Modules can be re-used many times, which saves time and reduces complexity, but also increases reliability. It is also easier to update or fix the program by replacing individual modules rather than larger amounts of code.

How can i share my cable modem?

You can use a Wireless router, standard wired router, or wired switch or hub. Common vendors are Linksys, Netgear, DLink and they can be found almost anywhere now.

What is the difference between explicit and transparent proxy server?

When the application (Client side) knows about the proxy (Configured within the application) this is called explicit proxy.

When it does not know about the proxy (Not configured within the application), this is called transparent proxy. and in this case the traffic has to be redirected somehow to reach the proxy, or the proxy has to be physically installed in the path of the traffic.

The traffic can be redirected to the proxy using a redirection protocol, such as WCCP or Policy based routing.

The Client side application can be a web browser (Example IE or firefox ), Instant messaging client, streaming client, etc....

I meant 2 look up other differences so..... I CAN'T HELP YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!