answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

How do you fix an expired security certificate?

Renewing your SSL certificate is a multiple-step process that varies depending on your certificate type and where you host your website. If you’re looking for a new SSL certificate, check out GoDaddy3. GoDaddy SSL Certificates authenticate your website’s identity and encrypt the information visitors enter on your site, preventing thieves from “overhearing” any exchange between your website and another computer. Visit GoDaddy.com/SSL to learn more.

What was a key element in making computers widely accessible to the public?

Not much.

The big breakthrough in making computing accessible to all was the Personal Computer, which was developed into the mass market by IBM. There were PCs before the IBM PC, but they were not successfully marketed at a huge scale.

IBM bought the disk operating system, the software to make the machine work, from Microsoft. Microsoft had itself bought the system from Seattle Software Works and they just licensed it to IBM.

There were other disk operating systems out there, including the very popular CP/M and MS-DOS was more or less derived from and very similar to CP/M.

The IBM PC took off spectacularly, and Microsoft became very rich. But their flair was (and still is) in marketing, not in invention. Mice, windows interfaces, desktop images, icons, etc. etc, were invented elsewhere, some by Xerox at their Palo Alto research centre, some by Apple, and quite a lot from the various Unix flavours out there.

What are some examples of pin code?

one example of a pin is 4589 but it doesn't have to be that you can make up your own but do NOT tell ANYBODY your pin

What virus makes your Internet go off?

There is generally not a virus that forces you off the internet. There is however a DDOS or Denial of Service Attack that could be taking place on your internet. If someone with malicious intent has gotten hold of your IP and network port (generally port 80) they can send excessive internet traffic into your router which will knock you offline for a while.

How do you stop Norton from putting irritating messages with appear and disappear anytime they like on your computer?

You can either send a nasty letter to Norton (which won't get you anywhere :/), or you can install other antivirus software (after, of course, uninstalling Norton). If you chose to install different antivirus software, I would recommend Microsoft Security Essentials which in my opinion is the best antivirus software out there. It is completely free. It doesn't slow down your system, or anything like other antivirus software do. I barely notice that I have it except when every once in a while it asks me to scan my computer (which is a good thing). If you don't want to download that, there is also AVG Free. It isn't nearly as good, it has advertisements, and it slows down your computer, but I like it way better than Norton.

Hopefully this helps, sorry that I don't know a way to stop Norton from doing that.

What are school appropriate sites?

Many schools put links on their webpages to websites that are approved and educational.

How do you change your password for password journal?

take out the batteries locate the tiny button and press your password jouranol should be reset

Difference between privacy and security?

Patients have a right to privacy, which means they can refuse to answer/share information with doctors or anyone else.

Confidentiality is a promise between two or more individuals (usually a doctor and patient) that information shall not be shared with others.

What are the disadvantages of symmetric cryptography?

- If you forget your passphrase and/or keyfile then there is almost no chance of recovering your data.

- Some forms of encryption only offer nominal protection and can be broken easily with the right program e.g an older ZIP archive or Word Document.

- Some encryption programs are too complicated for the everyday user and they may end up using them incorrectly. This could lead to securing data which they did not wish to encrypt or failing to encode data which they did wish to protect.

- The very existence of encryption programs or encrypted files will attract suspicion as to what it is you are trying to protect whereas a non-encrypted system would not attract the same level of interest.

- With reference to the above point, in certain countries such as the UK, Police can use legislation to compel you to reveal passwords to encrypted data. You could face jail time if you failed to comply.

- Certain types of encryption software are banned in some countries. For example, US versions of the program PGP cannot be exported outside the country.

- As Encryption protects your personal data e.g bank details, love letters etc. it also protects drug dealers who make deals from having their messages intercepted, terrorists planning attacks and paedophiles peddling child pornography.

Do public schools monitor everything kids do on their computers and if so is this legal?

Many do. The reason they can do this is because most schools have students sign some sort of form at the beginning of the year claiming that they understand the school rules and will obey them. These rules usually have something about conduct on the internet both in and out of school. By signing this paper you give the school the right to monitor your activities.

How do you find a proxy website?

simply search google for proxy websites

if you want country specific proxy then search like " us proxy" "australia proxy" "canada proxy"

if you want proxy to open blocked site then search like "facebook proxy" "orkut proxy" "gmail proxy"

Who created msn?

AnswerContrary to what some people believe, Bill Gates does not invent everything Microsoft does.

MSN (or The Microsoft Network) is a collection of Internet services provided by Microsoft. It was initially released on August 24, 1995, to coincide with the release of Windows 95

by Harlee Howarth age 12

MSN (The Microsoft Network) is a collection of Internet services provided by Microsoft, the owner of MSN.

The concept for MSN was created by the Advanced Technology Group at Microsoft, headed by Nathan Myhrvold, in response to the increasing relevancy and growth of the Internet.

How do you download stuff from the internet safely?

One way is to know where it is you are downloading the information from and from who. Don't download from suspicious websites. If one is trying to download something that can't be sent by email a person can use sites like keepandshare. One should also have a secure computer with programs like McAfee to scan downloads and protect against infections and attacks.

How can network prevented from internal threats in computer?

It can't. Any network is vulnerable, it's just a matter of how vulnerable. You can reduce the chances of in network problems by using hard passwords, closing insecure ports and reducing actual physically contact of people with the server(s).

What is the worst thing about the internet?

To be fair, trolling existed long before the internet; we just called it "bullying" and "harassment" then. I mean, we still call it bullying and harassment, but the Internet opened up a whole new way for people to be awful to one another.

What is a consequence of giving out personal information on social sites?

You give out personal information on social sites, you risk several things. People could trick you into giving them money or stuff. People could possibly steal your identity. People could trick you into coming to their place (or allowing them to come to your place) and they could do various horrible things to you like rape and murder. The risks go on and on.

Is flight deal online a safe site?

Various Experiencesbought a ticket, was a nice price, recceived a ticket on time, confirmed it with the airline

I have been Duped USD.910 today by Flightbuddyonline.After booking ticket when I tried paying throgh credit card .A message apperared infroming that due to some problem with their account they cannot accept credit cards and either bak trasfer or payment thru Western union was OK.

they asked me to edit the payment mode in my order.I did so by selecting Bank transfer.

Then I got an email to my personal Email ID with bank details in UK.

After transferring they gave me a fake e-Ticket which I realised only when I approached the Airline for confirmation.

Then I could not trace them either by email or phone.

I knew I was duped.

Please do not even think of using Fight buddyonline they are Fraudsters.

The same thing happened to me. First they say they receive credit cards. When that did not work I tried paying with Paypal. Then they said they had problems with Paypal and I should send them money by wire.

If they don't take credit cards or Paypal they must be a fraud. I least I did not fall for it.

ohh I am feeling so foolish that why I didnt research about them before buying a ticket from them. they are complete fraud and I lost $1115. they issued me a fake ticket. Please do complaint to the concern authorities and also inform your friends to be aware of such day light robbers.

Thank you

What is proxy port mean?

A proxy port is a specific network port used by a proxy server to accept incoming connections and route traffic between clients and other servers. It acts as an intermediary, forwarding requests from clients to the desired destination while masking the client's IP address. Common proxy ports include 8080 and 3128, and they help manage and control internet traffic for security, performance, and anonymity purposes.

How you get beat internet filtering?

search google for vtunnel.com dont type vtunnel.com above because it might be blocked, just click on the link for vtunnel.com that google gives after searching and type the link you want in vtunnel.com hoppefully it will open without any blocking.

What is the avg 9.0 license key?

You don't need one. as long as you download the Free version any way.

This wont give you the full version but it will still give you protection. It will give you components like;

  • anti-virus
  • email scanner
  • resident shield.

Suggest the best Anonymous web surfing software?

for me,this ios the best>>>http://www.anonymizer.com/ I installed anonymizer and got A keylogger and unable to use firefox...I can't knock it....It's A legit program. The best of the best is getting an ssh tunel. You could get A free trial and has A very great price....The description is from http://www.intl-alliance.com/

from there you could join the forum, or go to the store. I purchase one and the support is unbelievable. Hope this helped

What is SSH and how can I use it ? Secure Shell or SSH is a network protocol that allows data to be exchanged over a secure channel between two computers. Encryption provides confidentiality and integrity of data. SSH uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user, if necessary. An SSH tunnel is an encrypted network tunnel created through an SSH connection. SSH is frequently used to tunnel insecure traffic over the Internet in a secure way. In order to create an SSH tunnel, the SSH client is configured to forward a specified remote port and IP address (that is accessible on the SSH server) to a port on the local machine. Once the SSH connection has been established, the user can connect to the specified local port to access the network services that would otherwise only be available at the remote IP address and port. SSH tunnels provide a means to bypass firewalls that prohibit certain Internet services provided that outgoing connections on port 22 are allowed. For example, many institutions prohibit users from accessing Internet web pages (port 80) directly without first being examined by a proxy/filter device. However, if users are able to connect to an external SSH server, it is possible for them to create an ssh tunnel to forward port 80 on an external web server to a given port (probably port 80) on their local machine. More commonly, users may setup their own proxy server at home, using free software such as Squid, and construct a tunnel from their workstation to the proxy. Next, by configuring their browser to use localhost rather than the corporate proxy server, users can access any web page they want, bypassing their company's filters and firewalls. Another HTTP-based tunneling method uses the HTTP CONNECT method/command. This command tells an HTTP proxy to make a TCP connection to the specified server:port, and relay data back and forth between that connection and the client connection. Therefore, for security reasons, CONNECT-capable HTTP proxies commonly restrict access to the CONNECT method to accessing TLS/SSL-based HTTPS services only. Server locations available for SSH Proxy Services: United States, United Kingdom, Germany, Malaysia, Czech Republic, The Netherlands, and Hong Kong. We can issue you a completely anonymous ip address from any of these locations.;

Is it illegal to trace an IP address?

Nope. Just do it. It's the same as looking in the phone book for someone's street address. Just use the information wisely.

3 How can you ensure that you have minimised your security risks while using the Internet from your home computer?

3 things you can do to ensure safety on the Internet are:

1. Make sure you have a anti virus and never click on ads or popups.

2. Only go to websites that are secure.

3. Never give out personal information

( Safety on the Internet could mean protecting you computer or protecting your identity so i did a combination of both)