answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

If your using some one's wifi can they see all of your history?

It depends on how good their router is. If hey hav a goos router, then they will probably be able to see who used their wifi and what they used it for.

What is the impact of cryptography?

One might need cryptography in any situation which warrants privacy or secrecy to protect data, trade secrets, or embarrassing situations. Examples include business transactions, ecommerce, extramarital affairs, political campaigns, and government actions.

What is Website URL?

Abbreviation of Uniform Resource Locator, the global address of documents and other resources on the World Wide Web. The first part of the address is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name are separated by a colon and two forward slashes. For example, the two URLs below point to two different files at the domain pcwebopedia.com. The first specifies an executable file that should be fetched using the FTP protocol; the second specifies a Web page that should be fetched using the HTTP protocol: * ftp://www.pcwebopedia.com/stuff.exe * http://www.pcwebopedia.com/index.html

Does it mess up your PC to have more than one firewall?

Not really. One antivirus and one firewall is enough. Some people may recommend that you have more than one AV or firewall but they will only trip each other up. That said, that only applies to real-time scanning programs. Programs like Spybot and the free version of SUPERAntiSpyware which only have on-demand scanning are a valuable addition to your computer security.

Melissa computer virus?

it is not a virus but a worm, if you have the proper anti virus software, you will be just fine!!!

sexysk8trgirl on Quizilla

How do you remove a virus without switching on the computer?

How to delete virus w/o using any antivirus programs !!One of the ways by which a virus can infect your PC is through USB/Flash drives. Common viruses such as 'Ravmon' , 'New Folder.exe', 'Orkut is banned' etc are spreading through USB drive . Most anti virus programs are unable to detect them and even if they do, in most cases they are unable to delete the file, only quarantine it. Here are the things which you can do if you want to remove such viruses from your USB drives or harddisk. Whenever you plug a USB DRIVE in your system, a window will appear similar to the one shown below…

Don't click on Ok , just choose 'Cancel'. Open the Command Prompt by typing 'cmd' in the run box. In the command prompt type the drive letter: and press enter . Now type dir /w/a and press enter.

This will display a list of the files in the Flash drive or Hardisk. Check whether the following files are there or not

  • Autorun.inf
  • Ravmon.exe
  • New Folder.exe
  • svchost.exe
  • Heap41a
  • or any other .exe which may be suspicious.

If any of the above files are there, then probably the USB drive is infected. In command prompt type attrib -r -a -s -h *.* and press enter. This will remove the Read Only, Archive, System and hidden file attribute from all the files. Now just delete the files using the command delfilename. example del Ravmon.exe. Delete all the files that are suspicious. To be on a safer side, just scan the USB drive with a latest anti-virus program like McAfee or TrendMicro's PCCillin to check whether it is free of virus or not. Now remove the drive and plug it again. In most of the cases, the real culprit turns out to be the "Autorun.inf" file which mostly gets executed when someone clicks Ok in the dialog window which appears above. Thus the infections can spread…

Should Theo click the link when he receives an email from his bank while at work that emphatically states he must verify his personal information immediately or his account will be closed?

This is one of the most common forms of Phishing. Luring customers to think that their account is closed and making them enter their account information in a fake site where they get registered and then these people will access your account using the details you provided and steal your money.

Beware!!! No bank would send such emails.

Advantages and disadvantages of quick heal antivirus software?

I used many anti-viruses and i suggest you to buy Quick Heal. I'm telling you the advantages and disadvantages of all anti-viruses. Bitdeffender's detection is good but it decrease your internet speed. Bitdeffender is recommend only for high speed users. Kespersky is the worst anti-virus. Virus detection is very bad and it is very risky as it delete the System file also it kill very much computer resource. Norton is a anti virus that only scan for viruses but didn't delete completely as it is mentioned in the official website of symentic(Norton) and the daily update of this anti virus is too big. AVG is a good anti-virus but the main problem is that if are about to download videos from youtube via IDM or DAP, you cant and the daily update of AVG is very big. I recommend this anti-virus only for high speed internet users. Panda has amazing cloud security but the detection is not good at all. Avast has low property of detection and healing. Avira detect very well but cant heal properly. Microsoft Security is now become very popular. The update of Microsoft Security Essential takes low time but it cant heal properly and the scanning of 1.5 gb takes more than 2 hour.

I recommend you to buy Quick Heal with amazing scanning,detection and healing property. Update is low and it don't hamper your internet speed.

It is my favorite anti virus since i'm using. Quick heal is not so popular but it is the best anti virus. It have also mobile scanner which scan your mobile

Which port is used by ICMP?

There really is no "port" for icmp but there is a icmp code. If you are looking for the icmp code for echo-reply it is 0 and the echo is 8 For an access list you could do the following: permit icmp any any echo-reply

permit icmp any any echo Or the same using the icmp code permit icmp any any 0

permit icmp any any 8

How do you get the password for your internet connection?

if it is not changed it should be admin

user name on linksys admin

password password

user name on netgear admin

password admin

user name on Motorola admin

password Motorola

user name on smc smc

password smcpassword

that is once agin if not changed and to accesses the login screen type 192.168.1.1 on routers and 192.168.100.1 on modems specific to cable modems

The KRESV test should be used to program your firewall?

False, the KRESV is used to check workstation security measures. Also, stop looking on WikiAnswers for DOD and DA cert answers...

How do networks impact on daily lives?

Networks impact the daily lives of humans by allowing them access to the Internet. The Internet allows people to connect via social sites, learn new information, and help them track data.

What is a privacy impact assessment under HIPAA?

This is essentially a NIST 800-66 audit conducted by a qualified assessor. The objective is to find violations and other risks to your organization before criminals do.

These are things we do at Lazarus Alliance when helping organizations with proactive cyber security services such as IT Audit & Compliance (FedRAMP, PCI, HIPAA, SOX, SSAE 16, ISO 27001), IT Risk Management, IT Governance & Policies and Cybervisor services.

Since 2000, Lazarus Alliance has remained on the cutting edge of IT security, risk, audit, privacy, governance, cyberspace law and compliance leadership, innovation and services provided to the global community. Lazarus Alliance's primary purpose is to help organizations attain, maintain, and demonstrate Proactive Cyber Security compliance and information security excellence, in any jurisdiction.

Hope this helped!

Is there any way to hunt down a person's cell phone number online?

you will need the persons 1st and last name or their address to find them...but all you need to do is go to directoryassistanceplus.com

What does a firewall use to effectively control traffic flow?

In the physical world, businesses rely on several layers of security. First, they rely on their country's government and military forces to keep order. Then, they trust their local police to patrol the streets and respond to any crimes that occur. They further supplement these public security mechanisms by using locks on doors and windows, employee badges, and security systems. If all these defenses fail and a business is a victim of a crime, the business's insurance agency absorbs part of the impact by compensating the business for a portion of the loss.

Unfortunately, the state of networking today lacks these multiple levels of protection. Federal and local governments do what they can to slow network crime, but they're far from 100 percent effective. Beyond prevention, law enforcement generally only responds to the most serious network intrusions. The average Internet-connected home or business is attacked dozens of times per day, and no police force is equipped to handle that volume of complaints. Losses from computer crime are hard to quantify and predict, and as a result most business insurance policies do little to compensate for the losses that result from a successful attack.

The one aspect of physical security, however, that isn't missing from network security is the equivalent of door locks, employee badges, and security systems: firewalls. Just as you lock your car and home, you need to protect your computers and networks. Firewalls are these locks, and just like in the physical world, they come in different shapes and sizes to suit different needs. The famous Jargon Dictionary has a great definition for firewall: "a dedicated gateway machine with special security precautions on it, used to service outside network connections and dial-in lines." Firewalls serve two useful purposes: they filter what traffic comes into your network from the outside world, and they control what computers on your network may send there.

It's important to understand one thing, however. No firewall-whether a small, free host-based firewall or a multiple-thousand-dollar enterprise firewall array-will make your computers impervious to attack. Firewalls, like locks and walls and moats and dragons, create barriers to attack-they get in the way of someone trying to take control. By making it difficult for attackers to get into your computer, by making them invest lots of time, you become less attractive. Firewalls very effectively block most bad guys from compromising an individual computer. But it's impossible to fully prevent every intrusion: All software has bugs, and someone might find an obscure bug in your firewall that allows them to pass through. In a nutshell, there's no such thing as absolute security. How much you invest in firewalls should be a function of how much you have to lose if an attack is successful.

I Forgot my Password for outlook account what do I do?

Method 1: Reset your forgotten password with another administrator account

1. Start your computer, Log on to another administrator account or account which has administration privilege you will use to reset password.

2. Open Local Users and Groups by clicking the Start button, typing lusrmgr.msc into the Search box, and then pressing ENTER.‌ Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Double-click Local Users and Groups, and then click Users.

4. Right-click the account that you need to reset the password for, and then click Set Password.

5. Type and confirm the new password.

Method 2: Reset the lost password with a Windows password reset disk

A password reset disk is really helpful when you realize you have lost password. Insert the password reset disk to your drive then follow these steps:

1. If you enter the wrong password when you attempt to log on, Windows displays a message that the password is incorrect. Click OK to close the message.

2. Click Reset password, and then insert Windows password reset disk (or other removable media).

3. Follow the steps in the Password Reset Wizard to create a new password.

4. Log on with the new password. If you forget your password again, you can use the same password reset disk. You don't need to make a new one.

Method 3: Reset the password with Windows Password Key

Step 1: Login any available computer and download Windows Password Key.

Step 2: Install it and Burt the ISO image to a blank CD or USB flash diver.

Step 3: Set BIOS to boot from CD or USB

Step 4: Reset the password with the burned CD or USB flash drive.

Do cursors give you viruses?

sometimes, yeah, you should never trust a proper site or an add, if you click on something that says on the hyperlink double click then that means what you have clicked on is most likely a virus. If however, you do go on it just click the red X in the right hand corner. thanks.

What are four methods for increasing data security in a computer system?

Data encryption is one good method of information security for computers. Another good method is anti-virus software. Intrusion detection systems are sometimes used along with access control lists.

What is the worlds hardest password?

TsEhGUOt. This is the world's toughest Password ever created. By Mr. Vivek Joshi Indore (M.P.)INDIA You can Get him on tanishq237@rediffmail.com.His Educational Qualification is MCA.

What is email address for Microsoft support?

Looking at their website, I could not see an email address, however, there is a postal address, phone number and it allows you to start a chat with an agent online, depending on the matter you are seeking support with.

http://support.microsoft.com/contactus/?ws=support

How do you Create a Master Password in Firefox?

Master Password+ extension let's you "log out" your master password without closing Firefox.

What is the difference between static packet filter firewall operation and stateful firewall operation?

Stateful firewall checks more than just the ACK flag;it inspects the sequence numbers to ensure the correct state of the TCP session.

List two security issues when using the internet?

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

# Cyber Stalking/Bullying and various types of cyber offense # Hacking.

Etc....

---- Check out the related link for more.

Is there security on the Internet?

For the typical user the answer is most certainly no but it depends entirely on how you define "sent via the internet." If you connect to a web site using the standard http protocol then it is an unsecured connection. If you are using the https (SSL) connection then it is encrypted and gives some degree of security however there are man in the middle attacks that can defeat SSL connections.

If you are talking about sending email then there is no security as the message crosses the internet unless you encrypt it with something like PGP. You can have TLS encrypted connections between mail servers that will protect the message as it crosses the internet but once it is received by the mail server it is unprotected. Thus the network connection between your client and the mail server is not secure. The message can be sniffed off the network and read.

The same goes for your user name and password for a typical POP3 mail account (most ISP accounts), it can be sniffed off the network and stolen. So bottom line is for the most part information sent via the internet is not secure unless specific measures are taken to secure it.