Over 1 million tech questions and answers.

US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

Q: US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

The United States Department of State wants to make it mandatory for all foreigners to provide social media details when applying for a visa to enter the US.

US authorities want to modify three visa application forms. The changes made to the three forms would make it mandatory for all visa applicants ?immigrant and non-immigrant? to provide all social media handles used in the last five years.

Diplomatic visas will be exempt from this new rule and some applicants might be asked to provide a list of emails and phone numbers used in the past five years, for additional vetting purposes.

The Department of State has not detailed the list of social media platforms for which it intends to collect account names but said the forms would include an optional section where applicants can enter usernames for online platforms not included in the main list.

Nearly 15 million visa applicants affected
The State Department is seeking Office of Management and Budget (OMB) approval to modify three US visa forms ?DS-156, DS-160, and DS-260.

These are visa forms that immigrant and non-immigrant visa applicants must fill in and submit before being allowed to enter the US. US officials estimate 710,000 immigrant seekers and 14 million non-immigrant visa applicants will be affected.
......
......
......Click to expand...

RELEVANCY SCORE 200
Preferred Solution: US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

They could just ask Facebook for all info.

Read other 3 answers
RELEVANCY SCORE 79.6

Fight Social Engineering?
Make Your Priceless Data Completely Worthless:
SOURCE: bsminfo.com (ARTICLE DATE: 22nd Aug 2016)

Security involves people and processes, in addition to technology. The most logical weakness is you and I, the human component. Hackers caught on to this years ago, and we?ve become incredibly familiar with weak spots that result in social engineering attack vectors that often trick people into breaking normal security procedures...

Digital disruption in the financial industry has led to a rise in third-party payment systems. The Amazon Store Card, Apple Pay, and Google Wallet are just a few examples. And with them, we?re far less likely to actually use our credit and debit cards at the point-of-sale. In fact, our physical use of cards is arguably becoming obsolete.

This trend isn?t going anywhere, and with it we will continue to deliver more of our personal and account information over the phone, email, and web to banks and retailers without thinking twice. But when this information reaches the contact centers that facilitate these interactions, it can be gold mine for fraudsters and criminals ? especially with the rise of massive data breaches exposing huge amounts of personally identifiable information (PII).

Humans have always been, and always will be, the weakest link in the security chain. Contact centers must do everything to try to insure that criminals are not socially engineering their employees. More cyber criminals will turn t... Read more

A:Fight Social Engineering- Make Your Data Worthless

I do not use any of these the Amazon Store Card, Apple Pay, and Google Wallet but it is not looking good towards the future.
 

Read other 1 answers
RELEVANCY SCORE 62.4

I'm using mandatory profiles on an active directory, and I want the users local AppData (like IE history) to be part of their mandatory profile, instead of being on the machine. Is this possible, and if so, how?
 

Read other answers
RELEVANCY SCORE 61.6

I just upgraded my Win10 X51 to the new creator version and now Dell Data Vault Data Collection Service has been running at 25+% for several hours.  How do I make this service stop overconsuming processor time?
Thanks.
Alienware X51 R3, Intel® Core™ i7-6700 (8MB Cache, up to 4.0GHz with Turbo Boost Technology) Includes Hyper-Threading.  Memory: 16GB (2x8GB) 2133MHz DDR4 Non-ECC

Read other answers
RELEVANCY SCORE 61.2

I am trying to capture data for below counters on windows server 2012R2  and i see no counter data getting logged. i can capture memory counters data without any issues.  any suggestions on what i can do


{\PowerShell Workflow(*)\PowerShell Remoting: # of connections closed-reopened, \PowerShell

                     Workflow(*)\PowerShell Remoting: #
of disposed connections, \PowerShell Workflow(*)\PowerShell Remoting: #
                     of created connections, \PowerShell
Workflow(*)\PowerShell Remoting: # of forced to wait requests in
                     queue...}
 

Read other answers
RELEVANCY SCORE 60.8

Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach. Announced by the global credit card company on Monday, these best practices are designed to further the payment industry's efforts to develop a common, open standard while providing guidance to encryption vendors and early adopters. Data field encryption protects card information from the swipe to the acquirer processor with no need for the merchant to process or transmit card data in the "clear."



Source -
Visa Announces New Data Encryption Practices

Read other answers
RELEVANCY SCORE 59.2

For those looking to learn about and share malware samples, a site called VirusBay may be what you are looking for. VirusBay's goal is to make malware analysis more social by providing a place for researchers to upload samples, request samples, and discuss them with other researchers.Click to expand...


While there are many sites that offer malware sample sharing, the main goal of VirusBay is to offer a place for researchers to discuss the uploaded samples with their peers. These discussions range from determining related families, technical details, information on how to analyze them, or information on how the malware samples are spreading.

This allows researchers and security professionals to stay informed about new malware outbreaks and learn how to prepare for them.Click to expand...


Though VirusBay still has a way to go before it becomes a full fledged community, for those who wish to get access to new malware samples and discuss them with other researchers, the site has a lot to offer.Click to expand...
 

Read other answers
RELEVANCY SCORE 58

Hi forum, i would like to know if there is or are any social media sites that allow loading music on a page or anywhere else like myspace used to be.

I have no idea what happened to myspace but i used to use it years ago and it was something like facebook. A couple of years ago i checked myspace again and it became something like hi5, really crappy. I had an account there and some pictures there too but i don't know if i can get them back? i don't even remember my account name. Havn't used myspace for more than a decade

Read other answers
RELEVANCY SCORE 57.6

The risks of Social Media
Do you cyber-blab? Are you a compulsive Tweeter or Facebooker? Think carefully about what you post. A simple post about your daily visit to the local coffee shop could be enough to tell a burglar when it is safe to rob your house. Remember EVERYTHING on a Social Media site is public.

Facebook and Twitter
Don?t get carried away with what you post on these sites and remember that almost everything you post will be completely public and it is rather like walking down the local High Street and shouting at the top of your voice to everyone in earshot, everything that happened last night, what colour underwear you have on, your name & address and phone number and where you hide the spare keys to your front door.
Be very careful what you post on Facebook or tweet about. It can be used against you in court or by an insurance company, even something as mild and innocent as: ?I?m jogging every day to get fit for my holiday?. Not good if you?re claiming for whiplash after a car accident or you are off sick from work.
Lawyers, Insurance companies, your current or prospective employer will take the time to scroll your Facebook timeline and your tweet history for evidence that can go against you.
Scammers and Fraudsters will scan Facebook, Twitter and other social media sites for useful information that will help them scam you.
Read the rest on http://myonlinesecurity.co.uk/the-risks-of-social-media/
 

A:The risks of Social media

Read other 9 answers
RELEVANCY SCORE 57.6

Not really to do with a PC.
I am not a fan of social media and do not use any of them. Facebook in
my opinion can be dangerous considering the world situtation.
My question is this: Facebook is into everything so why do I have to use
Facebook to sign onto so many web sites?
 

A:Social Media/Facebook

I am not a fan of social media and do not use any of them. Facebook in my opinion can be dangerous considering the world situation.Click to expand...

I also do not use social media(Facebook, Twitter, etc.).

Facebook is into everything so why do I have to use Facebook to sign onto so many web sites?Click to expand...

If a site only offers that option to sign it, avoid it.

---------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 57.6

Hi everyone. My name is Mike.
Please do not laugh at my question. I am trying to learn everything I can about using social media.
If anyone here could help by directing me to some free online courses and or articles etc,I would greatly appreciate it. I am new to this so anything would be of help. I would like to know how to use facebook,instagram twitter etc. I would also like to know about creating fanpages. Thank you. I know I must sound silly but I have to start somewhere.
 

A:Want to Learn How to Use Social Media

Have you tried Googling "How to use Facebook"?
You will find several hits, same with the others.
 

Read other 2 answers
RELEVANCY SCORE 56.8

I have a logo which i want to place on social media sites. I am having difficulty placing the logo onto these sites. I try to open the logo files on my tablet, but it cannot do so.
Can anyone help me please?
 

Read other answers
RELEVANCY SCORE 56.8

I was running a disk cleanup because apparently my disk space was almost used up (though with what, I can't figure out.) So I decided to run a disk cleanup on my Surface RT, and that seemed to do something. However, I discovered it deleted the programs I
had pinned to my desktop and now for whatever reason I cannot view my messages via DeviantART (it is like Facebook, only for artists). I've restarted, rebooted, refreshed, logged off and then back on three times, retyped in the URL, but nothing I do can seem
to fix this problem. I can still view my messages on Gmail and on YouTube, but not on DeviantART. I know it isn't something with the website because I can view my messages on my laptop, but not my Surface. If anyone has any ideas as how to fix this or what
the problem might be, please help!

Read other answers
RELEVANCY SCORE 56.8

Hello,
 
I'm looking for software that can manage all my business social media accounts in one place.
It has to be able to manage Facebook (chat and wall), Twitter, Email (Microsoft), an on website chat and if possible also Telegram.
So far I only found brand embassy and live agent.
 
Any other suggestions?
 

Read other answers
RELEVANCY SCORE 56.8

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype?s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Because social media exists outside of the network perimeter, social media threats can manifest long before network perimeter and endpoint security detect malicious behavior. Detecting and mitigating these threats requires a thorough understanding of this new threat landscape. If we compare these tactics, techniques, and procedures to traditional network attack methods, we can draw some important contrasts.

Adversaries traditionally target a corporate network using two phases: reconnaissance and exploitation. Reconnaissance involves footprinting (for example, gathering information about an organization?s IP address and domains), scanning (identifying what systems are using what IPs), and enumeration (identifying the services and ports available on these target systems). When attackers use social media, their strategy is similar, but the methods of at... Read more

Read other answers
RELEVANCY SCORE 56.8

Greetings,

My company is interested in setting up a social media presence online using Facebook.

We have a concern over negative feedback from customers or competitors or outside parties and that fact that the comments become a permanent record.

I would welcome comments from anyone with a point of view on this issue.

Many thanks!

A:Beginners guide to social media

Hello.First. . . I'm unsure of what your asking, could you clarify please?Secondly, it is my opinion that there is no such thing as "bad feedback" provided you make proper use of it. Both positive and negative feedback have use in determining your company's future. Positive feedback shows you what you're doing right, and negative feedback shows you how you can improve. Personally, if I see a company with only positive "testimonies" available I get a little bit suspicious; I believe that the ethical company should not take steps to hide flaws, but instead use those resources to find and correct said flaws. Finally, if by "negative feedback" you mean spam or troll attacks on your company, Facebook does provide the capability to remove offending comments from your page.Hope that helps.~Blade

Read other 2 answers
RELEVANCY SCORE 56.8

About three months ago, this program was making headlines all over the national news. I thought it was at the very least amusing and thought I would give it a try. When I installed the program, I didn't do all the setting up required. I tried to get rid of it today and upon attempting to uninstall it I got this message:

"The installation source for this product is not available. Verify that the source exists and you can access it."

It appears I need a file that would be in my temp files. I went to the website, www.socialmediasobrietytest.com to reinstall the software, and eventually got this message:

"Another version of this product is already installed. Installation of this version cannot continue. To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel."

So, now I'm stuck in a never-ending cycle. When a program does this, it usually gives me cause for concern, but everywhere I look I'm seeing that WebRoot designed the program and WebRoot makes anti-virus and anti-spyware software. There's no program with that title on www.webroot.com, however.

I've googled everything I can think of and I'm finding almost all of the media's coverage in Novemer and NOTHING about install/uninstall issues. Is this program malware/adware/spyware? How do I remove it? Is it ok to reinstall it and try it out? Thanks.

Windows 7. I may have installed it for IE or FireFox.
 

A:Social Media Sobriety Test

You could try Revo Uninstaller.
 

Read other 1 answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

With the upcoming Holiday and Party Seasons, together with the increase of online and real world shopping at this time of year, it is time to remind our user bases that the Risks and Dangers associated with Social Media usage increases dramatically.
https://myonlinesecurity.co.uk/the-risks-of-social-media/
 

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.4

Cyber crime has reached a new battlefield ? social media platforms. Just as companies seek new opportunities to reach their target audience, so do cyber criminals. According to Proofpoint?s recent Social Media Brand Fraud Report, 19% of the 4,840 social media accounts associated with ten top worldwide brands were fraudulent.

Identikit fraudulent social media accounts
Carefully crafted, bogus accounts can be difficult to distinguish from legitimate ones. They replicate the brand account as much as they can, mimicking the logo, look and feel, and even content. The only difference is in what they propose to the audience: customer service at odd times, discounts, free gifts, and deals that are too good to be true. As the report says, ?the only difference might be something as small as one character in the Twitter handle, such as @askmajorbank vs. @ask_majorbank?.

Although social media platforms like Facebook, Twitter and Instagram have implemented an account verification service ? the blue checkmark badge next to the account name ? cyber criminals have become even smarter and can replicate the badge in their background image to fool customers. However effective account verification is, it doesn?t extend to posts or tweets and fraudsters know this all too well.

The 7 different types of fraudulent accounts
The research identified 7 different types of bogus accounts:
Phishing accounts
These bogus accounts are replicas of official brand products and customer suppor... Read more

A:7 types of social media account fraud

SpartacusSystem said:





Pornography
Pornographers exploit brands? popularity (based on number of followers) to distribute adult content and damage brand image and customer retention.Click to expand...

Wait, you mean the Dairy Queen account I follow isn't legit!?
 

Read other 0 answers
RELEVANCY SCORE 56.4

I´m running a number of events this year and I am looking for a solution to project foursquare/twitter/facebook up on a large screen at the event so that users can see themselves on the screen. One of the obvious problems I envisage is that the page would need to refresh itself all the time.

The idea is that it drives a lot of social engagement but from a technical standpoint I have no clue how to do this or even where or what kind of forum I should be asking on.

Would anyone be able to point me in the right direction as to where I´m best to ask this question?
 

A:How can I project live social media onto a screen?

No big mystery, unless I'm missing something. Simply connect the PC to the screen/projector.
 

Read other 1 answers
RELEVANCY SCORE 56.4

Tech Support Guy System Info Utility version 1.0.0.4
OS Version: Microsoft® Windows Vista? Home Premium, Service Pack 2, 32 bit
Processor: Intel(R) Core(TM)2 CPU 4300 @ 1.80GHz, x64 Family 6 Model 15 Stepping 2
Processor Count: 2
RAM: 3069 Mb
Graphics Card: NVIDIA GeForce 8600 GTS, 256 Mb
Hard Drives: C: 222 GB (139 GB Free); D: 9 GB (4 GB Free);
Motherboard: Dell Inc., 0CT017
Antivirus: None

Censoring by FB, Twitter and Google creates the need alternatives. Has anyone any suggestions?

Txs
 

Read other answers
RELEVANCY SCORE 56.4

ESET technology now integrated directly into Facebook... so ESET Social Media Scanner for Facebook has now been discontinued
​ESET said:




Hello,

We just want to let you know about a change to ESET Social Media Scanner.

We?ve partnered with Facebook, which means that ESET?s award-winning technology is now integrated directly into the Facebook platform. Read more about it here »

As a result ? and after securing 73,441,194,563 links ? ESET Social Media Scanner is being discontinued as a stand-alone application for Facebook.

However, you can still enjoy full protection from ESET Social Media Scanner on Twitter, where you can use it to scan your timeline and lists automatically.

For even more scanning capability, why not try ESET Online Scanner to check and remove threats on your local drives? It?s effective, easy to use, and free.

Thanks
Your friends at ESETClick to expand...

For more information, go here: https://socialmediascanner.eset.com/#/profiles/eol

 

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

I just changed my phone number. Now all my social media sites wont let me go into my sites. I don't know what to do. Is there away to change my profiles.
 

A:I changed phone numbers, now cant get into my social media .

Phone number shouldn't matter unless you are accessing via your phone. In which case, I didn't know the phone number was tied to the account. You will likely need to contact each site and ask if your profile can be updated (or check their FAQ / support page). Aside from that, create a new account.
 

Read other 1 answers
RELEVANCY SCORE 56.4

This is a thread I wanted to make for quite some time... namely since 2011 when the whole SOPA / PIPA / ACTA / CISPA madness started, as part of a massive plan to censor the internet. Like many others, I've been interested in a way to create a framework that would allow people to post what they want, without either an ISP being able to censor them nor the government being able to knock at a specific door and arrest someone for what they're hosting.
 
Most attempts to make this dream come true have been at networking level. Mesh networking in routers is an example of it being done through hardware, while TOR is an example of an attempt through software on existing devices. But all of these methods are either slow, unreliable, or unavailable for most people. So before this breakthrough happens, and people can create an internet that doesn't require ISP's and where your traffic can't be spied on, I've been thinking about different kind of platform. I'm a below average programmer, so I can't say I have the knowledge to do it alone... or maybe someone else attempted my idea already. In either case, I wanted to post about it and hear what people think, if this would ever be a viable project:
 
- The idea and functionality:
 
My idea is creating a full media platform, on which you can post text / video / music / pictures / web games, which could be used as either a blog or forum or journal or art site. In appearance it would be like most websites that accept submissio... Read more

Read other answers
RELEVANCY SCORE 56

Internet users spent much time online every day. Young people in particular spend a lot of time in social networks and on messaging services. However, when they do so, they are frequently careless with their personal data and thus endanger their digital identities. Another danger when dealing with the worldwide web is cyberbullying. This year?s Safer Internet Day (SID) is being held under the slogan ?Create, connect and share respect: A better Internet starts with you?, and aims to make users aware of the dangers of the Internet. To mark this European day of action, G DATA is providing security tips and demonstrating how Internet users can keep control of their data.


Ransomware, phishing, cyberbullying ? the list of threats on the Internet is long. Users can quickly become victims of successful attacks and then have to deal with the loss of their personal data or other far-reaching consequences.
?Many Internet users do not take the security of their own digital identity seriously because they are unaware of the risks or do not see themselves as interesting targets of attack for cyber criminals. This then makes successful attacks particularly easy for the perpetrators,? explains Tim Berghoff, G DATA Security Evangelist. ?Users can protect themselves against online attacks, cyberbullying and the like by following a few simple security tips.?

What is Safer Internet Day?
SID is a global day of action initiated by the European Union to improve security on the ... Read more

Read other answers
RELEVANCY SCORE 55.6

Social media security:
Avoiding the phishing threats from Facebook, Twitter and LinkedIn

Social media may not be everyone?s cup of tea, but it is getting harder and harder to ignore for organisations ? especially from a cyber security perspective.

A range of recent research has highlighted the increasing dangers that organisations face from employees? social media usage.

One thing that stands out in the research is how little ?due diligence?, in the words of Raj Samani, CTO EMEA at Intel Security, is done when connecting with other accounts.

Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.

These are concerning figures as it is easier than ever to set up a fake social media account.

A ProofPoint report revealed a huge number of fraudulent social media accounts and apps associated with the Olympics. 15 percent of Olympics-related social media accounts were fr... Read more

A:Social media security: Avoiding the phishing threats

Great read, thanks Logethica




Logethica said:





Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.Click to expand...

Most social Media is bad enough with security, you add user habits like this and your asking for trouble.
Thanks again buddy.
PeAcE
 

Read other 5 answers
RELEVANCY SCORE 55.6

Sorry if this is the wrong location to be posting this subject. I couldn't decide whether it should have been this or a networking subcategory. 
*please feel free to move if need be*
So, I have a new client. They want me to set up some kind of blocking tool or parental controls that block access to certain sites.
Facebook, twitter, youtube, and instagram basically.
I have done about 10 minutes of research because I'm very busy today but I haven't found really what I am looking for.
All the users log into the Domain on Win 7 Pro.
Please, any advice, as always is greatly appreciated!
-Jerry

A:Blocking social media sites for Office staff?

Hi jerrymck This could be easily done via the hosts file (implying the users don't have Admin Rights to edit it back), but the easiest way would be to obviously block these websites at a router level. Do they have a firewall, proxy, etc.?

Read other 8 answers
RELEVANCY SCORE 55.6

Google Chrome has some tricks... Facebook and other social sites may offer alerts through Chrome web-browser, I wonder how to get to the settings page of those.

What should I input into address bar to get to it? ...this method.
 

A:Google Chrome social media sites alerts, getting to it

You want the notifications areas follow the steps below:
Settings > Show advanced settings > Privacy > Content settings?. Find Notifications, and choose from Allow all sites to show notifications, Ask when a site wants to show notifications or Do not allow any site to show notifications,
 

Read other 1 answers
RELEVANCY SCORE 55.6

Easy Tips on Cyber Security and Use of Social Media This Summer:

Summer is in swing.

This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.

Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts. With publicly showing our meals out or just picnics in the park, everybody can see where we go, how long for and when we are back home.

Cyber security is an issue that is becoming predominant both in our business and home life. That?s why we all need to educate ourselves in looking after our own online privacy, in order to reduce potential risks, such as burglaries for example.

Our public Twitter accounts can be merciless if a savvy criminal is planning to act.

Advertising your vacation plans on social media seems like a sharing-fun thing to do; however, digital footprints are all clues available to anyone who is trying to find out about us. We?re all guilty of Googling our names, so yes, potential criminals can track down your address this way.

They can track you down by checking your other social media accounts for clues. They can easily identify where you live. Did you know that insurance claims may not be granted if you have a public display of your whereabouts on social me... Read more

A:Tips on Cyber Security & Using Social Media This Summer

Always browse using incognito then keep eye on your accounts for possible compromise activities.

Until now, I saw few people fall on classy traps which automatically spam the posts.
 

Read other 1 answers
RELEVANCY SCORE 55.2

I'm creating the set of performance data collection sets on multiple computers. This is fine and it is working as smooth as possible with logman. The challenge I do have is the "expiration time". I would like to be sure that those data collections
are in use only a certain time, and by the GUIs I can do that either from performance counter tool, or modify the task itself.
But how I'm able to do that by scripting? I cannot modify the files directly on the path: "C:\Windows\System32\Tasks\Microsoft\Windows\PLA\" as that somehow corrupts the files. It is strange as the file is still just a general text file. Perhaps
somewhere there are the hashes for the files and those are not in sync anymore after direct modification.
Has anybody success to control the data collection sets from the script. On the Windows 7 of course..
PowerShell from W2012 to Win7 did not work.

Petri

Read other answers
RELEVANCY SCORE 55.2

I've searched the Web and seen lots of theories and arguments on what Microsoft collects on its new operating system. I've seen people say statistics, basic data. I've seen people say Cortina's voice commands, Bing searches, even email content. I've heard about a possible keylogger that got "removed" on the final version. I've seen Microsoft disclaimers saying data was needed to improve user's experience. And finally I've seen Microsoft say any info will be delivered to the government if the law required it, the user was under legal sight or to protect consumers.

Now the question I wanna make is: does Microsoft collect information on third party sites/apps, just as Gmail instead of Hotmail/Outlook? And finally does Microsoft access to user's personal files, such as pictures?

I know Microsoft does not care about my private holidays on Guatemala, and this is not a thread to discuss whether they spy or do not spy on us. I just want to know how deep is this issue, just to know what I'm installing.

Anyone's got a clue?

PS: is keylogger really removed?
 

Read other answers
RELEVANCY SCORE 55.2

Microsoft collects Windows diagnostic data to keep Windows up-to-date, secure, and operating properly. It also helps us improve Windows and, for users who have turned on ?tailored experiences?, can be used to provide relevant tips and recommendations to tailor Microsoft products to the user?s needs. This article describes all types diagnostic data collected by Windows at the Full telemetry level (inclusive of data collected at Basic), with comprehensive examples of data we collect per each type. For additional, detailed technical descriptions of Basic data items, see Windows 10, version 1703 Basic level diagnostic events and fields.

The data covered in this article is grouped into the following categories:

Common Data (diagnostic header information)
Spoiler: Example of Common Data
Common Data Information that is added to most diagnostic events, if relevant and available:

OS name, version, build, and locale
User ID -- a unique identifier associated with the user's Microsoft Account (if one is used) or local account. The user's Microsoft Account identifier is not collected from devices configured to send Basic diagnostic data
Xbox UserID
Environment from which the event was logged -- Application ID of app or component that logged the event, Session GUID. Used to track events over a given period of time such the period an app is running or between boots of the OS.
The diagnostic event name, Event ID, ETW opcode, version, schema signature, keywords, and flags... Read more

Read other answers
RELEVANCY SCORE 55.2

Hi everyone.

More and more these days we see a vertical bar at the left side of web pages with social media links. I believe they are called CSS Social Media Sidebars. They usually cover up what your trying to read. They really annoy me and I was wondering if there is a way to automatically stop them loading with webpages.

I know that you can use Ad Block Plus to remove some but that doesn't always work and it's not automatic.

Any ideas?

Many thanks in advance.

[/IMG]
 

Read other answers
RELEVANCY SCORE 54.8

On the Field Chooser, under the "Global Properties" I right-click "UsbDevicePortPath" and select "Add As Grouping". Predictably, this groups my messages so that the Analysis Grid shows
entries like:
|>UsbDevicePortPath(299): 2
|>UsbDevicePortPath(44): 7
etc. (|> represents expanding glyph on the left)
Yet when I add this as a filter: "*UsbDevicePortPath==2" the Analysis Grid shows 0 entries. Why is this happening? What am I doing wrong?

Thank you,

Eugene

Read other answers
RELEVANCY SCORE 54.8

Hi everyone,

I am trying to put together a prototype for demonstrating the Access 2010 data collection feature integrated with Outlook. So I created a simple table with an email address field in it, then used the "Create Email" feature under data collection in Access, went through the wizard and all works fine, I get the email with the data entry form, I do a reply and the data in Access get updated just fine. Now to the part that is now working, I have an data macro "On Update" which is simple and will send back a conformation email, when I fire this macro by updating the table data (row) manually the macro works and sends the email, but when the data gets updated from the reply email explained above the macro does nor work, I checked the log file and found an error "The 'SendEmail' action failed because the current database is not trusted.". I Googled this error and followed the suggested solution by creating a folder, add it to trusted locations, move my DB to that folder, I still get the same error.

Please help

Thanks
 

A:Access 2010 data collection feature

You might try making sure the trusted location allows network trusted and allows subfolders trusted, hopefully that will solve your problem.
 

Read other 3 answers
RELEVANCY SCORE 54.8

I've been a fan of CCleaner for several years, since I've always found it good for cleaning up extraneous files. However, this article now gives me pause for thought as to whether or not I want to continue using this product.

To be sure, the information may be anonymised but I do like the choice of whether to accept this, or not.
 

Read other answers
RELEVANCY SCORE 54.8

If a firewall is blocking the connection of a malware, the malware may still collect information and send them to the hacker?

-Sorry for grammatical mistakes I'm not Native English speakers
 

A:Can a firewall blocks the collection of data from a malware?

Herofday said:





If a firewall is blocking the connection of a malware, the malware may still collect information and send them to the hacker?

-Sorry for grammatical mistakes I'm not Native English speakersClick to expand...

In short, it really depends on the situation (how the firewall component was engineered and how good the malware is about security software awareness and the techniques it uses).

If you have a firewall component activated in a security product on your system, then it will be monitoring the traffic (usually both in-bound and out-bound (firewalls which monitor both in and out bound are also referred to as "two way firewalls")). This means that when a program either attempts to obtain information from the internet (connect to a host and retrieve information) or send information (connect and then attempt to send back) the firewall would be monitoring this activity. If a malware sample is attempting to make a connection which the firewall either automatically or due to the configuration decides to block, then this malicious process will become a failure at either obtaining or sending information.

However, in some cases it may be potentially possible for the malware sample to successfully obtain and send information, regardless of the original process being blocked. I wouldn't worry about something like this happening because most firewall components (from well-established vendors) these days are tested thor... Read more

Read other 0 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

Does anyone know if Search Engines can crawl and index social media profile pages that are set to private (set to where only "friends" of that person are able to access the page)? The best analogy I can give is back in the Myspace era when users had the option to set their pages to private, and anyone who wasn't a 'friend' of that person and tried to access their profile would just get a blank screen that just said "This profile is set to private. You are not authorized to view this page," or something to that effect. I was just wondering if Search Engine crawler bots get this same sort of page when they try to access private profiles, or if somehow they are able to get past these blocks and thus crawl & index social media pages that are supposedly private. I have been searching all over the net trying to find an answer to this question but haven't been able to find anything.  

A:Can search engines crawl & index social media profiles set to private?

Probably not but I bet there are products that will do that for a price. 

Read other 1 answers
RELEVANCY SCORE 54

Yikes:  so much for all those privacy settings.  Just like Paragraph 2 of the Microsoft Services Agreement reads, you agree that MSFT has a complete free right to Your Content, even as Paragraph 3 there gives it God-like judgment powers over whether you're behaving.  So now more teeth in all that, ouch. 
 
Computerworld article here.

A:Windows 10 Makes Diagnostic Data Collection Compulsory

Really MS? This is getting quite ridiculous.   

Read other 8 answers
RELEVANCY SCORE 53.2

I'm looking for a simple way to manage my film and video collection. I use iTunes for my music collection because I like how simple and straightforward it is. It would be ideal to have a utility such as iTunes for organizing my movies so I can rate them, put them into playlists (smart playlists?), and sort them. My files aren't supported by iTunes and I'd rather keep iTunes dedicated to my music.

Is there anything out there that meets these requirements? Does anyone have any general recommendations?
 

A:Media management utility for movie collection

i assume you are on a windows OS.

windows media player has this function and windows media center has the same with a nicer interface.

winamp is another one thats good for sorting media, primarily music thou but i think it does movies and pictures too

there are also media center plug-ins in win 7 that do a good job of maintaining and updating a movie library
 

Read other 5 answers