Over 1 million tech questions and answers.

Interesting security question

Q: Interesting security question

Hi peoples
For security purposes is it safer to use the on screen keyboard in windows when logging into sites using your password etc.
For instance do keyloggers pickup this or is it hidden.
Just a curious question?

RELEVANCY SCORE 200
Preferred Solution: Interesting security question

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: Interesting security question

It would help if you have a hardware keylogger but I don't think it would help if you had a much more common software keylogger.

Read other 3 answers
RELEVANCY SCORE 51.2

http://camtech2000.net/Pages/SpySites_Program.html
This program I read about it and used it puts some 1500 "dangerous" sites (like IE_SPYAD) at Internet Explorer's Restricted Zone and it has some features for better handling them.

"SpySites Help

SpySites includes a database of over 1,500 known Spy/Sleaze sites and guides you through the simple process of including them in Internet Explorer's Restricted Zone to prevent them from performing intrusive acts on your PC. The Restricted Sites zone in Internet Explorer contains a list of sites that must follow very strict rules. By setting the policies for the Restricted sites zone to a very high level of security, you can be assured that any web sites added to the Restricted sites zone cannot do certain things which could compromise your privacy and security such as installing and/or running:

ActiveX controls
Java applets
JavaScript
Cookies
Download and installation of Desktop items
Use of email address as anonymous FTP password
Hijacking your Home page and/or Search page
Installing their "Sleazeware" without your knowledge

By adding sites to the Restricted sites zone, you will prevent them from intruding on your privacy and possibly taking over your PC. Those annoying popups may still appear but their ability to set Cookies or perform other actions on your Computer will be blocked. SpySites does not block popups, only their ability to act.

I consider this database to be just the... Read more

A:Interesting Security Tool

Looks nice.

This, in combination with a Hosts file should go a long way towards making surfing the web a more pleasurable, and safer, experience.
 

Read other 3 answers
RELEVANCY SCORE 51.2

Hi,

I was wondering if the following is possible or not.
I want to put a message box on certain folders. To explain, when the user opens a certain folder, windows puts up a message on the screen with a message like "This folder is out of date, please use folder 3." or something along the same lines and then open the folder when they click "OK".
I don't want to restrict access, I just want to give the user information when they enter a folder.

I have searched about a bit but I don't really know if it is possible and what to search for.

Any help would be greatly appreciated.
 

A:Interesting Question

It'll take some searching but I think I saw this trick somewhere.
Do a ggogle search for "registry tips and tricks".
Here's a good one:
http://www.mdgx.com/
 

Read other 2 answers
RELEVANCY SCORE 51.2

Hi I am learning ASP.Net C# programming, My friend give me a very interesting question to solve

I have the following class decleration for a person, I need to write a C# code, for the following functions: PrintDescendants() and TestPrintDescendants()

PrintDescendants should return a string in the following format:

“childA ( grandChildAA ( greatGrandChildAAA () ) grandChildAB () ) childB ( grandChildBA () ) childC ()”
public class Person
{
List<Person> children;
string name;

public Person(string name)
{
this.name = name;
}

public string PrintName()
{
return name;
}

// print all of your descendants (children, grandchildren, etc)
// into a string
public string PrintDescendants()
{

}
}

[TestFixture]
class TestPerson
{
[Test]
public void TestPrintDescendants()
{
}
}

I will be very thankfull If any one can give me a hint what is actually I needed to do and how to solve the problem.

Thankyou
 

A:An interesting C# question

"childA ( grandChildAA ( greatGrandChildAAA () ) grandChildAB () ) childB ( grandChildBA () ) childC ()&#8221; <------ can You Pls Explain this?
 

Read other 2 answers
RELEVANCY SCORE 51.2

Well MS fixed "Error 80248015" ,  Thinking about it this AM how did they access our machines to apply the fix????????????????????

A:Interesting Question

They didn't, the problem was created by an outdated file located on the Microsoft Update servers.
 
When the Windows Update Client on your computer tries to update, first it check if there is a new version of the client on the server and during that check it downloads a file that didn't pass the validation check because of the expired date.

Read other 3 answers
RELEVANCY SCORE 51.2

Is there a way to block someone from booting up a computer?

(I apologize if this is the wrong forum for this question.)

I have an individual who frequently spends time at my house, and I do not want her to have access to this computer. I'm sure there is a way to do it, but I don't know how. I've tried going to the CMOS screen on start up and setting a password there - It didn't work. I can't remember if there is a password command that can go into a DOS .bat file.

I have an Intel Pentium III, 500 MHz processor. The "brand" name is Pionex. I'm not sure of the motherboard type.

I would appreciate any insite on this problem. Thanks in advance.

[This message has been edited by splatt123 (edited 07-10-2000).]
 

A:Hello. I have an interesting question...

How did she find a way around the BIOS password? Here's an easy solution: take the power cord off your computer and hide it. Works for me.

------------------
NormanSmiley
Programming Page
Get Paid to Surf the Net

[This message has been edited by NormanSmiley (edited 07-10-2000).]
 

Read other 3 answers
RELEVANCY SCORE 51.2

Is it possible to send a fax over a cell phone? Hubby posed this question today. I can't think of a way it could be done, but promised I'd try to see if anyone here had ever heard of it being done.
 

A:Interesting question

A quick google search

Question: How can I send faxes with my cell phone?

Answer:
Our fax software can send faxes with cell phone modems, as long as your modem can be seen from a COM Port on your computer, and your cell phone carrier supports this. You may need to call your cell phone service provider to ask if faxing is supported.

http://download1.electrasoft.com/faq/faq32bf.htm#Q08
 

Read other 1 answers
RELEVANCY SCORE 51.2

Good morning

I'm wondering. On my laptop i have a screen (duh) How can i use it to play xbox 360 or for that matter.. use it as a monitor for another PC...
What can i get that has good quality HD comp. in or VGA in. I have VGA out, but not in.....
SO can i get some PCI card to fulfill this desire? Or is this just impossible....?

Thanks

Michael
 

A:An interesting question

The laptop screen is hard wired (digitally) to the laptop motherboard.

It's a proprietary digital interface that differs between makes and models.

It's not therefore "available" to use as an external monitor, even if you were to disassemble the laptop.
 

Read other 2 answers
RELEVANCY SCORE 51.2

dear all members , i am running windows xp home edition and the problem since 3months onwards iam facing is that when iam starting the system in safe mode immediately the computer is switched off like a tv when there is a power failure. when i want to install or upgrading the current version with bootable xp home cd after copying files the system is switched off as said above. everything is running fine in normal mode and no problems during normal operation.please kindly help me to solve this problem.

Read other answers
RELEVANCY SCORE 50.8

Hi everyone,

I found an interesting test of security products at the following link, just scroll down about 1/4 of the page for a chart that compares products...

http://techsupportalert.com/issues/al_current.htm

The link above has some other interesting articles & info.

Here is a link to a more in depth article & information related to the test results...

http://www.techsupportalert.com/security_scanners.htm

John
 

A:Interesting test of top security products

without getting into a big discussion or argument here, his test methods are fatally flawed & consequently his results

You cannot use a VM to test the effectiveness of antiviruses

Many of his conclusions are seriously in error
 

Read other 3 answers
RELEVANCY SCORE 50.4

Hi,
I was just wondering if there is an option in Newegg that makes all of the things in your cart get shipped the same day. For example, is there a way to make everything arrive on the same day, or at least get shipped on the same day?

Thanks,
Van
 

A:An Interesting Question About Newegg

Read other 16 answers
RELEVANCY SCORE 50.4

i know its possible to directly connect two computers via parallel port...but is it possible to share an internet connection connected like that? i've never had the want or need to link up via parallel, so i have no clue... and i've asked a couple people and no one knew for sure
 

A:interesting question i was asked..

Read other 6 answers
RELEVANCY SCORE 50.4

one of the mucky-mucks got a new laptop today, imaged it, installed his custom apps, copied over his profile, installed all necessary software for his various apps, and the only problem I am having is that he wants his custom dictionary imported. Now, I know that with word it's normal.dot; I know this as I tend to have most of my office suite products pretty customized and back up the toolbars rather frequently, as I don't feel like re-adding a few thousand entries into the custom dictionary.

My question, however, is is there a place where office stores ALL of the custom dictionary stuff, as when he opens outlook all his custom entries are popping up in spell checker, and he understandably doesn't want to rebuild that.

I had thought that by bringing over his profile it would solve that issue, or rather had assumed it, as nobody has ever voiced that question before in 5 years of doing this.

So is there a central repository that office dumps stuff in outside the profile that I need to bring up to his new machine?

tia,

v
 

A:Solved: interesting question

Read other 12 answers
RELEVANCY SCORE 50.4

This is sort of a weird problem that I imagine someone has encountered before...

My wife's computer at work might have been damaged in a flood (water heater broke). But the PC was off and the hard drive in the PC tower never got wet. So, I popped the hard drive out and brought it home. I installed this hard drive as a slave in my home PC and XP recognized it immediately. My plan was to backup all the data, put the drive back in to her work PC and try turning it on. That way if a short causes everything to crash and burn, I still have her data on my home PC. (I am afraid to turn the work PC on until I have backed up the data).

Now on to the problem: At my wife's work, she had numerous users on it, so the important documents were stored under the password protected "My Documents" folder for the owner of that PC. This folder is obviously actually under the "Documents and Settings/Owner" directory under root.

When I try to view the contents of this directory from my PC, I keep getting the message "Access denied." I can't seem to figure out how to override the security from her original computer. Do I need to modify the registry settings on her drive to remove any security on that directory? Thanks for any help!

Some additional details:
- My PC has installed my wife's drive as F:
- I tried creating the same name account with owner privileges on my PC (so, for example, if the owner on the original flooded PC was named "Stac... Read more

A:Interesting problem with Windows user security

Checkout: http://support.microsoft.com/default.aspx?scid=kb;en-us;308421&sd=tech

Let us know if it worked.
 

Read other 2 answers
RELEVANCY SCORE 50

Hi,

I would like to know if it is possible to add the username and password information into a hyperlink so that as soon as the hyperlink is clicked it will go to the specific page and bypass the sign on screen.

The website in question has an .aspx ending to it. Have just found out i cannot post the exact site on these forums.

I notice this is an asp page and wonder if this is possible or not, I have 30 children accessing these hyperlinks at a time for a class and it would be helpful if each and everyone of them did not have to sign in.

Thanks
Chris
 

A:Interesting question, probably easy answer!

Read other 8 answers
RELEVANCY SCORE 50

I connect to a hotspot with a USB dongle. I want to connect another machine, a Wii to be exact, in another room but it can't recieve the signal from the hotspot. I was wondering if there was a way to use the wireless router I have, which only has one input and that is ethernet, to somehow extend the signal to the other room? I have no way of plugging my USB adapter into the router. Can the router plug into the ethernet port on my computer and transmit what is being received via the USB dongle? Thank you guys so much.
 

A:Interesting USB adapter / router question.

Bridging wireless connections with a pc

Short answer yes.
I currently have a DLink router in one room, a gaming bridge in another room and a USB wireless adapter in a third room. The internet connection from my cable modem service is being bridged to the usb adapter which relays all the internet to the router. The router also communicates wirelessly with the gaming bridge passing along all that traffic.

If you can connect the WII to the router/gaming bridge(one ethernet port makes it sound more like a bridge) then connect the router to your pc using the ethernet port. Finally there should be two connections under "Start>settings>network connections" (assumes windows xp). Select the two connections (holding ctrl while clicking) then right click either and select "bridge connections". That should pass all traffic from your wireless USB adapter to the ethernet adapter.

I don't have a WII but for the XBox 360 bridging was prefered to Internet Connection Sharing (ICS) as it blindly forwards all ports and eliminates the need to specify what ports are necessary for gaming.

Good Luck
 

Read other 3 answers
RELEVANCY SCORE 50

I have a couple questions about printing between two computers

i have one Canon all in one media printer that i would like to use between my two home computers... the computers are about 10 feet away.

First of all.. i was wondering if using a program like Remote Assitance or something like that where you can access everything on someone elses computer you could print on the computer thats not hooked up to the printer.

orrrr

Second, is there anyway to send prints across the internet? i don't know if that makes sense so just ask for clarity if needed

i just dont' want to have to buy a router and all that...

kev
 

A:Interesting Question about Printing between two computers?!?

Read other 12 answers
RELEVANCY SCORE 50

On discord, its not uncommon for me to come across "Cursed MP4 Files" with strange properties.

I'm incredibly interested how the creators of these files were able to get their results and mostly I want to make my own "cursed files". Some of the properties I've seen are video lengths upwards of 13,000 hours long, yet still being 1 MB. I've also seen videos that have negative video lengths and videos that display the video length as 0, yet still plays a video.

How were some of these made? I can file share the specific MP4 files in question
 

Read other answers
RELEVANCY SCORE 49.2

Krypto-Trojaner: TeslaCrypt 4.1A erschwert Desinfektion des Rechners, verschlüsselt weitere Formate

TeslaCrypt is one of the most successful crypto Trojans. And the developers are not tired to add new features to make life difficult for the victims. Version 4.1A encrypts even more formats more and makes it more difficult to disinfect the computer.

The developers of blackmail Trojan TeslaCrypt aren't tired yet of further optimizing their pest: Current version 4.1A has some new, nasty tricks on hand. According to an analysis of the security company Endgame, the new version now encrypts among others Bitcoin wallets and Scores. It also has an eye for files ending in .bak, being used by various programs for backups. Also, TeslaCrypt does not like being observed: Analysis tools such as Process Explorer from SysInternals or the Task Manager are being shut down by the malware.

TeslaCrypt hunts down specific file extensions, that might be of value for the user, but spares out system files. The recently added extensions denominated .bak .bsa, .litesql, .tiff and .wallet. The ending .bak is used by various programs for backups, .bsa is a file format by the {Video Game] Developer Bethesda (Fallout 3, The Elder Scrolls and more). In .litesql files to TeslaCrypt probably hopes that it concerns databases, .tiff is a common graphic format. Furthermore, it hunts for .wallet files the blackmailer: This ending is used for example by the widespread Bitcoin Wallet multi HD.



... Read more

Read other answers
RELEVANCY SCORE 48.4

this is going to sound bizarre, but i need the info...i have been sending my husband nude photos to his mediacom email account. i asked him for his password and he freaked out and said i couldn't have it. it seems silly, but why would he say no? anyway, i don't want his password at all, i'm just wondering if someone can verify something for me...my husband claims that he cannot give me his password because i won't be able to see any emails, as all his emails sent to the mediacom address are forwarded in 15 seconds to outlook express on his work computer. he claims that i cannot have his password because the mediacom email is for work, and others in his store have access to the address log in, but he says they cannot see my photos because they are going to outlook. how does this work? sounds odd to me. basically, even though on my home computer i can go to the mediacom website and technically log in to his account if he gave me his password...but i wouldn't see any emails?
this is what hubby says...and is outlook truly this amazing

mediacom doesn't delete the messages, outlook express takes them from mediacom, and delivers them to my inbox....It is amazing when you think about it.
 

A:question about outlook and mediacom mail communication...interesting story at least

If he has Outlook Express set to check for new mail every 15 seconds and to delete downloaded messages from the (Mediacom) server immediately then what he says is true. I've never used OE, but I doubt that you can set it to check for mail more frequently than every minute.
 

Read other 3 answers
RELEVANCY SCORE 47.2

I know that I have a virus on my computer. I do not know what it is but I have run Mbam and it says that nothing is infected. I did have an infection but I got rid of most of it and now I cannot find the loose hairs that are still messing with my computer. While I was going through my computer seeing what had been added I came across something interesting. I came across a file that had been downloaded to my hard drive along with the virus. I read through the file and it was kind of like a guide for what was on my computer. I found some of the files it say were harming my computer and I deleted them. I am still having issues with the start up of my computer outside of safe mode and I was wondering if anyone could help me. I will also post the file that I found[Advertising.com]Threat="Tracking cookie or cookie of tracking site"Description="I won't call a saved IP in combination with a log of visited web pages anonymous!"[Avenue A, Inc.]Threat="Tracking cookie or cookie of tracking site"Description="They say they no longer do tracking."[ClickFinders]Threat=Tracking cookie or cookie of tracking siteDescription=Their cookie itself is a tracking cookie.[CoreMetrics][Enliven]Threat=Tracking cookie or cookie of tracking siteDescription=A unique number and the IP would be enough for me to call it tracking; but to also save search terms is even worse.[HitBox][Bluemountain]Threat=Tracking cookie or cookie of tracking siteDescription=[Adbur... Read more

A:interesting infection and an interesting find on computer

I would also like to add that my browser has been getting jacked too. When I search on Yahoo I get redirected to other websites.

Read other 8 answers
RELEVANCY SCORE 42.4

Hello!
Like so many others before me, I have an issue and want help... And I’d be very grateful to anyone who can help...

So... yesterday, I believe, I was browsing around the internet... and I got the typical "This page cannot be displayed" error when I attempted to go to one of my heavily frequented websites. I refreshed a few times, as I thought the error popped up a bit quickly (and everyone knows that IE will, on occasion, toss that error at you for no good reason -_-)... but to no avail...

I shrugged, and went off to another of my regular websites. Same error. Now this struck me as odd. I refreshed a few times... both of these websites are LARGE websites... and generally are not down... one of them can be slow and sluggish on occasion, but very rarely down... Perhaps there was something wrong with my net connection? A few other clicks around the internet revealed that some websites would still load normally as though there was nothing wrong... So maybe just those websites, then?

I sent links to a few friends of mine over Yahoo!... all three of them said that the two webpages that would not load at all loaded fine for them... ...Even odder.

After a bit more experimentation, I discovered:

Some websites Will Not Show Up. At all. I get 'This page cannot be displayed" errors until the cows come home.

Some websites will display fine.

Some websites will give me 'page cannot be displayed' errors for the first several refreshes, then will... Read more

A:Interesting issues with IE... interesting to me, anyway...

Read other 7 answers
RELEVANCY SCORE 36.4

My friend has windows XP on an HP ??? PC, twice when he played starcrat, expansion, the game seemed to log itself in while he was logged in.

To help understand:
His name: Ryan
His username: alakazammath

First time: He was waiting for others to join his game, and suddenly it said alakazammath has joined the game, it then said that the other alakazammath wrote: hi me

Second time: While he was looking for a game to join, it said connection to battle.net lost, then when he logged in, it said CD key currently in use by Ryan...
 

Read other answers
RELEVANCY SCORE 36

I am hoping someone canhelp me with this. I logged onto my Lowe's account today and I noticed a funny object in the address bar. Does anyone know what this might be? If it is a trojan how can I get rid of it immediately?

Well how do oyu add a picture to a thread? The object goes from the standard Lowe's Icon (warehouse) to a small red object tha looks like the letter C but turned 45 degrees clockwise.

Your help is greatly appreciated

Travis
 

A:Security Question

Read other 9 answers
RELEVANCY SCORE 36

Hi guys, this is my first posting. Sorry if this sounds like a dumb question. I'm a bit young and don't really know much about computer security. But here's my concern:

I was browsing today and I noticed some malware/spyware (I think it was called Malware doctor or something like that) suddenly appeared on my screen and started scanning, it was trying to scan the "virus" my computer system, even if I didn't even install the software. I know then my computer had probably been infected with some virus. Out of panic I turned off the computer.

Then I decided I should completely reboot the computer, but before I do that I need to save some files on my computer. So I turned on the computer (I didn't get on the web) and as soon as it was on, I quickly plugged in my flash drive and started copying some files from my desk top onto the flash drive. That malware also had appeared and started "scanning" my computer viruses, as I was downloading files onto my flash drive. After I downloaded the files I needed (I only downloaded a few files), I unplugged the flash drive and then quickly turned off the computer. Then I rebooted the computer.

My question was, was it secure for my flash drive? Can someone steal the files that I was downloading, and most importantly, can someone retrieve the files that were already stored in my flash drive? All the information stored in my flash drive are important.
 

A:Security question, please help.

follow advice here and post the logs those programs make
 

Read other 1 answers
RELEVANCY SCORE 36

I have Vonage VOIP on my PC. I have no router (except the linksys rtp300 which is the one vonage supplied to enable VOIP). I tried port forwarding, but it would not work. Ports still remained closed. When I enable the DMZ in the linksys rtp300 settings, the ports then open. From what I understand the DMZ basically bypasses the built in firewall protection etc. in the rtp300. I was just wondering how safe it is for me to be this open to the internet. Am I exposed to outside threats, hackers etc. or is it not really that big of a deal .Thanks.
 

A:Security question

Captainkewl said:

I have Vonage VOIP on my PC. I have no router (except the linksys rtp300 which is the one vonage supplied to enable VOIP). I tried port forwarding, but it would not work. Ports still remained closed. When I enable the DMZ in the linksys rtp300 settings, the ports then open. From what I understand the DMZ basically bypasses the built in firewall protection etc. in the rtp300. I was just wondering how safe it is for me to be this open to the internet. Am I exposed to outside threats, hackers etc. or is it not really that big of a deal .Thanks.Click to expand...

DMZ opens all your ports. I dont think it disables your router's firewall. As i have said DMZ opens up ALL your ports, this is like a hackers dream really.. the hard part of hacking is getting in to their system, but letting those ports open is basicly letting your door open and leaving the house for a few nights (crappy example heh).

Basicly you want to let VOIP work right? Maybe you are Portforwarding the wrong ports?
 

Read other 2 answers
RELEVANCY SCORE 36

I recently had problems with hijack programs, adware, and trojan viruses. I have been working diligently thru your great website to solve these problems. However, recently I received an email that the "cell phone" that I ordered was shipped. I have also began receiving phone calls and letters about the schools and courses I have inquired about.

This cell phone arrived by UPS from "weresmyorder.com". It was shipped by a company called "In Phonics". I refused the shipment since I had never ordered this. When I do research on the order, it shows that I ordered at 3:30 am one morning when I was sound asleep. This phone also had included an activation for cell phone service. Since I do not see any charges to my bank account or credit cards, I have not been so concerned.

Now I am receiving these calls and letters about my inquiries into schools and home study courses. HELP... HELP... HELP! I have no idea what happened to me or what to do about it. Obviously, somebody or something took my identity from my computer and dispatched inquiries and orders to all kinds of places!

Can anyone help me with this problem?????? What should I do next????

Paul
 

A:Question on Security

The first thing you should do is change all critical passwords to financial and web accounts you have which either have been stored on the computer or accessed through it.

You may have been the victim of a keylogging trojan that captured these passwords.

If you had stored credit card info on your computer you should contact the credit card companies and get new cards with new numbers.
 

Read other 1 answers
RELEVANCY SCORE 36

ive been using windows 7 for a while now. just wana know how to protect my inentity on the net?? every time i go to icq or any chat every one knows wat country im form and wat internet service i use and what os i use . how do i hide my self from ppl like that??? its becomming anoying now.

A:security question

  
Quote: Originally Posted by gigabyte


ive been using windows 7 for a while now. just wana know how to protect my inentity on the net?? every time i go to icq or any chat every one knows wat country im form and wat internet service i use and what os i use . how do i hide my self from ppl like that??? its becomming anoying now.


Basically you just need to hide your IP (Internet Protocol) address using an app such as HideMyIP or Easy-Hide-IP (Easy-Hide-IP is free, doesn't hide your IP but it can change your IP and trick users). You're country, internet service provider (ISP), or browser could easily be tracked or identified because of your IP address.

Read other 6 answers
RELEVANCY SCORE 36

Sniffers...what would be a good way to setup a sniffer to monitor what is going on on a particular machine? I have a server (NT 4) that I want to attempt to compromise. It will be out on the Internet with its own unique ip address. If I set a sniffer up on the server would that keep track of what's going on when I attempt to break in? I have NAI's Sniffer Pro v3.5 but have yet to use it. Would setting up the server internally (on the LAN) and breaking in from the LAN first be a good way to get started? Any help would be great.
 

A:New security question...

Well I don't think you're going to get any advice on sniffers and hacking here. The person you'd want to talk to is Steve Gibson. Whether he'll answer or not is another question. http://grc.com/ Somewhere on his site is a discussion board. Post there and see if he'll answer.

[Edited by Kento on 07-16-2001 at 04:22 PM]
 

Read other 2 answers
RELEVANCY SCORE 36

I just read that using a tool such as AirSnort, a 128-bit WEP encrypted wireless network can be cracked in less than a day if there is a decent amount of network traffic.

So my question is - how much more protection does 152-bit or 256-bit WEP encryption offer? Does it just extend the amount of days to weeks or does it really offer a protected network?
 

A:WEP Security Question

bump
 

Read other 1 answers
RELEVANCY SCORE 36

Not sure if this is the right forum for posting this question if not Please move to appropriate one ThanksThis is probably a stupid question but here gos I'm dual booting and i have AVG free AV installed on my primary OS which scans all of my HD when my system boots up, is it necessary to install AV on both OS ? I do most of my downloading and mail checking with my primary OS I'm security and IT challenged Moved from the XP Forum. ~acklan~

A:Security Question

Yes it need to be installed on the OS that is running at the moment.

Read other 3 answers
RELEVANCY SCORE 36

Ok, I was wondering...

Scenario;
Your user account is called user1.

You run a shoutcut to a command prompt as "User 2"

If someone tries to see who ran the command prompt via logs etc...

Who ran it? User1 who used "runas" or User2 whos credentials were used.

Thanks

A:Security Log Question?

It records it as User2 since its credentials where used

Read other 2 answers
RELEVANCY SCORE 36

Hi,
I am trying to make my wireless network security enabled and am having a really hard time. Can you please give me step-by-step directions??
 

A:security question

Make and Model of your Wireless router?
I bet if you go to the router manufacturers website and download the manual, you can probably figure it out. That is what we are going to do when we help you.
 

Read other 2 answers
RELEVANCY SCORE 36

Is it possible to restrict access to a slave hard drive In Windows XP Pro? I'm getting a new 250 GB HD Tuesday and Win MCE With an upgrade coupon to Windows Vista (My Christmas present to myself :-D ). There are 3 other people who use my PC right now, and I want to keep the new HD squeaky clean.
 

A:Security Question

Read other 14 answers
RELEVANCY SCORE 36

Has anyone ever seen these http://www.networkcamerareviews.com/networkcameras/4xem/IPCAMWPTZ/camera_details.html

I want to set one up to secure my home but I don't know anything about them except you can view them over the internet.....sounds pretty cool if you ask me.

Anyone ever use one before?
 

A:Security Question

try the hardware forum. Or maybe google property security cameras would be a better bet?
 

Read other 2 answers
RELEVANCY SCORE 36

So, first of all sorry for asking this question again but. Recently I upgraded to the Fall update for Windows 10, and ditched Avast as I feel it used to be a great software but not anymore sadly.

So the main question is, if you guys could suggest a software that is good at protecting but also very light on system resources? I originally had the idea to purchase Malwarebytes Premium and use it alongside Windows Defender. Is Malwarebyte's Premium real-time scanner/engine deemed good enough? If not, then any other suggestion would be appreciated. And thank you all in advance!

PS: So, I decided to ask this question as all the other ones are toward which antivirus is better, but I rarely see any topics about which one is very light and better.

A:A question about security

I'd like to Recommend Bit Defender Total Security (typically goes on Deep sale towards the end of the year). I use it on all my windows PCs (Love the 'nix) and It's seriously all I could ever need.

PROS:
Impressive set of technologies.Built in tools to replace CCleanerAutopilot mode (auto update, threat mitigation, etc.)Cloud control panel to trigger scans and suchprotects 3 PCs with one license.

Check it out and let me know if you have any questions!

Read other 7 answers
RELEVANCY SCORE 36

Hello all, I have an interesting issue.

So I prefer to have my uac set to the highest setting: Which is always notify.

I noticed that sometimes when I check the setting, it will be at the default (not off) Level 2, notify when programs make changes to this pc on secure desktop.

So I set it to the highest, click ok and reboot. Its still set to the highest setting and I go on my way. I check it several days(weeks even) later and UAC is on the default setting again.

So I am curious, UAC at the highest setting is supposed to prompt whenever UAC settings are about to be changed, but this is not happening. It does when I initiate it, but not otherwise apparently.

I know what your thinking, and I am absolutely sure its not malware. I don't know if its a older program I have that's doing it or what. Still, it should not be able to.

So questions:

1.) What could be causing this?

2.) Is there a way in group policy I could disable the uac setting screen so it could not be changed? Or lock it down to the always notify option?

I have searched the net and have not found any information on this.

Thank you.

1st image is what I want,

2nd image is what happens after a few weeks.

Event viewer shows nothing.

A:UAC security question

Hello Andrew,

Interesting. Is this all happening in the same user account?

One possibility is a Windows Update resetting it back to default.

Read other 9 answers
RELEVANCY SCORE 36

If someone had access to my home computer, could they set it up so that they could view everything I'm doing on their home computer. Also could they activate the camera.
Thanks in advance for any help.
ruger18

A:Security question

Yes.

Read other 7 answers
RELEVANCY SCORE 36

I did a security scan from http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym

and every thing shows up ok - except it says this after the scan-

Description:
Checks for a current version of a commonly-used virus protection product.

Analysis:
WARNING! No known virus protection software found. This means your computer and data are vulnerable to virus attacks. Virus attacks can have serious consequences, including system damage and data loss.

Recommendation:
Install the latest version of a commonly-used virus protection product.

The thing is I have AVG antivirus program that I paid for and it is installed and up to date - why did they not pick up that I had it - is it not set right ?
 

A:security question

I just ran the same scan, with the same results. I use AVG free version. My guess is that the Symantec Security Scan just does not recognize AVG. I wouldn't worry about it.
 

Read other 2 answers
RELEVANCY SCORE 36

I am running a Win 7 64 ( updated ) router for firewall, 7 fw, LUA, MSE, Malwrebytes free, Hitman pro free, Sandboxie free delete contents upon closing , and use Chrome for my browser. I only use this computer for surfing, and was wondering how likely it would be to get hacked or infected other then the usual click on me social malware stuff which seems to be about 99.9% of the problem?

A:Security question

Honestly in my experiences the chances of getting infected if your not doing much more than websurfing would depend verymuch so on your firewall. If someone is actively doing a port scan and your ports are all in stealth mode and do not respond to the request then the likelyhood of you getting hacked is close to nil.

Read other 8 answers
RELEVANCY SCORE 36

I frequent another forum and while reading the posts made by one of the members, This is what is at the end of each of his posts. My IP address, the name of my ISP, my windows operating system and the browser I am using. Also it says " better change that password, it can be seen by us."

I have Zone Alarm, Spy Bot Search and Destroy, Adaware, Avg and Norton.

My windows updates as well as all the other updates are current. I don't know how to keep others out. Please enlighten me. Thanks!
 

A:XP Security Question

I'm thinking it's just some script set to pull things from your system that actually only you can see, while another user sees their information, etc. As far as the password thing, it's probably there as a joke. What's the forum address or a link to a thread the poster has posted on?
 

Read other 2 answers
RELEVANCY SCORE 36

hi tech guys
i need help with this,
Please answer the question provided. This process is used to prevent automated processes.

Name of the Site

i need to know what name of the site this is so i can finished the reg

greetings, asmrdarling
 

A:need help with security question

The name of this website is "Tech Support Guy" and the URL (domain name) is "techguy.org"
 

Read other 1 answers
RELEVANCY SCORE 36

I am trying to devise a layered security approach for my PC. I wrote in about this a while back but some of the programs were messing with my PC so I uninstalled them. I recently found ZoneAlarm Free Antivirus + Firewall. I currently have Trend Micro Titanium Maximum Security 2013 installed. I like Trend a lot but don't like the fact that their Titanium products don't have a true firewall--only a booster which utilizes the Windows Firewall. Would installing ZoneAlarm's Free Antivirus + Firewall conflict with Trend's protection? I'm thinking yes just because there would be "2 antiviruses" running in real-time.

A:Security Question

I would think so too. 2 antivirus apps at the same time is never a good idea. That is different with scanners. There you can have several.

Read other 8 answers
RELEVANCY SCORE 36

First time user - please help!

Every time I log into my pc I get a security alert saying the certificate has expired or is not yet valid.

I have to click "yes" about 6 times before it goes away.

Does anyone of you clever computer people know how I can stop this happening please

Many thanks
 

A:Please help me with security question

Hi

Can you please check what version of java you have installed

Control pannel>add or remove programs

The latest is Java Runtime Environment 1.6.0.7

You should install the latest version and remove all the old java

http://www.filehippo.com/download_java_runtime/

**********************************************************

Also check the date your computer is showing.
 

Read other 1 answers
RELEVANCY SCORE 36

Most who have seen me post know I have "some" security knowledge (pretty basic, but enough to get by). I always use the following programs while online (and update weekly): AVG Anti-Virus, ZoneAlarm, spwareblaster, and spywareguard. I also use (and keep updated) AdAware and Spybot. These have kept me in pretty good shape.

However, I have a cousin who uses AOL (3,000 miles away, so my contact with her is only email & phone). She's asked if she should be using anything. I've heard that AOL incorporates some or all of the protection I listed above (I use IE6 and a local server). I'm not sure what to tell her. Would any of these programs be beneficial to her? I've never used AOL, so I'm not familiar with it.

Thanks for any input
 

A:AOL Security Question

Read other 6 answers
RELEVANCY SCORE 36

Hi,

Just finished resetting Laptop back to Win 8 ...currently upgrading it to win 8.1

McAfee is installed on the laptop, Do I need this...?

What would be the best security for win 8.1... I reset it to the original factory settings, as it had so much crap on it, click on IE on one web page and have 20 others open!

I also need to make this 'kid proof'.... with the thought that her husband told one of her kids to download a Keylogging utility so he could perhaps track her goings on, on her laptop.... even if that is possible for him to do...?!

Thanks
 

A:Win 8.1 security question

windows 8 comes with windows defender , which is virus product -
McAfee is installed on the laptop, Do I need this...?Click to expand...

this will be a trial version - you should use the mcafee removal tool

Mcafee Removal Tool
I would recommend that you restart the PC and run the removal tool for a second time or even a third time - I have found instances where the removal tool needs to be run twice to fully remove all traces of Mcafee from the PC

http://service.mcafee.com/FAQDocument.aspx?id=TS101331
 

Read other 5 answers