Over 1 million tech questions and answers.

Interesting security question

Q: Interesting security question

Hi peoples
For security purposes is it safer to use the on screen keyboard in windows when logging into sites using your password etc.
For instance do keyloggers pickup this or is it hidden.
Just a curious question?

Preferred Solution: Interesting security question

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: Interesting security question

It would help if you have a hardware keylogger but I don't think it would help if you had a much more common software keylogger.

Read other 3 answers

This program I read about it and used it puts some 1500 "dangerous" sites (like IE_SPYAD) at Internet Explorer's Restricted Zone and it has some features for better handling them.

"SpySites Help

SpySites includes a database of over 1,500 known Spy/Sleaze sites and guides you through the simple process of including them in Internet Explorer's Restricted Zone to prevent them from performing intrusive acts on your PC. The Restricted Sites zone in Internet Explorer contains a list of sites that must follow very strict rules. By setting the policies for the Restricted sites zone to a very high level of security, you can be assured that any web sites added to the Restricted sites zone cannot do certain things which could compromise your privacy and security such as installing and/or running:

ActiveX controls
Java applets
Download and installation of Desktop items
Use of email address as anonymous FTP password
Hijacking your Home page and/or Search page
Installing their "Sleazeware" without your knowledge

By adding sites to the Restricted sites zone, you will prevent them from intruding on your privacy and possibly taking over your PC. Those annoying popups may still appear but their ability to set Cookies or perform other actions on your Computer will be blocked. SpySites does not block popups, only their ability to act.

I consider this database to be just the... Read more

A:Interesting Security Tool

Looks nice.

This, in combination with a Hosts file should go a long way towards making surfing the web a more pleasurable, and safer, experience.

Read other 3 answers

Is it possible to send a fax over a cell phone? Hubby posed this question today. I can't think of a way it could be done, but promised I'd try to see if anyone here had ever heard of it being done.

A:Interesting question

A quick google search

Question: How can I send faxes with my cell phone?

Our fax software can send faxes with cell phone modems, as long as your modem can be seen from a COM Port on your computer, and your cell phone carrier supports this. You may need to call your cell phone service provider to ask if faxing is supported.


Read other 1 answers

dear all members , i am running windows xp home edition and the problem since 3months onwards iam facing is that when iam starting the system in safe mode immediately the computer is switched off like a tv when there is a power failure. when i want to install or upgrading the current version with bootable xp home cd after copying files the system is switched off as said above. everything is running fine in normal mode and no problems during normal operation.please kindly help me to solve this problem.

Read other answers

Well MS fixed "Error 80248015" ,  Thinking about it this AM how did they access our machines to apply the fix????????????????????

A:Interesting Question

They didn't, the problem was created by an outdated file located on the Microsoft Update servers.
When the Windows Update Client on your computer tries to update, first it check if there is a new version of the client on the server and during that check it downloads a file that didn't pass the validation check because of the expired date.

Read other 3 answers

Good morning

I'm wondering. On my laptop i have a screen (duh) How can i use it to play xbox 360 or for that matter.. use it as a monitor for another PC...
What can i get that has good quality HD comp. in or VGA in. I have VGA out, but not in.....
SO can i get some PCI card to fulfill this desire? Or is this just impossible....?



A:An interesting question

The laptop screen is hard wired (digitally) to the laptop motherboard.

It's a proprietary digital interface that differs between makes and models.

It's not therefore "available" to use as an external monitor, even if you were to disassemble the laptop.

Read other 2 answers

Hi I am learning ASP.Net C# programming, My friend give me a very interesting question to solve

I have the following class decleration for a person, I need to write a C# code, for the following functions: PrintDescendants() and TestPrintDescendants()

PrintDescendants should return a string in the following format:

“childA ( grandChildAA ( greatGrandChildAAA () ) grandChildAB () ) childB ( grandChildBA () ) childC ()”
public class Person
List<Person> children;
string name;

public Person(string name)
this.name = name;

public string PrintName()
return name;

// print all of your descendants (children, grandchildren, etc)
// into a string
public string PrintDescendants()


class TestPerson
public void TestPrintDescendants()

I will be very thankfull If any one can give me a hint what is actually I needed to do and how to solve the problem.


A:An interesting C# question

"childA ( grandChildAA ( greatGrandChildAAA () ) grandChildAB () ) childB ( grandChildBA () ) childC ()&#8221; <------ can You Pls Explain this?

Read other 2 answers

Is there a way to block someone from booting up a computer?

(I apologize if this is the wrong forum for this question.)

I have an individual who frequently spends time at my house, and I do not want her to have access to this computer. I'm sure there is a way to do it, but I don't know how. I've tried going to the CMOS screen on start up and setting a password there - It didn't work. I can't remember if there is a password command that can go into a DOS .bat file.

I have an Intel Pentium III, 500 MHz processor. The "brand" name is Pionex. I'm not sure of the motherboard type.

I would appreciate any insite on this problem. Thanks in advance.

[This message has been edited by splatt123 (edited 07-10-2000).]

A:Hello. I have an interesting question...

How did she find a way around the BIOS password? Here's an easy solution: take the power cord off your computer and hide it. Works for me.

Programming Page
Get Paid to Surf the Net

[This message has been edited by NormanSmiley (edited 07-10-2000).]

Read other 3 answers


I was wondering if the following is possible or not.
I want to put a message box on certain folders. To explain, when the user opens a certain folder, windows puts up a message on the screen with a message like "This folder is out of date, please use folder 3." or something along the same lines and then open the folder when they click "OK".
I don't want to restrict access, I just want to give the user information when they enter a folder.

I have searched about a bit but I don't really know if it is possible and what to search for.

Any help would be greatly appreciated.

A:Interesting Question

It'll take some searching but I think I saw this trick somewhere.
Do a ggogle search for "registry tips and tricks".
Here's a good one:

Read other 2 answers

Hi everyone,

I found an interesting test of security products at the following link, just scroll down about 1/4 of the page for a chart that compares products...


The link above has some other interesting articles & info.

Here is a link to a more in depth article & information related to the test results...



A:Interesting test of top security products

without getting into a big discussion or argument here, his test methods are fatally flawed & consequently his results

You cannot use a VM to test the effectiveness of antiviruses

Many of his conclusions are seriously in error

Read other 3 answers

one of the mucky-mucks got a new laptop today, imaged it, installed his custom apps, copied over his profile, installed all necessary software for his various apps, and the only problem I am having is that he wants his custom dictionary imported. Now, I know that with word it's normal.dot; I know this as I tend to have most of my office suite products pretty customized and back up the toolbars rather frequently, as I don't feel like re-adding a few thousand entries into the custom dictionary.

My question, however, is is there a place where office stores ALL of the custom dictionary stuff, as when he opens outlook all his custom entries are popping up in spell checker, and he understandably doesn't want to rebuild that.

I had thought that by bringing over his profile it would solve that issue, or rather had assumed it, as nobody has ever voiced that question before in 5 years of doing this.

So is there a central repository that office dumps stuff in outside the profile that I need to bring up to his new machine?



A:Solved: interesting question

Read other 12 answers

I was just wondering if there is an option in Newegg that makes all of the things in your cart get shipped the same day. For example, is there a way to make everything arrive on the same day, or at least get shipped on the same day?


A:An Interesting Question About Newegg

Read other 16 answers

i know its possible to directly connect two computers via parallel port...but is it possible to share an internet connection connected like that? i've never had the want or need to link up via parallel, so i have no clue... and i've asked a couple people and no one knew for sure

A:interesting question i was asked..

Read other 6 answers

This is sort of a weird problem that I imagine someone has encountered before...

My wife's computer at work might have been damaged in a flood (water heater broke). But the PC was off and the hard drive in the PC tower never got wet. So, I popped the hard drive out and brought it home. I installed this hard drive as a slave in my home PC and XP recognized it immediately. My plan was to backup all the data, put the drive back in to her work PC and try turning it on. That way if a short causes everything to crash and burn, I still have her data on my home PC. (I am afraid to turn the work PC on until I have backed up the data).

Now on to the problem: At my wife's work, she had numerous users on it, so the important documents were stored under the password protected "My Documents" folder for the owner of that PC. This folder is obviously actually under the "Documents and Settings/Owner" directory under root.

When I try to view the contents of this directory from my PC, I keep getting the message "Access denied." I can't seem to figure out how to override the security from her original computer. Do I need to modify the registry settings on her drive to remove any security on that directory? Thanks for any help!

Some additional details:
- My PC has installed my wife's drive as F:
- I tried creating the same name account with owner privileges on my PC (so, for example, if the owner on the original flooded PC was named "Stac... Read more

A:Interesting problem with Windows user security

Checkout: http://support.microsoft.com/default.aspx?scid=kb;en-us;308421&sd=tech

Let us know if it worked.

Read other 2 answers

On discord, its not uncommon for me to come across "Cursed MP4 Files" with strange properties.

I'm incredibly interested how the creators of these files were able to get their results and mostly I want to make my own "cursed files". Some of the properties I've seen are video lengths upwards of 13,000 hours long, yet still being 1 MB. I've also seen videos that have negative video lengths and videos that display the video length as 0, yet still plays a video.

How were some of these made? I can file share the specific MP4 files in question

Read other answers

I connect to a hotspot with a USB dongle. I want to connect another machine, a Wii to be exact, in another room but it can't recieve the signal from the hotspot. I was wondering if there was a way to use the wireless router I have, which only has one input and that is ethernet, to somehow extend the signal to the other room? I have no way of plugging my USB adapter into the router. Can the router plug into the ethernet port on my computer and transmit what is being received via the USB dongle? Thank you guys so much.

A:Interesting USB adapter / router question.

Bridging wireless connections with a pc

Short answer yes.
I currently have a DLink router in one room, a gaming bridge in another room and a USB wireless adapter in a third room. The internet connection from my cable modem service is being bridged to the usb adapter which relays all the internet to the router. The router also communicates wirelessly with the gaming bridge passing along all that traffic.

If you can connect the WII to the router/gaming bridge(one ethernet port makes it sound more like a bridge) then connect the router to your pc using the ethernet port. Finally there should be two connections under "Start>settings>network connections" (assumes windows xp). Select the two connections (holding ctrl while clicking) then right click either and select "bridge connections". That should pass all traffic from your wireless USB adapter to the ethernet adapter.

I don't have a WII but for the XBox 360 bridging was prefered to Internet Connection Sharing (ICS) as it blindly forwards all ports and eliminates the need to specify what ports are necessary for gaming.

Good Luck

Read other 3 answers


I would like to know if it is possible to add the username and password information into a hyperlink so that as soon as the hyperlink is clicked it will go to the specific page and bypass the sign on screen.

The website in question has an .aspx ending to it. Have just found out i cannot post the exact site on these forums.

I notice this is an asp page and wonder if this is possible or not, I have 30 children accessing these hyperlinks at a time for a class and it would be helpful if each and everyone of them did not have to sign in.


A:Interesting question, probably easy answer!

Read other 8 answers

I have a couple questions about printing between two computers

i have one Canon all in one media printer that i would like to use between my two home computers... the computers are about 10 feet away.

First of all.. i was wondering if using a program like Remote Assitance or something like that where you can access everything on someone elses computer you could print on the computer thats not hooked up to the printer.


Second, is there anyway to send prints across the internet? i don't know if that makes sense so just ask for clarity if needed

i just dont' want to have to buy a router and all that...


A:Interesting Question about Printing between two computers?!?

Read other 12 answers

Krypto-Trojaner: TeslaCrypt 4.1A erschwert Desinfektion des Rechners, verschlüsselt weitere Formate

TeslaCrypt is one of the most successful crypto Trojans. And the developers are not tired to add new features to make life difficult for the victims. Version 4.1A encrypts even more formats more and makes it more difficult to disinfect the computer.

The developers of blackmail Trojan TeslaCrypt aren't tired yet of further optimizing their pest: Current version 4.1A has some new, nasty tricks on hand. According to an analysis of the security company Endgame, the new version now encrypts among others Bitcoin wallets and Scores. It also has an eye for files ending in .bak, being used by various programs for backups. Also, TeslaCrypt does not like being observed: Analysis tools such as Process Explorer from SysInternals or the Task Manager are being shut down by the malware.

TeslaCrypt hunts down specific file extensions, that might be of value for the user, but spares out system files. The recently added extensions denominated .bak .bsa, .litesql, .tiff and .wallet. The ending .bak is used by various programs for backups, .bsa is a file format by the {Video Game] Developer Bethesda (Fallout 3, The Elder Scrolls and more). In .litesql files to TeslaCrypt probably hopes that it concerns databases, .tiff is a common graphic format. Furthermore, it hunts for .wallet files the blackmailer: This ending is used for example by the widespread Bitcoin Wallet multi HD.

... Read more

Read other answers

this is going to sound bizarre, but i need the info...i have been sending my husband nude photos to his mediacom email account. i asked him for his password and he freaked out and said i couldn't have it. it seems silly, but why would he say no? anyway, i don't want his password at all, i'm just wondering if someone can verify something for me...my husband claims that he cannot give me his password because i won't be able to see any emails, as all his emails sent to the mediacom address are forwarded in 15 seconds to outlook express on his work computer. he claims that i cannot have his password because the mediacom email is for work, and others in his store have access to the address log in, but he says they cannot see my photos because they are going to outlook. how does this work? sounds odd to me. basically, even though on my home computer i can go to the mediacom website and technically log in to his account if he gave me his password...but i wouldn't see any emails?
this is what hubby says...and is outlook truly this amazing

mediacom doesn't delete the messages, outlook express takes them from mediacom, and delivers them to my inbox....It is amazing when you think about it.

A:question about outlook and mediacom mail communication...interesting story at least

If he has Outlook Express set to check for new mail every 15 seconds and to delete downloaded messages from the (Mediacom) server immediately then what he says is true. I've never used OE, but I doubt that you can set it to check for mail more frequently than every minute.

Read other 3 answers

I know that I have a virus on my computer. I do not know what it is but I have run Mbam and it says that nothing is infected. I did have an infection but I got rid of most of it and now I cannot find the loose hairs that are still messing with my computer. While I was going through my computer seeing what had been added I came across something interesting. I came across a file that had been downloaded to my hard drive along with the virus. I read through the file and it was kind of like a guide for what was on my computer. I found some of the files it say were harming my computer and I deleted them. I am still having issues with the start up of my computer outside of safe mode and I was wondering if anyone could help me. I will also post the file that I found[Advertising.com]Threat="Tracking cookie or cookie of tracking site"Description="I won't call a saved IP in combination with a log of visited web pages anonymous!"[Avenue A, Inc.]Threat="Tracking cookie or cookie of tracking site"Description="They say they no longer do tracking."[ClickFinders]Threat=Tracking cookie or cookie of tracking siteDescription=Their cookie itself is a tracking cookie.[CoreMetrics][Enliven]Threat=Tracking cookie or cookie of tracking siteDescription=A unique number and the IP would be enough for me to call it tracking; but to also save search terms is even worse.[HitBox][Bluemountain]Threat=Tracking cookie or cookie of tracking siteDescription=[Adbur... Read more

A:interesting infection and an interesting find on computer

I would also like to add that my browser has been getting jacked too. When I search on Yahoo I get redirected to other websites.

Read other 8 answers

Like so many others before me, I have an issue and want help... And I’d be very grateful to anyone who can help...

So... yesterday, I believe, I was browsing around the internet... and I got the typical "This page cannot be displayed" error when I attempted to go to one of my heavily frequented websites. I refreshed a few times, as I thought the error popped up a bit quickly (and everyone knows that IE will, on occasion, toss that error at you for no good reason -_-)... but to no avail...

I shrugged, and went off to another of my regular websites. Same error. Now this struck me as odd. I refreshed a few times... both of these websites are LARGE websites... and generally are not down... one of them can be slow and sluggish on occasion, but very rarely down... Perhaps there was something wrong with my net connection? A few other clicks around the internet revealed that some websites would still load normally as though there was nothing wrong... So maybe just those websites, then?

I sent links to a few friends of mine over Yahoo!... all three of them said that the two webpages that would not load at all loaded fine for them... ...Even odder.

After a bit more experimentation, I discovered:

Some websites Will Not Show Up. At all. I get 'This page cannot be displayed" errors until the cows come home.

Some websites will display fine.

Some websites will give me 'page cannot be displayed' errors for the first several refreshes, then will... Read more

A:Interesting issues with IE... interesting to me, anyway...

Read other 7 answers

I have applied Microsoft security baseline to Windows 10 IoT.

Can anyone please provide a workaround or a solution to revert back the system to previous/original state?
(Any way which can basically revert the system + group policy + registry settings back to the way it was before applying security baselines)

PS: Microsoft compliance toolkit itself does not have this option which is why I have mention even a workaround would help if you know any.

Note: Just reversing GPO will not help. We will need to revert GPO + registry + (potential changes introduced by baseline).

Read other answers

My friend has windows XP on an HP ??? PC, twice when he played starcrat, expansion, the game seemed to log itself in while he was logged in.

To help understand:
His name: Ryan
His username: alakazammath

First time: He was waiting for others to join his game, and suddenly it said alakazammath has joined the game, it then said that the other alakazammath wrote: hi me

Second time: While he was looking for a game to join, it said connection to battle.net lost, then when he logged in, it said CD key currently in use by Ryan...

Read other answers

I am hoping someone canhelp me with this. I logged onto my Lowe's account today and I noticed a funny object in the address bar. Does anyone know what this might be? If it is a trojan how can I get rid of it immediately?

Well how do oyu add a picture to a thread? The object goes from the standard Lowe's Icon (warehouse) to a small red object tha looks like the letter C but turned 45 degrees clockwise.

Your help is greatly appreciated


A:Security Question

Read other 9 answers

Has anyone ever seen these http://www.networkcamerareviews.com/networkcameras/4xem/IPCAMWPTZ/camera_details.html

I want to set one up to secure my home but I don't know anything about them except you can view them over the internet.....sounds pretty cool if you ask me.

Anyone ever use one before?

A:Security Question

try the hardware forum. Or maybe google property security cameras would be a better bet?

Read other 2 answers

This question is not actually Win7 related, but there is expert knowledge on this forum. I would really appreciate your input. (It may be Win7 related, because I may have to do a reinstall)

Today I received a Yahoo IM from someone I did not know. As I was attempting to have my antivirus (Kaspersky) do a scan, I inadvertently opened the IM. It did not contain any attachments/links, but a weird coded message, something like "SSD12xxy" (not actual letters, but similar) The IM had a person's name in the from block.

It is my understanding that Kaspersky scans all incoming IMs but I am not sure under Yahoo Mail. A later system scan was negative. (It should be noted that my Yahoo IM address is the same as my Yahoo Email address)

Should I be concerned that I have spyware or a virus on my computer ? Does anyone know what this IM may be ?

Thanks for your replies. As a new member, I really respect the knowledge on this forum.

A:Security Question

a weird coded message

Something like possibly a Java script code?

Read other 7 answers

I am trying to devise a layered security approach for my PC. I wrote in about this a while back but some of the programs were messing with my PC so I uninstalled them. I recently found ZoneAlarm Free Antivirus + Firewall. I currently have Trend Micro Titanium Maximum Security 2013 installed. I like Trend a lot but don't like the fact that their Titanium products don't have a true firewall--only a booster which utilizes the Windows Firewall. Would installing ZoneAlarm's Free Antivirus + Firewall conflict with Trend's protection? I'm thinking yes just because there would be "2 antiviruses" running in real-time.

A:Security Question

I would think so too. 2 antivirus apps at the same time is never a good idea. That is different with scanners. There you can have several.

Read other 8 answers

I am running a Win 7 64 ( updated ) router for firewall, 7 fw, LUA, MSE, Malwrebytes free, Hitman pro free, Sandboxie free delete contents upon closing , and use Chrome for my browser. I only use this computer for surfing, and was wondering how likely it would be to get hacked or infected other then the usual click on me social malware stuff which seems to be about 99.9% of the problem?

A:Security question

Honestly in my experiences the chances of getting infected if your not doing much more than websurfing would depend verymuch so on your firewall. If someone is actively doing a port scan and your ports are all in stealth mode and do not respond to the request then the likelyhood of you getting hacked is close to nil.

Read other 8 answers

Hi techies!

Hi have a question regarding my security.
I am currently behind a NAT router, using NOD32 Antivirus (Not smart security) and the Vista firewall, so my question is if I'm protected enough against hackers? I use my pc for netbanking etc. or do I need to get the Eset smart security suite in a hurry?

Regards Andersson!

A:Security question?

Read other 6 answers

Most who have seen me post know I have "some" security knowledge (pretty basic, but enough to get by). I always use the following programs while online (and update weekly): AVG Anti-Virus, ZoneAlarm, spwareblaster, and spywareguard. I also use (and keep updated) AdAware and Spybot. These have kept me in pretty good shape.

However, I have a cousin who uses AOL (3,000 miles away, so my contact with her is only email & phone). She's asked if she should be using anything. I've heard that AOL incorporates some or all of the protection I listed above (I use IE6 and a local server). I'm not sure what to tell her. Would any of these programs be beneficial to her? I've never used AOL, so I'm not familiar with it.

Thanks for any input

A:AOL Security Question

Read other 6 answers

I am trying to make my wireless network security enabled and am having a really hard time. Can you please give me step-by-step directions??

A:security question

Make and Model of your Wireless router?
I bet if you go to the router manufacturers website and download the manual, you can probably figure it out. That is what we are going to do when we help you.

Read other 2 answers

if you are behind a wirless router and log onto a website, will your physical IP be viewable by the website admin or just the IP that your wireless router gives?

A:security question ... HELP!

Read other 8 answers

hi tech guys
i need help with this,
Please answer the question provided. This process is used to prevent automated processes.

Name of the Site

i need to know what name of the site this is so i can finished the reg

greetings, asmrdarling

A:need help with security question

The name of this website is "Tech Support Guy" and the URL (domain name) is "techguy.org"

Read other 1 answers

I recently had problems with hijack programs, adware, and trojan viruses. I have been working diligently thru your great website to solve these problems. However, recently I received an email that the "cell phone" that I ordered was shipped. I have also began receiving phone calls and letters about the schools and courses I have inquired about.

This cell phone arrived by UPS from "weresmyorder.com". It was shipped by a company called "In Phonics". I refused the shipment since I had never ordered this. When I do research on the order, it shows that I ordered at 3:30 am one morning when I was sound asleep. This phone also had included an activation for cell phone service. Since I do not see any charges to my bank account or credit cards, I have not been so concerned.

Now I am receiving these calls and letters about my inquiries into schools and home study courses. HELP... HELP... HELP! I have no idea what happened to me or what to do about it. Obviously, somebody or something took my identity from my computer and dispatched inquiries and orders to all kinds of places!

Can anyone help me with this problem?????? What should I do next????


A:Question on Security

The first thing you should do is change all critical passwords to financial and web accounts you have which either have been stored on the computer or accessed through it.

You may have been the victim of a keylogging trojan that captured these passwords.

If you had stored credit card info on your computer you should contact the credit card companies and get new cards with new numbers.

Read other 1 answers

I have a problem of spyware. I found spyware with name InnovaSpy at Innovaspy.com. It can steal data such as calls logs, photo, SMS, GPS, Contact ... and it sent to the computer. I want to know that can it be installed on the computer? if it is installed on the computer, can it steal the data on the computer? Sorry for the stupid question because I do not know much about spyware.
And spyware is a virus, is not it? i can destroy it in any way?

A:A question about security.

Hello -
I am aware of this "program", and that is "Spyware", but it can be used legally by some people.
Can you please tell me if your computer, Ipad, or your phone is infected ?
Or are you just seeking further information about this infection / program ?
Thank You -

Read other 2 answers

Is it possible to restrict access to a slave hard drive In Windows XP Pro? I'm getting a new 250 GB HD Tuesday and Win MCE With an upgrade coupon to Windows Vista (My Christmas present to myself :-D ). There are 3 other people who use my PC right now, and I want to keep the new HD squeaky clean.

A:Security Question

Read other 14 answers

I just read that using a tool such as AirSnort, a 128-bit WEP encrypted wireless network can be cracked in less than a day if there is a decent amount of network traffic.

So my question is - how much more protection does 152-bit or 256-bit WEP encryption offer? Does it just extend the amount of days to weeks or does it really offer a protected network?

A:WEP Security Question


Read other 1 answers


I am wondering if anyone could advise me about security settings for my wireless connection. This is all new to me so I am not really up on the networking lingo!! I have heard from alot of people that I should have security enabled on my router to prevent unwanted users such as neighbours from using my wireless connection and having access to my files. I have spent hours reading the 'help' section of the user manual and I am no further forward. Is this true?

I have a Belkin G router 802.11g, that is attached to my broadband modem. I connet my destop computer and my laptop via this router. I have logged on to the routers IP address where I can make changes to the router settings but the problem is that if I make any changes to the security settings which is defaulted on 'disabled' I cannot make a connection on my laptop, it finds the network but will not connect. This may be a stupid question but am I doing something wrong? (maybe everything!!!)

A little advice goes a long way!


A:security question

Are you enabling WEP or WPA on the router?
Does your wireless network card support WPA?
What Operating System are you running and at what Service Pack?

You should really only make changes to your Wireless settings on the router when you have a physical attachment to it.

Read other 3 answers

I did a security scan from http://security.symantec.com/sscv6/default.asp?langid=ie&venid=sym

and every thing shows up ok - except it says this after the scan-

Checks for a current version of a commonly-used virus protection product.

WARNING! No known virus protection software found. This means your computer and data are vulnerable to virus attacks. Virus attacks can have serious consequences, including system damage and data loss.

Install the latest version of a commonly-used virus protection product.

The thing is I have AVG antivirus program that I paid for and it is installed and up to date - why did they not pick up that I had it - is it not set right ?

A:security question

I just ran the same scan, with the same results. I use AVG free version. My guess is that the Symantec Security Scan just does not recognize AVG. I wouldn't worry about it.

Read other 2 answers


Just finished resetting Laptop back to Win 8 ...currently upgrading it to win 8.1

McAfee is installed on the laptop, Do I need this...?

What would be the best security for win 8.1... I reset it to the original factory settings, as it had so much crap on it, click on IE on one web page and have 20 others open!

I also need to make this 'kid proof'.... with the thought that her husband told one of her kids to download a Keylogging utility so he could perhaps track her goings on, on her laptop.... even if that is possible for him to do...?!


A:Win 8.1 security question

windows 8 comes with windows defender , which is virus product -
McAfee is installed on the laptop, Do I need this...?Click to expand...

this will be a trial version - you should use the mcafee removal tool

Mcafee Removal Tool
I would recommend that you restart the PC and run the removal tool for a second time or even a third time - I have found instances where the removal tool needs to be run twice to fully remove all traces of Mcafee from the PC


Read other 5 answers

Hello all, I have an interesting issue.

So I prefer to have my uac set to the highest setting: Which is always notify.

I noticed that sometimes when I check the setting, it will be at the default (not off) Level 2, notify when programs make changes to this pc on secure desktop.

So I set it to the highest, click ok and reboot. Its still set to the highest setting and I go on my way. I check it several days(weeks even) later and UAC is on the default setting again.

So I am curious, UAC at the highest setting is supposed to prompt whenever UAC settings are about to be changed, but this is not happening. It does when I initiate it, but not otherwise apparently.

I know what your thinking, and I am absolutely sure its not malware. I don't know if its a older program I have that's doing it or what. Still, it should not be able to.

So questions:

1.) What could be causing this?

2.) Is there a way in group policy I could disable the uac setting screen so it could not be changed? Or lock it down to the always notify option?

I have searched the net and have not found any information on this.

Thank you.

1st image is what I want,

2nd image is what happens after a few weeks.

Event viewer shows nothing.

A:UAC security question

Hello Andrew,

Interesting. Is this all happening in the same user account?

One possibility is a Windows Update resetting it back to default.

Read other 9 answers

So this is a bit of a unique or maybe not so unique question.

The maintenance guy at the complex where my office is located had an old laptop that he wanted refurbished. So I fixed it up, added Linux Mint rather than Windows because specs wise, it wasn't all that great.

Thing is, I forgot to delete my work Wi-Fi information/connection from the laptop and now I'm a bit paranoid. Obviously he'd literally have to sit in front of the building to connect to it.

My questions are:

1. While our work computers have web filtering/blocking over Windows and I guess the group policy, would this carry over to the laptop he now has is if he's connecting to the same Wi-Fi?

2. Would my Network Admin even know he's connecting to the Wi-Fi? Our work computers are all addressed uniquely, this one obviously is not a work computer therefore isn't. Its obviously not setup to join the domain.

Any help/input is appreciated.

A:Wi-Fi Security Question

Because you installed a new OS, there wouldn't be anything left over from the WiFi credentials you've saved under Windows for your work wireless network. That information is not saved into any part of the hardware.

Read other 1 answers

I have windows xp and use mozilla firefox as my browser. I do have norton antivirus installed and have recently updated it . Recently whenever I try to go on the web I get a security alert stating "The information you have entered is to be sent over an unencrypted connection and could easily be read by a third party. Are you sure you want to continue sending this information?"
What can I do to secure my connections? Thanks

A:security question

Secured connection is dependent on the website you're connecting to, not your computer.

Read other 1 answers

Not sure if this is the right forum for posting this question if not Please move to appropriate one ThanksThis is probably a stupid question but here gos I'm dual booting and i have AVG free AV installed on my primary OS which scans all of my HD when my system boots up, is it necessary to install AV on both OS ? I do most of my downloading and mail checking with my primary OS I'm security and IT challenged Moved from the XP Forum. ~acklan~

A:Security Question

Yes it need to be installed on the OS that is running at the moment.

Read other 3 answers

Hello folks,
I have a small security question for you. I have a linksys wrt54gs wireless router. Runs good and all but i have a small concern with security which i dont know whether i should take action or just let be. It is on WEP encryption with the MAC filter enabled. (bad i know) but the reason is that my sister has a nintendo DS that she plays online with using the nintendo wifi connection. I was thinking about the connection and wondering if i should try to change it back to WPA again as she says she does have the nintendo usb adapter but i had trouble attempting to get it around firewalls and such in the past, but had an idea on setting up the device to run on a vm of windows xp with no security (would be a dmz zone for it) if i set it to WPA. I ask this because i dont know if i should be concered with packetsniffers still decrypting packets of data or if they physically need to be on the network to collect traffic. Thanks for any advice.

A:Security question

I would set the linksys router to use WPA and let your sister use the Nintendo USB Wifi gadget. According to this article:

the Nintendo USB Wifi gadget can only work with Nintendo DS because it uses proprietory authentication.

By letting your main network use WPA, you will have better security.

Packet sniffers can collect data whereever they are because Wifi signals flow everywhere.

Read other 2 answers