Over 1 million tech questions and answers.

The risks of Social media

Q: The risks of Social media

The risks of Social Media
Do you cyber-blab? Are you a compulsive Tweeter or Facebooker? Think carefully about what you post. A simple post about your daily visit to the local coffee shop could be enough to tell a burglar when it is safe to rob your house. Remember EVERYTHING on a Social Media site is public.

Facebook and Twitter
Don?t get carried away with what you post on these sites and remember that almost everything you post will be completely public and it is rather like walking down the local High Street and shouting at the top of your voice to everyone in earshot, everything that happened last night, what colour underwear you have on, your name & address and phone number and where you hide the spare keys to your front door.
Be very careful what you post on Facebook or tweet about. It can be used against you in court or by an insurance company, even something as mild and innocent as: ?I?m jogging every day to get fit for my holiday?. Not good if you?re claiming for whiplash after a car accident or you are off sick from work.
Lawyers, Insurance companies, your current or prospective employer will take the time to scroll your Facebook timeline and your tweet history for evidence that can go against you.
Scammers and Fraudsters will scan Facebook, Twitter and other social media sites for useful information that will help them scam you.
Read the rest on http://myonlinesecurity.co.uk/the-risks-of-social-media/

RELEVANCY SCORE 200
Preferred Solution: The risks of Social media

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: The risks of Social media

Read other 9 answers
RELEVANCY SCORE 96.8

With the upcoming Holiday and Party Seasons, together with the increase of online and real world shopping at this time of year, it is time to remind our user bases that the Risks and Dangers associated with Social Media usage increases dramatically.
https://myonlinesecurity.co.uk/the-risks-of-social-media/
 

Read other answers
RELEVANCY SCORE 75.6

How useful are application whitelists when social-engineering risks are minimal where you don't download and execute random stuff from the internet especially, path/hash based whitelisting like SRP/Bouncer? It seems some of the top 4 mitigation strategies I found from wherever - namely, application whitelisting and restriction of administrative rights are partly to prevent users from doing whatever they want risking their computers. I'm just curious as to what happens when this is not a threat and you're the one actually making your own decisions instead of trying to prevent others'.
 

A:How useful are Application Whitelists when Social-Engineering Risks are Minimal?

It still serves a purpose while not much on the way you are describing the situation. You never know when something will slip by you and having that whitelist is protection.

I know of a very good Penguin who is awesome at prevention and something malicious manage to pass while he was afk or watching TV. Always a good bet to have some insurance. You don't always need it but it does come in handy when you do.
 

Read other 1 answers
RELEVANCY SCORE 58

Hi forum, i would like to know if there is or are any social media sites that allow loading music on a page or anywhere else like myspace used to be.

I have no idea what happened to myspace but i used to use it years ago and it was something like facebook. A couple of years ago i checked myspace again and it became something like hi5, really crappy. I had an account there and some pictures there too but i don't know if i can get them back? i don't even remember my account name. Havn't used myspace for more than a decade

Read other answers
RELEVANCY SCORE 57.6

Hi everyone. My name is Mike.
Please do not laugh at my question. I am trying to learn everything I can about using social media.
If anyone here could help by directing me to some free online courses and or articles etc,I would greatly appreciate it. I am new to this so anything would be of help. I would like to know how to use facebook,instagram twitter etc. I would also like to know about creating fanpages. Thank you. I know I must sound silly but I have to start somewhere.
 

A:Want to Learn How to Use Social Media

Have you tried Googling "How to use Facebook"?
You will find several hits, same with the others.
 

Read other 2 answers
RELEVANCY SCORE 57.6

Not really to do with a PC.
I am not a fan of social media and do not use any of them. Facebook in
my opinion can be dangerous considering the world situtation.
My question is this: Facebook is into everything so why do I have to use
Facebook to sign onto so many web sites?
 

A:Social Media/Facebook

I am not a fan of social media and do not use any of them. Facebook in my opinion can be dangerous considering the world situation.Click to expand...

I also do not use social media(Facebook, Twitter, etc.).

Facebook is into everything so why do I have to use Facebook to sign onto so many web sites?Click to expand...

If a site only offers that option to sign it, avoid it.

---------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 56.8

Finding and addressing Twitter and Facebook threats requires a thorough understanding of how they're accomplished.

Social media threats are at an all-time high, ranging from account hijacking to impersonation attacks, scams, and new ways of distributing malware and executing phishing attacks. Sophisticated attacks target organizations of all sizes. For example, Microsoft was the victim of a series of social media hacks by nation-state threat actors. The attack campaign was extensive, affecting multiple Twitter accounts (principally Skype?s) and exposing corporate passwords and emails for dozens of Microsoft employees.

Because social media exists outside of the network perimeter, social media threats can manifest long before network perimeter and endpoint security detect malicious behavior. Detecting and mitigating these threats requires a thorough understanding of this new threat landscape. If we compare these tactics, techniques, and procedures to traditional network attack methods, we can draw some important contrasts.

Adversaries traditionally target a corporate network using two phases: reconnaissance and exploitation. Reconnaissance involves footprinting (for example, gathering information about an organization?s IP address and domains), scanning (identifying what systems are using what IPs), and enumeration (identifying the services and ports available on these target systems). When attackers use social media, their strategy is similar, but the methods of at... Read more

Read other answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

If you want to get rid on those social media pop ups on the left hand side of your web page, this is how you do it.

1. Download Addblock Plus on Firefox

2. https://adblockplus.org/tutorials

3. Now find and click read more herebelow

Adblock Plus automatically installs a default filter list, based on the language of your browser. If you wish to learn how to add other filter lists, you can read more here. For more advanced options, like disabling tracking, click here.

4.Now find and click here below

Please click on "Add filter subscription", and open the drop-down menu for the filter list subscriptions to add new/more filters. Select the list you want to subscribe to, Adblock Plus automatically enable these lists by default. This menu only shows the most popular and recommended filters. Please go here for more filter lists.

5.Now find and click Fanboy's Annoyances and Fanboy's Social Blocking List

If you have any queries on this subject, please Google them as the above is really all I know.

A:How to disable Social Media Buttons and Pop Ups.

Just wanted to add, I've used AdBlock Plus on Firefox for years. It certainly gets rid of all the annoying pop-ups, etc. You'll like it.

Read other 3 answers
RELEVANCY SCORE 56.8

About three months ago, this program was making headlines all over the national news. I thought it was at the very least amusing and thought I would give it a try. When I installed the program, I didn't do all the setting up required. I tried to get rid of it today and upon attempting to uninstall it I got this message:

"The installation source for this product is not available. Verify that the source exists and you can access it."

It appears I need a file that would be in my temp files. I went to the website, www.socialmediasobrietytest.com to reinstall the software, and eventually got this message:

"Another version of this product is already installed. Installation of this version cannot continue. To configure or remove the existing version of this product, use Add/Remove Programs on the Control Panel."

So, now I'm stuck in a never-ending cycle. When a program does this, it usually gives me cause for concern, but everywhere I look I'm seeing that WebRoot designed the program and WebRoot makes anti-virus and anti-spyware software. There's no program with that title on www.webroot.com, however.

I've googled everything I can think of and I'm finding almost all of the media's coverage in Novemer and NOTHING about install/uninstall issues. Is this program malware/adware/spyware? How do I remove it? Is it ok to reinstall it and try it out? Thanks.

Windows 7. I may have installed it for IE or FireFox.
 

A:Social Media Sobriety Test

You could try Revo Uninstaller.
 

Read other 1 answers
RELEVANCY SCORE 56.8

I have a logo which i want to place on social media sites. I am having difficulty placing the logo onto these sites. I try to open the logo files on my tablet, but it cannot do so.
Can anyone help me please?
 

Read other answers
RELEVANCY SCORE 56.8

Greetings,

My company is interested in setting up a social media presence online using Facebook.

We have a concern over negative feedback from customers or competitors or outside parties and that fact that the comments become a permanent record.

I would welcome comments from anyone with a point of view on this issue.

Many thanks!

A:Beginners guide to social media

Hello.First. . . I'm unsure of what your asking, could you clarify please?Secondly, it is my opinion that there is no such thing as "bad feedback" provided you make proper use of it. Both positive and negative feedback have use in determining your company's future. Positive feedback shows you what you're doing right, and negative feedback shows you how you can improve. Personally, if I see a company with only positive "testimonies" available I get a little bit suspicious; I believe that the ethical company should not take steps to hide flaws, but instead use those resources to find and correct said flaws. Finally, if by "negative feedback" you mean spam or troll attacks on your company, Facebook does provide the capability to remove offending comments from your page.Hope that helps.~Blade

Read other 2 answers
RELEVANCY SCORE 56.8

Hello,
 
I'm looking for software that can manage all my business social media accounts in one place.
It has to be able to manage Facebook (chat and wall), Twitter, Email (Microsoft), an on website chat and if possible also Telegram.
So far I only found brand embassy and live agent.
 
Any other suggestions?
 

Read other answers
RELEVANCY SCORE 56.8

I was running a disk cleanup because apparently my disk space was almost used up (though with what, I can't figure out.) So I decided to run a disk cleanup on my Surface RT, and that seemed to do something. However, I discovered it deleted the programs I
had pinned to my desktop and now for whatever reason I cannot view my messages via DeviantART (it is like Facebook, only for artists). I've restarted, rebooted, refreshed, logged off and then back on three times, retyped in the URL, but nothing I do can seem
to fix this problem. I can still view my messages on Gmail and on YouTube, but not on DeviantART. I know it isn't something with the website because I can view my messages on my laptop, but not my Surface. If anyone has any ideas as how to fix this or what
the problem might be, please help!

Read other answers
RELEVANCY SCORE 56.4

I just changed my phone number. Now all my social media sites wont let me go into my sites. I don't know what to do. Is there away to change my profiles.
 

A:I changed phone numbers, now cant get into my social media .

Phone number shouldn't matter unless you are accessing via your phone. In which case, I didn't know the phone number was tied to the account. You will likely need to contact each site and ask if your profile can be updated (or check their FAQ / support page). Aside from that, create a new account.
 

Read other 1 answers
RELEVANCY SCORE 56.4

Tech Support Guy System Info Utility version 1.0.0.4
OS Version: Microsoft® Windows Vista? Home Premium, Service Pack 2, 32 bit
Processor: Intel(R) Core(TM)2 CPU 4300 @ 1.80GHz, x64 Family 6 Model 15 Stepping 2
Processor Count: 2
RAM: 3069 Mb
Graphics Card: NVIDIA GeForce 8600 GTS, 256 Mb
Hard Drives: C: 222 GB (139 GB Free); D: 9 GB (4 GB Free);
Motherboard: Dell Inc., 0CT017
Antivirus: None

Censoring by FB, Twitter and Google creates the need alternatives. Has anyone any suggestions?

Txs
 

Read other answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 56.4

Cyber crime has reached a new battlefield ? social media platforms. Just as companies seek new opportunities to reach their target audience, so do cyber criminals. According to Proofpoint?s recent Social Media Brand Fraud Report, 19% of the 4,840 social media accounts associated with ten top worldwide brands were fraudulent.

Identikit fraudulent social media accounts
Carefully crafted, bogus accounts can be difficult to distinguish from legitimate ones. They replicate the brand account as much as they can, mimicking the logo, look and feel, and even content. The only difference is in what they propose to the audience: customer service at odd times, discounts, free gifts, and deals that are too good to be true. As the report says, ?the only difference might be something as small as one character in the Twitter handle, such as @askmajorbank vs. @ask_majorbank?.

Although social media platforms like Facebook, Twitter and Instagram have implemented an account verification service ? the blue checkmark badge next to the account name ? cyber criminals have become even smarter and can replicate the badge in their background image to fool customers. However effective account verification is, it doesn?t extend to posts or tweets and fraudsters know this all too well.

The 7 different types of fraudulent accounts
The research identified 7 different types of bogus accounts:
Phishing accounts
These bogus accounts are replicas of official brand products and customer suppor... Read more

A:7 types of social media account fraud

SpartacusSystem said:





Pornography
Pornographers exploit brands? popularity (based on number of followers) to distribute adult content and damage brand image and customer retention.Click to expand...

Wait, you mean the Dairy Queen account I follow isn't legit!?
 

Read other 0 answers
RELEVANCY SCORE 56.4

This is a thread I wanted to make for quite some time... namely since 2011 when the whole SOPA / PIPA / ACTA / CISPA madness started, as part of a massive plan to censor the internet. Like many others, I've been interested in a way to create a framework that would allow people to post what they want, without either an ISP being able to censor them nor the government being able to knock at a specific door and arrest someone for what they're hosting.
 
Most attempts to make this dream come true have been at networking level. Mesh networking in routers is an example of it being done through hardware, while TOR is an example of an attempt through software on existing devices. But all of these methods are either slow, unreliable, or unavailable for most people. So before this breakthrough happens, and people can create an internet that doesn't require ISP's and where your traffic can't be spied on, I've been thinking about different kind of platform. I'm a below average programmer, so I can't say I have the knowledge to do it alone... or maybe someone else attempted my idea already. In either case, I wanted to post about it and hear what people think, if this would ever be a viable project:
 
- The idea and functionality:
 
My idea is creating a full media platform, on which you can post text / video / music / pictures / web games, which could be used as either a blog or forum or journal or art site. In appearance it would be like most websites that accept submissio... Read more

Read other answers
RELEVANCY SCORE 56.4

ESET technology now integrated directly into Facebook... so ESET Social Media Scanner for Facebook has now been discontinued
​ESET said:




Hello,

We just want to let you know about a change to ESET Social Media Scanner.

We?ve partnered with Facebook, which means that ESET?s award-winning technology is now integrated directly into the Facebook platform. Read more about it here »

As a result ? and after securing 73,441,194,563 links ? ESET Social Media Scanner is being discontinued as a stand-alone application for Facebook.

However, you can still enjoy full protection from ESET Social Media Scanner on Twitter, where you can use it to scan your timeline and lists automatically.

For even more scanning capability, why not try ESET Online Scanner to check and remove threats on your local drives? It?s effective, easy to use, and free.

Thanks
Your friends at ESETClick to expand...

For more information, go here: https://socialmediascanner.eset.com/#/profiles/eol

 

Read other answers
RELEVANCY SCORE 56.4

I´m running a number of events this year and I am looking for a solution to project foursquare/twitter/facebook up on a large screen at the event so that users can see themselves on the screen. One of the obvious problems I envisage is that the page would need to refresh itself all the time.

The idea is that it drives a lot of social engagement but from a technical standpoint I have no clue how to do this or even where or what kind of forum I should be asking on.

Would anyone be able to point me in the right direction as to where I´m best to ask this question?
 

A:How can I project live social media onto a screen?

No big mystery, unless I'm missing something. Simply connect the PC to the screen/projector.
 

Read other 1 answers
RELEVANCY SCORE 56.4

This is something i wonder of curiousity, if your photo is somehow compromised (i know how rare it is but still), if you upload the photo to lets say facebook, if than you download that same photo and open it will you get infected? Does the social media sites (facebook and so on) scan somehow the photos you upload? Is anyone aware? 

Read other answers
RELEVANCY SCORE 55.6

Google Chrome has some tricks... Facebook and other social sites may offer alerts through Chrome web-browser, I wonder how to get to the settings page of those.

What should I input into address bar to get to it? ...this method.
 

A:Google Chrome social media sites alerts, getting to it

You want the notifications areas follow the steps below:
Settings > Show advanced settings > Privacy > Content settings?. Find Notifications, and choose from Allow all sites to show notifications, Ask when a site wants to show notifications or Do not allow any site to show notifications,
 

Read other 1 answers
RELEVANCY SCORE 55.6

Easy Tips on Cyber Security and Use of Social Media This Summer:

Summer is in swing.

This is the time of the year when the majority of employees take time off work, due to child-care (with schools being closed) and wanting to spending time recharging their batteries.

Social media and cyber security play a big role in the summer. On a daily basis, and particularly when we travel, we are all guilty of sharing personal photographs, pictures of our families and kids on our social media accounts. With publicly showing our meals out or just picnics in the park, everybody can see where we go, how long for and when we are back home.

Cyber security is an issue that is becoming predominant both in our business and home life. That?s why we all need to educate ourselves in looking after our own online privacy, in order to reduce potential risks, such as burglaries for example.

Our public Twitter accounts can be merciless if a savvy criminal is planning to act.

Advertising your vacation plans on social media seems like a sharing-fun thing to do; however, digital footprints are all clues available to anyone who is trying to find out about us. We?re all guilty of Googling our names, so yes, potential criminals can track down your address this way.

They can track you down by checking your other social media accounts for clues. They can easily identify where you live. Did you know that insurance claims may not be granted if you have a public display of your whereabouts on social me... Read more

A:Tips on Cyber Security & Using Social Media This Summer

Always browse using incognito then keep eye on your accounts for possible compromise activities.

Until now, I saw few people fall on classy traps which automatically spam the posts.
 

Read other 1 answers
RELEVANCY SCORE 55.6

Sorry if this is the wrong location to be posting this subject. I couldn't decide whether it should have been this or a networking subcategory. 
*please feel free to move if need be*
So, I have a new client. They want me to set up some kind of blocking tool or parental controls that block access to certain sites.
Facebook, twitter, youtube, and instagram basically.
I have done about 10 minutes of research because I'm very busy today but I haven't found really what I am looking for.
All the users log into the Domain on Win 7 Pro.
Please, any advice, as always is greatly appreciated!
-Jerry

A:Blocking social media sites for Office staff?

Hi jerrymck This could be easily done via the hosts file (implying the users don't have Admin Rights to edit it back), but the easiest way would be to obviously block these websites at a router level. Do they have a firewall, proxy, etc.?

Read other 8 answers
RELEVANCY SCORE 55.6

Social media security:
Avoiding the phishing threats from Facebook, Twitter and LinkedIn

Social media may not be everyone?s cup of tea, but it is getting harder and harder to ignore for organisations ? especially from a cyber security perspective.

A range of recent research has highlighted the increasing dangers that organisations face from employees? social media usage.

One thing that stands out in the research is how little ?due diligence?, in the words of Raj Samani, CTO EMEA at Intel Security, is done when connecting with other accounts.

Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.

These are concerning figures as it is easier than ever to set up a fake social media account.

A ProofPoint report revealed a huge number of fraudulent social media accounts and apps associated with the Olympics. 15 percent of Olympics-related social media accounts were fr... Read more

A:Social media security: Avoiding the phishing threats

Great read, thanks Logethica




Logethica said:





Intel Security?s research found that 24 percent of the 2000 UK-based respondents had connected with someone they did not know on LinkedIn.

69 percent of respondents had never wondered if someone was not whom they said they were on LinkedIn.

Research conducted by OnePulse for RiskIQ found that only 53 percent of people check for the verified badge when engaging with a retail brand.

Only 42 percent of people checked the brand?s other social media posts, 40 percent checked the brand?s replied to other people?s Tweets or posts. 31 percent checked the Twitter handle or Facebook URL while 24 percent checked the brand?s number of followers or likes.Click to expand...

Most social Media is bad enough with security, you add user habits like this and your asking for trouble.
Thanks again buddy.
PeAcE
 

Read other 5 answers
RELEVANCY SCORE 55.2

Hi everyone.

More and more these days we see a vertical bar at the left side of web pages with social media links. I believe they are called CSS Social Media Sidebars. They usually cover up what your trying to read. They really annoy me and I was wondering if there is a way to automatically stop them loading with webpages.

I know that you can use Ad Block Plus to remove some but that doesn't always work and it's not automatic.

Any ideas?

Many thanks in advance.

[/IMG]
 

Read other answers
RELEVANCY SCORE 54.4

The United States Department of State wants to make it mandatory for all foreigners to provide social media details when applying for a visa to enter the US.

US authorities want to modify three visa application forms. The changes made to the three forms would make it mandatory for all visa applicants ?immigrant and non-immigrant? to provide all social media handles used in the last five years.

Diplomatic visas will be exempt from this new rule and some applicants might be asked to provide a list of emails and phone numbers used in the past five years, for additional vetting purposes.

The Department of State has not detailed the list of social media platforms for which it intends to collect account names but said the forms would include an optional section where applicants can enter usernames for online platforms not included in the main list.

Nearly 15 million visa applicants affected
The State Department is seeking Office of Management and Budget (OMB) approval to modify three US visa forms ?DS-156, DS-160, and DS-260.

These are visa forms that immigrant and non-immigrant visa applicants must fill in and submit before being allowed to enter the US. US officials estimate 710,000 immigrant seekers and 14 million non-immigrant visa applicants will be affected.
......
......
......Click to expand...
 

A:US Wants to Make Social Media Data Collection Mandatory for All Visa Applicants

They could just ask Facebook for all info.
 

Read other 3 answers
RELEVANCY SCORE 54.4

Does anyone know if Search Engines can crawl and index social media profile pages that are set to private (set to where only "friends" of that person are able to access the page)? The best analogy I can give is back in the Myspace era when users had the option to set their pages to private, and anyone who wasn't a 'friend' of that person and tried to access their profile would just get a blank screen that just said "This profile is set to private. You are not authorized to view this page," or something to that effect. I was just wondering if Search Engine crawler bots get this same sort of page when they try to access private profiles, or if somehow they are able to get past these blocks and thus crawl & index social media pages that are supposedly private. I have been searching all over the net trying to find an answer to this question but haven't been able to find anything.  

A:Can search engines crawl & index social media profiles set to private?

Probably not but I bet there are products that will do that for a price. 

Read other 1 answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 54.4

I added in yahoo mail signature 3 social media icons, one NEXT to each other, as shown here https://goo.gl/fFBtn5. But the icons come one BELOW each other: https://goo.gl/GzhQpZ


Any suggestions on how I can fix this bug or who should I contact at yahoo to fix it?

Thank you,

Hopper

Read other answers
RELEVANCY SCORE 50

After working with TSF experts and trying many things my java runtime environment will not work. Also, links posted to social media do not work that link to my website on avahost.com ( Cloud Hands Virtual Gallery) but same links will work when pasted into a browser. For example this link was not working earlier when posted to TSF: http://jerryrosspittore.com/Verify.png but works ok when pasted into Chrome or IE10.

I have run the programs suggested by Rich and am attaching the attach.zip file in hope they can shed some light on my problem.

Read other answers
RELEVANCY SCORE 48.4

I have been infected by a virus or trojan etc.My access to internet is now partial .Some times it connects and sometimes it does not connect.Also one ad comes on top of other ads in the network asking to join some social media sites.I have formatted all my drives many times but still the virus comes back. Please help.

A:internet virus , social media virus

 
 Install and run MBAM
Information about MBAM: http://www.bleepingcomputer.com/virus-removal/how-to-use-malwarebytes-anti-malware-tutorial
If this scan has been done, please post the the log into your next reply.
 

  Running TDSSKiller to obtain log
 
Note: Don't cure or delete a threat, but choose skip for all instead.
Please download TDSSKiller from here and save it to your Desktop
Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters

In the Additional options: Check Detect TDLFS file system
Click Start Scan and allow the scan process to run

Choose for all threats to Skip for all of them.
Click Continue
Please post the TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)
===================================================
 
 ESET Online Scanner
==================
Note: If your AV is blocking Eset online scanner, please temporarily disable your AV.
 
I'd like us to scan your machine with ESET OnlineScan This process may may take several hours, that is normal.
Hold down Control and click on this link to open ESET OnlineScan in a new window.
Click the  button.
For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desk... Read more

Read other 14 answers
RELEVANCY SCORE 41.2
Q: Risks

I read a few things online about overclocking, but I still do not know what the risks are. Also, I have a front fan, side fan, rear fan, cpu fan, and a PCI fan. Should these keep it cool enough?
 

RELEVANCY SCORE 41.2

Hi, I need infornation on possible, but not everyday risks involved when hosting a WAN.

The idea is to host a LAN consisting out of 300 people, in 5 places, connected via a WAN

All I need to know for now... is the possible high risks or problems that I might run into when setting up this network.

Now since this is a task only, money will not be a risk or problem.

If anyone has links to valuable information, it would be greatly appreciated.
 

A:WAN risks

hmm; Just to be clear, Five physical sites connected via a WAN to enable a common LAN for shared resources?

IF AND ONLY IF your WAN connections are VPNs to the lan will that be safe at all.
However, each of the remotes will then find it difficult to do anything except access LAN resources, as to allow them to surf while connected to you is also a security issue.

You should also insist that each remote site
have a 3rd party firewall to control BOTH in/out bound traffic
and a good A/V product that runs nighly
The issue is any infection on one could easily infect the LAN and from there ALL of the other WAN users.
 

Read other 8 answers
RELEVANCY SCORE 41.2

I have been using Win7 since the beta first came out with very minor problem and am now using it as my only OS on my machine. I have a 2nd partition in which I have all my documents, programs and so on. I also have a full C copy on an external HD run by Norton Ghost.

Now when the trial ends and MS has not come out with a RC or retail product of 7 and I have to reinstall Vista on the C drive will I have a problem. I can't imagine this happening but with MS one never knows.

Call me paranoid!

I really like Win7!

Hank

A:What are my risks?

Hi nchank,

You shouldn't have any problem reinstalling Vista.

Clean reinstall on to the partition you currently have 7 on , taking care not to format your 2nd (data) partition.

If you allowed 7 to create it's own 200mb system partition, delete that during the installation of Vista.

I am sure you don't need this link - somebody else reading this might

Clean Install with a Full Version of Vista - Vista Forums

Hope it helps

SIW2

Read other 6 answers
RELEVANCY SCORE 41.2

1. Will installing RAM bought from someone (i.e. through Craig's list) potentially harm my PC?
2. If it's messed up/bad memory, then I know the PC won't start, is this all I should be worried about ?
3. I'm aware of the risks with installing any RAM (i.e. potential for static sparks to fry the PC), but are there potential risks with used RAM, specifically?

(Basically, by buying 256/512 MB PC 2300 or PC 2100 used, I'll be saving around $90).

Thank you very much in advance
 

A:Used Ram - Any risks?

I've done this many times for the same reason, and never run into a problem.
RAM chips seem very robust to me, so I think the biggest potential problem is losing some money.
 

Read other 3 answers
RELEVANCY SCORE 40.8

Trying to help someone out with their ransomware situation & I'm concerned with going to the site that tells you the amount wanted. Is there any risks of doing this? I have computer at my home, not on network, but didn't want to run a risk of turning this loose on my home network. I actually went through this process before, but I had a verizon USB modem that I used, so wasn't as concerned. I had thought of just connecting computer directly to my comcast modem, figuring that would keep things isolated.Any advice?Thanks!

A:Any risks with Tor browser?

I'm sure someone will be along to help shortly......but in the mean time.........I would certainly not visit the site if I were you.

Read other 5 answers
RELEVANCY SCORE 40.8

Hello,i have a  HP 15 Notebook PC, SKU K7Q26EA#ABZI noticed an update to HP PC Hardware Diagnostics UEFI, what risks there are to update it?

Read other answers
RELEVANCY SCORE 40.8

I've come across the same problems as TheGodFather. Every time I boot, my XP firewall turns off so I have to switch it back on again and a security risk pops up on SpyBot when I run it. I looked in the regedit and it says:

AntiVirusDisableNotify 0x00000000 (0)
AntiVirusOverride 0x00000000 (1)
FirewallDisableNotify 0x00000000 (0)
FirewallOverride 0x00000000 (0)
UpdatesDisableNotify 0x00000000 (0)

This is different than TheGodFather's as I don't have
FirstRunDisabled 0x00000001 (1). Is that a problem? My 1s and 0s are different as well. What do I need to do? All 3 boxes are ticked in the security centre alerts. I've heard something about a virus called Bagle-AT, but I don't know too much about it. Cheers.

Logfile of HijackThis v1.99.1
Scan saved at 23:57:43, on 29/07/2005
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINNT\System32\smss.exe
C:\WINNT\system32\winlogon.exe
C:\WINNT\system32\services.exe
C:\WINNT\system32\lsass.exe
C:\WINNT\system32\svchost.exe
C:\WINNT\System32\svchost.exe
C:\Program Files\Sygate\SPF\smc.exe
C:\WINNT\system32\spoolsv.exe
C:\WINNT\system32\CTSvcCDA.EXE
C:\WINNT\system32\nvsvc32.exe
C:\WINNT\Explorer.EXE
C:\WINNT\SOUNDMAN.EXE
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\WINNT\system32\RUNDLL32.EXE
C:\Program Files\Silicon Image\SiISATARaid\SATARaid.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Hijackthis\Hijack... Read more

A:Security Risks

Read other 8 answers
RELEVANCY SCORE 40.8

Trying to help someone out with their ransomware situation & I'm concerned with going to the site that tells you the amount wanted. Is there any risks of doing this? I have computer at my home, not on network, but didn't want to run a risk of turning this loose on my home network. I actually went through this process before, but I had a verizon USB modem that I used, so wasn't as concerned. I had thought of just connecting computer directly to my comcast modem, figuring that would keep things isolated.Any advice?Thanks!

A:Any risks with Tor browser?

I'm sure someone will be along to help shortly......but in the mean time.........I would certainly not visit the site if I were you.

Read other 5 answers
RELEVANCY SCORE 40.8

Are there any risks having IE 8 installed on servers (2008 R2) if it is not used for browsing the internet?  Even though it is not used, should we still be looking to upgrade it to the latest version of IE across our server estate?

Thanks

Read other answers
RELEVANCY SCORE 40.8

Hello

I have 2x250GB harddrives with a raid0 configuration, partitioned to 45gb+419gb.
The 45GB install is a windows 7 install that I primarily use. The 419gb one is my storage partition that also houses a XP installation.

If I were to partition the Windows 7 partition to create a third partition (419+30+15) are there any risks that I'll damage any files? The 419gb partition contains vacation pictures and such irrecoverable data. I have it all backed up to an external harddrive but I don't exactly feel like reinstalling and setting up two OS's.

A:Risks with partitioning

There are always risks when manipulating data on your hard drives. Heck you might have a power outage while saving a text file. Who knows when the HDD demon will strike.

That said, if your are certain that your backups are valid, then the risk is unimportant.
The point being that if the partition operation corrupts your drive, you will be able to use your backups to be up and running in no time.

Read other 1 answers
RELEVANCY SCORE 40.8

I just updated and ran Spybot S&D and it detected this

Security Risks:
Settings (Registry change, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify!=dword:0

Security Risks: Settings (Registry change, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify!=dword:0

Is that something bad that I should remove?

Thanks
 

A:Security Risks

Read other 16 answers
RELEVANCY SCORE 40

Hi All,

I am a newbie to VBA but i have been making some progress, however i need some help with the below:

I currently have a code that searches for a range of risk variables in a specifc cell as each row is checked...
If any one of those risks is identified in that cell, it will copy the row and paste it on the working sheet.
this is all well and good but i want this code to search for the most critical and probable risks first ("5 - Certain5 - Critical", copy and paste into the working sheet then, go back to the "Risks" sheet and check for another risk variable of lesser risk i.e "4 - Highly likely4 - Major" and so on.
As each type of risk is found it would need to be copied and pasted below the previous 'Higher Risk' in the working sheet thus giving a list of risks in order of severity.

This is the code i am currently using:

Code:

Do
Sheets("working01").Select
Sheets("working01").Range("A1:AV400").Select
Selection.Delete
Sheets("Risks").Select
Sheets("Risks").Range("A4").Select
Do
ActiveCell.Offset(1, 0).Select
If ActiveCell.Value Like "R***-2687" And ActiveCell.Offset(0, 50).Value = "5 - Certain5 - Critical" Or _
ActiveCell.Offset(0, 50).Value = "4 - Highly likely4 - Major" Or _
ActiveCell.Offset(0, 50).Value = "3 - Likely3 - Mode... Read more

Read other answers
RELEVANCY SCORE 40

Hi,



i know power-shell comes integrated with windows 7 and searched everywhere if there is a way to disable this.

But i haven't found a good answer yet.

My questions are:

1. Is there a way to disable power-shell for windows 7?

2. How can i secure misuse of power-shell on my domain?



regards,

Read other answers