170 posts tagged with Security and resolved.
Displaying 1 through 50 of 170. Subscribe:

Need to build a dummy car alarm with bright-red flashing LED

Someone recently broke into my car at night. I can't afford to install a true car alarm. Instead, I'd like to put a bright red flashing LED on my dashboard. [more inside]
posted by akk2014 on Nov 15, 2016 - 6 answers

Just use fingerprint scanner on a Nexus 6P?

How to *just use* fingerprint scanner to unlock a Nexus 6P? [more inside]
posted by My Dad on Nov 2, 2016 - 7 answers

How early to get to Toronto Pearson for a Sat. AM flight to the US?

Flying back to the US out of Toronto Pearson on a Saturday 7:45 AM flight (AA terminal 3). How early should we get there to deal with customs, security, checking bags ... (we are US citizens).
posted by gudrun on Oct 27, 2016 - 8 answers

Stay sexy, don't get murdered

After listening to too many true crime podcasts, I need suggestions on updating my apartment security. [more inside]
posted by pumpkinlatte on Oct 7, 2016 - 11 answers

Are identify theft monitoring services worth it?

More than one such service exists. Do they work? Are they worth it? Should I sign up? [more inside]
posted by StrawberryPie on Aug 22, 2016 - 8 answers

Can the office network dept intercept cellular signal?

At the office, they put in a Wilson Panel Antenna (looks like this one) for a stronger cell phone signal indoors (for Verizon, Sprint, and T-Mobile I think they said). My question is, can they (the network people at the office) intercept the signal such that they could see employee phone calls, texting, and web traffic?)
posted by allelopath on Aug 10, 2016 - 8 answers

Which flavor of awful should I buy: Norton Vs. McAfee edition

I am holding my CEO's credit card in my hand and cannot leave work without purchasing either Norton or McAfee today (thanks to our sales guy who keeps getting malware on his computer). Running a Lenovo Yoga 3 Pro-1370 with Windows 10 and Windows Defender, however, they are not convinced this is sufficient and are forcing me to buy/install one or the other today. Help? [more inside]
posted by Unicorn on the cob on Jun 24, 2016 - 20 answers

Malvertising, drive by downloads

How safe is it really, to surf the web these days on a modern Windows PC? [more inside]
posted by inner_frustration on Jun 4, 2016 - 11 answers

My castle in the clouds... New Rules for data architecture.

I need a cloud storage service and I know just enough to be overwhelmed. Halp? [more inside]
posted by fritillary on Jun 3, 2016 - 2 answers

Why are sites switching to two page login processes

Tumblr and Google are now using two page login processes where you first enter your username or email and then are sent to a second page to enter your password. What's the reason/logic behind this switch from the standard two item form?
posted by srboisvert on May 29, 2016 - 9 answers

Responding to persistent personal informaion requests.

To the law people out there: I work for a small company that recently signed up with a new health insurance company. For various reasons I declined the coverage, but I am getting bombarded by requests for personal information. Here's the actual latest message that I received after I informed them that I do not wish to participate: Hi C13, For any employees at Small Company to get health insurance, you need to complete your application. All employees must complete an application, regardless of whether accepting or waiving coverage. [more inside]
posted by c13 on May 5, 2016 - 11 answers

Looking for "horror stories" of computer virus infections

I need to put the fear of God into some foolish, negligent users. I'm looking for examples of organizations that were hit with some kind of horrible malware (like CryptoLocker) or had sensitive data stolen -- all because of a really stupid action by an employee. [more inside]
posted by alex1965 on May 2, 2016 - 21 answers

Durable, metal-free belt?

For at least the immediate future I'll need pass through security in a federal courthouse without the benefit of employee ID, which means going through a metal detector. I need a durable, metal-free belt (leather or otherwise) that fits standard 35mm belt loops and looks reasonably presentable in a casual-end-of-business-casual environment. Thanks!
posted by Oktober on Apr 6, 2016 - 7 answers

Disconnect random Facebook Ads account from my profile?

A stranger's Facebook Ads account was somehow connected to my personal Facebook profile. How do I disconnect it? [more inside]
posted by kwaller on Feb 16, 2016 - 4 answers

Unfamiliar email in form autocomplete- how freaked out should I be?

I'm worried I've done something deeply stupid and potentially made my PC vulnerable. Full details below the fold. [more inside]
posted by Merzbau on Jan 5, 2016 - 3 answers

What can a thief do with my reasonably locked down Mac

My MacBook Pro was stolen last night. The disk was encrypted with FileVault and the login passwords were non trivial (good enough for petty thieves though probably not hackers skilled in the art). I told iCloud to lock it down and erase it on first contact. Will the thief and his friends be able to do anything with this machine, or is it just a paperweight at this point? [more inside]
posted by alms on Jan 1, 2016 - 15 answers

Clothing Security tag left on skirt, issue at airport?

First world problem: Went to go pack for Holiday flight today. Opened an order I placed from Macy's.com and somebody left the hard tag sensor on it... sigh. I don't have time to take skirt and receipt into the store before flight. Can I pack this in my bag I'm checking so I can bring it into Macy's when I get there? Or do you think it will set off some kind of security thing when they scan it? I'm overthinking, as usual! Pic attached [more inside]
posted by twoforty5am on Dec 20, 2015 - 10 answers

People keep getting into my apartment building?

We've had at least two instances of people who are not supposed to be in the apartment building being in the building since we moved in July. One in late October; one yesterday/today. I don't know what, if anything, I need to be doing right now, both from a perspective of "I like my apartment building being secure" and a mental health perspective. So many words inside because what do I do, oh god. [more inside]
posted by you could feel the sky on Dec 3, 2015 - 16 answers

Safety deposit box or fire safe? And which one?

Like many people, I've accumulated a stash of documents that are important to me and my family in some way (deeds, birth certificates, marriage certificate, passports) and some are difficult/impossible to replace (immigration paperwork, ancestral information). Right now they all sit in a plastic Tupperware box on the bottom shelf of an IKEA bookshelf. I was thinking that maybe they should be a little better secured. Is a safety deposit box the right answer or a safe? I'm having a hard time choosing. [more inside]
posted by fireoyster on Nov 23, 2015 - 19 answers

How many people do you have to trust to use a piece of software?

I downloaded gmailnotifier from gmailnotifier.com and setting it up, it requested my password. Obviously it needs this information but how can I be sure that it won't abuse it? How do you know what software to trust? [more inside]
posted by Obscure Reference on Sep 11, 2015 - 10 answers

What's the safest way to get this data to the outside?

I have a database table with sensitive (read as personal, non-financial) information inside our office locked-down network that I need to expose to users on a website. What's the best way for me to expose this data without exposing us to unnecessary risk? [more inside]
posted by chillin411 on Aug 7, 2015 - 6 answers

Where to stay near Minneapolis airport (MSP) before very-early flight?

Next Thursday I have a 515a flight (on American née US Air, so Terminal 1 is my point of departure) out of MSP. Assuming I'll go through security at around 400-415, it seems silly to stay at a hotel the night before. The airport is open 24 hours. What I'm curious about is if I can I go through security around midnight and try to catch a few ZZZs in the terminal? If not, can I sleep safely outside of security, or will local law enforcement tell me to move along? [more inside]
posted by anaphoric on Jul 2, 2015 - 7 answers

Moving into a house; how to not creep myself out whenever I'm alone?

Are you a big scaredy cat? Do you live in a house with lots of vulnerabilities anyways, and manage to sleep at night? How did you do it? Please hope me. [more inside]
posted by stellaluna on Jul 1, 2015 - 35 answers

Adware/malware in Safari?

I was informed by the CIO that an email that I sent out of OWA from Safari, OSX Mavericks had dodgy source code attached. See a text file of source code. [more inside]
posted by jadepearl on Mar 17, 2015 - 6 answers

How to VPN while traveling

I'm going to be traveling a fair amount over the holidays which means I'll likely be on public WiFi a lot more than usual, and with all of the various security and privacy issues that have popped up in the news recently, I figure the time is ripe to figure out a VPN strategy (since not everything I do is over SSL/HTTPS). [more inside]
posted by Aleyn on Nov 24, 2014 - 11 answers

So what do I use now if I don't use Truecrypt?

I used to use Truecrypt to encrypt little enclosures so I wouldn't have to worry about my files so much when I, say, put them on a USB stick or backed them up to the cloud. There was a whole... thing with Truecrypt and now it's hard to say if I should use it anymore. Is there another program that's going to work well for this purpose? [more inside]
posted by selfnoise on Sep 21, 2014 - 7 answers

Seniors, Social Security, and Sallie Mae

Thinking ahead to my eventual retirement, I phoned Sallie Mae earlier this year, and spoke with a rep who was easy to chat with, and seemed well-informed and helpful. I asked her if there was any sort of discount or other concession made for student loan payments once the debtor retired and began drawing Social Security. Her answer was that, good news, once I provide Sallie Mae with documentary evidence that I am drawing Social Security, the balance of my loans would be waived. [more inside]
posted by mmiddle on Sep 11, 2014 - 7 answers

Web content filtering at work + paranoia!

Trying to understand what IT is doing with my workstation right now. Near-constant prompts to log in to Outlook (I am already logged in) and suddenly, for the first time, most websites (but oddly, not social media) are being blocked with EdgeWave iPrism. What's going on, and should I worry? Details inside. [more inside]
posted by magdalemon on Sep 5, 2014 - 14 answers

Clean personal info off work computer while leaving apps behind?

I got a new job (cool!) but have to turn in my MacBook Air from old job (oh well). Since I also used as my primary laptop for personal stuff, like banking and Facebook, it also has a ton of personal data on it. (I plan to buy my own laptop for next job. And no, I did not look at naughty stuff on it -- I do have a tablet.) The company wants the programs already installed left on the computer, which is reasonable -- so leave Photoshop and Word installed -- but I want to clear off any personal data. Is there a good way to scrub an Apple computer while leaving programs behind? Right now you could go to Twitter on my browser and log into my personal account without a problem. (I realize I can just Clear History on browsers, but also looking for deeper scrub, such as WiFi passwords and stuff on keychains).
posted by Peemster on Aug 29, 2014 - 12 answers

geolocating question for techies out there

One of many painful aspects to the James Foley tragedy is that the US attempted rescue, but was in error as to the location of the hostages. I wonder - is there not some geolocating device, maybe even a microchip, that could be required for journalists and tourists/hikers entering a war zone? I can understand that it would be an intolerable risk for soldiers and spies, but Foley was leaving an Internet café when he was abducted - not trying to live a hidden life.
posted by mmiddle on Aug 22, 2014 - 11 answers

Why does McAfee have a problem with my website?

So I recently completed a project, and was sharing the news with people on Facebook - but Facebook blocked the link to my website because it was apparently on some spammy/malware blacklist. I did some investigation, and my site comes up clean on every security scan thing I tried, except McAfee SiteAdvisor. It seems likely that it's a false positive, possibly due to my shared hosting. If there's a legitimate security issue, though, I'd like to find out what it is so I can fix it - but I don't know how I can do that. [more inside]
posted by NMcCoy on Jul 24, 2014 - 5 answers

What's happening with Truecrypt?

Recently I noticed a lot of controversy about whether Truecrypt is secure or not. It looks like their webpage is raising concerns about it, even to the point of suggesting that people migrate their data away from it. Arstechnica and others are following the story. What's going on? Might this be a hoax? Are truecrypt encrypted flashdrives not safe? If not, what level of security do they provide, if any? What would be a good alternative if we are to migrate away as quickly as possible?
posted by jasper411 on Jun 10, 2014 - 8 answers

My apartment is being renovated, how does that impact moving out?

My apartment building was sold in the past 6 months. The new owners have been completely gutting and renovating units as people have moved out; the work is going on for months. I'm planning to move out at the end of the month and wondering how much I need to worry about cleaning or repairing any minor damage if they're just going to do the same thing to my unit. Additionally, if they do charge me for any damages do I have any recourse to argue that they shouldn't have because they weren't preserving whatever it was any way? Obviously not expecting any binding legal advice on this, more curious if anyone has had similar experiences or any pointers to share.
posted by chriswarren on May 16, 2014 - 11 answers

Printed bank statement may have fallen into wrong hands. What to do?

My mother still gets her bank statements by paper mail. Her latest one failed to be delivered for 2 weeks now, and she verified the bank mailed it, so we assume it was delivered by the mail carrier to the wrong address, or dropped, or something. Nothing has happened yet, but it seems best to guard against the worst-case scenario, namely that someone else now has her home address, bank address, all account numbers (including retirement accounts), possibly other identifying information, and has the willingness to exploit it. What are the prudent steps we should take? [more inside]
posted by StrawberryPie on Feb 25, 2014 - 9 answers

Why virtualbox can overcome win8 UEFI issue to install Linux?

I tried to install linux on a win8 laptop and failed although I tried everything to disable UEFI and security boot options in Bios. So I think there is no solution to install Linux on certain win8 Laptops. But someone told me of course I can install Linux on any win8 laptops by using virtualbox. So I'm wondering why can it be done? How exactly is virtualbox/virtual machine works for this issue? can anybody explain this to me in a easy to understand way? Thanks very much.
posted by pack2themoon on Feb 19, 2014 - 9 answers

Use 'terms' on hardware?

Are terms and conditions, disclosed after sale, legitimate? What if the associated item is a gift? [more inside]
posted by Goofyy on Dec 30, 2013 - 24 answers

Help me keep my game from being gamed

I'm developing a website where people try to be click number X (sort of like radio call-in contests) to win a prize, and am looking for advice on ways to make it harder for someone to cheat. [more inside]
posted by signal on Dec 14, 2013 - 13 answers

Small, hideable, motion activated HD camera with built in DVR?

Car was broken into last night, and again I wondered why I can't seem to find a small HD camera and DVR combo that can be hidden in my car. [more inside]
posted by hanoixan on Dec 1, 2013 - 4 answers

Buzz off - or not?

I am a first time city apartment dweller, and don't have a clue on how/when to use my door buzzer. What is okay, what isn't, and yes, I am over thinking this, but it is bugging the hell out of me because I am already overstressed. [more inside]
posted by batikrose on Nov 8, 2013 - 35 answers

Question about Bluetooth security and speakers.

I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology? Many thanks for your time.
posted by jason's_planet on Oct 24, 2013 - 2 answers

Microsoft Security Essentials

Microsoft Security Essentials Missing From System Tray. [more inside]
posted by dbirchum on Sep 2, 2013 - 35 answers

Boob pockets and panty stuffing

We're going to Vegas in 3 weeks and I want to be able to spend my days walking around without having a purse always looped over my shoulder. My clothes don't have pockets. Fanny packs are the work of Satan. Is it a terrible idea to keep my often accessed stuff (cash, credit cards) in my bra and more important stuff (like health insurance card, driver's licence, etc) hidden in my panties? What should I do with my phone (that is also my camera)? [more inside]
posted by PuppetMcSockerson on Aug 23, 2013 - 53 answers

Ransomware and a compromised email password

My Dad received a spam email purporting to be from his email provider (BT Yahoo, fwiw) asking him to verify his account. In a moment of utter stupidity, I fell for the scam and entered his email password into a bogus website (I know, I know: STUPID). I was using his iPad at the time, and a ransomware website opened in safari, however the browser didn't lock, and I was able to close it straight away. I immediately logged into his email account and successfully changed his password to something completely different. Google tells me that there is currently no ransomware which can successfully hijack Apple devices, which my experience seems to bear out. I am a bit worried about the risk that I've accidentally compromised his email, though. Is there anything else I should do beyond what I've already done, ie changing the password? Should I contact BT Yahoo about it?
posted by meronym on Jul 21, 2013 - 5 answers

Searching for a server rack/cabinet…

At my place of employment, I have been charged with physically securing our two servers. The decision has been made to bolt them to the concrete floor in a cage. I don't know how to shop for a server rack. We have an old one that they're on now, but it's an open rack, without sides or locks. I need one that's more of a cage, to keep people without the key out. It'll have to fit at least 8U worth of servers, and also accommodate a midsized tower somehow, and be 1000mm deep minimum. How do I shop for this? I can't find any information on whether any of the racks I'm looking at are bolt downable.
posted by TrueVox on Jul 19, 2013 - 13 answers

How accurate is the white house siege in the film "Olympus Has Fallen"?

I read online that the director did a lot of research and consulted with military experts on how an actual terrorist siege on the white house could work. Of course, he also said that white house security experts have already planned for such an attack. I'm curious what would have been done differently in real life by the white house and DC security?
posted by Wanderer7 on Jun 28, 2013 - 10 answers

How are locked-down file perms in Linux similiar/different to Win EFS?

I am looking into alternatives to Windows EFS to protect sensitive data on a Linux web server. I know practically nothing about EFS, but I get the impression that the files are effectively plain-text if you are logged into the Windows machine as the user who owns the files, so the same level of "encryption" exists in a Linux environment if the files have only read/write perms for file owner and no perms for anybody else. My colleague says "No, it is not the same level of security" but doesn't provide any further info regarding how/why it's different. What am I missing here? [more inside]
posted by 0 on Apr 1, 2013 - 11 answers

Multilingual security help!

Please help me translate the phrase, "Something that you bought at another store has not been cleared. I can fix that for you. Thank you." [more inside]
posted by wintersonata9 on Mar 17, 2013 - 8 answers

Why is google being spooky and filling in other people's gmails?

This has happened twice now, and it is freaky. Google chrome on the iMac I use in my office at work (at a university) will have usernames and passwords for people who have never been in my office ever. The first time it happened it was my father's email, and the second time it was my stepmother's. Why would chrome be filling in these odd emails when it doesn't even save my own login information after closing the browser window? [more inside]
posted by artychoke on Mar 7, 2013 - 8 answers

How do I stop people walking on a path behind my house?

Strangers from adjoining neighborhoods have created a path on private land behind my house. What are some ways I can stop them? [more inside]
posted by Arbitrage1 on Mar 3, 2013 - 48 answers

How can we trust open source software?

Open source software is considered trustworthy because anyone can validate the source code and hold the developer accountable. Usually developers will also make compiled binaries available for convenience. How can we know that these binaries are compiled from the same source code the developer published, and not a malicious variant of it? [more inside]
posted by The Winsome Parker Lewis on Feb 26, 2013 - 17 answers

Page: 1 2 3 4