Help me better secure my server (and workstations). I sit behind a Firebox X700, with an Exchange server, active directory, etc. Today the external address became blacklisted on the CBL. A machines are on SP2 and everything is up to date patch wise. I'm currently running malware detection on all machines. I'd like an effective antivirus program... [more inside]
posted by geoff.
on Nov 8, 2005 -
Does this device exist, and if not, how can I modify cheap consumer digicams to create it:
A cheap portable digicam that will endlessly record video to some kind of small memory buffer, say enough memory for 1 minute of video, such that I could leave it running for days on the off-chance of it recording something interesting, and when something interesting happened, I just press a "Stop Recording" button, and the last 60 seconds of video are sitting in memory. [more inside]
posted by -harlequin-
on Oct 29, 2005 -
Anonymous web hosting: I left a cult which I was raised in about a year ago. I would like to set up a page with information as well as a forum for ex-members to locate each other and heal. I would like to do this anonymously because I have family, friends and coworkers who are still inside and I would like to keep my identity private. [more inside]
posted by anonymous
on Oct 26, 2005 -
I'm writing some personal wiki software that I want to make as secure as possible. Think wiki software in the footsteps of Tinfoil Hat Linux
. The software is intended to run as a CGI Perl script though Apache on the local machine, with data stored in encrypted XML files that will be decrypted for display by the Crypt::GPG
module. So the question is, where could plaintext data escape to? More inside... [more inside]
posted by phrontist
on Oct 17, 2005 -
Need nerd help: Is it better to use a software firewall or a router to protect oneself while connected to the internet? Pardon my igorance, but I really am quite stupid. [more inside]
posted by _sirmissalot_
on Oct 12, 2005 -
I am flying to another city soon and would like take my guitar with me. On the plane--not as baggage. I would like to read about the experiences of anyone here who has tried to do the same. My research thus far yields no fixed answer.
posted by y2karl
on Oct 9, 2005 -
UK residents, is it illegal to hide your face from the ubiquitous security cameras? [more inside]
posted by jsonic
on Oct 8, 2005 -
What's the absolute simplest way for two or more people to share encrypted information via email, either in the text body or as a file attachment? [more inside]
posted by taz
on Oct 3, 2005 -
Why do I set off certain security alarms at the entrances and exits of some department stores? [more inside]
posted by hamster
on Oct 2, 2005 -
Wifilter: Wired + Wireless network architecture: How can I protect my wired machines, but still access them from my wireless devices? [more inside]
posted by daver
on Sep 22, 2005 -
I'm looking for a wardriving map of downtown Toronto that was posted online a year or two ago. It had wireless networks marked in three colours: encrypted, unencrypted, and out-of-the-box. I had a copy on my hard drive, but I think I've lost it. Does anyone know where I can find it?
posted by Jairus
on Sep 21, 2005 -
I'd like to get a handle on computer security. Where should I start? I'd like to stress that I am NOT talking about spyware and viruses here, but the more interesting things like authentication and authorization. [more inside]
posted by ChrisR
on Sep 11, 2005 -
My computer illiterate family has an HP box running Windows XP Home SP 2.
They are constantly installing random programs from suspicious websites and allowing nefarious Active X controls to run – often leaving a trail of destruction for me to deal with.
Is there an easy way to restrict their ability to install software?
(Also - was I dreaming or did Microsoft just release some kind of policy editing tool that deals with this kind of problem?)
posted by mockjovial
on Aug 26, 2005 -
I moved into my new apartment complex two weeks ago and already there's been one car break-in and one apartment burglary. What can I do to secure my apartment and my personal safety? [more inside]
posted by lychee
on Aug 23, 2005 -
Our car was broken into today for the fourth time in about two years and the stereo was stolen for the third time. The car is getting pretty worn out overall, so we're probably going to sell it and get a newer one once we get the window replaced. What should we consider when shopping for a newer car and associated car audio, to avoid being a target?
posted by xulu
on Jul 31, 2005 -
Home Security: The doors currently on my house would be laughably easy to break through. I'm planning to replace them with solid wood doors with metal strips reinforcing the jamb, and serious deadbolts (with long screws securing them.) Is there anything I'm missing (so far as securing doors go)? [more inside]
posted by Zed_Lopez
on Jul 25, 2005 -
Hotel keys and their locks. So I've been staying in a lot of hotels lately and everyone uses these swipe cards now. [more inside]
posted by edgeways
on Jul 13, 2005 -
Let's say I wanted to create a simple web app to store my various usernames and passwords. The app and database would be hosted externally (by Dreamhost). I would use a secure connection for any HTTP stuff going back and forth, and I would encrypt all of the passwords before going into the db, and I can only extract and decrypt a password after entering a pass phrase that exists only in my brain. What would it take for someone else to get at my passwords? [more inside]
posted by patgas
on Jul 12, 2005 -
seems to have figured out a way around the Firefox popup blocker.
posted by Manjusri
on Jun 20, 2005 -
Army Knowledge Online is a webmail/pop email service that any current or former US Army member can use in order to have a .mil address. I've been using it for a while, but for going on three years now I can't get Mail.app (and the keychain) to accept its security certificate. The normal way of importing a self-signed certificate doesn't work under Jaguar, Panther, or Tiger- I can import the cert, but nothing happens. I've tried setting up a new "root" certificate. Nothing works. Apple discussion boards have been useless. Can someone look at this certificate (try going here
and it will send you the cert) and maybe tell me what's going on? I think it's in some odd format that prevents it from being imported.
posted by yesno
on May 27, 2005 -
I recently purchased my first home. It's in a neighborhood that used to be a little sketchy (Seattle's Rainier Beach
), but is now relatively safe. Here's the thing: some of my neighbors still have bars on their windows. Others have security systems. Should I? Do they really help? Or is it just dwindling hysteria?
posted by arielmeadow
on May 24, 2005 -
Being a non-US citizen that has family living in the continental US I have noticed that border traversal has been getting exceedingly difficult and more intrusive. However, the US-VISIT
program seems to take it a little far (IMO). [more inside]
posted by purephase
on May 16, 2005 -
So I bought a shirt today, and they forgot to remove the security tag. Had I known that it wasn't going to beep, I'd never have thrown down the Visa. Why buy what you can steal? Anyway, short of returning to the store, how can I remove the tag at home. I have all the basic tools a homeowner needs. It is not the kind of tag that sprays inks should the procedure go bad. Anyone larcenous members, or those that have retail experience care to detail a procedure.
posted by Keith Talent
on May 14, 2005 -
The back of my house faces an alley. There is no fence or gate.
Someone loves to take my hanging flower baskets or even vegetables from my garden boxes.
I would like to get a weather-proof wireless camera to start snapping away when someone enters the field of view.
What brands or technologies should I look at?
-I'd also like to beam the images to my home PC which would be about 50-75 feet away from where I want to put the camera.
posted by phredhead
on May 11, 2005 -
Someone has been repeatedly trying to hack into my website. I'm on a windows box, running ASP and an Access Database. [more inside]
posted by quibx
on May 9, 2005 -
So I've gone to www.thawte.com/email and got myself a Freemail certificate and imported it into Thunderbird, and my friend is about to do the same thing, and we want to exchange encrypted mails. What do we actually DO with our shiny new certificates? [more inside]
posted by flabdablet
on May 1, 2005 -
Starting two weeks ago, e-checkin machines at airports have stopped letting me check in for a flight. I can no longer print boarding passes from the web, either. I now have to wait to talk to a ticket agent, who then has to make a lengthy phone call before I can check in, because I am on "the list". What is this list? How can I get off it? What is that phone call about?
posted by rajbot
on Apr 26, 2005 -
I recently flew domestically in the US and had luggage damaged by a TSA inspection, anybody have a similar experience? [more inside]
posted by crazy finger
on Apr 14, 2005 -
What's the risk in exposing your bank account and routing number? Let's say you wrote VOID across a check and dropped it in the street. Could anyone use the information on a check to withdraw cash from your account, issue charges to your account, get themselves a new phone line on your dime?
posted by scarabic
on Apr 8, 2005 -
I dissected my old VISA card. Underneath the hologram is a 4x4 matrix of rectangles. There are numbers or letters in each row, thus: blank, blank, '1', blank; blank, 'A', blank, blank;'C', blank, blank, blank; blank, blank, blank, '4'. Why are they there, and what do they mean?
posted by i_am_joe's_spleen
on Apr 6, 2005 -
Is there an application (for OS X) that shows me who's trying to connect to my mac? Kinda like Little Snitch
, but for incoming connections? Netstat just gives me a huge list of everything happening on all ports, which is kinda useless to me.
posted by slater
on Apr 5, 2005 -
I'm flying to New York in the summer and have heard from recent visitors that they have had any padlocks or other security devices attached to their luggage removed/broken and replaced when going through security checks. How common is this and should I bother to lock up my luggage when I travel to/from the U.S.?
posted by floanna
on Apr 4, 2005 -
I have problems sharing new folders on my home LAN. I have an XP pro box, my wife has a WinME laptop. [more inside]
posted by signal
on Mar 30, 2005 -
stop reading my email filter; I type an email, I send said email to person X, I immediately delete said email from sent folder, and I delete said email from the deleted folder. I can no longer see said email. Now the fun begins! Fast forward 24 hours. Person Y tells me that he is looking at my screen and said email and can quote from email. [more inside]
posted by busboy789
on Mar 24, 2005 -
I am ready to Fight The Man and refuse to remove my shoes at airport security *unless and until* they set off the metal detector. Help my defense. [more inside]
posted by tristeza
on Mar 19, 2005 -
I am looking for the definative method for determining if my machine has been hacked. I don't trust antivirus software and was thinking of looking into packet sniffers but wasn't sure if that was the place to start.
posted by Wong Fei-hung
on Mar 3, 2005 -
Is it possible to rig up my iSight camera (Mac OS X) to essentially act as a security camera? I'd like to record the footage it sees for "x" hours before overwriting, and ideally have it motion-activated so it only records when it detects movement.
posted by robbie01
on Mar 1, 2005 -
How accessible should the archives of one's blog be? In terms of privacy and security, are there certain things that should not be able to be Googled? [more inside]
posted by themadjuggler
on Feb 28, 2005 -
Is there some way within Windows XP or using 3rd party software that I can password protect individual folders on my pcs so that you cant see or get access to what is in them with out entering a password? Just to be super clear, I want to do this one folder at a time not as a general login.
posted by nightocean
on Feb 25, 2005 -