I have a desktop that is located in a semi-public place. I have a bios password and a windows password on it. Sometimes I leave it logged out of windows so that I can leave in the middle of a project without restarting everything again. I was wondering how hard it would be to get my data? Short of stealing the actual hardware, is there a way to get past a bios password and access my data without me knowing? (From what I understand, resetting the cmos would clear the password so I would know if someone got in.) Also, is it possible to get in if I leave it logged out of windows with a password? How safe is my data?
How do I password protect a specific app in OS X? [more inside]
Should we attempt to hire out for a mailserver or let the seemingly incompetent corporate IT department run our mail, with all the restrictions they want to impose? [more inside]
Okay, so I often use free wireless connections...whether they be in coffee shops or occasionally my neighbor's open network. My question is, how much of what I post online/what sites I visit can be seen? Sometimes I post things I don't want to share with my neighbors, also I check email. If other open wireless network users CAN see what I'm looking at, how do I prevent it? The network I use is belkin 54g. This shouldn't be a problem soon, as I am getting my own connection. When I had my own, I left it open so others could share. I assume my neighbor is doing the same thing? But for now, I would like to know that my neighbors can't see the pix I send my long-distance boyfriend and/or what I post on our shared journal. Is this unrealistic? Thank you for your help.
What are the legal implications of a university monitoring, storing, and cataloging all incoming and outgoing email into a searchable database? What if I have first hand knowledge of a university doing this? [more inside]
On my XP system, the recently installed Norton anti-worm app told me that my Netgear RP614v2 NAT-enabled router attempted to udp connect to my port number 2061 from its port 12024. However, there is no port fowarding or triggering enabled, nor is there a DMZ address configured at all. [more inside]
I am a Mac Geek and will be setting up a Windows XP Pro computer for my computer novice mother, but I am concerned about XP security. [more inside]
Flying Robot Planes? The analysts seem to think there is no good way to stop these things. Why isn't the government interested in using the wisdom of crowds to prevent terrorist attacks? [more inside]
What is the probability that google will loose my data (mails and calendars) ?
Car theft: I'm looking into buying a convertible, and would like a feel for when you would leave the vehicle with the top down. [more inside]
What are the slightly creepy metal clips on the door of this (empty?) apartment? [more inside]
Who should I call for an office burglar alarm system in Manhattan? [more inside]
Best choice for securing a monitor in a kiosk setting... [more inside]
I have a linksys wireless-G 2.4 ghz router. I use a macbook pro. The set up cd for the router works only on Windows. The router works and i get wireless, but i was unable to set up a security feature. I am guessing anyone in my neighbourhood can use my signal. How can i make this secure if the set up cd with instructions is incompatible with my OS ?
I want my browser to remember my password for a couple of sites, but it must assume that I don't want most of my passwords remembered. I hate browser popups that ask "Remember this password?" What's a good solution? I use Firefox on Windows.
I want to put together the ultimate Computer security kit to fix my uncle's ailing computer. Suggestions? [more inside]
How would you grow an effective barrier of annoying vegetation? [more inside]
I have a client who has a Windows 2000 server and a LAN consisting of a whopping 3 other computers. He would like a program that lets him know when employees have logged onto the network...preferably by email notification. He doesn't care for anything as machine-centric or intrusive as Spectorsoft, but would like a small utility that does it's small job well for a small cost. All suggestions are appreciated.
Is the script that powers my contact form spam-safe? [more inside]
I’m working on a PHP/MySQL app and would like to ensure my security is up to scratch – need tips on authentication, globals and input sanitization. [more inside]
In a few months I'm going to have an MA in Science & Security. So where do I look for a job? [more inside]
What do I need to do, practically speaking, after a computer theft? (Several related questions inside.) [more inside]
I need to purchase a new doorbell and/or intercom system and have some questions... [more inside]
I just found out I have Smitfraud-C on my computer. I'm not sure how long it's been there. According to one website it's a keylogger among other things. I just removed it but should I cancel all my credit cards?
Where can I find lockable food &/or drink containers? [more inside]
[Paranoid credit card filter] How safe is my personal information? Can this credit card company come after me? [more inside]
PasswordFilter: Any places to store passwords online? [more inside]
Web site hacking attempts courtesy of "rory". [more inside]
I just got a collections notice from my old apartment complex. What do I do to make it go away? [more inside]
Is there an "industry standard" for password expiration periods? [more inside]
Is it possible for a computer to catch spyware/malware/virus/trojan just by viewing or scrolling a compromised webpage even if no clicking no pressing yes on any popup is involved?
I know that cookies may be automatically and surreptitiously installed on my computer when I arrive at a webpage, but what about spyware/malware/virus ? [more inside]
This happened to me last week at O'Hare - and now, today, in LAX. I opened my laptop in the terminal and checked for wireless networks. I noticed that there was a "computer-to-computer" network called "Free Public Wifi" available. I didn't try to connect, because I know that such networks generally can't provide internet access if there's no other connection available. Does this mean there are folks trying to socially engineer gullible wireless users? What could they gain? Would Windows be more vulnerable than Macs? AND how would a curious samaritan figure out who, amongst the dozen or more folks with open laptops in the vicinity, the culprit is?
I need help with a security system. [more inside]
Is Zone Alarm the last free firewall software? [more inside]
How can I track the source of a file? [more inside]
I went through airport security today, and had to go through a large apparatus that blew bursts of air at me from about 30 little air jets. What was that? What does it do? What were they looking for? [more inside]
Sex toys + airport security/immigration control/customs? [more inside]
What do you or your company do regarding physical destruction of hard drives? [more inside]
Can anyone recommend a good lock (Kensington-style) for my Apple iMac and new LCD TV? [more inside]
So, a friend of mine who is helping out with tech support at a small business is trying to find a way to recover the password to a computer's EZ Firewall software. Suggestions? [more inside]
Adobe PDFMaker and its attendant Word toolbars only work on an Administrator Account. Is there a way to make it work on a Limited User account? I'm on Windows XP. [more inside]
Is there a way to connect to gmail using pop from behind a firewall that blocks the ports they specify? Ideally over 80? I don't have broadband at home so setting up a tunnel or variation to a pc on the outside isn't an option. Thunderbird on WinXP connected behind a typical corporate firewall.
I'm interested in enacting parental controls on the Mozilla Firefox browser. [more inside]
Is there a reasonably priced Windows backup solution that does SCP, not FTP? [more inside]
How do I make a flash drive more secure? [more inside]
I just got a new laptop...help me care for it so it has a long and happy life. [more inside]
Will I be able to get thru airport security with an internal frame daypack? [more inside]
If you ran a Debian server and one day noticed that telnet and apt-get were segfaulting, how would you proceed? [more inside]
Can you use mail() in PHP without creating an unsecure, open mail relay boon to spammers everywhere? I keep trying to read This Page, and I think I understand it, but I'm not sure. [more inside]
Is it possible to fake someone's caller ID to place a crank call? [more inside]