Join 3,421 readers in helping fund MetaFilter (Hide)

925 posts tagged with Security. (View popular tags)
Displaying 51 through 100 of 925. Subscribe:

Related tags:
+ (138)
+ (61)
+ (50)
+ (49)
+ (47)
+ (42)
+ (40)
+ (39)
+ (36)
+ (35)
+ (34)
+ (34)
+ (30)
+ (30)
+ (29)
+ (29)
+ (28)
+ (28)
+ (26)
+ (24)
+ (22)
+ (22)
+ (20)
+ (20)
+ (19)
+ (18)
+ (18)
+ (18)
+ (17)
+ (16)
+ (16)
+ (15)
+ (15)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (10)
+ (10)
+ (10)
+ (10)
+ (10)


Users that often use this tag:
Anonymous (75)
meta.mark (4)
Jairus (3)
signal (3)
Raichle (3)
tcv (3)
Thorzdad (3)
curiousleo (3)
wordsmith (2)
dougiedd (2)
QuantumMeruit (2)
serial_consign (2)
Metroid Baby (2)
-harlequin- (2)
boombot (2)
amtho (2)
jeffburdges (2)
bartleby (2)
mendel (2)
flabdablet (2)
symbioid (2)
zardoz (2)
Admiral Haddock (2)
electroboy (2)
purephase (2)
GleepGlop (2)
aburd (2)
striker (2)
ChrisR (2)
odinsdream (2)
beniamino (2)
bytewrite (2)
chichimimizu (2)
goshling (2)
radsqd (2)
valleys (2)
Crotalus (2)
randomthoughts (2)
Alterscape (2)
woot (2)
titans13 (2)
Grinder (2)
storybored (2)
UMDirector (2)
Mave_80 (2)
caution live frogs (2)
loquacious (2)
ascullion (2)
chill (2)
Grod (2)
alms (2)
jadepearl (2)
emptybowl (2)
40 Watt (2)
monju_bosatsu (2)
rorycberger (2)
tiamat (2)
daver (2)
mecran01 (2)
grumblebee (2)

Humor Among Thieves

Our house got broken into, but the thieve(s) stole slightly strange objects. Why? [more inside]
posted by alex_skazat on Nov 1, 2013 - 22 answers

Device to tell whether someone's entered my apartment?

I live in a rent-controlled apartment in San Francisco, and have been enduring some landlord harassment of various types. (I'm paying a fortune, but rents are so high right now that even what I pay is well below market.) For my peace of mind, I'd like to install some sort of reasonably priced device to ensure that no one's entering my apartment when I'm not there. A huge bonus would be collecting evidence if it does happen. [more inside]
posted by roxie110 on Oct 25, 2013 - 17 answers

Question about Bluetooth security and speakers.

I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology? Many thanks for your time.
posted by jason's_planet on Oct 24, 2013 - 2 answers

Burgled!

I was burgled again this week. Sigh. I need help asking my landlord for specific safety interventions. [more inside]
posted by latkes on Oct 20, 2013 - 17 answers

Hacked Twitter Account

My old, dormant Twitter account recently started sending out direct messages to everyone on my list with spammy stuff. This happened within the last hour, and I just deactivated the account. The password for the Twitter account is different than the password for the email account that I set it up with. The password on the Twitter account hadn't been changed, and no tweets were sent from it (only DMs). Is this likely a third party app jacking the Twitter account (and therefore isolated) or should I be concerned about the establishing email account as well? I ask because this is my primary gmail account.
posted by codacorolla on Oct 15, 2013 - 5 answers

IT Security Assessments: How much do they cost?

I've been tasked with figuring out what firms charge to perform IT Security tests, penetration tests, etc, for commercial clients? What kind of metrics do they base their charges on? Is there a standard rate for this kind of work? Alternately, do you have any tips for getting this kind of info from the companies that do this kind of stuff? [more inside]
posted by tokaidanshi on Sep 25, 2013 - 3 answers

Upgrading apartment entry/camera system

Do you have an awesome system that works well? I am looking for advice, experience and any general wisdom as I look to find a replacement entry and video security system for a multi-unit condo building. [more inside]
posted by donovan on Sep 24, 2013 - 0 answers

Landlord used city lease form for suburban rental, is he bound by RLTO?

We rented a house in Skokie, and the landlord used an office-supply-store-pre-printed lease form for the city. It included a copy of the Chicago RLTO as part of the form. Understanding that YANML, does this incorporate the requirements of the RLTO into the terms of the lease? If so, he'd be required to submit receipts meet deadlines for the return of the deposit. Or is he only bound by State Law (which for a single-family home, seems to require bupkus). He only returned half of our security deposit. Is it worth fighting for the other half ($600)? If I accept and deposit the $600 he sent, am I hurting my chances of getting the rest? [more inside]
posted by Morydd on Sep 16, 2013 - 5 answers

Can you recommend tiny, customized, permanent I.D. labels for gadgets?

Can you recommend a source for tiny, personalized, permanent adhesive labels I can use to I.D. my gadgets 'n' doodads 'n' stuff? [more inside]
posted by argonauta on Sep 12, 2013 - 14 answers

Microsoft Security Essentials

Microsoft Security Essentials Missing From System Tray. [more inside]
posted by dbirchum on Sep 2, 2013 - 35 answers

Good basic digital CCTV camera?

I'm planning to install a simple CCTV system in my house and am looking for recommendations for an entry-level camera. [more inside]
posted by Grinder on Aug 28, 2013 - 0 answers

Security issues to consider?

I'm making a small app (website) that stores arbitrary encrypted data on a server. It's always encrypted on the server; encoding and decoding the information takes place in the browser via JS using the Stanford Javascript Crypto Library. [more inside]
posted by jsturgill on Aug 25, 2013 - 28 answers

Boob pockets and panty stuffing

We're going to Vegas in 3 weeks and I want to be able to spend my days walking around without having a purse always looped over my shoulder. My clothes don't have pockets. Fanny packs are the work of Satan. Is it a terrible idea to keep my often accessed stuff (cash, credit cards) in my bra and more important stuff (like health insurance card, driver's licence, etc) hidden in my panties? What should I do with my phone (that is also my camera)? [more inside]
posted by PuppetMcSockerson on Aug 23, 2013 - 53 answers

"If You Knew What I Know About Email, You Might Not Use It"

Lavabit's Ladar Levinson was recently quoted as follows: "I'm taking a break from email. If you knew what I know about email, you might not use it either." Why would Levinson warn other people off using email? He's not just saying, "Be careful how you use email," but, "It's probably a good idea not to use email at all. I'm taking a break from it myself." [more inside]
posted by paleyellowwithorange on Aug 13, 2013 - 20 answers

What's a giftable home/apartment security upgrade?

I have a friend moving to a sketchy part of town (and living without a roommate for the first time). I want to get her some sort of security "thing" as an apartment-warming gift. Any suggestions? [more inside]
posted by Nonsteroidal Anti-Inflammatory Drug on Aug 10, 2013 - 17 answers

Which SSL certificate should I buy?

I'm starting a photography website where privacy and security are important features, and would like to offer SSL encryption to my users, so I'm going to buy a SSL certificate. Where should I get it from and which type should I get? [more inside]
posted by signal on Aug 3, 2013 - 8 answers

How to keep from going crazy with boredom at my job?

I recently took a job as an overnight security guard. The entire job is standing at the entrance to a company's parking lot, from 10pm to 6am. In theory, I'm supposed to warn off people who look like they don't belong there, but that never happens. No books, smartphones, or other distractions are allowed. Sometimes I'll look at my watch and discover that it's only ten minutes since the last time I checked my watch, even though it feels like an hour has passed. Is there some kind of mental exercise or trick I can use to occupy my mind and make the time go faster?
posted by internet_explorer on Jul 30, 2013 - 23 answers

At risk. How do I prevent my door from being kicked down during the day?

Is there a relatively easy, inexpensive way to reinforce my apartment door so that it cannot be kicked in during the day? Something very strong and secure but that is easily removable with minimal damage from the inside so that my security deposit won't go towards replacing the door? [more inside]
posted by WhitenoisE on Jul 28, 2013 - 18 answers

Web design: What are my options for adding a password system to a site?

Hi, I've recently completed web design courses in HTML and JavaScript with O'Reilly School of Technology. The courses were good but the main feature I'd like to add to my website is a password system. . [more inside]
posted by Musashi Daryl on Jul 26, 2013 - 6 answers

NJ tenant rights: how do I get my security deposit back?

After renting a room for almost 2 years, I broke the lease 1.5 months early (gave 1.5 months notice). I ensured that someone else was going to move into my room 1 week after I move out (so my landlord only has a 1 week gap in receiving rent checks). It's been almost 2 months and my landlord hasn't sent me my deposit, and is saying he will only give me 1/2 of it back. Details inside... [more inside]
posted by never.was.and.never.will.be. on Jul 24, 2013 - 6 answers

Ransomware and a compromised email password

My Dad received a spam email purporting to be from his email provider (BT Yahoo, fwiw) asking him to verify his account. In a moment of utter stupidity, I fell for the scam and entered his email password into a bogus website (I know, I know: STUPID). I was using his iPad at the time, and a ransomware website opened in safari, however the browser didn't lock, and I was able to close it straight away. I immediately logged into his email account and successfully changed his password to something completely different. Google tells me that there is currently no ransomware which can successfully hijack Apple devices, which my experience seems to bear out. I am a bit worried about the risk that I've accidentally compromised his email, though. Is there anything else I should do beyond what I've already done, ie changing the password? Should I contact BT Yahoo about it?
posted by meronym on Jul 21, 2013 - 5 answers

Searching for a server rack/cabinet…

At my place of employment, I have been charged with physically securing our two servers. The decision has been made to bolt them to the concrete floor in a cage. I don't know how to shop for a server rack. We have an old one that they're on now, but it's an open rack, without sides or locks. I need one that's more of a cage, to keep people without the key out. It'll have to fit at least 8U worth of servers, and also accommodate a midsized tower somehow, and be 1000mm deep minimum. How do I shop for this? I can't find any information on whether any of the racks I'm looking at are bolt downable.
posted by TrueVox on Jul 19, 2013 - 13 answers

Home directory encryption for OSX?

Is there any software that allows for encryption of home directories in OSX, a la original FileVault? [more inside]
posted by Philosopher Dirtbike on Jul 1, 2013 - 4 answers

How accurate is the white house siege in the film "Olympus Has Fallen"?

I read online that the director did a lot of research and consulted with military experts on how an actual terrorist siege on the white house could work. Of course, he also said that white house security experts have already planned for such an attack. I'm curious what would have been done differently in real life by the white house and DC security?
posted by Wanderer7 on Jun 28, 2013 - 10 answers

What size security deposit should I require for a 1-month sublet?

I'm subletting my room in a Capitol Hill, Washington DC rowhouse for 1 month. I pay $1250 for rent, and I'm thinking about charging $1050 in rent for a subletter to make sure I get someone for July. My security deposit with the landlord is about $1000. The landlord knows I'm subletting it and is totally OK with it, as long as I'm responsible for any potential damage. So would it be unreasonable to require a $1000 security deposit for a 1-month sublet? How about $750? $500? [more inside]
posted by catquas on Jun 27, 2013 - 15 answers

Android Update Infrastructure

I'm thinking about replacing my current mobile phone with an Android device and I'm having a hard time understanding how the Android update / security patch infrastructure for the core system is supposed to work. [more inside]
posted by mirage pine on Jun 26, 2013 - 5 answers

Can a company track web usage on a company laptop not on the network?

I recently took a job for a new company and received a company laptop. However, I'll be a remote employee working from home and travelling. The company is a small independent subsidiary of a large Japanese company who hires out their IT functions to an independent contractor. I won't be googling any super-weird stuff, but hey, it gets boring in hotels sometimes. How can I know if my company can monitor any web usage remotely? [more inside]
posted by anonymous on Jun 25, 2013 - 13 answers

Downsides of getting street address deliveries to my new post office?

My small town post office is offering a new feature I'd never heard of, street address deliveries to it, so you don't have to have anything delivered at home anymore. Given that the mailbox of the house I've been renting a room in is extremely insecure, this seems desirable. But given that every action I've taken in the last 10 months has gotten turned to the worst possible outcome, I want to know what the downsides are. Would it affect my credit rating? Would it make me look suspicious? What would be the downsides of using it as a residence address for my drivers license, which is up for renewal before I find a stable situation? [more inside]
posted by endurance on Jun 24, 2013 - 13 answers

Security Reporting Management System? Guard Patrol Administration?

I've been tasked with creating (well, refactoring and redesigning) a web app for managing a security company. It includes call logs, encounter reports, regions, locations, duties (patrols), various kinds of bulletins, and other things. If I were to search for existing software that covers the same purpose, what would I search for? What is this kind of thing called? [more inside]
posted by WasabiFlux on Jun 14, 2013 - 5 answers

Local root exploit code for Ubuntu?

Motivated by a combination of curiosity and laziness, I want to gain root privileges on an Ubuntu 10.04 machine (which belongs to me). I'm pretty sure I failed to apply any security updates, so hopefully there are some unpatched holes. I have an account which I can log in to, but I have forgotten my password so I can no longer sudo. It's not easy to physically access the machine, so I can't boot to single user mode. I have found sites which provide exploit code, but the exploits seem to be crippled in a highly responsible way. Where are the non-crippled versions?
posted by beniamino on Jun 11, 2013 - 10 answers

Virtual Bullproofing my Life

I'm interested in asserting a lot more control of my personal information and communications to prevent prying eyes of both governmental and criminal types. I'm interested in general best practices to secure my personal information, passwords, data and communication (including phones, texting and email). I am not an expert in software or anything of the kind. I use an iPhone and Apple computers. There's a few more specific requests inside. [more inside]
posted by anonymous on Jun 9, 2013 - 15 answers

Phish Spam (bleurgh)

Twice this week, I've fallen for spam emails. Have I compromised my security? Will I die? [more inside]
posted by popcassady on Jun 7, 2013 - 5 answers

Weird stuff in mail logs. Was my server hacked?

I'm running the latest LTS version of Ubuntu on my hosting provider's cloud VPS service. I recently noticed a series of weird, spammy looking messages in my server's mail.log file. Tech support at my hosting provider says it does not appear to be compromised; are they wrong? [more inside]
posted by compartment on Jun 6, 2013 - 2 answers

Internet in China

What are the best practices for internet security in China? [more inside]
posted by anonymous on Jun 1, 2013 - 10 answers

Sending financial information via (unsecure) email: why not to do it

How can I misuse this bank account information? No, wait, that came out wrong. I’m looking for help justifying data security measures (at my office) for banking info. [more inside]
posted by Signed Sealed Delivered on May 29, 2013 - 9 answers

Down with Big Security: consumer home security products?

I am moving into a medium-sized house soon and I need a decent security system. I'd love to avoid paying the big security corporations that force you to sign contracts and all that. Aside from a normal alarm system (I'm thinking Simplisafe), I also want to explore the option of security cameras (on the outside). Does anyone have experience with good consumer products in this space?
posted by malhouse on May 25, 2013 - 8 answers

Enforcing firewall in OS X

How can I enforce a firewall -- built-in or 3rd-party -- in OS X, such that even someone with an admin account can't disable it? [more inside]
posted by mendel on May 24, 2013 - 16 answers

Can loan security be conditional on bankruptcy or death?

Is it possible to write a loan contract which effectively secures the debt against the borrower's property only in the event of bankruptcy or death of the borrower? I.e., as long as the borrower is in control of his financial affairs the lender has no right to the secured assets even if the borrower defaults, but if the borrower dies or goes bankrupt the security kicks in, so that the debt has priority for any third-party trustees managing the estate? [more inside]
posted by Estragon on May 17, 2013 - 4 answers

Easy way to generate new passwords for each website?

Does anyone have a simple method of coming up with a excellent new passwords for every website that you can nevertheless easily remember? I'm thinking some combination of a master password combined with the website url or something like that, but the underlying rule should not be easily guessable by others even if they have a few examples in front of them. Any ideas?
posted by shivohum on May 1, 2013 - 23 answers

Mr. Nice Guy keeps going and going and going an...

I'm out for a walk taking some pictures and he stops to chat me up. We exchanged email addresses and now I'm regretting it BIG time. [more inside]
posted by redindiaink on Apr 20, 2013 - 31 answers

Offline paper wallet

Bitcoin paper wallet? [more inside]
posted by anonymous on Apr 7, 2013 - 2 answers

How are locked-down file perms in Linux similiar/different to Win EFS?

I am looking into alternatives to Windows EFS to protect sensitive data on a Linux web server. I know practically nothing about EFS, but I get the impression that the files are effectively plain-text if you are logged into the Windows machine as the user who owns the files, so the same level of "encryption" exists in a Linux environment if the files have only read/write perms for file owner and no perms for anybody else. My colleague says "No, it is not the same level of security" but doesn't provide any further info regarding how/why it's different. What am I missing here? [more inside]
posted by 0 on Apr 1, 2013 - 11 answers

Is "type letters 1 4 and 7 of your password" considered secure?

Instead of the usual "username/password" challenge, some bank websites ask you for a username, and then for some letters from your password -- e.g. 'Type letters 1, 4 and 7 of your password'. I understand that the advantage of this is that you never enter your whole password, thereby making life difficult for keyloggers. But I don't see how it's possible to implement such a system without (effectively) storing the password in plain text on the server, which surely not a good idea. What is this practice called? Do security experts consider it good practice? Can you point me to a paper that explains how it is implemented securely?
posted by beniamino on Mar 28, 2013 - 39 answers

Dropbox + coffee shop wifi = secure?

How secure is Dropbox on an open coffee shop wifi? [more inside]
posted by bluecore on Mar 26, 2013 - 8 answers

Help me put together a class assignment on hardening a computer

I want to teach students good computer security habits. [more inside]
posted by jadepearl on Mar 24, 2013 - 9 answers

Securing a wordpress site accessed through a gmail email

So. If you had a wordpress self-hosted website accessed through your name and an ok password and a gmail account associated with the wordpress admin login, what would you do to secure everything from fuckery? [more inside]
posted by Kerasia on Mar 21, 2013 - 16 answers

Multilingual security help!

Please help me translate the phrase, "Something that you bought at another store has not been cleared. I can fix that for you. Thank you." [more inside]
posted by wintersonata9 on Mar 17, 2013 - 8 answers

Help me with debit card security

So, my debit card number has now been "compromised" twice in as many months. How am I supposed to approach security with cards nowadays? [more inside]
posted by selfnoise on Mar 11, 2013 - 19 answers

Why is google being spooky and filling in other people's gmails?

This has happened twice now, and it is freaky. Google chrome on the iMac I use in my office at work (at a university) will have usernames and passwords for people who have never been in my office ever. The first time it happened it was my father's email, and the second time it was my stepmother's. Why would chrome be filling in these odd emails when it doesn't even save my own login information after closing the browser window? [more inside]
posted by artychoke on Mar 7, 2013 - 8 answers

How do I stop people walking on a path behind my house?

Strangers from adjoining neighborhoods have created a path on private land behind my house. What are some ways I can stop them? [more inside]
posted by Arbitrage1 on Mar 3, 2013 - 48 answers

Page: 1 2 3 4 5 6 7 8 ... 19