Join 3,564 readers in helping fund MetaFilter (Hide)

943 posts tagged with Security. (View popular tags)
Displaying 101 through 150 of 943. Subscribe:

Related tags:
+ (144)
+ (62)
+ (51)
+ (50)
+ (48)
+ (42)
+ (42)
+ (39)
+ (37)
+ (36)
+ (35)
+ (34)
+ (30)
+ (30)
+ (30)
+ (29)
+ (29)
+ (28)
+ (26)
+ (24)
+ (23)
+ (23)
+ (20)
+ (20)
+ (19)
+ (19)
+ (19)
+ (18)
+ (18)
+ (16)
+ (16)
+ (16)
+ (15)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (13)
+ (13)
+ (13)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (10)
+ (10)
+ (10)
+ (10)


Users that often use this tag:
Anonymous (76)
meta.mark (4)
Jairus (3)
signal (3)
Raichle (3)
Admiral Haddock (3)
Thorzdad (3)
curiousleo (3)
tcv (3)
QuantumMeruit (2)
serial_consign (2)
Metroid Baby (2)
bytewrite (2)
chichimimizu (2)
goshling (2)
radsqd (2)
valleys (2)
Crotalus (2)
randomthoughts (2)
Alterscape (2)
woot (2)
titans13 (2)
Grinder (2)
storybored (2)
UMDirector (2)
Mave_80 (2)
ajp (2)
-harlequin- (2)
boombot (2)
amtho (2)
jeffburdges (2)
bartleby (2)
mendel (2)
flabdablet (2)
symbioid (2)
zardoz (2)
electroboy (2)
purephase (2)
GleepGlop (2)
aburd (2)
striker (2)
ChrisR (2)
odinsdream (2)
beniamino (2)
selfnoise (2)
caution live frogs (2)
loquacious (2)
ascullion (2)
chill (2)
Grod (2)
alms (2)
jadepearl (2)
emptybowl (2)
40 Watt (2)
monju_bosatsu (2)
rorycberger (2)
tiamat (2)
daver (2)
mecran01 (2)
grumblebee (2)

Weird stuff in mail logs. Was my server hacked?

I'm running the latest LTS version of Ubuntu on my hosting provider's cloud VPS service. I recently noticed a series of weird, spammy looking messages in my server's mail.log file. Tech support at my hosting provider says it does not appear to be compromised; are they wrong? [more inside]
posted by compartment on Jun 6, 2013 - 2 answers

Internet in China

What are the best practices for internet security in China? [more inside]
posted by anonymous on Jun 1, 2013 - 10 answers

Sending financial information via (unsecure) email: why not to do it

How can I misuse this bank account information? No, wait, that came out wrong. Iā€™m looking for help justifying data security measures (at my office) for banking info. [more inside]
posted by Signed Sealed Delivered on May 29, 2013 - 9 answers

Down with Big Security: consumer home security products?

I am moving into a medium-sized house soon and I need a decent security system. I'd love to avoid paying the big security corporations that force you to sign contracts and all that. Aside from a normal alarm system (I'm thinking Simplisafe), I also want to explore the option of security cameras (on the outside). Does anyone have experience with good consumer products in this space?
posted by malhouse on May 25, 2013 - 8 answers

Enforcing firewall in OS X

How can I enforce a firewall -- built-in or 3rd-party -- in OS X, such that even someone with an admin account can't disable it? [more inside]
posted by mendel on May 24, 2013 - 16 answers

Can loan security be conditional on bankruptcy or death?

Is it possible to write a loan contract which effectively secures the debt against the borrower's property only in the event of bankruptcy or death of the borrower? I.e., as long as the borrower is in control of his financial affairs the lender has no right to the secured assets even if the borrower defaults, but if the borrower dies or goes bankrupt the security kicks in, so that the debt has priority for any third-party trustees managing the estate? [more inside]
posted by Estragon on May 17, 2013 - 4 answers

Easy way to generate new passwords for each website?

Does anyone have a simple method of coming up with a excellent new passwords for every website that you can nevertheless easily remember? I'm thinking some combination of a master password combined with the website url or something like that, but the underlying rule should not be easily guessable by others even if they have a few examples in front of them. Any ideas?
posted by shivohum on May 1, 2013 - 23 answers

Mr. Nice Guy keeps going and going and going an...

I'm out for a walk taking some pictures and he stops to chat me up. We exchanged email addresses and now I'm regretting it BIG time. [more inside]
posted by redindiaink on Apr 20, 2013 - 31 answers

Offline paper wallet

Bitcoin paper wallet? [more inside]
posted by anonymous on Apr 7, 2013 - 2 answers

How are locked-down file perms in Linux similiar/different to Win EFS?

I am looking into alternatives to Windows EFS to protect sensitive data on a Linux web server. I know practically nothing about EFS, but I get the impression that the files are effectively plain-text if you are logged into the Windows machine as the user who owns the files, so the same level of "encryption" exists in a Linux environment if the files have only read/write perms for file owner and no perms for anybody else. My colleague says "No, it is not the same level of security" but doesn't provide any further info regarding how/why it's different. What am I missing here? [more inside]
posted by 0 on Apr 1, 2013 - 11 answers

Is "type letters 1 4 and 7 of your password" considered secure?

Instead of the usual "username/password" challenge, some bank websites ask you for a username, and then for some letters from your password -- e.g. 'Type letters 1, 4 and 7 of your password'. I understand that the advantage of this is that you never enter your whole password, thereby making life difficult for keyloggers. But I don't see how it's possible to implement such a system without (effectively) storing the password in plain text on the server, which surely not a good idea. What is this practice called? Do security experts consider it good practice? Can you point me to a paper that explains how it is implemented securely?
posted by beniamino on Mar 28, 2013 - 39 answers

Dropbox + coffee shop wifi = secure?

How secure is Dropbox on an open coffee shop wifi? [more inside]
posted by bluecore on Mar 26, 2013 - 8 answers

Help me put together a class assignment on hardening a computer

I want to teach students good computer security habits. [more inside]
posted by jadepearl on Mar 24, 2013 - 9 answers

Securing a wordpress site accessed through a gmail email

So. If you had a wordpress self-hosted website accessed through your name and an ok password and a gmail account associated with the wordpress admin login, what would you do to secure everything from fuckery? [more inside]
posted by Kerasia on Mar 21, 2013 - 16 answers

Multilingual security help!

Please help me translate the phrase, "Something that you bought at another store has not been cleared. I can fix that for you. Thank you." [more inside]
posted by wintersonata9 on Mar 17, 2013 - 8 answers

Help me with debit card security

So, my debit card number has now been "compromised" twice in as many months. How am I supposed to approach security with cards nowadays? [more inside]
posted by selfnoise on Mar 11, 2013 - 19 answers

Why is google being spooky and filling in other people's gmails?

This has happened twice now, and it is freaky. Google chrome on the iMac I use in my office at work (at a university) will have usernames and passwords for people who have never been in my office ever. The first time it happened it was my father's email, and the second time it was my stepmother's. Why would chrome be filling in these odd emails when it doesn't even save my own login information after closing the browser window? [more inside]
posted by artychoke on Mar 7, 2013 - 8 answers

How do I stop people walking on a path behind my house?

Strangers from adjoining neighborhoods have created a path on private land behind my house. What are some ways I can stop them? [more inside]
posted by Arbitrage1 on Mar 3, 2013 - 48 answers

Parking lot security for trucks - Threatened by ex-contractor

A former contractor for a small business I'm involved in has told an employee he plans to sabotage the business' 5 trucks, possibly pouring chemicals in the gas tanks. Advice on the best methods and devices to try to prevent this would be very appreciated. [more inside]
posted by jcfudgely on Mar 1, 2013 - 26 answers

Securing Various Electronics in the South Pacific

What would be the best ways to secure multiple laptops, smartphones, cameras (physically, and also to catch thieves) in a "rustic" foreign country... keeping in mind I need to fit everything in luggage or fashion it out of raw materials in country. [more inside]
posted by DaftMythic on Feb 28, 2013 - 6 answers

How can we trust open source software?

Open source software is considered trustworthy because anyone can validate the source code and hold the developer accountable. Usually developers will also make compiled binaries available for convenience. How can we know that these binaries are compiled from the same source code the developer published, and not a malicious variant of it? [more inside]
posted by The Winsome Parker Lewis on Feb 26, 2013 - 17 answers

How can I deny an android app permissions it claims to require?

Android apps seem to grab permissions that I have no desire to give them. My understanding is that the permissions per app are all bundled together: it's all or nothing. At least officially. Is there another way? Also, is there a privacy watchdog site that will help me find apps that actually respect my privacy and support/purchase them over those that do not? [more inside]
posted by jsturgill on Feb 19, 2013 - 4 answers

How can I get paid to write and protect my privacy from clients?

I want to only share my identity with the tax man when I write, and allow people to pay me online. How do I do this? [more inside]
posted by anonymous on Feb 13, 2013 - 8 answers

Encrypted chat between mobile devices?

The best and simplest way to communicate between a smallish number of (known) people, on a few different devices, with encryption? [more inside]
posted by running order squabble fest on Feb 5, 2013 - 6 answers

Google+ pros/cons

My department is being mandated to start using Google+ and some other Google apps. Please help me think through the security and privacy implications of what I am afraid might become a real mess. [more inside]
posted by jbickers on Feb 4, 2013 - 9 answers

How can I keep my mailchimp list private

I am new to this so this may be a very basic question. I am starting a mailing list of about 1000 people with 3-4 subgroups. I want to structure it so that people working for me can design and send out campaigns but I want to find a way by which they can't download the mailing list and share it with others or use it for purposes other than my campaigns. Is there a way to do this? If not in MailChimp can I do it in another software?
posted by london302 on Feb 3, 2013 - 2 answers

But I don't *want* anyone to recognize it...

How do I prevent OCR on a document (typically a PDF but I could use another document format if necessary)? I know that when I scan it from a hard copy to a PDF I can disable/stop the OCR process, but Adobe allows it to happen on any PDF I scan in, whether OCR was eliminated at scanning or not, and I have to stop that (I have work product I'd like to distribute electronically, but my boss would like to make sure it's not searchable and it's as hard as I can make it to copy). I can use any software or process within reason.
posted by mrs. taters on Jan 25, 2013 - 27 answers

Help me protect my car from vandalism.

Is there a practical way to keep someone from f-cking with my car? [more inside]
posted by phaedon on Jan 17, 2013 - 38 answers

My Gmail acct. hijacked to send spam

Twice recently my Gmail acct. has been hijacked by someone who is sending spam emails to some, but not contacts --seems to be only recently emailed (by me) people. The spam is an ad, as seen on Fox News for Raspberry drops weight loss aid. How do the spammers access my Gmail account? Could it be through my brand new Android cell phone? I am unaware of any other problems on my (Macbook) home computer. I have a secure WiFi router at home. No evidence malware or virus. I've changed my Gmail password, FWIW. Any suggestions on how/where to find a way from this happening again?
posted by NorthCoastCafe on Jan 15, 2013 - 5 answers

I had a compromised Java version. How do I clean up afterwards?

My AV program found 'Exploit:Java/CVE-2012-4681' on my laptop. It's a primer that sets up my machine for future exploits, but I haven't found any further infections using AV or Housecall. What steps should I be taking to assure myself that the machine is clean, and what can I do to prevent this kind of problem in the future. [more inside]
posted by Urtylug on Jan 12, 2013 - 3 answers

Question about password security

With email and website passwords, are successful "brute force" attacks still common, where an automated bot tries thousands and thousands of passwords on the same user account until one works? [more inside]
posted by pete_22 on Jan 9, 2013 - 17 answers

How to retrieve SSID when not in range

I need to retrieve the SSID of a wifi network that is not in range from either an iPhone or an old hard drive. [more inside]
posted by IanMorr on Jan 2, 2013 - 5 answers

Tales of harrowing and/or redemption? Not so much. Just the facts.

What are good resources, online and offline, for information about the average experience in federal prison camps (minimum security prisons)? [more inside]
posted by anonymous on Jan 1, 2013 - 7 answers

Help me name my new multi-app

Help me name my new product, which combines the functionality of popular existing apps, but is specialized with high-security features. [more inside]
posted by bfu on Dec 26, 2012 - 21 answers

Why aren't top commerce sites using AOSSL?

Question for the hard-core commerce and security geeks: Always-on SSL, or AOSSL. Last spring The Online Trust Alliance, or OTA, started a PR campaign to convince folks who manage web sites to use SSL to secure the entirety of their web sites ā€” not just forms and checkout pages. OTA points out that some large social sites (Twitter, Facebook, Google) ā€” folks for whom the customer is the product ā€” have implemented AOSSL, or are in the process of doing so. Who I *don't* see coming on-board are large and highly trafficked e-commerce sites. By my survey, none of the top 100 eCommerce vendors (using Internet Retailer's list) have implemented AOSSL, and I'm wondering if there's a reason why... (more inside). [more inside]
posted by deCadmus on Dec 13, 2012 - 8 answers

Do we need a lease?

Landlord doesn't require a lease or a security deposit. Should I be concerned? [more inside]
posted by baby beluga on Dec 11, 2012 - 23 answers

Easy way to make a website accessible only by VPN?

How can I setup a website accessible by VPN but by multiple users at different locations? More details inside... [more inside]
posted by thorny on Dec 6, 2012 - 9 answers

Politics in outer space

What would politics in outer space look like? [more inside]
posted by espada0 on Nov 24, 2012 - 13 answers

I'd like my security deposit back, please.

I'd like my security deposit back, please. [more inside]
posted by Prairie on Nov 20, 2012 - 6 answers

This is your Mac. This is your Mac on lockdown.

Looking for best practices for home data security for an exclusively Mac household. [more inside]
posted by Admiral Haddock on Nov 20, 2012 - 4 answers

Gmail security settings???

I was checking the security setting on my gmail account this AM and was alarmed to see that govtrack.us had somehow been granted " granted the following services access to your Google Account". Especially concerning since i had never seen that site, or even heard of it. What gives?
posted by dougiedd on Nov 18, 2012 - 5 answers

Who the hell added these videos to my favourites folder on YouTube?

I found several "favourited" videos in my YouTube account that were definitely not my or my partner's doing. What could have happened? Was I hacked? [more inside]
posted by peripathetic on Nov 14, 2012 - 3 answers

Is it safe?

Yesterday I added a network print server device to my home network. How can I know that it is secure? Can I firewall it to prevent it from sending anything out to the internet? A few more details inside. [more inside]
posted by DarkForest on Nov 13, 2012 - 5 answers

Our former landlord is trying to rip us off for nearly $4,000 (Prince George Co, Maryland)

Our former landlord is trying to withhold our security deposit and charge us $3,000+ for damages we did not cause. We just received her letter itemizing the "charges" and I just want to make sure we are covering our bases, as it's my first time in this situation. We are in Prince George County, Maryland. [more inside]
posted by SpicyMustard on Nov 8, 2012 - 12 answers

Chrome vs. Firefox Extension Security

Please help me understand the difference (or non-difference) in safety for Firefox vs. Chrome browser extensions (plugins/add-ons). [more inside]
posted by pavane on Nov 5, 2012 - 3 answers

Do iTunes security question failed attempts reset after a wait time?

Apparently, I didn't keep the answers to my iTunes security authorization questions. I think I can guess my answers with a few more tries, but I might get locked out before I get there. Will the wrong answer count reset back to zero after a wait time? Meaning, can I try again tomorrow, or will I still get locked out? [more inside]
posted by p3t3 on Oct 17, 2012 - 4 answers

Can I save a secure form in Reader?

How to get Adobe Reader to save a secure form? [more inside]
posted by Thorzdad on Oct 11, 2012 - 3 answers

understanding mediaplex

How do I remove a Mediaplex virus from my computer? [more inside]
posted by crazylegs on Oct 6, 2012 - 3 answers

What is the best way to keep your web access on a network untraceable?

What is the best way to keep your web usage on a network hidden from anyone who might be snooping packet traffic? [more inside]
posted by anonymous on Oct 4, 2012 - 7 answers

VPN for someone w/minimal IT skills?

Secure VPN for a novice? [more inside]
posted by ryanshepard on Sep 29, 2012 - 8 answers

Page: 1 2 3 4 5 6 7 8 ... 19