I just visited Facebook and it showed me the login screen with the email address of the guy I'm dating as the username. I was using FB earlier today, puttering around, sending messages and whatnot, and I haven't logged out of FB or restarted my Mac since. What's going on here? Am I paranoid to think that he (or someone else) could have remotely accessed my computer? [more inside]
I have contacted the designer of my WordPress theme for support and they are asking for log-in info. This seems like a "stop right there" kinda thing. Am I being to cautious? [more inside]
Does this registration security procedure for my website make any sense? [more inside]
Where's the profit in DDOS'ing IRC servers? [more inside]
I need to find a source for travel and security advisories for locations around the world. Our organisation is too small to employ a security advisor and I don't always trust the locals. What publicly available resources do you use to prepare for travel? [more inside]
Moving out of my apartment and I have a few questions on how to handle the last month of rent and the security deposit. [more inside]
What steps do I need to take before recycling my old computers? [more inside]
Can the president of the U.S. make a truly surprise appearance? [more inside]
On a scale of 1-10, with 1 being "very safe" and with going-to-11 being "the most crazy," how insane is it to try to get into London from Heathrow to do some light sightseeing on my way back home to the US. (I've read the previous questions, but needed some clarification about some of the issues!) [more inside]
My new boss is totally different from my old boss. Help me persuade my colleagues not to hate him. [more inside]
Help me fend off the cyber brigands (and persuade my family that they need help)! [more inside]
The 7-11. You take a penny from the tray, right? Well those are whole pennies, right? I'm just talking about fractions of a penny here. But we do it from a much bigger tray and we do it a couple a million times.
What are the risks of online banking? Has anyone developed best practices for consumers and bankers regarding security? [more inside]
I have an open-plan office full of computers, about 75% Macs. We're considering putting in security cameras with a DVR. It seems to me that with all these computers (and a bunch of spares, at that) we could do this with what we have instead of paying a security company for dedicated hardware. What can I use to coordinate multiple webcams and do security-DVR-type stuff with them?
I currently use Google Docs for cloud storage for documents I wanted to work on at home and at lunch, but I've heard good things about DropBox's usability and would like to give it a try. However, I'm concerned about my employer being able to log what I do in DropBox if it's installed on an office computer. Will my employer be able to access my DropBox the same way they can access the rest of my work machine?
I want a secure way for people to log into a server on my Windows machine from the internet. I have an idea; is it good? [more inside]
Please help me find the password management solution I'm hoping exists: the ability to automatically, dynamically sync a specific folder of passwords between accounts w/o involving Dropbox. [more inside]
Any of you have any experience with high-tech dog doors? [more inside]
I am running a Wordpress installation on my own domain. It was hacked. For an admin fee, my web host is restoring prior to the hack. What are my best practices going forward to prevent this from happening again? [more inside]
I have a moped I would like to use on a regular basis to commute to and from school. My issue is storage. Right now it is stored inside in the back of my (first floor) apartment and it is difficult to lug outside and back in. Ideally I'd put it outside, but I live in an area where I'm extremely concerned about the possibility of it being stolen. What to do? [more inside]
a question about secure/code-entry apartment buildings. [more inside]
So...I'm thinking my Mac has a virus. I have a Mac OS X 10.5.8. I keep running out of hard drive space and deleting files constantly, so I got Disk Inventory X to see where my space is. Turns out there is 20 GB of 130,000 text files on my computer in a hidden file marked "private". I can't see this "private" folder from the file manager...only from Disk Inventory X. What do I do? [more inside]
How can I block browser access to MP3 files, yet allow streaming? [more inside]
How do I make my passwords available to loved ones if I die suddenly, but keep them secure while I'm alive? [more inside]
Got a call from someone who said he got my number from someone else I don't remember meeting. Should I pursue more info or let it drop? [more inside]
I am seeking ideas on guidelines for internet usage and privacy for a 12-year-old girl. She is pretty internet-savvy but not publicly sharing info yet (just email), and I'd like to guide her well as she begins to do so. [more inside]
When uploading my files to the cloud, are they automatically encrypted before they leave my computer?
When uploading my files to major cloud services (Microsoft SkyDrive, Google Docs and Google Picasaweb), are they automatically encrypted before they leave my computer? [more inside]
Hey, so, turns out I was granted a U.S. secret security clearance! ...that I'm not using. I understand that the approval/eligibility is good for two years, but beyond that I have a few questions. (For one: can I apply for jobs truthfully claiming I have an "active clearance"?) [more inside]
What are some good internet security forums / blogs to follow? [more inside]
What's a good way to share passwords among members of a team? [more inside]
What's the easiest, most secure way to move this SQL database and its browser-based front end online? [more inside]
Help me solve a wifi mystery. A paid wifi hotspot near where I am staying is intermittently providing me with free access to the 'net. I would like to try to understand why this is happening so that I can (hopefully) replicate it at will from my devices. [more inside]
I live in the state of pennsylvania in montgomery county.I rented apartment from craigslist on a verbal monthly lease with $650 security deposit. After 8 months I gave the landlord moving out notice of 30 days to find a new tenant. its been almost 11 months and she has not given me $300 of the initial security deposit back. I cleaned the house and she had no issues. Is there any way i can get the money back. I have tried to contact the person multiple times through email and phone but no reply.
Is it ok to put a Kitchenaid Stand Mixer in my checked luggage on a flight from JFK to Heathrow? [more inside]
How much should I worry about an expired credit card number being leaked in the Stratfor Lulzxmas event? [more inside]
Security Nerds: What do you think of using Riseup.net for secure online communications for leftist movements? [more inside]
I've just noticed that Facebook is geotagging status updates. How the hell do I turn it off? [more inside]
Need a battery operated security (nannycam) camera recommendation. [more inside]
I have just installed a few foscam cameras in my business but no dvr to record the feed. Does a wise soul in the hive know of any web based dvr that can record the feed for later viewing. Something I can access online with out having to install a DVR.
Looking for a community/forum where I can learn more about networking, code, security, and OS-independent CS topics
I'm looking for a forum where I can ask questions about networking, security, coding, operating systems, web design, etc. There are many of these out there, but I'd like to find a single community which covers all these topics more or less equally (so it isn't a Linux forum with a small section on BSD, or a coding forum with a small section on networking). I'd like it to be the sort of forum where users stay around for several years as they learn and contribute at different levels, with high literacy and education-to-spam levels. Could I have your recommendations please?
What do I *really* need to do in order to keep my computer reasonably save from malware and intrusions? [more inside]
How did someone break into my house? [more inside]
An aquaintance of mine works for a defense contractor company as has a fairly high security clearance. They also have a serious drinking problem and have admitted that they are an alcoholic. However, they are afraid to go for treatment because they are concerned that they will lose their security clearance as a result. [more inside]
Airport body scans -- male and female buttons. How do they work? [more inside]
On the way home from work today I found an employee badge that someone appeared to have dropped and lost (it was right next to the bus stop I usually wait at). The badge's owner was nowhere in sight (it was a photo ID) and I don't know anyone who works for the company identified on the badge. What's the best / quickest way to get it back to its owner, especially given tomorrow is a (US) holiday? [more inside]
Security Deposit & Home Improve Filter: We moved into a brand new house and when we moved out, there were some damages on the floor. Turns out these “engineered” hardwood floor that requires a removal of an entire area for a few inches of damage. 1) Is this actually required to fix engineered hardwood floors? 2) Is this legal to charge us for an entire section of undamaged area for inches of damage? Pics inside. [more inside]
Password security strength question. [more inside]
An elderly relative, once technically savvy, now goes into fugue states where, in his confusion, he dismantles computer and A/V setups, with no one in the household to reconnect them properly. I'm looking for a way of securing A/V and computer connections while leaving the function of the devices still accessible. The alternative so far is spending endless hours with the cable company to get them to send someone to help, or paying someone else to come by. Phone instructions are no good, and there is no one in the household who can help.
Can you help me understand how to approach a couple issues of server security. (1) I want to run things in 'silos', so that if someone from the web has hacked and has code level access to example.com/blog they can't query the db of example.com/app (2) If they do get access to a user database, how do I make it harder for them to figure out passwords (beyond just storing them as md5)? [more inside]
Looking to implement the most effective reasonable set of best practices for preserving internet privacy and blocking commercial data harvesting. Seeking tips, tricks, hacks, and useful online resources. [more inside]