I have Prey installed on my MacBook Pro to assist with tracking my laptop if it's ever stolen. My question is... should I still have a password? If I want the best chance of finding the laptop, wouldn't I want the thief to USE it and log onto a WiFi network to assist with locating it? [more inside]
Multi-part questions about the security of the roof-top luggage box I just installed on my car. [more inside]
Please help, computer techies. Asus Eee PC wireless connection problem with Windows 7. [more inside]
A friend of mine has become convinced that Facebook is using her cell phone number to steal her contacts off her cell phone. My question - given the limitations listed in the more inside, how could this happen? Could it? [more inside]
Is Randall Munroe right about passwords in today's xkcd? Are very long (all lower case) plain text passwords more secure than short ones using a mix of numerals and upper/lower case text? [more inside]
Is there any windows program that allows to see the desktop or allow programs to be seen and password protect if any modification is needed.
When transferring between connecting flights in Canada, do you need to go through security screening again? [more inside]
Expert googler help needed! [more inside]
My management company refuses to do anything about the (lackluster) security of my building. What recourse do I have? [more inside]
I'm looking for ideas on ways to setup an informal neighborhood CCTV /cam enabled security system. Something like a flikr pool with wifi connected cameras taking snapshots/continuous street view. Ideally some kind of low cost DIY package that could be informally setup by a group of neighbors. [more inside]
Need some guidance on message-digest based password generation algorithms. [more inside]
How can I cover my filesharing tracks? [more inside]
I want to access my personal diary from anywhere - and keep it as secure as possible at the same time. Here's my idea on how to do this...what do you think? [more inside]
What is the best way for someone with plenty of sysadmin and programming experience but no actual professional IT experience to begin a career in IT?
What is the best way for someone with plenty of sysadmin and programming experience but no actual professional IT experience to begin a career in IT? [more inside]
How careful do I need to be in disposing of the credit card offers that come in the mail? [more inside]
I am flying on frontier airlines to Indianapolis in July. I won't be checking anything, just bringing a carry on bag. I was hoping to bring some vacuum sealed packs of jerky from this store with me on my carry on bag. Is this a problem? Are they going to make me open up my packages of jerky in security? I am going for a long visit and need my stuff to stay fresh so I don't want to unseal it. So basically, can I bring sealed packages of beef jerky/nuts/berries on an airplane?
Can I trust apps on my computer or phone with email login information? [more inside]
A Prince-loving vegan travels to Minneapolis with a CPAP machine. Then some joke of some kind occurs.
I'm about to head to the Netroots Nation conference in Minneapolis, and as a vegan traveling for the first time with a CPAP machine for my sleep apnea, I have a few questions - snowflake details inside. [more inside]
What are the legalities (in the United States) of browsing the contents of an "open folder" on a public website? [more inside]
I got a new Windows machine. It's been a while since I used Windows (never Windows 7). What do I, as someone paranoid about viruses and malware, need to download and set up in order to be 99.99% sure that nothing untoward happens to my machine? [more inside]
Listening to NPR I heard them saying, a little too casually, that "Generation Y is preparing for a future without any Social Security benefits". REALLY?? I did _NOT_ get that memo. [more inside]
I am subletting a room in a four bedroom apartment from a person I met on craigslist. This person moved out/I moved in in March. He's still on the lease and I am also on the lease. Please help me understand how my landlord is handling our security deposits. [more inside]
How do I create a public wifi network that is separate from our corporate network while using the same internet connection? [more inside]
What measures can I take to prevent retail store thieves from getting away in their unmarked vehicles (i.e., temporarily moved license plates). [more inside]
Best security software for my new Win7 laptop? Any other advice to ensure my computer's life gets off to a good start? [more inside]
Looking for advice for a home safe (and places to sell that safe to me). [more inside]
What simple, secure, portable password and secure data management systems do you use? [more inside]
I have a challenge in our computer repair storefront. We recently had an issue wherein someone tried to scam us on an iPhone repair. [more inside]
How to record something digitally in a way that verifies it has not been 'shopped [more inside]
What do I do about someone squirting glue into the locks of my house? [more inside]
I got a spam email from my friend who has a hotmail account. It looks like the spam has been sent to everyone in his hotmail distribution list. My question is, how did the hackers do this? Did they need his password in order to get access to his distribution list? As far as I know he is still able to use his account which puzzles me. Wouldn't a hacker (if he had the password) quickly change the password so that they could keep sending spam out on that account?
A while ago, my Gmail account notified me of suspicious activity. The IP that accessed my account seems to be from Microsoft. [more inside]
Will installing a Linux Operating System onto an old Windows laptop fully erase the contents of the hard drive? [more inside]
I'm having trouble disassembling an old desktop PC to get to the hard drive before I can destroy it and throw everything out. Is there a quick and easy way to destroy the drive in situ, using everyday household objects? [more inside]
Is it possible to get an extended history (perhaps several months) of "last account activity" records for a gmail account?
Is it really necessary to shred all receipts? Is identity fraud really likely? [more inside]
Will a U.S. security clearance investigation in progress be halted if I leave my sponsoring company? [more inside]
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft?
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft? [more inside]
Asking for a friend: He is a security manager. The client told him to document post orders, but they wouldn't provide him with the resources to do them. He did them on his own computer. Then, his hard drive failed. (A bit of a long story inside.) [more inside]
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected?
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected? [more inside]
Taking over the lease for one roommate in a four person household. I was originally told that I needed to pay first and last month's rent to move in: first month to the landlord and last month's to John, the roommate moving out. On moving day I was told that it was actually first and security. I would make the check for security out to John and then the landlord would give me back John's security deposit when I moved out. Confused and exhausted, I wrote a check. [more inside]
iPhone security question: My employer is considering allowing the use of iPhones (and possibly Android phones) in place of our traditional Blackberries, but is concerned about ensuring security of our confidential information. We already know how to turn off the ability of apps to access location data on the iPhone, but I'm also looking for a way to prevent apps from accessing the contact list. Perhaps my GoogleFu is failing me--is there an easy (or not so easy) way to do this?
Can I sue my former employer for leaking my social security number, email address and physical address? [more inside]
How long can EU citizens stay in the United States per year? My girlfriend would like to stay with me for two-three months, then return home to work for a month, come back to the US for a couple months, etc. Will homeland security break up this arrangement after a while? Is there a limit to how many days per year she can stay in the US? To be clear, she won't be working here.
How can you know if someone is capturing information that you are sending over a public wireless network? [more inside]
I suspect my young son is carrying on an ongoing discussion with a stranger he met on the internet. My wife and I are going to approach him, but we would like some evidence so we know what questions to ask. [more inside]
It's really hot. I need to let the breeze through my house while minimising risk of invitin burglars. [more inside]
Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.