How can I cover my filesharing tracks? [more inside]
I want to access my personal diary from anywhere - and keep it as secure as possible at the same time. Here's my idea on how to do this...what do you think? [more inside]
What is the best way for someone with plenty of sysadmin and programming experience but no actual professional IT experience to begin a career in IT?
What is the best way for someone with plenty of sysadmin and programming experience but no actual professional IT experience to begin a career in IT? [more inside]
How careful do I need to be in disposing of the credit card offers that come in the mail? [more inside]
I am flying on frontier airlines to Indianapolis in July. I won't be checking anything, just bringing a carry on bag. I was hoping to bring some vacuum sealed packs of jerky from this store with me on my carry on bag. Is this a problem? Are they going to make me open up my packages of jerky in security? I am going for a long visit and need my stuff to stay fresh so I don't want to unseal it. So basically, can I bring sealed packages of beef jerky/nuts/berries on an airplane?
Can I trust apps on my computer or phone with email login information? [more inside]
A Prince-loving vegan travels to Minneapolis with a CPAP machine. Then some joke of some kind occurs.
I'm about to head to the Netroots Nation conference in Minneapolis, and as a vegan traveling for the first time with a CPAP machine for my sleep apnea, I have a few questions - snowflake details inside. [more inside]
What are the legalities (in the United States) of browsing the contents of an "open folder" on a public website? [more inside]
I got a new Windows machine. It's been a while since I used Windows (never Windows 7). What do I, as someone paranoid about viruses and malware, need to download and set up in order to be 99.99% sure that nothing untoward happens to my machine? [more inside]
Listening to NPR I heard them saying, a little too casually, that "Generation Y is preparing for a future without any Social Security benefits". REALLY?? I did _NOT_ get that memo. [more inside]
I am subletting a room in a four bedroom apartment from a person I met on craigslist. This person moved out/I moved in in March. He's still on the lease and I am also on the lease. Please help me understand how my landlord is handling our security deposits. [more inside]
How do I create a public wifi network that is separate from our corporate network while using the same internet connection? [more inside]
What measures can I take to prevent retail store thieves from getting away in their unmarked vehicles (i.e., temporarily moved license plates). [more inside]
Best security software for my new Win7 laptop? Any other advice to ensure my computer's life gets off to a good start? [more inside]
Looking for advice for a home safe (and places to sell that safe to me). [more inside]
What simple, secure, portable password and secure data management systems do you use? [more inside]
I have a challenge in our computer repair storefront. We recently had an issue wherein someone tried to scam us on an iPhone repair. [more inside]
How to record something digitally in a way that verifies it has not been 'shopped [more inside]
What do I do about someone squirting glue into the locks of my house? [more inside]
I got a spam email from my friend who has a hotmail account. It looks like the spam has been sent to everyone in his hotmail distribution list. My question is, how did the hackers do this? Did they need his password in order to get access to his distribution list? As far as I know he is still able to use his account which puzzles me. Wouldn't a hacker (if he had the password) quickly change the password so that they could keep sending spam out on that account?
A while ago, my Gmail account notified me of suspicious activity. The IP that accessed my account seems to be from Microsoft. [more inside]
Will installing a Linux Operating System onto an old Windows laptop fully erase the contents of the hard drive? [more inside]
I'm having trouble disassembling an old desktop PC to get to the hard drive before I can destroy it and throw everything out. Is there a quick and easy way to destroy the drive in situ, using everyday household objects? [more inside]
Is it possible to get an extended history (perhaps several months) of "last account activity" records for a gmail account?
Is it really necessary to shred all receipts? Is identity fraud really likely? [more inside]
Will a U.S. security clearance investigation in progress be halted if I leave my sponsoring company? [more inside]
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft?
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft? [more inside]
Asking for a friend: He is a security manager. The client told him to document post orders, but they wouldn't provide him with the resources to do them. He did them on his own computer. Then, his hard drive failed. (A bit of a long story inside.) [more inside]
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected?
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected? [more inside]
Taking over the lease for one roommate in a four person household. I was originally told that I needed to pay first and last month's rent to move in: first month to the landlord and last month's to John, the roommate moving out. On moving day I was told that it was actually first and security. I would make the check for security out to John and then the landlord would give me back John's security deposit when I moved out. Confused and exhausted, I wrote a check. [more inside]
iPhone security question: My employer is considering allowing the use of iPhones (and possibly Android phones) in place of our traditional Blackberries, but is concerned about ensuring security of our confidential information. We already know how to turn off the ability of apps to access location data on the iPhone, but I'm also looking for a way to prevent apps from accessing the contact list. Perhaps my GoogleFu is failing me--is there an easy (or not so easy) way to do this?
Can I sue my former employer for leaking my social security number, email address and physical address? [more inside]
How long can EU citizens stay in the United States per year? My girlfriend would like to stay with me for two-three months, then return home to work for a month, come back to the US for a couple months, etc. Will homeland security break up this arrangement after a while? Is there a limit to how many days per year she can stay in the US? To be clear, she won't be working here.
How can you know if someone is capturing information that you are sending over a public wireless network? [more inside]
I suspect my young son is carrying on an ongoing discussion with a stranger he met on the internet. My wife and I are going to approach him, but we would like some evidence so we know what questions to ask. [more inside]
It's really hot. I need to let the breeze through my house while minimising risk of invitin burglars. [more inside]
Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.
Today I clicked on the Chapters website's "My Account" link, which usually 'remembers' who I am and shows my email address, asking only for my password. Today, however, it showed a stranger's email address and name. Do I need to be concerned? [more inside]
Safe to bank from home computer? [more inside]
Sort of interesting Apple security question: I have a VPN that I trust. When I use an iOS device (4.2.1 on iPad or 3GS) I often have Safari running most of the time. If I use Safari for an innocuous task, background it, initiate a VPN connection, and then go back to Safari to use eg. internet banking, does my web traffic pass through the VPN, or should I "kill" Safari and restart it? I use IP-restricted academic journal access sometimes and have noticed I have to restart Safari sometimes to be allowed to see articles, and it got me wondering. Clever paranoid opinions much appreciated!
Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
Which method of traveling/travel route from Europe to the US will be the least invasive in terms of baggage examinations, pat-downs, and background checks? [more inside]
Mom is using the internet for the first time on an old, old laptop with Windows XP, and using it for email and also streaming movies (the pirated kind) on sites like Megavideo. Anything to help her avoid scams and malware? Hoping for software/Firefox extensions as well as maybe a guide for first-time internet users.
Up to now, I have used Apple's Keychain program to manage my passwords. I recently got an iPad, and now I have lots of login passwords that I don't have memorized and can't access from my iPad browser. So, I'm looking for a password management setup that will do the following things (or as many as possible): [more inside]
How exactly does XBox account security work? Our 360 was stolen in November. We haven't bought a replacement yet, but we did change the password on the Live account associated with the console immediately. We just noticed that within the last few days, our gamertag has logged on and has been playing games, buying avatar items with points we already had, etc. WTF? [more inside]
How should a business that's about security set up its own secure communications? [more inside]
I'm filling in a background-check form for a US government job--Questionnaire for Non-Sensitive Positions--and I'm confused. Help! [more inside]