I'm having trouble disassembling an old desktop PC to get to the hard drive before I can destroy it and throw everything out. Is there a quick and easy way to destroy the drive in situ, using everyday household objects? [more inside]
Is it possible to get an extended history (perhaps several months) of "last account activity" records for a gmail account?
Is it really necessary to shred all receipts? Is identity fraud really likely? [more inside]
Will a U.S. security clearance investigation in progress be halted if I leave my sponsoring company? [more inside]
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft?
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft? [more inside]
Asking for a friend: He is a security manager. The client told him to document post orders, but they wouldn't provide him with the resources to do them. He did them on his own computer. Then, his hard drive failed. (A bit of a long story inside.) [more inside]
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected?
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected? [more inside]
Taking over the lease for one roommate in a four person household. I was originally told that I needed to pay first and last month's rent to move in: first month to the landlord and last month's to John, the roommate moving out. On moving day I was told that it was actually first and security. I would make the check for security out to John and then the landlord would give me back John's security deposit when I moved out. Confused and exhausted, I wrote a check. [more inside]
iPhone security question: My employer is considering allowing the use of iPhones (and possibly Android phones) in place of our traditional Blackberries, but is concerned about ensuring security of our confidential information. We already know how to turn off the ability of apps to access location data on the iPhone, but I'm also looking for a way to prevent apps from accessing the contact list. Perhaps my GoogleFu is failing me--is there an easy (or not so easy) way to do this?
Can I sue my former employer for leaking my social security number, email address and physical address? [more inside]
How long can EU citizens stay in the United States per year? My girlfriend would like to stay with me for two-three months, then return home to work for a month, come back to the US for a couple months, etc. Will homeland security break up this arrangement after a while? Is there a limit to how many days per year she can stay in the US? To be clear, she won't be working here.
How can you know if someone is capturing information that you are sending over a public wireless network? [more inside]
I suspect my young son is carrying on an ongoing discussion with a stranger he met on the internet. My wife and I are going to approach him, but we would like some evidence so we know what questions to ask. [more inside]
It's really hot. I need to let the breeze through my house while minimising risk of invitin burglars. [more inside]
Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.
Today I clicked on the Chapters website's "My Account" link, which usually 'remembers' who I am and shows my email address, asking only for my password. Today, however, it showed a stranger's email address and name. Do I need to be concerned? [more inside]
Safe to bank from home computer? [more inside]
Sort of interesting Apple security question: I have a VPN that I trust. When I use an iOS device (4.2.1 on iPad or 3GS) I often have Safari running most of the time. If I use Safari for an innocuous task, background it, initiate a VPN connection, and then go back to Safari to use eg. internet banking, does my web traffic pass through the VPN, or should I "kill" Safari and restart it? I use IP-restricted academic journal access sometimes and have noticed I have to restart Safari sometimes to be allowed to see articles, and it got me wondering. Clever paranoid opinions much appreciated!
Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
Which method of traveling/travel route from Europe to the US will be the least invasive in terms of baggage examinations, pat-downs, and background checks? [more inside]
Mom is using the internet for the first time on an old, old laptop with Windows XP, and using it for email and also streaming movies (the pirated kind) on sites like Megavideo. Anything to help her avoid scams and malware? Hoping for software/Firefox extensions as well as maybe a guide for first-time internet users.
Up to now, I have used Apple's Keychain program to manage my passwords. I recently got an iPad, and now I have lots of login passwords that I don't have memorized and can't access from my iPad browser. So, I'm looking for a password management setup that will do the following things (or as many as possible): [more inside]
How exactly does XBox account security work? Our 360 was stolen in November. We haven't bought a replacement yet, but we did change the password on the Live account associated with the console immediately. We just noticed that within the last few days, our gamertag has logged on and has been playing games, buying avatar items with points we already had, etc. WTF? [more inside]
How should a business that's about security set up its own secure communications? [more inside]
I'm filling in a background-check form for a US government job--Questionnaire for Non-Sensitive Positions--and I'm confused. Help! [more inside]
Someone scammed my parents. But what, exactly, is the point of the scam? They called my mom, claiming to be from AT&T, saying that something in her house was causing interference all over the neighborhood, and that they needed to come over. They came, showed fake credentials, identified the interference as coming from my parents' security system, deactivate they system and left. [more inside]
My landlord wants me to leave my apartment unlocked so maintenance people can enter during the day. This makes me uncomfortable. How much should I push back? [more inside]
Quick and simple. Will my iPhone still work when I take the camera out? [more inside]
Interested in tenant rights: NYC landlord is asking for more money (additional $1000) than security+pet deposit ($2,400)?? [more inside]
What damage control measures can I do for selling my PC on eBay which was only partially wiped? Yes, I know how stupid this was. [more inside]
Suffering through the great midwest Comcast outage of late 2010. What ill may come of this? [more inside]
How to protect a website? [more inside]
My parents just got a weird call about 30 mins ago (11:50pm). They were getting ready for bed, so my sister picked up. [more inside]
Our house got robbed last week for the second time in less than a year. Short of moving, what can we do to get our peace of mind and sense of security back? [more inside]
Does my wife need to abandon her email address? [more inside]
Flying into the US from another country: what's going on with security? [more inside]
Can you go through the new airport scanner machines holding a pet? [more inside]
I'm going to be flying next month, and I'm already annoyed/upset, etc... about the pornoscanners and groping issue, but I'm even more nervous now due to one article I read and am wondering if I'm misunderstanding the groping issue and it is actually WORSE than I already believe it to be: Is the "enhanced patdown" an actual under/inside the clothes grabbing of genitals? I can't find a clear statement on the TSA site (great PR, not so great information architecture) and one blog explicitly detailed the touching of her labia but other blog posts I've seen can be read either way (as underclothes contact or overclothes, they're not particularly clear). Help???
How can I take advantage of free internet at a hotel and/or cafe during the post-firesheep apocalypse? [more inside]
What are the most cost-effective ways to burglar-proof a rented apartment? [more inside]
Help me keep my bags from being stolen during the TSA security check. [more inside]
How worried do I need to be about Firesheep? What sites does it affect? Is there anything I can do to protect myself on an iPad? [more inside]
I like Mint.com and I want to use it. My wife, she disagrees. This has caused some consternation. Maybe you can help. [more inside]
[NaNoWriMo Filter] Help me research network security for my novel please. [more inside]
When I start a wifi session (at a coffee shop for instance), the bubble will say "additional login may be required" which, when I open a web page, is just an "I accept" disclaimer. BUT, when I have to turn off the computer (reboot for windows update, go to the bathroom, etc) and then try to re-establish contact, it won't work. I can't get connected and I can't get the login screen. I've tried everything I can think of to get it to work but it just seems like I have to come back the next day. Any tricks to get me back on?
override XMLHttpRequest security policy in firefox? [more inside]
I have a Linksys WRT110 router. Although it has some access controls, I find them difficult to use and counterintuitive, and I say this as someone who has been using computers since the days of the TRS-80. Is there a router out there that will let me limit access times by MAC address of different devices, either by a daily quota or a cutoff time? [more inside]