63 posts tagged with computer and security.
Displaying 1 through 50 of 63. Subscribe:

This JPEG has a virus. Is it dangerous?

I've got a few JPEGs with viruses in them. What would need to happen for these to get executed and do stuff to my computer? [more inside]
posted by straight on Oct 6, 2014 - 9 answers

So what do I use now if I don't use Truecrypt?

I used to use Truecrypt to encrypt little enclosures so I wouldn't have to worry about my files so much when I, say, put them on a USB stick or backed them up to the cloud. There was a whole... thing with Truecrypt and now it's hard to say if I should use it anymore. Is there another program that's going to work well for this purpose? [more inside]
posted by selfnoise on Sep 21, 2014 - 7 answers

Software skills for aspiring technical writer

How do I know I’ve taught myself enough technical writing software (number of programs and my abilities therein) for potential employers to take me seriously? [more inside]
posted by glass.hourousha on Jul 23, 2014 - 6 answers

Question about Bluetooth security and speakers.

I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology? Many thanks for your time.
posted by jason's_planet on Oct 24, 2013 - 2 answers

Microsoft Security Essentials

Microsoft Security Essentials Missing From System Tray. [more inside]
posted by dbirchum on Sep 2, 2013 - 35 answers

I had a compromised Java version. How do I clean up afterwards?

My AV program found 'Exploit:Java/CVE-2012-4681' on my laptop. It's a primer that sets up my machine for future exploits, but I haven't found any further infections using AV or Housecall. What steps should I be taking to assure myself that the machine is clean, and what can I do to prevent this kind of problem in the future. [more inside]
posted by Urtylug on Jan 12, 2013 - 3 answers

Is it safe? Is it?!

How safe is a virtual machine for testing unknown software or browsing unknown websites? [more inside]
posted by apip on Aug 29, 2012 - 9 answers

How do online banking trojans work?

How do online banking trojans work? [more inside]
posted by davar on Jun 3, 2012 - 5 answers

Laptop theft prevention

How secure is this Spyder laptop lockdown device? [more inside]
posted by etc. on Dec 16, 2011 - 7 answers

Should I report this security issue to my school?

Is it troublesome to be able to obtain access to the names and e-mail addresses of students, faculty, employees, and alumni of a university? If so, how should I go about reporting it without being misinterpreted or punished? [more inside]
posted by anonymous on Oct 19, 2011 - 18 answers

Best lock for my laptop?

Laptop lock question. Yes I know you people hate locks, but please bear with me! [more inside]
posted by radioamy on Sep 14, 2011 - 13 answers

How to force Asus Eee to recognize private wireless

Please help, computer techies. Asus Eee PC wireless connection problem with Windows 7. [more inside]
posted by Viomeda on Aug 21, 2011 - 6 answers

Easiest way to destroy a hard drive in situ?

I'm having trouble disassembling an old desktop PC to get to the hard drive before I can destroy it and throw everything out. Is there a quick and easy way to destroy the drive in situ, using everyday household objects? [more inside]
posted by tel3path on Apr 6, 2011 - 36 answers

Redoing work with less time and fewer resources, on his own time. Should he do it?

Asking for a friend: He is a security manager. The client told him to document post orders, but they wouldn't provide him with the resources to do them. He did them on his own computer. Then, his hard drive failed. (A bit of a long story inside.) [more inside]
posted by methroach on Mar 8, 2011 - 5 answers

Safety tips without pop-ups/unders

Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.
posted by SillyShepherd on Feb 1, 2011 - 4 answers

Do I need to be concerned about my computer security?

Today I clicked on the Chapters website's "My Account" link, which usually 'remembers' who I am and shows my email address, asking only for my password. Today, however, it showed a stranger's email address and name. Do I need to be concerned? [more inside]
posted by smilingtiger on Jan 31, 2011 - 10 answers

Safe to bank from home computer?

Safe to bank from home computer? [more inside]
posted by Prairie on Jan 15, 2011 - 14 answers

If I only wiped 10% of a hard drive before selling it, am I 90% screwed?

What damage control measures can I do for selling my PC on eBay which was only partially wiped? Yes, I know how stupid this was. [more inside]
posted by anonymous on Dec 15, 2010 - 8 answers

Is a stolen PC effectively protected by a password?

In the event of a loss or theft, how safe is the data on a password-protected PC laptop? [more inside]
posted by Clambone on Aug 24, 2010 - 12 answers

Mysterious keyboard behavior: accidental or malicious?

My MacBook's keyboard mysteriously changed to Dvorak! How can I tell if someone messed with my computer? [more inside]
posted by k. on Mar 19, 2010 - 8 answers

Thieves who stole my iMac left a trail...

My house was broken into and among other things, I had my iMac stolen, but I was able to get the burglar's IP address... What can I do with this info? [more inside]
posted by mwang1028 on Mar 16, 2010 - 9 answers

Facebook's taken over my GMail

When I log into Gmail, Firefox redirects me to a page on Facebook. What gives? [more inside]
posted by reenum on Feb 1, 2010 - 10 answers

Help me connect Mac-at-home to Windows-at-work?

What could happen to my mac if I connect remotely to my windows computer at work. Is there a viciously secure way of doing this? [more inside]
posted by OlivesAndTurkishCoffee on Oct 9, 2009 - 8 answers

I've been hacked.

Someone hacked my laptop! What do they know now, how much can I find out, and how can I keep it from happening again? [more inside]
posted by atchafalaya on Sep 10, 2009 - 13 answers

Is my hard drive opaque on a public network?

Wi-Fi security. How much of the contents of my a) iPhone or b) iBook can be "seen" if I'm on a public network? Particularly concerning the latter, I've never been clear whether, in logging on to network X--be it a free municipal net or my employer's "guest net"--I'm simply an inscrutable blip on a network or I'm making my hard drive an open book to anyone who cares to peek. Any insight would be appreciated.
posted by the sobsister on Jul 19, 2009 - 11 answers

How can I use a computer securely and privately

How can a competent but not technical geek person browse internet as securely and privately as possible, keep files private on a pc etc? Linux distro? specifics - [more inside]
posted by Not Supplied on Jun 8, 2009 - 12 answers

Let's not give all my data to oppressive governments, okay?

How to I compute safely in dangerous places? Looking for advice on hiding data, protecting accounts, and securing connections. [more inside]
posted by Nothing on Jun 2, 2009 - 25 answers

I need resources / links information to convince a friend that his small computer network might be of interest to hackers?

I need resources / links information to convince a friend that his small computer network might be of interest to hackers? [more inside]
posted by jacobean on Jan 11, 2009 - 7 answers

My computer might have a Trojan, now what?

It's become apparent that my computer may have a Trojan. I just received a Returned Mail notice for mail I never sent, which instead of displaying my name it displayed "jasen kimberly," and was sent to a strange russian email address: munsov@pobox.spbu.ru. I'm concerned that this may be the result of a trojan "phoning home," or using my computer to send spam.
posted by matkline on Oct 5, 2008 - 9 answers

Recommend easy-to-use software for elderly people

Help me with some free, easy to use software for elderly people to use on a computer. Specifically: hands-off, self-maintaining security, and a good replacement for Windows Explorer. [more inside]
posted by biwa-shu on Jul 2, 2008 - 9 answers

Problems with antivirus software. How do I check there aren't any viruses?

I think my computer might have a virus. Are there any trustworthy security testing services that I can use to conclusively prove whether or not this is the case? [more inside]
posted by Jack Alucard on Jun 10, 2008 - 7 answers

Buggy USB Drive?

Can simply connecting an infected jump drive release bugs onto a computer? [more inside]
posted by Kronos_to_Earth on May 1, 2008 - 8 answers

Virus protection stats?

I need your help to settle a debate. Could you suggest the safest antivirus setup, within the confines of Windows XP and a wireless internet connection, with the least bloat, and provide the statistics to prove it? I need more than simple AV comparatives. I need stats on the virtues of Firefox versus IE, on using two function-differentiated user accounts (admin versus everyday, with the 'everyday' account having no admin privileges), etc. Can you help? [more inside]
posted by flibbertigibbet on Mar 25, 2008 - 6 answers

Securing and encrypting a network?

General network and computer security: keyservers, PGP/GPG, encryption, etc...book/instructional recommendations? [more inside]
posted by jjsonp on Mar 10, 2008 - 6 answers

Can computers live forever?

Computer maintenance 101: Just bought a Thinkpad T61. How do i make it go forever? [more inside]
posted by doppleradar on Feb 27, 2008 - 14 answers

Hey, I'm not Trudy! Or Ben!

Why does my Mac appear to have other people's computer names at the command line? What's up here? [more inside]
posted by Happy Dave on Nov 12, 2007 - 8 answers

malicious security suites?

How do we know that highly regarded secuity suites are not surreptitiously malicious? [more inside]
posted by Kevin S on Oct 27, 2007 - 14 answers

What was that password again?

In Windows XP, is there a way to see the password that is stored in the system to log into a wireless network? [more inside]
posted by al_fresco on Oct 24, 2007 - 6 answers

Keeping the Geek Squad Outta my Biznass

How to keep prying eyes from the files on my laptop... [more inside]
posted by TheGoldenOne on Sep 1, 2007 - 9 answers

Have I been hacked?

Have I been hacked? [more inside]
posted by Crotalus on Aug 4, 2007 - 16 answers

How to secure my computer for guests?

Is there a method/program for limiting a guest's access to my computer to -only- a web browser (no start menu, programs, file directories, etc.)? [more inside]
posted by JFitzpatrick on Jun 30, 2007 - 10 answers

Surveillance System Help

I am looking for either high-resolution wireless IP cameras or Video Capture card recommendations and I have a few additional questions. [more inside]
posted by Raichle on Apr 19, 2007 - 3 answers

How can I do cool non-cleared computer security work?

Help me figure out how I can do really cool computer security stuff for a living. The catch: it can't be work for the NSA or Justice Department or anything that requires a security clearance. [more inside]
posted by anonymous on Mar 27, 2007 - 15 answers

Can I allow people to visit one page in IE and nothing else on that computer?

Can I allow users on a Windows computer to access only one website in one program (IE Explorer or Firefox) and nothing else on that computer? [more inside]
posted by einarorn on Feb 26, 2007 - 8 answers

How to create a self destructing folder for my mac?

Is there an application for my mac (OS 10.4) that would enable me to have a folder that would "self destruct" if the contents in that folder are not accessed for a user set ammount of time? [more inside]
posted by superdeluxe on Feb 5, 2007 - 15 answers

Help me find out if someone is spying on my computer

Can you help me diagnose if someone is spying on my computer? [more inside]
posted by RustyBrooks on Jan 4, 2007 - 30 answers

Why can't my Keychain.app settings work for both Safari and Camino?

I typically use Safari, and have my preferences set to store all of my passwords and user names in my Keychain.app. However when it starts acting up and giving me the spinning beach ball, I use Camino (v. 1.0.3.) When I try to log in to a website, it asks me for my user name and password - do I really have to fill in ALL those passwords and user names all over again? In other words, is there any way I can get Camino to access the passwords I saved using Safari? [more inside]
posted by invisible ink on Sep 19, 2006 - 6 answers

I don't think they want to help me

network management filter: I'm working for a local government education department. My team is meant to be maintaining/improving several large websites. The IT support people refuse to install a web browser that isn't IE 6, citing network security as the reason.... are their fears reasonable? [more inside]
posted by Tixylix on Jul 10, 2006 - 23 answers

Help me help myself

I'm dropping my laptop off for service--what do I need to do to protect myself? [more inside]
posted by divka on Jul 8, 2006 - 10 answers

How best to secure a kiosk monitor

Best choice for securing a monitor in a kiosk setting... [more inside]
posted by O9scar on Apr 29, 2006 - 1 answer

Page: 1 2