Last year I put my email into the you've been pwned website [link] . This last week I got an email saying I may have been affected. What can I do to protect my data? [more inside]
How do I separate posting, notifying, & consuming content on Facebook? [more inside]
My Instagram was hacked into earlier today, and both the password and associated email were changed. [more inside]
My dad just called me in a panic. His iMac (running El Capital or Yosemite) gave him a scammy looking error message. Need some help figuring out what's going on and how to fix it. [more inside]
I would like a way of playing an audio recording when a Xmas gift is opened/the gift revealed. Need some ideas of how to make this happen; I'm sure it's possible, there are tons of greeting cards that have the mechanism that when you open, they play some corny song. I would like to something similar, but for a box. [more inside]
In September, my mom's email account sent out a bunch of spam to her address book. She sent out a "disregard that", changed her password, and we thought it was done. Then a couple of days ago it happened again. She is stressed out and I'm supposed to be the techy one in this family, so what do I tell her? [more inside]
I have a weird (what appears to be) link attempting to get my phone to follow a URL that is a WAP request. What the? [more inside]
I just received two standard-looking emails from a legit-looking European Web site, one welcoming me to the site and the other asking me to verify the email address. I've received those hack-y "here's the password reset you requested" emails and just ignore those, but the welcome email included the username (the old email address) and password. What's the best way to deal with this? [more inside]
My email was in the Ashley Madison leak, and I am married. Should I fess up now? [more inside]
So my email address is in the Ashley Madison hack. Not sure what to do, if anything. I am not married and never have been. I wasn't in a relationship when I signed up. In fact, I was just getting out of a relationship and I joined one night when I was feeling sad and lonely and I wanted to see what it was like. I thought AM was more for NSA relationships than specifically for cheaters. I'm a graduate student and I used my .edu address. This was really dumb, but I wasn't thinking straight at the time. So how worried should I be? [more inside]
What's up Mefites! Please can you share with me your post gym routine hacks - basically, how can I make the process of showering and getting ready for work after my morning workout less time-consuming? [more inside]
Hostgator says my site has been hacked but can't find where or how, and after two days and numerous calls, we're lost. Can anyone explain in teeny, tiny words what I should do next? [more inside]
I am familiar with the dark underside of PC software. Finding cracked and hacked versions of whatever you want is a trivial exercise. Is it like that in the Android app ecosystem too? [more inside]
How do I safely execute this blender trick? [more inside]
Is it possible to pull audio to a external speaker set in a affordable hack or method? [more inside]
What are your best hacks for repurposing items or using them in an unusual way to help organize your kitchen? [more inside]
I'm trying to play Region 2 European DVDs on my US DVD player. I know you can hack DVD players to be region-free, and have read the previous threads on AskMeFi from several years ago, but I cannot find a hack for my specific Sony player, model DVP-SR210P. Any tips appreciated!
I have a new, unassembled red 2x4 Kallax. I want it to be 2x3. Could a lumberyard easily cut down the two long-pieces? [more inside]
There was a distributed denial-of-service (DDoS) attack on my personal website, causing my shared web hosting provider to suspend my account and request that I find another web host. Someone sent me an ominous message on Twitter implying that they were responsible. I have never had anything like this happen before. I have a backup of everything and I can find another web host (with DDoS protection this time), but I am a little perturbed by the experience. Is there anything else I should do? How do I prevent this from happening again?
I'm getting tired of the constant hacks, and I pretty much use the same passwords across multiple sites. Thing is, I can't keep up with eight dozen passwords. Seems like the answer is one of the password manager programs/apps out there. So which one is the one to use? How do I use it with multiple locations and computers (work/home/mobile)? I'm willing to pay upfront, but not a subscription. No one needs another monthly expense. Bonus points if you can explain it like I'm five.
Have there been any documented cases where an engineer (or whatever) on a physical device or product used in the general marketplace has included a backdoor that allows them to get special "benefits"? Examples inside. [more inside]
I have a frustrating issue with a site hosted on Wordpress. Every now and again - and seemingly at random - I will get a message saying "Resource Limit Is Reached - The website is temporarily unable to service your request as it exceeded resource limit. Please try again later" when I try and visit my site or dashboard. [more inside]
How do I transition from an Android phone to and iphone? [more inside]
My dad passed away on Friday, and my mom is eager to get into his computer (Song Vaio running Windows 7) and Blackberry (Bold). Both are password protected. Is there any way to change the password on each without wiping the data? I'm fairly computer literate, and my father will have every software disk he's ever received. We also have access to his email if that helps with the Blackberry. Thanks.
Long story short: an anonymous twitter user started harassing me. Twitter troll has no followers so I guess was made up for the purpose of harassing me and a friend. No biggie, I've blocked. Slightly perturbing however is that the troll referred to something I've only talked about in private. How could troll know this and how do I protect myself? [more inside]
I'm documenting quilts and have a decent set-up in place for photographing them (seen here), but now I've got to take it on the road. My 1"x3"x9' wooden crossbar isn't going to cut it as checked baggage and it's a tight fit in my compact SUV, let alone an affordable rental car when I get to my destination. However--a deal breaker--the crossbar can't be a dowel or have a round profile. With dowel-type crossbars the quilts hang and sag at the top and don't present a flat place to photograph. More details and reqs after the jump. [more inside]
A fellow aspiring entrepreneur and friend of mine is in desperate need of help. Time is of the essence! Here's the story: Two years ago he created his own business that sells custom hand-made clothes and products. He owns a website and is on all of the normal social media. One of his most effective tools to connect with customers is through instagram. He's worked hard over the years to develop a fan base of over 27K followers. Mysteriously, last night this account was hacked. They changed the password, hacked the business email, and have taken control of the brand. This account is the business' main source of revenue and advertisement. Although he's trademarked the company and taken all the normal preventative measures, the admin. at instagram claims there's nothing they can do to help. Assuming this is true, what are his available options? Essentially, my friend's ship just got hijacked by some evil bastards and he's going to need a seal team to get it back. [more inside]
My "throw-away" password is in the list of those compromised by the Adobe hack. It's a common dictionary word that I use for sites that I really don't care about security on: things that I don't even understand why they should be password protected, "test-driving" sites or products where I don't intend to keep using them, and an old email account that was for a blog that I haven't updated in about four years. (And I don't use the account any more). I'm pretty unconcerned about it being compromised. Is there any reason I should worry? And if I do want to change it, is there any way to find out what all the sites are that I have used it on in the past? [more inside]
My old, dormant Twitter account recently started sending out direct messages to everyone on my list with spammy stuff. This happened within the last hour, and I just deactivated the account. The password for the Twitter account is different than the password for the email account that I set it up with. The password on the Twitter account hadn't been changed, and no tweets were sent from it (only DMs). Is this likely a third party app jacking the Twitter account (and therefore isolated) or should I be concerned about the establishing email account as well? I ask because this is my primary gmail account.
I recently had to retire my malfunctioning M$ Natural Wireless Laser Mouse 6000. I bought the M$ Sculpt Ergonomic Mouse, which works beautifully but is missing essential button functions. The "Back" button is tiny, stiff and hard to reach, and the "Forward" button is gone completely. I can set the "Click Roller" button to "Forward," but I'd much rather reset the "Horizontal Scrolling" functions (nudge roller left and right) to "Forward" and "Back." Is there a way to do this? Where else should I go to ask this question?
Today I discovered that Mr. Clean Magic Erasers -- which are meant for cleaning scuffs and dirt off of floors and walls -- effortlessly worked on some clean-but-stained melamine bowls I own. What new ways have you discovered to use common household goods and items?
I want to use a Google Hangout "On Air" for a project, but a tiny limitation is getting in the way. I would like to bypass the 'Press to Talk' functionality with a tiny browser script/hack/modification. My programming knowledge is tiny, but I am sure this could be done super super simply with a script loaded in the browser. Perhaps there's better solution. Any ideas? [more inside]
My Gmail account was very definitely hacked on Sunday. A whole lot of email was sent, seemingly to everyone I've ever corresponded with from that account. There was clearly a login from Poland which corresponds exactly with when the emails began to be sent. The session seemed to last about 7 minutes. I then received about 150 "mailer daemon" emails due to the bounces from either old addresses, addresses which don't receive unsolicited email and mail servers which correctly identified the content as spam. [more inside]
Tired of the random 'Searching' beep throughout the night waking me up. Help me get some sleep? [more inside]
I have two old Radio Shack handheld radios. They were purchased in the US, originally for communication on the ski slopes. On the back, there is a number "09A06" and it also says CAT NO 21-1936. I was about to throw them away, but would rather repurpose them for something. I live in a large metropolitan area, in an apartment. I am good at programming and am comfortable using something like an Arduino, Rasberry Pi, BeagleBone, etc. What interesting hack can I use these for?
I recently went onto amazon and found multiple items in my cart that I had not placed there. Could my account have been hacked, or is it just some weird glitch? [more inside]
I've been building guitar pedal kits from buildyourownclone, and it's been great fun. I'm running out of pedals I want to make for myself, and am looking for other projects, like this stereo tube amp, and maybe this sous vide. Can you recommend more electronics projects (preferably kits, so I don't have to scrounge for parts) that are cool and look good at the end? [more inside]
I would like to know if you have some place /event for me to visit in london. I'am a french otaku / geek / goth / rpg gamer. My friends already give me some address and i get somes like : The london hackerspace, namco station , forbiden planet, slimelight, the david bowie exposition. I will be there the 19 march to the 25 march mainly for the louie ck show. Regards Bussiere
Android apps seem to grab permissions that I have no desire to give them. My understanding is that the permissions per app are all bundled together: it's all or nothing. At least officially. Is there another way? Also, is there a privacy watchdog site that will help me find apps that actually respect my privacy and support/purchase them over those that do not? [more inside]
What would be cool to have spin round and round, but that's light and aerodynamical enough that my fan's motor could power it? [more inside]
How can I make my bras more comfortable? [more inside]
I'd like some every day hacks for life in Los Angeles. [more inside]
Can I hook up a Kindle Fire to an external hard drive? [more inside]
A friend has had an old Hotmail account hacked. The hacker used information in the archives there to access a YouTube account where apparently some compromising videos were uploaded. The hacker copied the videos to another YouTube account, and then sent links to the videos to my friend's family - and worse still, to members of the executive board of the nonprofit organization by whom my friend is (was?) employed. He reached out desperately to me, but I know nothing but the most basic things about Internet security and privacy law... [more inside]
How can I hack my Flip Ultra HD? [more inside]
How can I hack a Canon external Flash for my high-speed video application? [more inside]
This morning about 108 gmail inbox messages vanished. I can find them under "all mail" but i don't know they would leave the inbox. Also, someone's been trying to add an event to my google calendar, with no success. are these two things related? is there evidence of a hack? thank you.
Spa Pillow Rehab? Looking for suggestions on how to replace "skin" over foam spa pillows. [more inside]