1070 posts tagged with security.
Displaying 1 through 50 of 1070. Subscribe:

Symbol of security

I'm tasked to collect the different (academic) research topics on security and privacy of our group and commission someone from communications to help with making some graphical representation for a website. What should that look like? What symbolizes computer security/privacy/safety? I'd like to avoid clichés like padlocks or keyboards with the return key re-labeled, while retaining a mental association.
posted by meijusa on Dec 1, 2016 - 11 answers

Why should I hide my phone number when phone banking?

I'm about to train for phone banking with SURJ, and there are instructions to keep one's phone number private (basically, by connecting with Google Voice). Should I keep my number private--is it a conduit to other private information? Can someone find me with my number alone? [more inside]
posted by witchen on Nov 29, 2016 - 14 answers

Quantifying economic outcomes for whites of minority-targeted programs

In personal experience, many programs notionally or popularly perceived to be aimed or benefiting primarily minorities end up making me (white dude) better off as well, e.g. Section 8 housing assistance. I'm trying to identify data and research sources that either support or diminish this claim. [more inside]
posted by klangklangston on Nov 23, 2016 - 9 answers

Beginner cybersecurity, UK edition, Part II

I'm fairly well-versed in the things I need to do at the application layer, and standard advice for avoiding internet surveillance is "use a VPN, and hope they don't store logs". But what impact would switching to IPv6 have on this standard answer? [more inside]
posted by Leon on Nov 23, 2016 - 1 answer

link to recent new alternative-to-password-safe tool?

Google-fu fail. I'm looking for this new open-source sw tool I saw the other day that avoids creating a database, instead computing your needed passwords on the fly based on your username and the web site info in particular. I think. [more inside]
posted by bitterkitten on Nov 20, 2016 - 4 answers

I'm Dr Frankenstein, my Gmail password is a monster of my own creation

I can't remember what I changed my Gmail password to when I reset it last month, and I no longer have access to my recovery email address. I can still access my Gmail from my phone, but I can't get in to my Gmail account on any browser! Is there any hope for me? [more inside]
posted by rodneyaug on Nov 17, 2016 - 13 answers

My mac's security has gone awry

In the past week or so, a few aspects of my Mac's security setup have changed without my (knowing) intervention. 1. I've got my Mac set to lock itself after 60 minutes of inactivity. That is no longer happening; 2. Safari is bugging me to enter my password when I launch it. [more inside]
posted by adamrice on Nov 16, 2016 - 2 answers

Need to build a dummy car alarm with bright-red flashing LED

Someone recently broke into my car at night. I can't afford to install a true car alarm. Instead, I'd like to put a bright red flashing LED on my dashboard. [more inside]
posted by akk2014 on Nov 15, 2016 - 6 answers

How do I connect to my home network securley while traveling?

I want to connect to my home network, video and voice chat with my family securely, and possibly even screenshare or remote control one of the the PCs. What do I need? [more inside]
posted by cosmicbandito on Nov 10, 2016 - 5 answers

Becoming a Security Researcher

How do I get into the IT Security area? Not just superfluous knowledge based on a certification, but a genuine Security professional. [more inside]
posted by theobserver on Nov 10, 2016 - 9 answers

Private internet connection as part of anti-virus software

The latest version of my anti-virus software includes a new "Phantom VPN" function, which, when active, creates a "private connection" to a "virtual location in the USA." When active, it lists a "% used" statistic determined by a ratio of KB to MB. For example, right now it tells me I'm using "0%", or "219.38kb KB of 500MB Secured Traffic" I would like to know: A) In terms of security, what does a private/Phantom VPN connection accomplish, and is it worth using every time I connect to the internet? B) What does "% used" have to do with functionality? Is the percent KB/MB something I need to pay attention to? Thanks
posted by BadgerDoctor on Nov 5, 2016 - 5 answers

Just use fingerprint scanner on a Nexus 6P?

How to *just use* fingerprint scanner to unlock a Nexus 6P? [more inside]
posted by My Dad on Nov 2, 2016 - 7 answers

How early to get to Toronto Pearson for a Sat. AM flight to the US?

Flying back to the US out of Toronto Pearson on a Saturday 7:45 AM flight (AA terminal 3). How early should we get there to deal with customs, security, checking bags ... (we are US citizens).
posted by gudrun on Oct 27, 2016 - 8 answers

Attachment research- nurturing

What research do you know of (or how would you best word searches to get results on the topic) for how responses to toddler crying impact later attachment? [more inside]
posted by xarnop on Oct 25, 2016 - 5 answers

How easy is it for someone to discover your real identity online?

I'm struck by cases where someone who suddenly becomes famous is shamed by people online after they discover embarrassing comments they made in the past. As an example, CEO of Whole Foods used an alias and engaged in petty fights online over prospects of company. Somehow, hackers discovered it was him. Say I say some really harsh things about iPhones online (e.g., on Ask Mefi), then achieve fame through asking a question at a Presidential debate--how easy would it be for someone to discover my shameful anti-iPhone tirades?
posted by Jon44 on Oct 22, 2016 - 16 answers

Stay sexy, don't get murdered

After listening to too many true crime podcasts, I need suggestions on updating my apartment security. [more inside]
posted by pumpkinlatte on Oct 7, 2016 - 11 answers

Can my employer access sensitive information if they pay my phone bill?

I work for a company that has offered to pay my cell phone bill. I'd like to take them up on it and consolidate my two phones since I'm currently carrying a work and personal phone everywhere. But is it too good to be true?? [more inside]
posted by sparringnarwhal on Oct 6, 2016 - 18 answers

Best practices for using an iPhone on a public Wi-Fi network?

I'm looking for best practices for using our iPhones and iPads on public Wi-Fi networks. That is, what can we do to best protect/secure/encrypt the data that is transmitted over such networks to/from the devices (aside from not using the public networks in the first place)? Would using a VPN accomplish this? Any recommendations for one? Something else? These are iPhone 7's and iPad Pro's, all running the latest version of iOS 10. Thank you!
posted by jroybal on Sep 29, 2016 - 6 answers

How secure is a car with a 'remote keyless entry' system?

I just had to get a new car, and the one I got (a 2016 Honda HR-V) has remote keyless entry plus a pushbutton start/stop for the ignition. How secure is this when it comes to car thieves? [more inside]
posted by easily confused on Sep 25, 2016 - 19 answers

Netflix login issues

I've been getting messages from Netflix every month or so stating that they have seen suspicious activity on my account, and I need to change my password. I use strong passwords (12 characters, generated by a password manager). Usually, I see no suspicious activity on my account, but this weekend there did seem to be access from somebody other than my family, and no message from Netflix this time. Is there anything more I can do to secure my Netflix account? [more inside]
posted by dforemsky on Sep 6, 2016 - 7 answers

Make computer not go to sleep - without admin access

I am a teacher lucky enough to have several classroom computers. I am a teacher unlucky enough to not have admin access to these computers. I am a teacher whose students can't type capital letters. Help! [more inside]
posted by raspberrE on Sep 2, 2016 - 18 answers

Are identify theft monitoring services worth it?

More than one such service exists. Do they work? Are they worth it? Should I sign up? [more inside]
posted by StrawberryPie on Aug 22, 2016 - 8 answers

Breach, breach, breach

My identity was stolen last year [more inside]
posted by silsurf on Aug 18, 2016 - 7 answers

Like a used bike or like used underwear?

Our work recycling often contains copious amounts of working equipment. It's ok to bring stuff out. I brought out a number of high-capacity name brand hard-drives. What now? [more inside]
posted by Iteki on Aug 15, 2016 - 18 answers

Landlord is illegally keeping our security deposit - Michigan edition

We left the house in better condition than when we arrived - but the landlord is blaming us for preexisting damage. He missed the deadline to return our deposit, so shouldn't be entitled to any of the money. But now what? [more inside]
posted by anonymous on Aug 14, 2016 - 14 answers

Looking for a very specific security/nanny camera

I'm looking for a specific security/"nanny" camera and so far the list of must-have features is causing me to fail at google and amazon-fu. Specific features needed listed inside. [more inside]
posted by splen on Aug 11, 2016 - 7 answers

Can the office network dept intercept cellular signal?

At the office, they put in a Wilson Panel Antenna (looks like this one) for a stronger cell phone signal indoors (for Verizon, Sprint, and T-Mobile I think they said). My question is, can they (the network people at the office) intercept the signal such that they could see employee phone calls, texting, and web traffic?)
posted by allelopath on Aug 10, 2016 - 8 answers

You've been pwned- What next?

Last year I put my email into the you've been pwned website [link] . This last week I got an email saying I may have been affected. What can I do to protect my data? [more inside]
posted by Braeburn on Jul 12, 2016 - 7 answers

Lost/Stolen Cellphone Overseas - Information Secure?

Lost my phone overseas. Is the information on my phone mostly secure? [more inside]
posted by driedmango on Jul 4, 2016 - 3 answers

How to remove a webpage of log-in credentials from Google?

A forum I used to frequent had its log-in credential database hacked several months ago, including user names, passwords, and the email associated with the account. My email is on there, and it includes my full name. The text file of the hacked info was available on tor sites previously, but yesterday I googled myself and discovered that the file had made it to the normal www and was featured prominently in google results. How do I get this removed from google results? Google's help pages for removing content are not super helpful; more details inside. [more inside]
posted by anonymous on Jun 27, 2016 - 1 answer

Which flavor of awful should I buy: Norton Vs. McAfee edition

I am holding my CEO's credit card in my hand and cannot leave work without purchasing either Norton or McAfee today (thanks to our sales guy who keeps getting malware on his computer). Running a Lenovo Yoga 3 Pro-1370 with Windows 10 and Windows Defender, however, they are not convinced this is sufficient and are forcing me to buy/install one or the other today. Help? [more inside]
posted by Unicorn on the cob on Jun 24, 2016 - 20 answers

Do I need to appear in Los Angeles small claims court?

I know you are not my lawyer, etc. We have had a serious family death and I need to pack up everything to move across country in the next few days, for an undetermined amount of time (6 months, one year?), but I am supposed to show up here in small claims court in July. Need advice. [more inside]
posted by Vaike on Jun 14, 2016 - 10 answers

Culturally Inclusive Security Questions

I'm trying to come up with a list of online account security questions that are secure, memorable, and considerate of class & cultural differences [more inside]
posted by chara on Jun 6, 2016 - 35 answers

Malvertising, drive by downloads

How safe is it really, to surf the web these days on a modern Windows PC? [more inside]
posted by inner_frustration on Jun 4, 2016 - 11 answers

My castle in the clouds... New Rules for data architecture.

I need a cloud storage service and I know just enough to be overwhelmed. Halp? [more inside]
posted by fritillary on Jun 3, 2016 - 2 answers

21st-century safety deposit box protocols?

I opened up a safety deposit box, and was surprised to learn that my bank uses a "face recognition" program (not working at the moment, don't worry, we'll fix it soon) to control access to the vault. And thus, the box I'm renting can be unlocked with only my key. Is this practice standard for big banks these days? [more inside]
posted by QuantumMeruit on Jun 2, 2016 - 8 answers

Best way to protect the contents of an external hard drive?

I have one hard drive with some important documents on it and I'm looking to protect these contents in the event of theft. What's the best (not too difficult) way to do this? I'm on Apple OS.
posted by malhouse on May 29, 2016 - 5 answers

Why are sites switching to two page login processes

Tumblr and Google are now using two page login processes where you first enter your username or email and then are sent to a second page to enter your password. What's the reason/logic behind this switch from the standard two item form?
posted by srboisvert on May 29, 2016 - 9 answers

Is Wordpress secure now?

I've read anecdotally that Wordpress is pretty flawed from a security standpoint, and I'm wondering if any of the issues in this article have been patched in the four years since it was published (there have been a lot of updates since then). And if so, what are the current concerns about WP security? Anything a site owner like me should be concerned about, or watching for?
posted by jbickers on May 12, 2016 - 22 answers

Responding to persistent personal informaion requests.

To the law people out there: I work for a small company that recently signed up with a new health insurance company. For various reasons I declined the coverage, but I am getting bombarded by requests for personal information. Here's the actual latest message that I received after I informed them that I do not wish to participate: Hi C13, For any employees at Small Company to get health insurance, you need to complete your application. All employees must complete an application, regardless of whether accepting or waiving coverage. [more inside]
posted by c13 on May 5, 2016 - 11 answers

Google's Chrome browser is refusing to forget my passwords with LastPass

I've used the Chrome browser with the LastPass extension for years, and for years it's been set to refuse automatic access to accounts such as Facebook, metafiilter, GMAIL, etc, unless I type in the master LastPass password. Suddenly, this has changed, and Chrome refuses to forget my passwords....it's driving me nuts! [more inside]
posted by newfers on May 3, 2016 - 10 answers

Looking for "horror stories" of computer virus infections

I need to put the fear of God into some foolish, negligent users. I'm looking for examples of organizations that were hit with some kind of horrible malware (like CryptoLocker) or had sensitive data stolen -- all because of a really stupid action by an employee. [more inside]
posted by alex1965 on May 2, 2016 - 21 answers

Is there any way to get my hacked Instagram back?

My Instagram was hacked into earlier today, and both the password and associated email were changed. [more inside]
posted by bookish on Apr 19, 2016 - 3 answers

What was this SF short?

Trying to track down a short science fiction story involving compromised (in the infosec sense) wireless audio implants. [more inside]
posted by attercoppe on Apr 8, 2016 - 0 answers

Durable, metal-free belt?

For at least the immediate future I'll need pass through security in a federal courthouse without the benefit of employee ID, which means going through a metal detector. I need a durable, metal-free belt (leather or otherwise) that fits standard 35mm belt loops and looks reasonably presentable in a casual-end-of-business-casual environment. Thanks!
posted by Oktober on Apr 6, 2016 - 7 answers

How do airlines predict TSA capacity on a certain day?

My fiancé and I have a flight out of JFK at 7am on April 8th. I got a weird email from our airline (JetBlue) last night, warning us to get to the airport even earlier because of longer wait times at security checkpoints. [more inside]
posted by millipede on Apr 6, 2016 - 11 answers

Best way to clean personal info off work computer?

My work computer is 5 years old and is not responding well to the latest Office upgrade. It only has 4 GB RAM and my tech guy tells me that I need a new laptop. So, yay, but I have been using this laptop for everything for 5 years and I want to make sure that all my personal info and passwords are cleared before turning it in. So, how do I do this? (oh, it's a Latitude E6510, if that matters)
posted by qldaddy on Mar 29, 2016 - 11 answers

How to password protect (NOT encrypt) a portable HDD

I know there are a lot of good programs that will allow you to encrypt part or even all of the files/folders on a portable HDD. I am looking for a simple way to password protect the whole HDD so that if it is attached to any computer, a password is needed to access it. I know that is not as 'good' as encryption', but that is all I need. TIA.
posted by toucano on Mar 17, 2016 - 18 answers

Talk to me about home security cameras.

I'm interested in getting a home security camera. Please advise. [more inside]
posted by The corpse in the library on Mar 15, 2016 - 6 answers

Security best practices for lost Chromebook

I lost a Chromebook that I was signed into with my main Google account. What steps, if any, should I take to ensure that nobody gains access to my account or data? [more inside]
posted by Cucurbit on Mar 8, 2016 - 4 answers

Page: 1 2 3 4 5 6 7 8 ... 22