In light of revelations that some folks can look at me over the internet through my webcam without me knowing, I would like to have a solution to this problem.
I was thinking that taping over the webcam would work well, but it might also look tacky, and might also add a residue to my computer that I would not like. Is there a kind of tape that would look good on a unibody macbook pro? How would I make that tape look good? What sort of tape would be suggested for its no residue, opaque characteristics? Is there a better solution than tape, like a well-thought out kickstarter project or something of that nature?
Please help me with my paranoid bougie computer problem.
posted by oceanjesse
on Mar 6, 2014 -
I'm interested in getting a few residential security cameras installed to cover our yard and car areas. Requirements are: ~40 feet night vision, decent motion detection, networked recording to central PC/DVR unit (either over WiFi or PoE power), no batteries, weatherproof, not easily stolen. There are plenty of cameras with good tech specs, but many of them look like warp engines. I imagine putting up giant cameras will not only piss off the neighbors, but serve as a giant ROB ME I HAVE STUFF sign. What exterior cameras are not only good but inconspicuous? [more inside]
posted by benzenedream
on Mar 6, 2014 -
My girlfriend and I have just gone under contract on a home in Atlanta, Georgia. It's in a safe neighborhood, ITP (Briarlake area) but plan on having a security system installed ASAP. [more inside]
posted by rbf1138
on Mar 3, 2014 -
Is there a book or a research article (or high quality speculation) to be found, which would ponder how frequent bombarding with "surveillance is a good thing"
comments (appearing in media and made by some kind of authority) and "yet another security flaw appeared in a mobile application, in a web service or in a department of a company"
news (which would happen to some high profile and well known company) affects kids and youngsters? I mean their mind is still shaping, so it would be interesting to know in advance, what kind of adults will they become? Naturally the mind of an individual is shaping throughout the whole lifetime, but it could be said that there are lots of people, who aren't or will not be very good at getting rid of their "old programming".
posted by spctrm
on Mar 3, 2014 -
About ten years ago I signed up for gmail very early during beta when people were selling invites for up to 3 and 4 figures and lucked out on a very early, short email address. (See profile.)
And it's not cool. Not only do I get a lot of spam but I get a lot of misdirected email. I've seen receipts, bank statements, tax returns, boobies, dozens or hundreds of pictures of different families, newborns, weddings, new cars, old cars, flight reservations, money wire recepits.
And this isn't good, and I wonder about my liability, and I wonder about these known brands or services that don't include a button for "This is not my account or data." or any email validation step at all. [more inside]
posted by loquacious
on Feb 28, 2014 -
I'm trying to help a relative who's in a full panic about computer security, brought on both by the alarmist mainstream reporting about the gotofail bug and by some coincidental hardware issues with her OS X machine. My reassurance isn't going to cut it this time -- is there somewhere online where she can read, in lay terms, that although the bug was severe in theory / in its implications, there's very little evidence of real-world exploits? [more inside]
posted by anonymous
on Feb 26, 2014 -
My mother still gets her bank statements by paper mail. Her latest one failed to be delivered for 2 weeks now, and she verified the bank mailed it, so we assume it was delivered by the mail carrier to the wrong address, or dropped, or something. Nothing has happened yet, but it seems best to guard against the worst-case scenario, namely that someone else now has her home address, bank address, all account numbers (including retirement accounts), possibly other identifying information, and has the willingness to exploit it. What are the prudent steps we should take? [more inside]
posted by StrawberryPie
on Feb 25, 2014 -
How do I secure some files that need to be shared and be editable with several employees and also be able to immediately remove access to any version of those files from a particular person? [more inside]
posted by BigCalm
on Feb 25, 2014 -
I tried to install linux on a win8 laptop and failed although I tried everything to disable UEFI and security boot options in Bios.
So I think there is no solution to install Linux on certain win8 Laptops.
But someone told me of course I can install Linux on any win8 laptops by using virtualbox.
So I'm wondering why can it be done? How exactly is virtualbox/virtual machine works for this issue? can anybody explain this to me in a easy to understand way? Thanks very much.
posted by pack2themoon
on Feb 19, 2014 -
A couple of years ago I was flying across Canada and got randomly selected for an extended search of my bags and everything swabbed. They swabbed my cellphone, camera equipment, and bags. After a few minutes they told me the swab came up positive. I'm not sure what for. [more inside]
posted by anonymous
on Feb 12, 2014 -
I've only worked in a small business (15-20 employees) since I got out of school, and I've handled the technological necessities since I started because nobody else could. I've handled things on an as-needed basis: troubleshooting problems, setting up new computers, maintaining an iron grip on software installations, setting up the network and administering simple network devices, etc. However, I'm completely self-taught, and I have no idea if my hacked-together system looks anything like a properly-implemented corporate IT system. So I want to know what one looks like. Specifically, I'd like to know if there are any resources I can check out on my own that paint the picture of what I should be trying to achieve. NOTE: I'm NOT averse to hiring an outside IT firm or consultant to help with specification and implementation. However, I don't want to be at the mercy of a firm's "knowledge" and my own ignorance; you can waste a lot of money that way, regardless of scenario. [more inside]
posted by KinoAndHermes
on Feb 11, 2014 -
How can I set up Facebook from scratch with minimal spam/leakage into other accounts and minimal leakage from/to people I don't know? [more inside]
posted by lalochezia
on Feb 6, 2014 -
I'm currently living in a small apartment with two bedrooms and one roommate. My roommate has exhibited some odd behavior in the past, but in the last week things have gotten weird. Help me negotiate this situation. Details inside. [more inside]
posted by anonymous
on Feb 4, 2014 -
I am looking for ways to browse securely over the internet, while not giving any data to corporations (including my ISP) that is unwarranted and also preventing malware (like the CryptoLocker ransomware epidemic in late 2012). [more inside]
posted by theobserver
on Jan 19, 2014 -
I work in a 6-story office building. Outside of normal hours, you can get on the elevator in an upper floor, but it won't let you out in the lobby (requires keycard). You can
take the stairs down all the floors to the lobby.
I have been told that this is a building requirement that cannot be changed. But I'm perplexed by the logic. If I'm already on an upper floor, I am in a more-secure area than the lobby. Shouldn't I be able to access the lobby freely? Especially
since I can access the lobby freely from the stairs.
posted by reeddavid
on Jan 14, 2014 -
I need to find a bank with absolutely amazing online security. Two-factor authentication is a good place to start. Bonus points for stability and good interest rates. [more inside]
posted by anonymous
on Jan 13, 2014 -
After my PO Box was broken into, I have been searching for a USPS location that has security cameras aimed at the boxes (NOT the space where the employees work), and after speaking to 5 post offices and even chatting with the local postal inspector, I'm beginning to doubt that this even exists. [more inside]
posted by tastycracker
on Jan 6, 2014 -
Are terms and conditions, disclosed after sale, legitimate? What if the associated item is a gift? [more inside]
posted by Goofyy
on Dec 30, 2013 -
I'm developing a website where people try to be click number X (sort of like radio call-in contests) to win a prize, and am looking for advice on ways to make it harder for someone to cheat. [more inside]
posted by signal
on Dec 14, 2013 -
Car was broken into last night, and again I wondered why I can't seem to find a small HD camera and DVR combo that can be hidden in my car. [more inside]
posted by hanoixan
on Dec 1, 2013 -
After an internet outage (now resolved) Comcast customer service recommended that we update our 8 year old cable modem (Thompson DCM-425) to a new wireless router/modem combo. I'm trying to figure out if this will really be an upgrade or more of a "well the wireless would be faster, if it were still working" sort of situation? [more inside]
posted by mercredi
on Nov 26, 2013 -
My "throw-away" password is in the list of those compromised by the Adobe hack. It's a common dictionary word that I use for sites that I really don't care about security on: things that I don't even understand why they should be password protected, "test-driving" sites or products where I don't intend to keep using them, and an old email account that was for a blog that I haven't updated in about four years. (And I don't use the account any more). I'm pretty unconcerned about it being compromised. Is there any reason I should
worry? And if I do want to change it, is there any way to find out what all the sites are that I have used it on in the past? [more inside]
posted by lollusc
on Nov 22, 2013 -
So, I was one of many people to have my adobe account information leaked. Though I know I shouldn't, I use that same password on lots of different accounts. I've changed them on the important ones, but how do people possibly keep the dozens of passwords for every different website straight? [more inside]
posted by fontophilic
on Nov 22, 2013 -
Hive mind inquiry: does anyone have experience or advice they can give for the purchase of a waterproof, fireproof safe, big enough to store a few folders of documents? [more inside]
posted by Cycloptichorn
on Nov 19, 2013 -
I know there are a variety of options out there, but I'm having a hard time sifting through the information myself. [more inside]
posted by snarfles
on Nov 14, 2013 -
A couple of days ago I clicked a legit-looking result from a Google search and got to a page of hackery-looking type saying that my system now belonged to somebody else. I backed away fast, but tried it again out of curiosity and the same thing happened.
I didn't cap the screen and now I can't find the page, but can somebody hijack my computer (Mac running Safari this week for some reason) just because I clicked a link? This might be a laughable question, but since this has never happened to me before I don't know how seriously to take it!
posted by Camofrog
on Nov 8, 2013 -
I am a first time city apartment dweller, and don't have a clue on how/when to use my door buzzer. What is okay, what isn't, and yes, I am over thinking this, but it is bugging the hell out of me because I am already overstressed. [more inside]
posted by batikrose
on Nov 8, 2013 -
I live on the first floor in an apartment building in a very heavily trafficked and busy urban neighborhood. It's not a terribly dangerous place, but it definitely has its illicit activity going on - it's a college town. You don't see a lot of bars on the windows or anything. At some point yesterday, somebody broke into my apartment by forcing a window open, and they weren't in my apartment long. They didn't really ransack the place, it was almost hard to tell someone had been there. I am frankly puzzled by how very little they took and what they did take as it wasn't very valuable. They did rifle through my filing cabinet and they did steal my laptop which they will need a password to use, but if they are able to get past that, they will have access to all of my online accounts and my financial information (which I have already locked down).
I'm trying to work out a checklist for everything I need to do now, and I have one complicating factor about ID. [more inside]
posted by pazazygeek
on Nov 6, 2013 -
I live in a rent-controlled apartment in San Francisco, and have been enduring some landlord harassment of various types. (I'm paying a fortune, but rents are so high right now that even what I pay is well below market.) For my peace of mind, I'd like to install some sort of reasonably priced device to ensure that no one's entering my apartment when I'm not there. A huge bonus would be collecting evidence if it does happen. [more inside]
posted by roxie110
on Oct 25, 2013 -
I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology?
Many thanks for your time.
posted by jason's_planet
on Oct 24, 2013 -
I was burgled again this week. Sigh. I need help asking my landlord for specific safety interventions. [more inside]
posted by latkes
on Oct 20, 2013 -
My old, dormant Twitter account recently started sending out direct messages to everyone on my list with spammy stuff. This happened within the last hour, and I just deactivated the account. The password for the Twitter account is different than the password for the email account that I set it up with. The password on the Twitter account hadn't been changed, and no tweets were sent from it (only DMs). Is this likely a third party app jacking the Twitter account (and therefore isolated) or should I be concerned about the establishing email account as well? I ask because this is my primary gmail account.
posted by codacorolla
on Oct 15, 2013 -
I've been tasked with figuring out what firms charge to perform IT Security tests, penetration tests, etc, for commercial clients? What kind of metrics do they base their charges on? Is there a standard rate for this kind of work? Alternately, do you have any tips for getting this kind of info from the companies that do this kind of stuff? [more inside]
posted by tokaidanshi
on Sep 25, 2013 -
Do you have an awesome system that works well? I am looking for advice, experience and any general wisdom as I look to find a replacement entry and video security system for a multi-unit condo building. [more inside]
posted by donovan
on Sep 24, 2013 -
We rented a house in Skokie, and the landlord used an office-supply-store-pre-printed lease form for the city. It included a copy of the Chicago RLTO
as part of the form. Understanding that YANML, does this incorporate the requirements of the RLTO into the terms of the lease? If so, he'd be required to submit receipts meet deadlines for the return of the deposit. Or is he only bound by State Law (which for a single-family home, seems to require bupkus). He only returned half of our security deposit. Is it worth fighting for the other half ($600)? If I accept and deposit the $600 he sent, am I hurting my chances of getting the rest? [more inside]
posted by Morydd
on Sep 16, 2013 -
Can you recommend a source for tiny, personalized, permanent adhesive labels I can use to I.D. my gadgets 'n' doodads 'n' stuff? [more inside]
posted by argonauta
on Sep 12, 2013 -
I'm planning to install a simple CCTV system in my house and am looking for recommendations for an entry-level camera. [more inside]
posted by Grinder
on Aug 28, 2013 -
We're going to Vegas in 3 weeks and I want to be able to spend my days walking around without having a purse always looped over my shoulder. My clothes don't have pockets. Fanny packs are the work of Satan. Is it a terrible idea to keep my often accessed stuff (cash, credit cards) in my bra and more important stuff (like health insurance card, driver's licence, etc) hidden in my panties? What should I do with my phone (that is also my camera)? [more inside]
posted by PuppetMcSockerson
on Aug 23, 2013 -
I have a friend moving to a sketchy part of town (and living without a roommate for the first time). I want to get her some sort of security "thing" as an apartment-warming gift. Any suggestions? [more inside]
posted by Nonsteroidal Anti-Inflammatory Drug
on Aug 10, 2013 -
I'm starting a photography website where privacy and security are important features, and would like to offer SSL encryption to my users, so I'm going to buy a SSL certificate. Where should I get it from and which type should I get? [more inside]
posted by signal
on Aug 3, 2013 -
I recently took a job as an overnight security guard. The entire job is standing at the entrance to a company's parking lot, from 10pm to 6am. In theory, I'm supposed to warn off people who look like they don't belong there, but that never happens. No books, smartphones, or other distractions are allowed. Sometimes I'll look at my watch and discover that it's only ten minutes since the last time I checked my watch, even though it feels like an hour has passed. Is there some kind of mental exercise or trick I can use to occupy my mind and make the time go faster?
posted by internet_explorer
on Jul 30, 2013 -
Is there a relatively easy, inexpensive way to reinforce my apartment door so that it cannot be kicked in during the day? Something very strong and secure but that is easily removable with minimal damage from the inside so that my security deposit won't go towards replacing the door? [more inside]
posted by WhitenoisE
on Jul 28, 2013 -
. [more inside]
posted by Musashi Daryl
on Jul 26, 2013 -
After renting a room for almost 2 years, I broke the lease 1.5 months early (gave 1.5 months notice). I ensured that someone else was going to move into my room 1 week after I move out (so my landlord only has a 1 week gap in receiving rent checks). It's been almost 2 months and my landlord hasn't sent me my deposit, and is saying he will only give me 1/2 of it back. Details inside... [more inside]
posted by never.was.and.never.will.be.
on Jul 24, 2013 -
My Dad received a spam email purporting to be from his email provider (BT Yahoo, fwiw) asking him to verify his account. In a moment of utter stupidity, I fell for the scam and entered his email password into a bogus website (I know, I know: STUPID). I was using his iPad at the time, and a ransomware website opened in safari, however the browser didn't lock, and I was able to close it straight away. I immediately logged into his email account and successfully changed his password to something completely different.
Google tells me that there is currently no ransomware which can successfully hijack Apple devices, which my experience seems to bear out. I am a bit worried about the risk that I've accidentally compromised his email, though. Is there anything else I should do beyond what I've already done, ie changing the password? Should I contact BT Yahoo about it?
posted by meronym
on Jul 21, 2013 -