I'm about to train for phone banking with SURJ, and there are instructions to keep one's phone number private (basically, by connecting with Google Voice). Should I keep my number private--is it a conduit to other private information? Can someone find me with my number alone? [more inside]
A forum I used to frequent had its log-in credential database hacked several months ago, including user names, passwords, and the email associated with the account. My email is on there, and it includes my full name. The text file of the hacked info was available on tor sites previously, but yesterday I googled myself and discovered that the file had made it to the normal www and was featured prominently in google results. How do I get this removed from google results? Google's help pages for removing content are not super helpful; more details inside. [more inside]
An old password of mine has been compromised, and someone has been using that information in the past 30 minutes or so. What can I do? [more inside]
I know that password managers (LastPass, etc) are Good Things™. I know that using the same password for multiple things is terrible. And yet I can't bring myself to let go of my current habits. Help me see reason here. [more inside]
My old, dormant Twitter account recently started sending out direct messages to everyone on my list with spammy stuff. This happened within the last hour, and I just deactivated the account. The password for the Twitter account is different than the password for the email account that I set it up with. The password on the Twitter account hadn't been changed, and no tweets were sent from it (only DMs). Is this likely a third party app jacking the Twitter account (and therefore isolated) or should I be concerned about the establishing email account as well? I ask because this is my primary gmail account.
I'm looking for a book recommendation on the history of computer and internet security. [more inside]
Where's the profit in DDOS'ing IRC servers? [more inside]
Help me solve a wifi mystery. A paid wifi hotspot near where I am staying is intermittently providing me with free access to the 'net. I would like to try to understand why this is happening so that I can (hopefully) replicate it at will from my devices. [more inside]
What are the legalities (in the United States) of browsing the contents of an "open folder" on a public website? [more inside]
Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
I've been unsuccessful in getting an old pc up and running with Ubuntu or some other *nix OS. I am wondering. Is it possible to use VPN or ssh from my computer to my Dreamhost account to create a secure tunnel to their servers into to the internet? I'm using 0.00 gb on my account for bandwidth. Sound doable? [more inside]
Web site hacking attempts courtesy of "rory". [more inside]
Someone has been repeatedly trying to hack into my website. I'm on a windows box, running ASP and an Access Database. [more inside]
Every day for the last three weeks or so Sygate Personal Firewall Pro has blocked twenty or more port scans. In the past I would be scanned maybe once or twice a week. What has changed? I change my IP address from time to time and I know my box is secure and isn't worth hacking anyway. What gives? I'm getting tired of the blinking icon.
I'm new to the running a website thing. Reading the log files I noticed that people are already trying to hack me. Right now its the basic look for frontpage access (which, obviously, I don't have as I write everything in textpad) but I want to know what steps should I take to secure the server? How can I protect ftp directories, monitor bandwidth theft in the form of linking to images, etc.? can I prevent that all together? [more inside]
Anyone care to drop some knowledge about stopping spammers from spoofing your address? [more] [more inside]