I'm looking for best practices for using our iPhones and iPads on public Wi-Fi networks. That is, what can we do to best protect/secure/encrypt the data that is transmitted over such networks to/from the devices (aside from not using the public networks in the first place)? Would using a VPN accomplish this? Any recommendations for one? Something else? These are iPhone 7's and iPad Pro's, all running the latest version of iOS 10. Thank you!
I need to put the fear of God into some foolish, negligent users. I'm looking for examples of organizations that were hit with some kind of horrible malware (like CryptoLocker) or had sensitive data stolen -- all because of a really stupid action by an employee. [more inside]
I'm going to be traveling a fair amount over the holidays which means I'll likely be on public WiFi a lot more than usual, and with all of the various security and privacy issues that have popped up in the news recently, I figure the time is ripe to figure out a VPN strategy (since not everything I do is over SSL/HTTPS). [more inside]
I'm taking my laptop on vacation, for the first time. What do I need to do to be sure my info stays safe? [more inside]
I'm looking for a book recommendation on the history of computer and internet security. [more inside]
Is there any way to prevent external sites from linking to me? [more inside]
What's a good way to share passwords among members of a team? [more inside]
If I wanted banks or companies like LastPass to hire me to be on their security team to make systems safer and to block out hackers, what websites/books/resources should I dive into to go from n00b to pr0 ?? [more inside]
OSX security question from a total noob, involving uncertainty about interpreting messages from Little Snitch. [more inside]
[NaNoWriMo Filter] Help me research network security for my novel please. [more inside]
How safe and secure is my wireless network's WPA2-PSK key? [more inside]
What are the main differences between anti-spyware and anti-virus? [more inside]
I'm about to receive a desktop computer (Windows 7 Pro) that I am going to use *solely* for playing an online game. Do I need any additional security or virus protection programs aside from what comes with Windows 7? [more inside]
After 4 months of smooth sailing, my WiFi has started acting up and (first temperamental page loading; then lock icon disappears when connecting to my secure network; now work computer won't connect at all). Is it my ISP, router, computer, or something else? [more inside]
A question for IT and telecoms boffins: Help me understand voicemail. Specifically, what would need to go wrong with a mobile phone company's voicemail server for it to randomly connect customers to the mailboxes of complete strangers? Is it more likely to be an isolated technical glitch, a systemic network security problem, intentional foul play, or something else?
Wi-Fi security. How much of the contents of my a) iPhone or b) iBook can be "seen" if I'm on a public network? Particularly concerning the latter, I've never been clear whether, in logging on to network X--be it a free municipal net or my employer's "guest net"--I'm simply an inscrutable blip on a network or I'm making my hard drive an open book to anyone who cares to peek. Any insight would be appreciated.
Hi all, I've just downloaded the TPG Usage Meter application to allow me to monitor from my desktop how much of my download quota (from my ISP) I still have available for the month. As the application needs my username and password for my ISP I'm interested to see what data the application sends to the internet and to what hosts this data is sent. I've already tried using wireshark to see what is going on but from the overload of packets I'm getting very confused. Is there someway to filter the capture by process? Otherwise, is there some other tool that would be better suited for the job? Thanks, Max
IT Tech guy seeking more information on how to get deep into network security. [more inside]
General network and computer security: keyservers, PGP/GPG, encryption, etc...book/instructional recommendations? [more inside]
I have a new little alien on my home net, namely my daughter's xbox 360. I don't know what this will do to network security hereabouts. [more inside]
In Windows XP, is there a way to see the password that is stored in the system to log into a wireless network? [more inside]
OS X: Automatically trigger actions after connecting to a network. [more inside]
The alumni association wants to buy me some network security software for the students to block "non educational sites," prevent them from downloading related software, and can revert back to a specified login setup. Looking for suggestions inside. [more inside]
network management filter: I'm working for a local government education department. My team is meant to be maintaining/improving several large websites. The IT support people refuse to install a web browser that isn't IE 6, citing network security as the reason.... are their fears reasonable? [more inside]
Is there an "industry standard" for password expiration periods? [more inside]
I have a couple questions about the security of my wireless network... I'm definitely not a computer newbie, but networking issues have always gone a bit over my head. [more inside]
I have problems sharing new folders on my home LAN. I have an XP pro box, my wife has a WinME laptop. [more inside]
Ethical considerations aside, are there any issues I should be concerned with if I were to use my neighbor's wireless internet without his explicit permission? Say, my computer getting hacked, my passwords being intercepted, my email being read, my browsing history being revealed, etc etc.
MacCruftFilter: a guy i know told me yesterday that he discovered he had the ability to wander around the network using an old macintosh SE (linked through a newer one, as it's too old to connect directly). the funny thing was that in browsing appletalk he realized he could look at and open files - not just specifically shared files, but any files - on any networked mac on campus (he didn't say if he meant OS X too, or only OS 9 or older). he figures the new macs don't recognize the old one as even existing, and the old one is too old to recognize the security setup on the new ones - so they ignore each other and he's free to open someone else's files. he didn't try creating or deleting anything, though. so here's the question: can any mac people tell me if is he right about why this works, and, if not, is this just a fluke? am i potentially opening a can of mac-security worms by even asking this?
Secure WiFi: given one's ability to find free wifi access in any reasonable downtown core, how does one go about using said access securely? [more inside]
The company I work for is setting up a new office. Our external IT people are advising against installing a wireless computer network, but I have the distinct impression this is because they don't have the expertise to install one themselves. I need help to build a convincing case to the contrary (assuming I'm right about this). [more inside]
If several friendly, nosy and very tech-savvy, code-breaking sort of people have access to your computer and you wouldn't wish to hinder their access, but still need to hide, beyond all chance of detection, a folder where you keep your works in progress; innermost thoughts and tentative, early drafts (the kind that could easily be misinterpreted, specially if you write fiction); is there any John Le Carré-approved way of guaranteeing a private patch? I.e. So that they would think it's all open to anyone, but not really? [Mac OSX, if it's relevant.]