I'm looking for a book recommendation on the history of computer and internet security. [more inside]
posted by cman
on Sep 15, 2012 -
If I wanted banks or companies like LastPass to hire me to be on their security team to make systems safer and to block out hackers, what websites/books/resources should I dive into to go from n00b to pr0 ?? [more inside]
posted by querty
on Aug 29, 2011 -
I'm about to receive a desktop computer (Windows 7 Pro) that I am going to use *solely* for playing an online game. Do I need any additional security or virus protection programs aside from what comes with Windows 7? [more inside]
posted by woot
on Feb 13, 2010 -
After 4 months of smooth sailing, my WiFi has started acting up and (first temperamental page loading; then lock icon disappears when connecting to my secure network; now work computer won't connect at all). Is it my ISP, router, computer, or something else? [more inside]
posted by aquanet
on Feb 9, 2010 -
A question for IT and telecoms boffins: Help me understand voicemail. Specifically, what would need to go wrong with a mobile phone company's voicemail server for it to randomly connect customers to the mailboxes of complete strangers? Is it more likely to be an isolated technical glitch, a systemic network security problem, intentional foul play, or something else?
posted by embrangled
on Jul 21, 2009 -
Wi-Fi security. How much of the contents of my a) iPhone or b) iBook can be "seen" if I'm on a public network? Particularly concerning the latter, I've never been clear whether, in logging on to network X--be it a free municipal net or my employer's "guest net"--I'm simply an inscrutable blip on a network or I'm making my hard drive an open book to anyone who cares to peek. Any insight would be appreciated.
posted by the sobsister
on Jul 19, 2009 -
I've just downloaded the TPG Usage Meter
application to allow me to monitor from my desktop how much of my download quota (from my ISP) I still have available for the month.
As the application needs my username and password for my ISP I'm interested to see what data the application sends to the internet and to what hosts this data is sent. I've already tried using wireshark to see what is going on but from the overload of packets I'm getting very confused. Is there someway to filter the capture by process?
Otherwise, is there some other tool that would be better suited for the job?
posted by maxf
on Feb 8, 2009 -
IT Tech guy seeking more information on how to get deep into network security. [more inside]
posted by frwagon
on Oct 7, 2008 -
General network and computer security: keyservers, PGP/GPG, encryption, etc...book/instructional recommendations? [more inside]
posted by jjsonp
on Mar 10, 2008 -
I have a new little alien on my home net, namely my daughter's xbox 360. I don't know what this will do to network security hereabouts. [more inside]
posted by jfuller
on Dec 23, 2007 -
In Windows XP, is there a way to see the password that is stored in the system to log into a wireless network? [more inside]
posted by al_fresco
on Oct 24, 2007 -
The alumni association wants to buy me some network security software for the students to block "non educational sites," prevent them from downloading related software, and can revert back to a specified login setup. Looking for suggestions inside. [more inside]
posted by jmd82
on Sep 29, 2006 -
network management filter: I'm working for a local government education department. My team is meant to be maintaining/improving several large websites. The IT support people refuse to install a web browser that isn't IE 6, citing network security as the reason.... are their fears reasonable? [more inside]
posted by Tixylix
on Jul 10, 2006 -
I have a couple questions about the security of my wireless network... I'm definitely not a computer newbie, but networking issues have always gone a bit over my head. [more inside]
posted by semidivine
on Nov 18, 2005 -
I have problems sharing new folders on my home LAN. I have an XP pro box, my wife has a WinME laptop. [more inside]
posted by signal
on Mar 30, 2005 -
Ethical considerations aside, are there any issues I should be concerned with if I were to use my neighbor's wireless internet without his explicit permission? Say, my computer getting hacked, my passwords being intercepted, my email being read, my browsing history being revealed, etc etc.
posted by TheIrreverend
on Sep 2, 2004 -
MacCruftFilter: a guy i know told me yesterday that he discovered he had the ability to wander around the network using an old macintosh SE
(linked through a newer one, as it's too old to connect directly). the funny thing was that in browsing appletalk he realized he could look at and open files - not just specifically shared files, but any
files - on any networked mac on campus (he didn't say if he meant OS X too, or only OS 9 or older). he figures the new macs don't recognize the old one as even existing, and the old one is too old to recognize the security setup on the new ones - so they ignore each other and he's free to open someone else's files. he didn't try creating or deleting anything, though. so here's the question: can any mac people tell me if is he right about why this works, and, if not, is this just a fluke? am i potentially opening a can of mac-security worms by even asking this?
posted by caution live frogs
on Aug 5, 2004 -
Secure WiFi: given one's ability to find free wifi access in any reasonable downtown core, how does one go about using said access securely? [more inside]
posted by five fresh fish
on Jun 10, 2004 -
The company I work for is setting up a new office. Our external IT people are advising against installing a wireless computer network, but I have the distinct impression this is because they don't have the expertise to install one themselves. I need help to build a convincing case to the contrary (assuming I'm right about this). [more inside]
posted by nthdegx
on Apr 1, 2004 -
If several friendly, nosy and very tech-savvy, code-breaking sort of people have access to your computer and you wouldn't wish to hinder their access, but still need to hide, beyond all chance of detection, a folder where you keep your works in progress; innermost thoughts and tentative, early drafts (the kind that could easily be misinterpreted, specially if you write fiction); is there any John Le Carré-approved way of guaranteeing a private patch? I.e. So that they would think it's all open to anyone, but not really? [Mac OSX, if it's relevant.
posted by MiguelCardoso
on Feb 4, 2004 -