I got a new job (cool!) but have to turn in my MacBook Air from old job (oh well). Since I also used as my primary laptop for personal stuff, like banking and Facebook, it also has a ton of personal data on it. (I plan to buy my own laptop for next job. And no, I did not look at naughty stuff on it -- I do have a tablet.) The company wants the programs already installed left on the computer, which is reasonable -- so leave Photoshop and Word installed -- but I want to clear off any personal data. Is there a good way to scrub an Apple computer while leaving programs behind? Right now you could go to Twitter on my browser and log into my personal account without a problem. (I realize I can just Clear History on browsers, but also looking for deeper scrub, such as WiFi passwords and stuff on keychains).
posted by Peemster
on Aug 29, 2014 -
So I recently completed a project, and was sharing the news with people on Facebook - but Facebook blocked the link to my website because it was apparently on some spammy/malware blacklist. I did some investigation, and my site comes up clean on every security scan thing I tried, except McAfee SiteAdvisor. It seems likely that it's a false positive, possibly due to my shared hosting. If there's a legitimate security issue, though, I'd like to find out what it is so I can fix it - but I don't know how I can do that. [more inside]
posted by NMcCoy
on Jul 24, 2014 -
Recently I noticed a lot of controversy about whether Truecrypt is secure or not. It looks like their webpage
is raising concerns about it, even to the point of suggesting that people migrate their data away from it. Arstechnica
are following the story.
What's going on? Might this be a hoax? Are truecrypt encrypted flashdrives not safe? If not, what level of security do they provide, if any? What would be a good alternative if we are to migrate away as quickly as possible?
posted by jasper411
on Jun 10, 2014 -
My apartment building was sold in the past 6 months. The new owners have been completely gutting and renovating units as people have moved out; the work is going on for months. I'm planning to move out at the end of the month and wondering how much I need to worry about cleaning or repairing any minor damage if they're just going to do the same thing to my unit.
Additionally, if they do charge me for any damages do I have any recourse to argue that they shouldn't have because they weren't preserving whatever it was any way?
Obviously not expecting any binding legal advice on this, more curious if anyone has had similar experiences or any pointers to share.
posted by chriswarren
on May 16, 2014 -
My mother still gets her bank statements by paper mail. Her latest one failed to be delivered for 2 weeks now, and she verified the bank mailed it, so we assume it was delivered by the mail carrier to the wrong address, or dropped, or something. Nothing has happened yet, but it seems best to guard against the worst-case scenario, namely that someone else now has her home address, bank address, all account numbers (including retirement accounts), possibly other identifying information, and has the willingness to exploit it. What are the prudent steps we should take? [more inside]
posted by StrawberryPie
on Feb 25, 2014 -
I tried to install linux on a win8 laptop and failed although I tried everything to disable UEFI and security boot options in Bios.
So I think there is no solution to install Linux on certain win8 Laptops.
But someone told me of course I can install Linux on any win8 laptops by using virtualbox.
So I'm wondering why can it be done? How exactly is virtualbox/virtual machine works for this issue? can anybody explain this to me in a easy to understand way? Thanks very much.
posted by pack2themoon
on Feb 19, 2014 -
Are terms and conditions, disclosed after sale, legitimate? What if the associated item is a gift? [more inside]
posted by Goofyy
on Dec 30, 2013 -
I'm developing a website where people try to be click number X (sort of like radio call-in contests) to win a prize, and am looking for advice on ways to make it harder for someone to cheat. [more inside]
posted by signal
on Dec 14, 2013 -
Car was broken into last night, and again I wondered why I can't seem to find a small HD camera and DVR combo that can be hidden in my car. [more inside]
posted by hanoixan
on Dec 1, 2013 -
I am a first time city apartment dweller, and don't have a clue on how/when to use my door buzzer. What is okay, what isn't, and yes, I am over thinking this, but it is bugging the hell out of me because I am already overstressed. [more inside]
posted by batikrose
on Nov 8, 2013 -
I am about to buy some bluetooth speakers to be used in conjunction with a Windows computer and Itunes. I have heard vague rumblings to the effect that bluetooth has security issues that regular wifi devices do not. Ordinarily, I would buy wifi speakers but the few I can find are awfully damned pricey. Would I be putting myself at risk of compromising my computer's security if I set up a pair or two of bluetooth speakers in my apartment? In general, are there any bluetooth security issues I should be aware of, as a new user of this technology?
Many thanks for your time.
posted by jason's_planet
on Oct 24, 2013 -
We're going to Vegas in 3 weeks and I want to be able to spend my days walking around without having a purse always looped over my shoulder. My clothes don't have pockets. Fanny packs are the work of Satan. Is it a terrible idea to keep my often accessed stuff (cash, credit cards) in my bra and more important stuff (like health insurance card, driver's licence, etc) hidden in my panties? What should I do with my phone (that is also my camera)? [more inside]
posted by PuppetMcSockerson
on Aug 23, 2013 -
My Dad received a spam email purporting to be from his email provider (BT Yahoo, fwiw) asking him to verify his account. In a moment of utter stupidity, I fell for the scam and entered his email password into a bogus website (I know, I know: STUPID). I was using his iPad at the time, and a ransomware website opened in safari, however the browser didn't lock, and I was able to close it straight away. I immediately logged into his email account and successfully changed his password to something completely different.
Google tells me that there is currently no ransomware which can successfully hijack Apple devices, which my experience seems to bear out. I am a bit worried about the risk that I've accidentally compromised his email, though. Is there anything else I should do beyond what I've already done, ie changing the password? Should I contact BT Yahoo about it?
posted by meronym
on Jul 21, 2013 -
At my place of employment, I have been charged with physically securing our two servers. The decision has been made to bolt them to the concrete floor in a cage. I don't know how to shop for a server rack. We have an old one that they're on now, but it's an open rack, without sides or locks. I need one that's more of a cage, to keep people without the key out. It'll have to fit at least 8U worth of servers, and also accommodate a midsized tower somehow, and be 1000mm deep minimum.
How do I shop for this? I can't find any information on whether any of the racks I'm looking at are bolt downable.
posted by TrueVox
on Jul 19, 2013 -
I read online that the director did a lot of research and consulted with military experts on how an actual terrorist siege on the white house could work. Of course, he also said that white house security experts have already planned for such an attack.
I'm curious what would have been done differently in real life by the white house and DC security?
posted by Wanderer7
on Jun 28, 2013 -
I am looking into alternatives to Windows EFS to protect sensitive data on a Linux web server. I know practically nothing about EFS, but I get the impression that the files are effectively plain-text if you are logged into the Windows machine as the user who owns the files, so the same level of "encryption" exists in a Linux environment if the files have only read/write perms for file owner and no perms for anybody else. My colleague says "No, it is not the same level of security" but doesn't provide any further info regarding how/why it's different. What am I missing here? [more inside]
posted by 0
on Apr 1, 2013 -
Please help me translate the phrase, "Something that you bought at another store has not been cleared. I can fix that for you. Thank you." [more inside]
posted by wintersonata9
on Mar 17, 2013 -
This has happened twice now, and it is freaky. Google chrome on the iMac I use in my office at work (at a university) will have usernames and passwords for people who have never been in my office ever. The first time it happened it was my father's email, and the second time it was my stepmother's. Why would chrome be filling in these odd emails when it doesn't even save my own login information after closing the browser window? [more inside]
posted by artychoke
on Mar 7, 2013 -
Strangers from adjoining neighborhoods have created a path on private land behind my house. What are some ways I can stop them? [more inside]
posted by Arbitrage1
on Mar 3, 2013 -
Open source software is considered trustworthy because anyone can validate the source code and hold the developer accountable. Usually developers will also make compiled binaries available for convenience. How can we know that these binaries are compiled from the same
source code the developer published, and not a malicious variant of it? [more inside]
posted by The Winsome Parker Lewis
on Feb 26, 2013 -
With email and website passwords, are successful "brute force" attacks still common, where an automated bot tries thousands and thousands of passwords on the same user account until one works? [more inside]
posted by pete_22
on Jan 9, 2013 -
I need to retrieve the SSID of a wifi network that is not in range from either an iPhone or an old hard drive. [more inside]
posted by IanMorr
on Jan 2, 2013 -
Help me name my new product, which combines the functionality of popular existing apps, but is specialized with high-security features. [more inside]
posted by bfu
on Dec 26, 2012 -
I was checking the security setting on my gmail account this AM and was alarmed to see that govtrack.us had somehow been granted " granted the following services access to your Google Account".
Especially concerning since i had never seen that site, or even heard of it. What gives?
posted by dougiedd
on Nov 18, 2012 -
I found several "favourited" videos in my YouTube account that were definitely not my or my partner's doing. What could have happened? Was I hacked? [more inside]
posted by peripathetic
on Nov 14, 2012 -
Please help me understand the difference (or non-difference) in safety for Firefox vs. Chrome browser extensions (plugins/add-ons). [more inside]
posted by pavane
on Nov 5, 2012 -
Apparently, I didn't keep the answers to my iTunes security authorization questions. I think I can guess my answers with a few more tries, but I might get locked out before I get there.
Will the wrong answer count reset back to zero after a wait time? Meaning, can I try again tomorrow, or will I still get locked out? [more inside]
posted by p3t3
on Oct 17, 2012 -
New IPad - very computer savvy - do I need to worry about security on my new IPad? I check my banking accounts everyday on my laptop and would like to use my IPad for this. Is there additional security needed (to download) or am I good to go?
posted by pamspanda
on Sep 25, 2012 -
This past weekend I had a huge moving sale, and ended up with about $1500 in small bills ($1s, $5s, $10s, $20s). Between cleaning my apartment and packing everything up today, I forgot to go to the bank and deposit the money into my account. Tomorrow morning I fly out of JFK (Terminal 4, specifically) to move to San Francisco, and since my flight is early there's no time to go to a bank. I feel weird traveling with these huge wads of cash, especially as it's all small bills. Right now it's all stuffed into a cigar box in my carry-on. I don't think it will fit in my wallet. Will the currency exchange places give me $100s (or better yet a money order) for my cash, and will I find one before passing through security? Will TSA steal from me, or give me a hard time for carrying these wads of bills? Is there possibly a Bank of America branch in JFK? What should I do? I don't think I'm comfortable depositing this much cash through an ATM, and anyway it would take forever.
posted by betsbillabong
on Aug 27, 2012 -
It's very very hot today. My method of cooling the house is entirely fan based. I would like to be able to leave the windows cracked for the cats when I'm at work, and when I'm sleeping, but the first floor presents a security issue. What can you recommend to secure double hung windows? [more inside]
posted by instead of three wishes
on Jun 21, 2012 -
I just walked past an armoured truck doing a cash drop to a bank. On the back was a sign saying "Police follow this vehicle". Is this a request or a statement? What's it trying to achieve and does it work?
posted by cromagnon
on Jun 19, 2012 -
I have contacted the designer of my WordPress theme for support and they are asking for log-in info. This seems like a "stop right there" kinda thing. Am I being to cautious? [more inside]
posted by humboldt32
on May 31, 2012 -
I need to find a source for travel and security advisories for locations around the world. Our organisation is too small to employ a security advisor and I don't always trust the locals. What publicly available resources do you use to prepare for travel? [more inside]
posted by wingless_angel
on May 24, 2012 -
On a scale of 1-10, with 1 being "very safe" and with going-to-11 being "the most crazy," how insane is it to try to get into London from Heathrow to do some light sightseeing on my way back home to the US. (I've read the previous questions, but needed some clarification about some of the issues!) [more inside]
posted by jph
on Apr 16, 2012 -
So...I'm thinking my Mac has a virus. I have a Mac OS X 10.5.8. I keep running out of hard drive space and deleting files constantly, so I got Disk Inventory X to see where my space is. Turns out there is 20 GB of 130,000 text files on my computer in a hidden file marked "private". I can't see this "private" folder from the file manager...only from Disk Inventory X. What do I do? [more inside]
posted by HylandErickson
on Feb 26, 2012 -
When uploading my files to major cloud services (Microsoft SkyDrive, Google Docs and Google Picasaweb), are they automatically encrypted before
they leave my computer? [more inside]
posted by paleyellowwithorange
on Feb 5, 2012 -
Is it ok to put a Kitchenaid Stand Mixer in my checked luggage on a flight from JFK to Heathrow? [more inside]
posted by Grither
on Jan 12, 2012 -
What do I *really* need to do in order to keep my computer reasonably save from malware and intrusions? [more inside]
posted by lord_yo
on Dec 10, 2011 -
On the way home from work today I found an employee badge that someone appeared to have dropped and lost (it was right next to the bus stop I usually wait at). The badge's owner was nowhere in sight (it was a photo ID) and I don't know anyone who works for the company identified on the badge. What's the best / quickest way to get it back to its owner, especially given tomorrow is a (US) holiday? [more inside]
posted by aecorwin
on Nov 23, 2011 -
An elderly relative, once technically savvy, now goes into fugue states where, in his confusion, he dismantles computer and A/V setups, with no one in the household to reconnect them properly. I'm looking for a way of securing A/V and computer connections while leaving the function of the devices still accessible
. The alternative so far is spending endless hours with the cable company to get them to send someone to help, or paying someone else to come by. Phone instructions are no good, and there is no one in the household who can help.
posted by oneironaut
on Nov 21, 2011 -