i have some of my remote users in the office connect to our fileserver using webdav as a means to quickly (though admittadly not-securely) access and change documents, etc. it seems though, that since using windows xp SP2 it's been dirt slow. my user will click on a directory, and it will take no less than 10 seconds for the directory to be highlighted. that's not even attempting to open the directory - that'll take another two minutes or so. i'm trying to figure out what's exactly going on here. ideally i'll be switching to VPN soon, but in the meantime, i need to get this working properly again.
posted by quadrinary
on Sep 28, 2004 -
So we were burglarized sometime today while we were at work. My wife came home and found the front door open and the rooms completely tossed, just like in the movies. In some ways we're counting ourselves lucky, because they only took two cameras, a couple bottles of vodka, and our fire safe. On the other hand, the safe contained basically everything about us- our passports, our Social Security cards, marriage certificate, titles to the condo and car, photocopies of our credit cards(in case the originals were stolen, natch), bank account info, etc. Two questions: 1) are we fucked? 2) burglar alarm systems...yea or nay? [mi] [more inside]
posted by 40 Watt
on Sep 24, 2004 -
With all this talk of spyware can anyone explain to me the wha? I mean, I don't always stick to the same few sites but I'm not l337 and looking for warez, I don't visit porn sites and I never get beat down with spyware.
Isn't it the web equivelant of an STD brought on and spread by unsafe browsing?
Need network support person in downtown SF, please recommend [MI] [more inside]
posted by geekyguy
on Sep 15, 2004 -
WindowsXP, 250 gig shared backup hard drive, and a lab full of people with sensitive information that needs to be backed up on said drive but shouldn't be accessible by anyone other than the user who put it there. Security is giving me fits and I'd appreciate some helpful advice. [more gory details inside] [more inside]
posted by caution live frogs
on Sep 13, 2004 -
A friend of mine I know online works at an old hotel in New Orleans and he's trying to get rid of a group of trannies who are in and out at all hours of night running an escort service or some such shit. He called the cops but they seemed to not really care. What methods would you recommend for getting rid of them? Keep in mind the head one is about 6'6", and about 400 pounds, so brute force isn't in many cases an option. [more inside]
posted by angry modem
on Sep 10, 2004 -
Ethical considerations aside, are there any issues I should be concerned with if I were to use my neighbor's wireless internet without his explicit permission? Say, my computer getting hacked, my passwords being intercepted, my email being read, my browsing history being revealed, etc etc.
posted by TheIrreverend
on Sep 2, 2004 -
My 13-year-old brother uses MSN messenger a lot. Last night, a stranger popped up to speak to him, and after some taunting, told him he was going to delete his account. My brother got rid of him - and then found when he logged out, he couldn't log back in again.
What with my brother's tender age, there are a few holes in his story - has anyone heard of this happening before? [more inside]
posted by ascullion
on Aug 26, 2004 -
I want to share a limited amount of bandwith on my 802.11b to people at my bus stop, while keeping the network secure. (mi) [more inside]
posted by Keyser Soze
on Aug 17, 2004 -
MacCruftFilter: a guy i know told me yesterday that he discovered he had the ability to wander around the network using an old macintosh SE
(linked through a newer one, as it's too old to connect directly). the funny thing was that in browsing appletalk he realized he could look at and open files - not just specifically shared files, but any
files - on any networked mac on campus (he didn't say if he meant OS X too, or only OS 9 or older). he figures the new macs don't recognize the old one as even existing, and the old one is too old to recognize the security setup on the new ones - so they ignore each other and he's free to open someone else's files. he didn't try creating or deleting anything, though. so here's the question: can any mac people tell me if is he right about why this works, and, if not, is this just a fluke? am i potentially opening a can of mac-security worms by even asking this?
posted by caution live frogs
on Aug 5, 2004 -
How do I PERMANENTLY install a mail certificate in MacOS X 10.3? (more inside...) [more inside]
posted by 40 Watt
on Jun 28, 2004 -
Given a couple of encrypted hash strings, I need to identify the algorithm used to generate the hashes so that I can brute-force decrypt them. More inside.. [more inside]
posted by mrbill
on Jun 16, 2004 -
Which Mac OS X Files let Safari securely connect to sites?
I'd accidentally lost some of my System (my fault) and had to reinstall, etc. to get it back. Looks like everything is working... EXCEPT when I try to connect to https:// sites. gmail, hotmail, whatever.
I have other Macs here, so if anyone knows what frameworks or whatever likely make that work, I can easily copy them over and correct the permissions. But WHICH files? (minimally more inside) [more inside]
posted by John Kenneth Fisher
on Jun 14, 2004 -
Secure WiFi: given one's ability to find free wifi access in any reasonable downtown core, how does one go about using said access securely? [more inside]
posted by five fresh fish
on Jun 10, 2004 -
Windows XP firewall + Zone Alarm = problem?
I've just upgraded to Windows XP and I have three questions (so far...). [more inside]
posted by Termite
on Jun 7, 2004 -
Every once in a while, when I search Google, I end up with some weird search results
. All ads. It doesn't happen all the time and I don't know if it's Google stooping to a new low, or if it's me and some kind of adware. Note that I also get a pop-up window
with this page that has a couple other ad links. [more inside]
posted by MrAnonymous
on May 20, 2004 -
Web browser cookies. Is it worthwhile to examine each one as it comes, or is the average person who fears cookies from unknown sources really wasting their time? Please attack or defend this
. How do you find the balance between protecting your browsing history from marketers and surfing quickly and efficiently? Not looking for shaving tips. [more inside]
posted by bingo
on May 13, 2004 -
I need some help with a Netscreen FR114P Firewall. The problem I'm having is that I can't get it to work with fixed IP's. More inside... [more inside]
posted by trbrts
on May 7, 2004 -
Virus Question: I have something nasty. It closes any type of anti-virus application I install, closes regedit if I try to get in there, prevents access to anti-virus websites, and yes, there's [more inside]. [more inside]
posted by banished
on Apr 28, 2004 -
SQL injection security under php/MySQL. What specific issues do I need to deal with? [more inside] [more inside]
posted by y6y6y6
on Apr 28, 2004 -
An acquaintance who travels overseas frequently would like to scan and store her important identification (passport and driver's license) along with her credit cards, and store the images securely online. We would like to make the documents easily accessible to her through a Web page, but otherwise secure. I have offered her some space on my shared server, and while I have some ideas about how to secure things, suggestions would be useful.
posted by tranquileye
on Apr 22, 2004 -
MacAskMe: Two Mac related questions. The first regards Mac compatible security camera solutions; the second involves changing the color of the cursor/pointer in OS X. [more mac mumbojumbo inside] [more inside]
posted by anathema
on Apr 13, 2004 -
I haven't been on a plane since 2000 (before a certain terrorist attack) and I have a trip next week so is there anything i really need to know? Can I bring food, pencils, fingernail files, etc. onboard with me? Should i be careful what i say out loud? Are people gonna stop me wherever I go?
posted by Slimemonster
on Apr 13, 2004 -
Every day for the last three weeks or so Sygate Personal Firewall Pro has blocked twenty or more port scans. In the past I would be scanned maybe once or twice a week. What has changed? I change my IP address from time to time and I know my box is secure and isn't worth hacking anyway. What gives? I'm getting tired of the blinking icon.
posted by Grod
on Apr 3, 2004 -
The company I work for is setting up a new office. Our external IT people are advising against installing a wireless computer network, but I have the distinct impression this is because they don't have the expertise to install one themselves. I need help to build a convincing case to the contrary (assuming I'm right about this). [more inside]
posted by nthdegx
on Apr 1, 2004 -
I've been reading my mail on the server for a long time, but I'm starting to provide hosting for people here, and some of them want to read their mail through a regular old POP client. Is there a secure way to provide this service? [more] [more inside]
posted by majcher
on Mar 24, 2004 -
How 'secure' is AIM? My brother is behind a firewall and uses a proxy to connect to AIM at his university. Assuming there were people who wanted to, how easy would it be for someone within the university to read his ramblings?
posted by attackthetaxi
on Mar 15, 2004 -
As embarrassing as it is to confess, I am not very sophisticated with computers and technology. Recently my computer has become the eager droid of "purityscan," which (to my never ending frustration and dismay) opens a few hundred pop-ups per hour. I Googled for the best spy/pop up removal software, but I am unable to tell the good guys from the bad guys. I downloaded and ran "adaware" but now that they have identified "368 spyware components" on my computer they want $30.00 to remove them. I have no problem paying to end this problem, but I do not want to pay for dreck or pay evil extortionists who create the problem and then sell the solution. So: Which software is best, from an honest company, to fix this loathsome problem?
posted by limitedpie
on Mar 5, 2004 -
I'd like a signed ssl certificate, as signing it myself leads to warnings from both Internet Explorer and Safari.
signs 128 bit at $895, which seems ridiculous to me.
Does anyone have positive experience with other trust vendors
posted by the fire you left me
on Mar 2, 2004 -
Stupid Mac question - I have an AirPort card, but no base station. I was just visiting my cousin for the weekend, and they have one, and they did something
to my computer to get it to connect to their wireless network (they have all sorts of security on it) and now I cannot have my AirPort card turned on without it automatically connecting to my neighbors' networks. I use an ethernet cable here at home, and I have my configuration set to look for the ethernet connection before a wireless one. I am at a total loss as to what to do to tell it to not automatically connect, short of leaving the card turned off unless I'm using it (and Apple's website is no help, because they assume that you do
want to use it). Any ideas?
posted by eilatan
on Feb 29, 2004 -
I'm new to the running a website thing. Reading the log files I noticed that people are already trying to hack me. Right now its the basic look for frontpage access (which, obviously, I don't have as I write everything in textpad) but I want to know what steps should I take to secure the server? How can I protect ftp directories, monitor bandwidth theft in the form of linking to images, etc.? can I prevent that all together? [more inside]
posted by Grod
on Feb 26, 2004 -
I'm considering buying a domain, and setting up a personal site. This wouldn't be a problem, really, except that I've got over five years of content on my current personal site in various formats, and I don't want to repeat the mistakes of the past. [Very long, very geeky details inside. Not for the faint of heart.] [more inside]
posted by Jairus
on Feb 5, 2004 -
If several friendly, nosy and very tech-savvy, code-breaking sort of people have access to your computer and you wouldn't wish to hinder their access, but still need to hide, beyond all chance of detection, a folder where you keep your works in progress; innermost thoughts and tentative, early drafts (the kind that could easily be misinterpreted, specially if you write fiction); is there any John Le Carré-approved way of guaranteeing a private patch? I.e. So that they would think it's all open to anyone, but not really? [Mac OSX, if it's relevant.
posted by MiguelCardoso
on Feb 4, 2004 -
Anyone care to drop some knowledge about stopping spammers from spoofing your address? [more] [more inside]
posted by Hackworth
on Jan 17, 2004 -
I'm up for an internship at an NNSA-sponsored national lab. The position requires a "Q" clearance. I'm starting to get all paranoid about every little thing I've ever done wrong, of course. Can anyone tell me what types of things would prevent one from obtaining a "Q" clearance?
posted by answergrape
on Dec 11, 2003 -