I am subletting a room in a four bedroom apartment from a person I met on craigslist. This person moved out/I moved in in March. He's still on the lease and I am also on the lease. Please help me understand how my landlord is handling our security deposits. [more inside]
How do I create a public wifi network that is separate from our corporate network while using the same internet connection? [more inside]
What measures can I take to prevent retail store thieves from getting away in their unmarked vehicles (i.e., temporarily moved license plates). [more inside]
Best security software for my new Win7 laptop? Any other advice to ensure my computer's life gets off to a good start? [more inside]
Looking for advice for a home safe (and places to sell that safe to me). [more inside]
What simple, secure, portable password and secure data management systems do you use? [more inside]
I have a challenge in our computer repair storefront. We recently had an issue wherein someone tried to scam us on an iPhone repair. [more inside]
How to record something digitally in a way that verifies it has not been 'shopped [more inside]
What do I do about someone squirting glue into the locks of my house? [more inside]
I got a spam email from my friend who has a hotmail account. It looks like the spam has been sent to everyone in his hotmail distribution list. My question is, how did the hackers do this? Did they need his password in order to get access to his distribution list? As far as I know he is still able to use his account which puzzles me. Wouldn't a hacker (if he had the password) quickly change the password so that they could keep sending spam out on that account?
A while ago, my Gmail account notified me of suspicious activity. The IP that accessed my account seems to be from Microsoft. [more inside]
Will installing a Linux Operating System onto an old Windows laptop fully erase the contents of the hard drive? [more inside]
I'm having trouble disassembling an old desktop PC to get to the hard drive before I can destroy it and throw everything out. Is there a quick and easy way to destroy the drive in situ, using everyday household objects? [more inside]
Is it possible to get an extended history (perhaps several months) of "last account activity" records for a gmail account?
Is it really necessary to shred all receipts? Is identity fraud really likely? [more inside]
Will a U.S. security clearance investigation in progress be halted if I leave my sponsoring company? [more inside]
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft?
Lost my driver's license, am 19 years old, never had a credit card or applied for credit in any fashion before, how likely is identify theft? [more inside]
Asking for a friend: He is a security manager. The client told him to document post orders, but they wouldn't provide him with the resources to do them. He did them on his own computer. Then, his hard drive failed. (A bit of a long story inside.) [more inside]
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected?
Asking for trouble? Forms library on a non-profit website. Should proprietary forms be password protected? [more inside]
Taking over the lease for one roommate in a four person household. I was originally told that I needed to pay first and last month's rent to move in: first month to the landlord and last month's to John, the roommate moving out. On moving day I was told that it was actually first and security. I would make the check for security out to John and then the landlord would give me back John's security deposit when I moved out. Confused and exhausted, I wrote a check. [more inside]
iPhone security question: My employer is considering allowing the use of iPhones (and possibly Android phones) in place of our traditional Blackberries, but is concerned about ensuring security of our confidential information. We already know how to turn off the ability of apps to access location data on the iPhone, but I'm also looking for a way to prevent apps from accessing the contact list. Perhaps my GoogleFu is failing me--is there an easy (or not so easy) way to do this?
Can I sue my former employer for leaking my social security number, email address and physical address? [more inside]
How long can EU citizens stay in the United States per year? My girlfriend would like to stay with me for two-three months, then return home to work for a month, come back to the US for a couple months, etc. Will homeland security break up this arrangement after a while? Is there a limit to how many days per year she can stay in the US? To be clear, she won't be working here.
How can you know if someone is capturing information that you are sending over a public wireless network? [more inside]
I suspect my young son is carrying on an ongoing discussion with a stranger he met on the internet. My wife and I are going to approach him, but we would like some evidence so we know what questions to ask. [more inside]
It's really hot. I need to let the breeze through my house while minimising risk of invitin burglars. [more inside]
Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.
Today I clicked on the Chapters website's "My Account" link, which usually 'remembers' who I am and shows my email address, asking only for my password. Today, however, it showed a stranger's email address and name. Do I need to be concerned? [more inside]
Safe to bank from home computer? [more inside]
Sort of interesting Apple security question: I have a VPN that I trust. When I use an iOS device (4.2.1 on iPad or 3GS) I often have Safari running most of the time. If I use Safari for an innocuous task, background it, initiate a VPN connection, and then go back to Safari to use eg. internet banking, does my web traffic pass through the VPN, or should I "kill" Safari and restart it? I use IP-restricted academic journal access sometimes and have noticed I have to restart Safari sometimes to be allowed to see articles, and it got me wondering. Clever paranoid opinions much appreciated!
Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
Which method of traveling/travel route from Europe to the US will be the least invasive in terms of baggage examinations, pat-downs, and background checks? [more inside]
Mom is using the internet for the first time on an old, old laptop with Windows XP, and using it for email and also streaming movies (the pirated kind) on sites like Megavideo. Anything to help her avoid scams and malware? Hoping for software/Firefox extensions as well as maybe a guide for first-time internet users.
Up to now, I have used Apple's Keychain program to manage my passwords. I recently got an iPad, and now I have lots of login passwords that I don't have memorized and can't access from my iPad browser. So, I'm looking for a password management setup that will do the following things (or as many as possible): [more inside]
How exactly does XBox account security work? Our 360 was stolen in November. We haven't bought a replacement yet, but we did change the password on the Live account associated with the console immediately. We just noticed that within the last few days, our gamertag has logged on and has been playing games, buying avatar items with points we already had, etc. WTF? [more inside]
How should a business that's about security set up its own secure communications? [more inside]
I'm filling in a background-check form for a US government job--Questionnaire for Non-Sensitive Positions--and I'm confused. Help! [more inside]
Someone scammed my parents. But what, exactly, is the point of the scam? They called my mom, claiming to be from AT&T, saying that something in her house was causing interference all over the neighborhood, and that they needed to come over. They came, showed fake credentials, identified the interference as coming from my parents' security system, deactivate they system and left. [more inside]
My landlord wants me to leave my apartment unlocked so maintenance people can enter during the day. This makes me uncomfortable. How much should I push back? [more inside]
Quick and simple. Will my iPhone still work when I take the camera out? [more inside]
Interested in tenant rights: NYC landlord is asking for more money (additional $1000) than security+pet deposit ($2,400)?? [more inside]
What damage control measures can I do for selling my PC on eBay which was only partially wiped? Yes, I know how stupid this was. [more inside]
Suffering through the great midwest Comcast outage of late 2010. What ill may come of this? [more inside]
How to protect a website? [more inside]
My parents just got a weird call about 30 mins ago (11:50pm). They were getting ready for bed, so my sister picked up. [more inside]
Our house got robbed last week for the second time in less than a year. Short of moving, what can we do to get our peace of mind and sense of security back? [more inside]
Does my wife need to abandon her email address? [more inside]