Join 3,557 readers in helping fund MetaFilter (Hide)

942 posts tagged with security. (View popular tags)
Displaying 301 through 350 of 942. Subscribe:

Related tags:
+ (141)
+ (61)
+ (51)
+ (49)
+ (48)
+ (42)
+ (42)
+ (39)
+ (37)
+ (35)
+ (35)
+ (34)
+ (30)
+ (30)
+ (30)
+ (29)
+ (29)
+ (28)
+ (26)
+ (24)
+ (23)
+ (23)
+ (20)
+ (20)
+ (19)
+ (19)
+ (19)
+ (18)
+ (18)
+ (16)
+ (16)
+ (16)
+ (15)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (14)
+ (13)
+ (13)
+ (13)
+ (13)
+ (13)
+ (13)
+ (12)
+ (12)
+ (12)
+ (12)
+ (12)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (11)
+ (10)
+ (10)
+ (10)
+ (10)


Users that often use this tag:
Anonymous (76)
meta.mark (4)
Jairus (3)
signal (3)
Raichle (3)
Admiral Haddock (3)
Thorzdad (3)
curiousleo (3)
tcv (3)
dougiedd (2)
QuantumMeruit (2)
serial_consign (2)
Metroid Baby (2)
bytewrite (2)
chichimimizu (2)
goshling (2)
radsqd (2)
valleys (2)
Crotalus (2)
randomthoughts (2)
Alterscape (2)
woot (2)
titans13 (2)
Grinder (2)
storybored (2)
UMDirector (2)
Mave_80 (2)
ajp (2)
-harlequin- (2)
boombot (2)
amtho (2)
jeffburdges (2)
bartleby (2)
mendel (2)
flabdablet (2)
symbioid (2)
zardoz (2)
electroboy (2)
purephase (2)
GleepGlop (2)
aburd (2)
striker (2)
ChrisR (2)
odinsdream (2)
beniamino (2)
caution live frogs (2)
loquacious (2)
ascullion (2)
chill (2)
Grod (2)
alms (2)
jadepearl (2)
emptybowl (2)
40 Watt (2)
monju_bosatsu (2)
rorycberger (2)
tiamat (2)
daver (2)
mecran01 (2)
grumblebee (2)

Security Deposit Drama

Taking over the lease for one roommate in a four person household. I was originally told that I needed to pay first and last month's rent to move in: first month to the landlord and last month's to John, the roommate moving out. On moving day I was told that it was actually first and security. I would make the check for security out to John and then the landlord would give me back John's security deposit when I moved out. Confused and exhausted, I wrote a check. [more inside]
posted by chichimimizu on Mar 5, 2011 - 12 answers

iPhone App Access to Contacts

iPhone security question: My employer is considering allowing the use of iPhones (and possibly Android phones) in place of our traditional Blackberries, but is concerned about ensuring security of our confidential information. We already know how to turn off the ability of apps to access location data on the iPhone, but I'm also looking for a way to prevent apps from accessing the contact list. Perhaps my GoogleFu is failing me--is there an easy (or not so easy) way to do this?
posted by monju_bosatsu on Feb 24, 2011 - 7 answers

My former employer leaked my ss number!

Can I sue my former employer for leaking my social security number, email address and physical address? [more inside]
posted by UMDirector on Feb 19, 2011 - 15 answers

Don't deport her!

How long can EU citizens stay in the United States per year?  My girlfriend would like to stay with me for two-three months, then return home to work for a month, come back to the US for a couple months, etc. Will homeland security break up this arrangement after a while? Is there a limit to how many days per year she can stay in the US?  To be clear, she won't be working here. 
posted by pollex on Feb 15, 2011 - 6 answers

Security over a public wireless network

How can you know if someone is capturing information that you are sending over a public wireless network? [more inside]
posted by dancesquad on Feb 15, 2011 - 14 answers

Keylogging my son's mac

I suspect my young son is carrying on an ongoing discussion with a stranger he met on the internet. My wife and I are going to approach him, but we would like some evidence so we know what questions to ask. [more inside]
posted by anonymous on Feb 14, 2011 - 42 answers

SWF crashes when unloaded in IE7 and IE8; non standard code and iframes?

A colleague is finding that a page on a server that includes a SWF can load smoothly and be viewed in its entirety, but it generates a JavaScript error message whenever that page is unloaded, but only in IE7 and IE8. (Line 1, Char 1, "Access is denied", Code 0, URL=SWF file name). Firefox 3.6 and IE6 have no problems at all. For some reason, the page has been designed to load the SWF directly into an iframe's src attribute instead of using the usual OBJECT and EMBED tags and associated parameters within a separate HTML page. Is this unloading problem simply IE7 and IE8 being extra-vigilant about security with non-standard code? [more inside]
posted by The True Wheel on Feb 6, 2011 - 1 answer

House-cooling advice for fraidy cats

It's really hot. I need to let the breeze through my house while minimising risk of invitin burglars. [more inside]
posted by 8k on Feb 3, 2011 - 15 answers

Safety tips without pop-ups/unders

Please recommend good websites and blogs about computer/internet/social media security issues, someplace where I can find out about the latest scams, phishing attempts, malware, etc. I don't really like Snopes, due to the pop-under ads (what is up with that, anyway?). Thank you.
posted by SillyShepherd on Feb 1, 2011 - 4 answers

Do I need to be concerned about my computer security?

Today I clicked on the Chapters website's "My Account" link, which usually 'remembers' who I am and shows my email address, asking only for my password. Today, however, it showed a stranger's email address and name. Do I need to be concerned? [more inside]
posted by smilingtiger on Jan 31, 2011 - 10 answers

How do I put bibtex data into a semantic wiki?

How can I get my Semantic MediaWiki to display and sort BibTeX data the way I'd like? [more inside]
posted by Marty Marx on Jan 18, 2011 - 1 answer

Safe to bank from home computer?

Safe to bank from home computer? [more inside]
posted by Prairie on Jan 15, 2011 - 14 answers

VPN on iOS - app restart needed?

Sort of interesting Apple security question: I have a VPN that I trust. When I use an iOS device (4.2.1 on iPad or 3GS) I often have Safari running most of the time. If I use Safari for an innocuous task, background it, initiate a VPN connection, and then go back to Safari to use eg. internet banking, does my web traffic pass through the VPN, or should I "kill" Safari and restart it? I use IP-restricted academic journal access sometimes and have noticed I have to restart Safari sometimes to be allowed to see articles, and it got me wondering. Clever paranoid opinions much appreciated!
posted by cromagnon on Jan 10, 2011 - 3 answers

I was feeling insecure, you might not love me anymore

Having a minor freak out about identity theft, and looking for advice on making sure all my online information is as secure as possible. [more inside]
posted by goshling on Jan 5, 2011 - 16 answers

Least invasive border crossings?

Which method of traveling/travel route from Europe to the US will be the least invasive in terms of baggage examinations, pat-downs, and background checks? [more inside]
posted by anonymous on Jan 4, 2011 - 9 answers

Help Mom navigate the pirate bays

Mom is using the internet for the first time on an old, old laptop with Windows XP, and using it for email and also streaming movies (the pirated kind) on sites like Megavideo. Anything to help her avoid scams and malware? Hoping for software/Firefox extensions as well as maybe a guide for first-time internet users.
posted by anonymous on Jan 2, 2011 - 14 answers

Password management

Up to now, I have used Apple's Keychain program to manage my passwords. I recently got an iPad, and now I have lots of login passwords that I don't have memorized and can't access from my iPad browser. So, I'm looking for a password management setup that will do the following things (or as many as possible): [more inside]
posted by philosophygeek on Jan 1, 2011 - 16 answers

XBox security questions

How exactly does XBox account security work? Our 360 was stolen in November. We haven't bought a replacement yet, but we did change the password on the Live account associated with the console immediately. We just noticed that within the last few days, our gamertag has logged on and has been playing games, buying avatar items with points we already had, etc. WTF? [more inside]
posted by kmz on Dec 30, 2010 - 3 answers

Help us practice what we preach.

How should a business that's about security set up its own secure communications? [more inside]
posted by woot on Dec 28, 2010 - 15 answers

Questionnaire for Non-Sensitive Positions

I'm filling in a background-check form for a US government job--Questionnaire for Non-Sensitive Positions--and I'm confused. Help! [more inside]
posted by anonymous on Dec 28, 2010 - 9 answers

What's going on? Why did con-men deactivate my parents' alarm?

Someone scammed my parents. But what, exactly, is the point of the scam? They called my mom, claiming to be from AT&T, saying that something in her house was causing interference all over the neighborhood, and that they needed to come over. They came, showed fake credentials, identified the interference as coming from my parents' security system, deactivate they system and left. [more inside]
posted by grumblebee on Dec 25, 2010 - 31 answers

Keeping apartment safe during maintenance

My landlord wants me to leave my apartment unlocked so maintenance people can enter during the day. This makes me uncomfortable. How much should I push back? [more inside]
posted by Maarika on Dec 21, 2010 - 35 answers

Can I take the camera out of an iphone?

Quick and simple. Will my iPhone still work when I take the camera out? [more inside]
posted by ctmf on Dec 19, 2010 - 12 answers

How to handle a greedy landlord?

Interested in tenant rights: NYC landlord is asking for more money (additional $1000) than security+pet deposit ($2,400)?? [more inside]
posted by mooselini on Dec 17, 2010 - 9 answers

If I only wiped 10% of a hard drive before selling it, am I 90% screwed?

What damage control measures can I do for selling my PC on eBay which was only partially wiped? Yes, I know how stupid this was. [more inside]
posted by anonymous on Dec 15, 2010 - 8 answers

Deprivation does terrible things.

Suffering through the great midwest Comcast outage of late 2010. What ill may come of this? [more inside]
posted by thusspakeparanoia on Dec 5, 2010 - 14 answers

How to protect a website from hackers & Firesheep?

How to protect a website? [more inside]
posted by Aya on Nov 30, 2010 - 6 answers

phishing home security system emergency contacts

My parents just got a weird call about 30 mins ago (11:50pm). They were getting ready for bed, so my sister picked up. [more inside]
posted by wuMeFi on Nov 28, 2010 - 4 answers

Home Protection Ideas?

Our house got robbed last week for the second time in less than a year. Short of moving, what can we do to get our peace of mind and sense of security back? [more inside]
posted by kmz on Nov 24, 2010 - 37 answers

Wife's email was haxxored, please halp

Does my wife need to abandon her email address? [more inside]
posted by r_nebblesworthII on Nov 23, 2010 - 14 answers

Fucking airport security, how does it work?

Flying into the US from another country: what's going on with security? [more inside]
posted by anonymous on Nov 23, 2010 - 10 answers

Airport scanner with pet?

Can you go through the new airport scanner machines holding a pet? [more inside]
posted by ThePinkSuperhero on Nov 22, 2010 - 12 answers

Extent of "grope/enhanced patdown"???

I'm going to be flying next month, and I'm already annoyed/upset, etc... about the pornoscanners and groping issue, but I'm even more nervous now due to one article I read and am wondering if I'm misunderstanding the groping issue and it is actually WORSE than I already believe it to be: Is the "enhanced patdown" an actual under/inside the clothes grabbing of genitals? I can't find a clear statement on the TSA site (great PR, not so great information architecture) and one blog explicitly detailed the touching of her labia but other blog posts I've seen can be read either way (as underclothes contact or overclothes, they're not particularly clear). Help???
posted by symbioid on Nov 19, 2010 - 18 answers

all your internets are belong to us [firesheep users]

How can I take advantage of free internet at a hotel and/or cafe during the post-firesheep apocalypse? [more inside]
posted by ChefJoAnna on Nov 16, 2010 - 11 answers

Burglarproofing for renters?

What are the most cost-effective ways to burglar-proof a rented apartment? [more inside]
posted by Metroid Baby on Nov 16, 2010 - 25 answers

Preventing bag theft during TSA inspection

Help me keep my bags from being stolen during the TSA security check. [more inside]
posted by bchaplin on Nov 16, 2010 - 23 answers

Baa baa Firesheep, have you stolen my password?

How worried do I need to be about Firesheep? What sites does it affect? Is there anything I can do to protect myself on an iPad? [more inside]
posted by Horace Rumpole on Nov 14, 2010 - 23 answers

So what about Mint?

I like Mint.com and I want to use it. My wife, she disagrees. This has caused some consternation. Maybe you can help. [more inside]
posted by kbanas on Nov 10, 2010 - 45 answers

I'm really not planning to forge report cards, honest.

[NaNoWriMo Filter] Help me research network security for my novel please. [more inside]
posted by bardophile on Nov 6, 2010 - 8 answers

Losing my (free WiFi) connection

When I start a wifi session (at a coffee shop for instance), the bubble will say "additional login may be required" which, when I open a web page, is just an "I accept" disclaimer. BUT, when I have to turn off the computer (reboot for windows update, go to the bathroom, etc) and then try to re-establish contact, it won't work. I can't get connected and I can't get the login screen. I've tried everything I can think of to get it to work but it just seems like I have to come back the next day. Any tricks to get me back on?
posted by CodeMonkey on Oct 22, 2010 - 5 answers

override XHR policy

override XMLHttpRequest security policy in firefox? [more inside]
posted by nihlton on Oct 22, 2010 - 8 answers

controlling wifi access by MAC address

I have a Linksys WRT110 router. Although it has some access controls, I find them difficult to use and counterintuitive, and I say this as someone who has been using computers since the days of the TRS-80. Is there a router out there that will let me limit access times by MAC address of different devices, either by a daily quota or a cutoff time? [more inside]
posted by mecran01 on Oct 22, 2010 - 7 answers

Setting up wireless security?

How do I set up wireless security on my new Netgear modem? [more inside]
posted by meerkatty on Oct 14, 2010 - 3 answers

How do I post a photo album to a Facebook business page?

My Facebook account was apparently compromised. I have regained control of it, but a weird thing is happening and I need help figuring out how to fix it. [more inside]
posted by Mr_Zero on Oct 5, 2010 - 13 answers

Help me kill this autoexecuting at start script!

Is there a way to trace down where a script is attempting to start from on Windows XP? I had a bit of a drive-by download happen, and I mostly removed the infestation with some antispyware tools. However I manually deleted one file before getting the tools to do their work, and so some remnant of the startup process is trying to start this 36525.js script [more inside]
posted by symbioid on Oct 4, 2010 - 4 answers

What has your president done for you lately?

May I have a list of President Obama's achievements since he came into office? [more inside]
posted by captainsohler on Sep 24, 2010 - 7 answers

Accessible and secure - can they be friends?

Help me design a secure method of keeping my passwords both safe and available. [more inside]
posted by Tehhund on Sep 23, 2010 - 31 answers

Dual citizenship (US and CDN) and security clearance

Can a dual citizen (American and Canadian) get a Secret level security clearance in the United States? I'm starting to hear rumors that they'll ask me to give up my Canadian passport to get the security clearance. And - by giving up my Canadian passport are they asking me to renounce my Canadian citizenship to get the security clearance?
posted by raising_arizona on Sep 15, 2010 - 10 answers

Two separate online email accounts have been broken into within six months.

Two separate online email accounts (Hotmail then Gmail) of my wife's have been broken into within six months. Each time the hijacker changes the password, sends a message to the contact list asking for some emergency money, then deletes the contact list. Any idea why my wife would be targeted? And what should she do to protect herself from now on?
posted by markcmyers on Sep 13, 2010 - 14 answers

Backups during solar storms

What's the best way to safeguard my backups from the effects of a solar storm? Should I worry about that at all? [more inside]
posted by lord_yo on Sep 11, 2010 - 9 answers

Page: 1 ... 3 4 5 6 7 8 9 10 ... 19