Poor security

I can't sign in to Hotmail. I hit the button for approval and accepts the so-called. Then I go back and find that I am always connected. It's security. Also, your help system is appalling. I want microsoft toanser not a forum

Try here: http://windowslivehelp.com/

Welcome to Windows Live Solution Center, a community for Windows Live products and services where you can find Microsoft Certified Solutions, post your own questions in our forums, or help others by providing answers. We look forward to hear from your part, start by selecting a product below.

TaurArian [MVP] 2005-2011 - Update Services

Tags: Windows

Similar Questions

  • Receiver 'security warning '.

    Receive "Security warning" do you want to show only the content page Web which was delivered safely?  Why I get this now, has never done it before.  How do I delete or is it safe to do?

    Figfmly1

    "FIGFMLY" wrote in the new message: * e-mail address is removed from the privacy... *

    Receive "Security warning" do you want to show only the content page Web which was delivered safely?  Why I get this now, has never done it before.  How do I delete or is it safe to do?

    Figfmly1

    I can't tell you why you never received these warnings previously.  By default, you should always receive a warning each time Internet Explorer tries to connect to a web page (HTTPS) secure that includes non-secure content.

    To remove the warning, open Internet Explorer and click on Tools / Internet Options / Security.
    Select the Internet zone, then click Custom level
    Scroll down to the display of mixed content
    By default, EI invite for approval, before it connects to any secure page which includes mixed or poorly secured content.
    If you want to remove the warning, you can choose between two options:

    'Activate' allows Internet Explorer to download a mixed content, without any warning.  This option is dangerous, because the passwords and other sensitive data could be sent to unsecured locations.

    'Disable' prevents Internet Explorer to download all content not secure - without any warning, he did it.  This is my recommended option and in practice, it is unlikely to cause problems.

    So what happens when you turn off a mixed content?

    Mixed content occurs in general, when a poorly designed HTTP web page contains links to the sources of unsecured (HTTP) logos or other graphics.  You will notice that when you disable a mixed content, some graphics are missing from the page.  However, that should not affect functionality, so better be safe than sorry.

  • How can I connect to my account?

    I just reset my Windows 10 and now I can't connect to my gmail account. I downloaded the latest version of Thunderbird, and I get the error provided windows.

    I found the names of servers

    The new account wizard Thunderbird automatically fills in the correct server for Gmail settings.
    https://support.Mozilla.org/en-us/KB/automatic-account-configuration

    I don't know how you ended up with. Gmail.com as server name, which of course will not work.

    You try Manual Configuration?

    I don't remember my user name because at Google, you use your gmail address to sign.

    All you have to do is fill in your name, email address and password. Let the Wizard do the rest.

    I found a message on the website of gmail on an app with poor security, try to connect to my account.

    What happens in your Thunderbird 'Authentication method' account settings is not set to 'OAuth2', and you will not allow 'less safe apps' in the Gmail settings.

    Note, "OAuth2" works only for IMAP accounts. The wizard by default IMAP.
    In the event that you want to configure a POP account, you will still need to leave "less secure apps" in the Gmail settings before setting the account in Thunderbird.
    https://support.Google.com/accounts/answer/6010255?hl=en

  • ISP says "update of digital certificates expired" now no outgoing doesn't email - HELP

    That's what the ISP told me: "it seems that things worked until the moment when we updated our.
    digital certificates expire this morning. You may need to accept the new
    certificate (that I had to do on my iPhone/iPad). All e-mail applications
    differ in the way they treat the SSL certificates. Please see your
    Help files request for more information on how to import or accept a car
    signed digital certificate.

    I looked in 'view certificates' and 'validation', but I don't see anything to change or do... So, how can I accept this "new" certificate

    Thanks in advance!

    Craig

    If your ISP uses self-signed certificates ask them when they intend to become a professional store. Free self-signed certificates are basically something that exists to allow analysis of configurations without fees to pay for certificates. This leaves a loophole for tight companies, generally jobs of MOM and dad, or firms, who are simply stretched to use the correct string of voting trust and pay for their certificates.

    Not properly issued SSL certificates requires no acceptance, that the issuer or someone higher in the chain of trust is pre approved by Mozilla. It is extremely poor security to allow users wont accept SSL certificates and they are not experts in these things and could easily appove a certificate that makes their raw text of communication to third parties.
    You are done better with unsecured connections, you're free of those signed. At least you know your vulnerable.

    However, if you go to the menu Tools > options > advanced > certificates and Tower of the verify option you could do better. They are not probably set up as they sign free. Other than the view certificates and remove all those that you already have for them.

  • Blocks of FF Java 7 day 45. Why? Explanation regards 7U11.

    Installed upgrading Java 7 45.
    Have the two 32-bit versions and 64-bit installed from Oracle's Web site.

    Works in Chrome.

    24.0 Firefox displays the error message indicating that the Java plugin has known vulnerabilities.

    On the support page, it has a link to this explanation from January 2013 what Java 7 update 11 looks.
    https://blog.Mozilla.org/security/2013/01/11/protecting-users-against-Java-vulnerability/

    Does anyone have a permanent solution and preferably an explanation for this?

    I know how to allow Java to run once more as always on a specific site
    https://support.Mozilla.org/en-us/KB/how-to-enable-Java-if-its-been-blocked

    What I was asking is why Firefox still blocks Java by default, if Java has been changed several times since the explanation was written.

    Thanks a bunch!

    Hello mort3n, in future versions of the java plugin (also those nominally more current) will be considered as vulnerable by firefox and blocked by default. It is because of the poor security of oracle record in the past, as sitting on vulnerabilities not fixed for months...

  • Generator of newspapers to InDesign: IDML or InDesign Server?

    Hello!

    I create a lib to generate the log to the IDML/InDesign format.

    This library already outputs the log using PDFLib, giving control us all (in points) about what is to be drawn.

    In our version IDML search engine, we face with TextFrame and stories, but I don't have the same control as PDFLib.

    I don't know if my story fits into the TextFrame, I don't know if I need to resize or create a new TextFrame bound for printing to keep the same story in the next column.

    Because the final library will be used on a server, I need I use InDesign Server to generate?

    I can self-adjustment executives related, jumping to the new column to keep printing, (etc.)?

    Or this control is possible by simply using pure IDML?

    Thank you

    You can find the InDesign scripting docs at http://www.adobe.com/products/indesign/extend.displayTab2.html#Scriptingresources (to http://www.adobe.com/devnet/indesign/documentation.html#idscripting but which also omits the common things to the rest of the creative suite) and Jongware has some excellent references additional APIs extracted InDesign to http://jongware.com/idjshelp.html. If you read the SDK documentation, you will find them quite a breath of fresh air; they are targeted at end users learn to write scripts, not to C++ developers, and they are much more pleasant to taste.

    Theoretically, you can store anything you want within an IDML file. But normally, no.. An InDesign script can be written in JavaScript for platform independence towards, or in VBScript on Windows and Applescript under OS X. in general, they are stored in the filesystem in a Scripts / folder and InDesign makes available in the actions panel this folder and the user chooses a script of this Panel while InDesign is running and then InDesign will run the script. There is also a Startup Scripts folder, which may contain scripts that are executed at startup of InDesign. There is no possibility for a document (IDML or INDD or otherwise) for the exploitation of a script that runs when the document is opened (this has implications of poor security...), if a script existing that is running (start or not) can listen to an event triggered by opening a document and can act accordingly. Or an existing script cannot open a document. Some people use a paradigm where scripts run from script code that lives inside a document, as in a specially designated textframe or a script label. But this is not common.

    So you could certainly put most of your script in an IDML file and have a charger small script that the user runs that evaluates the script that you have included in the IDML file. Or more of similar models.

    If you have the file BCTI by history, you can ask (although scripting) the InDesign API to place each story on your network, and can react adaptable engine decisions makes the layout and based on these results, decide how to place the following story. If you include all of your stories within the main IDML file, I think that will be dealing with the unexpected difficulties. I think that InDesign expects stories inside a file IDML to appear in the linked text frames. But I could be wrong on this subject... I don't have much experience with the help of IDML the way you think about it. Most of my experience IDML is about IDML reading that ID has generated, not generating IDML customized for her. (Certainly, you can have stories placed in frames of related texts that do not account for the length of history, for purposes of placeholding - such as frames are in excess. And then you can adjust them later. I suspect nail down who will use is not very important for the development of your software. It could make a big difference in ease of use or its packaging later, but not really in the implementation.)

    You can associate arbitrary key/value pairs with objects in the DOM script, using the methods . insertLabel() and . extractLabel() . These appear as the elements in the IDML. Alternatively, you can store XML data in the IDML file as if you had imported XML into your InDesign document and then analyze that however you like. You can also simply read an XML raw with your script file and do what you want with it. So, Yes, you can store extra metadata in a variety of forms ranging from reasonably structured with the ID of object model for completely outside of it.

    You should certainly be able to have inline (anchored?) with a history of ICML tables, and I'm not really sure of graphics. You'll have to see! I see a lot of experience in your future. On the other hand, maybe someone else who is quite knowledgeable about IDML will appear in this thread...

  • The Security Center Satellite C660, showing the poor

    Hello.

    I have Toshiba Satellite C660 laptop. Buy 01/09/2011. I spend my computer and when I once again on I just opened Toshiba newsletter. There are health care system, Security Center showing the poor. But if 2 minutes on my computer then its good display auto. \My McAfee security is ok. but I do not understand where is the problem. Can u inform _ * me why Security Center showing poor when my computer is of.*_

    Thank you & best regards

    Send me the answer by e-mail: [email protected]

    Bimal Nag

    I put t understand what do you mean with display of poor.
    If everything is shown well more then everything should be OK.

  • Toshiba Bulletin Board warns about the security of the poor

    Hi all.

    I noticed that since I have my laptop (L500-1XL) who on a daily basis, a message appears, then disappears, but a sign is left on the security of the members of the Bulletin warning of red section, and if I pass the pointer over it, it says "poor."

    What does that mean?
    What am I supposed to do with this vague information?
    Does anyone else have this problem?

    I installed, updated antivirus updated, running, is recorded by Windows and Windows does not have a problem.
    I have a firewall works well.
    I don't understand! What is poor?

    Hello

    I think that this has nothing to do with the security of the laptop.
    Toshiba bulletin board provides a lot of information;
    Networks/Wlan, PC health, security, PC diagnosis utility Eco monitor
    Maybe the notification means the WiFi signal strength?  :|

    Sorry, but it's really hard to tell what it is without having more details
    However, here is a website of Toshiba Toshiba newsletter:
    http://laptops.Toshiba.com/Research-Center/technology-guides/Toshiba-Bulletin-Board-software

    Here is a Bulletin from Toshiba video:
    http://forums.computers.Toshiba-Europe.com/forums/thread.jspa?threadID=52212

  • Poor performance since the update of security online

    No problem with web browsers (Safari, Firefox, Chrome) at home (Comcast) and work (Integra) until I downloaded the recent Safari 9.0.3 and security of the OS update.  Now, with all browsers, while a few sites (Facebook, Flikr, Yahoo, search the Web) load more quickly, most of the others (links Apple in searches) loading VERY slow (Slower than Dial-Up) or not at all.  I ran the diagnostic - all connections are good.  E-mail works well.  I restored the computer using Time Machine.  Internet connections are fine with other computers on the same router.

    Spotify usually time very well.  iTunes Radio - NO.

    I spotted information about DNS server settings and I know where these, but if they need to change, how would we know who and what?  Currently, the router is the DNS server.

    Current settings are:

    Configure Iv4: Using DHCP

    Configure IPv6: automatically

    10.10.5 OS

    MacBook Pro (13-inch, mid-2012)

    Processor: 2.9 GHz Intel Core i7

    Memory: 8 GB

    Run recovery of the BONES

    Disconnect all devices from your computer except the keyboard & mouse.

    Start your computer by pressing command -r.  This will take you to the recovery disc.

    Select disk utility & hit back. 

    In disk utility, select the HD on the left & click repair disk (lower-right).

    When you reach the office after doing the above, repair permissions & reboot your computer.


    ===========


    10.10.5 OS

    By your profile: OS X Yosemite (10.10. 2)

    Conflict info:  Please update/correct your profile so that you can receive the good troubleshooting suggestions.  This will help users to try to help you.  Thank you.

  • Poor performance and crash since installing Microsoft Security Essentials

    My computer ran pretty fast until I decided to install security essentials download. Now he hangs up, takes a long time to go from site to site, etc.

    Make sure you have uninstalled completely any anti-virus that has been previously installed.

    You have only ONE AV installed and running.

    Microsoft Security Essentials questions should be directed to the MSE Forums:

    http://social.answers.Microsoft.com/forums/en-us/msestart/threads

    Installing and upgrading Microsoft Security Essentials program.

    http://social.answers.Microsoft.com/forums/en-us/msescan/threads

    Analysis, detection and removal of threats

    http://social.answers.Microsoft.com/forums/en-us/mseupdate/threads

    Update the definitions of spyware and viruses

    See you soon.

    Mick Murphy - Microsoft partner

  • The recommended action to correct security with SE 7 U does not work, then?

    I kept getting the Java SE 7 U plugin has problems of message security. I uninstalled both 32-bit and 64-bit and then installed again. I get the same message on the security of the poor. I use it for my crossword days online. Is the problem with www.independent.co.uk or my PC?

    Hello timgall, the java plugin has a record of questionable security in general. If you want to enable it for some sites, you can do it-for more details see How to enable Java on trusted sites

  • My computer is old and I am poor. Not enough ram for new ff! What can I do?

    Hello. I have windows xp, a very old hand e-machines computer and only 368 MB of RAM and a processor intel of 3.33 GHz. Even on this very old version of firefox, I get a lot of error messages and crashes. I had a newer version but had to come back to this one, because there are too many bugs!

    Now I get messages that my version (3.6.8)will soon be unsupported and have no security. I am very poor;  I have no money to buy a new computer with all the latest bells and whistles just so that firefox will work: 1 gig of ram is Not gonna happen on THIS computer. SO... what do you suggest we poor folks do?
    

    I liked firefox for years, but it seems to take place in the direction of Microsoft went: bulky, heavy programs, tons of software needed alongside more memory, tons of things, we don't want TO not but should have anyway. I guess that if you do not have terrabites now, you're not cool. This saddens me and excludes a large number of us who are poor.

    It comes to my feedback and a call for help. I hope you ask my questions and tell me what version of Firefox, I can go to that will be supported for more than what I currently have. Firefox keeps getting slower and slower, the more is invented. I use it mainly for youtube videos, email and search and watch the other vids, I can barely do at home is no longer. I don't want to go, but if I have no choice. I also wish a lighter application that is very light on my limited resources. I have a lot; just a search bar; don't need even toolbars, other applications like google. Is this possible. even if I've had enough of everything for firefox 8 (which I did not)?

    Thanks for any help you can give.

    Do a cleaning (re) install and delete the folder of the program Firefox (C:\Program Files\Mozilla Firefox\).

    Download a new copy of Firefox and save the file to the desktop.

    Uninstall your current version of Firefox if possible.

    • Do NOT remove the data of a personal nature when you uninstall the current version or you lose your bookmarks and other data in the profile folder.

    Delete the program folder Firefox before installing newly downloaded copy of the Firefox installer.

    • It is important to remove the Firefox program folder to delete all the files and make sure that there is no problem with the files that were the remains after uninstallation.

    Your bookmarks and other profile data stored in the Firefox profile folder and will not be affected by a relocation, but make sure that you do not select delete data of a personal nature if you uninstall Firefox.

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • OfficeJet 6500 a: securing wireless printer on home network

    Hello

    I did some research on it and can't seem to find the answer.  Others say that their problem has been resolved, but I don't see how.

    I have an Officejet 6500 connected to the router in my house - I manually entered the IP address.  I suspect that someone in my house (family member) is the impression of the things on my printer because my ink disappears quickly.  It's no big deal, but I thought I'd give the password protect the printer so that they could not connect and print at will.

    I have read other solutions, and people say that remove 'everyone' from the Security tab in windows will work, but that only works if I was connected to the printer via USB and share my connection to a printer through Windows.  Everyone connected to my without wire can install the driver and it will find the HP printer on our network, install and they can print at will.

    Is there a way to put a password on the printer, so access on a home network can be limited to even when I'm not home?  I realize that they could connect manually via USB - I'm just trying to make more of a pain to print when I'm not around.

    I guess I could of pseudo-seggregate my networkt House using a mask of the subnet and the printer on my laptop but my network is a little rusty as I am out of the TI of career and did not want to understand.  I can't find a way to disable the SSID broadcast - which would effectively mask the printing software to find the printer on the network.

    I am disappointed that the designers at HP could not put something so seemingly simple as requiring a password to connect to the printer.

    Any thoughts there?

    Thanks for confirming my suspicions.  If ever I strong enough to play with maybe subnet masks I'll post how it's done, if it works.

    Stupid... everything in this world is cheap and poorly thought.  Can't wait until this printer still works and HP stop cartridges or has no drivers for the next version of Windows coming out that everyone starts to use 3 years after the release, so that they can work out the bugs.

  • Linksys connection shows poor all the time

    When I check my status on my connection why you say poor all the time? I also noticed that there are others that are related to my linkskys and my connection is always ' say poor. How can I get a better connection? Thank you

    Hello

    You really need to be checked in the forums for your version of Windows.

    Answers - Windows Forums
    http://answers.Microsoft.com/en-us/Windows

    ---------------------------------------

    It is more connected to your router that are not in your household? If so, you will need to
    reset the router security. All unauthorized connections are the security risks and also use
    your connection resource. Check with the manufacturer of the router.

    Distance and other interference can affect the quality of the connection. Also check updates
    your WiFi and NIC drivers.

    LinkSys has support and excellent help. Also check the LinkSys forums.

    LinkSys support
    http://homesupport.Cisco.com/en-us/Wireless/Linksys

    LinkSys forums
    http://homecommunity.Cisco.com/community/?category.ID=Linksys

    ==================================================================

    References to Vista also apply to Windows 7.

    Follow these steps to remove corruption and missing/damaged file system repair or replacement.

    Start - type in the search box - find command top - RIGHT CLICK – RUN AS ADMIN

    sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    Then run checkdisk (chkdsk).

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    ====================================================

    After that the foregoing: (here, the NETWORK card and Wifi are interchangeable in the sense that the two must be
    fact that you can do if you first use).

    Follow these steps:

    Control Panel - network - write down of the brand and the model of the Wifi - double click - top
    tab of the driver - write version - click on update driver (can't do anything like MS
    is far behind the pilots of certification). Then right click on the Wifi/NIC device and UNINSTALL
    -Reboot - it will refresh the driver stack.

    If necessary to download drivers on another machine and transfer on the problem computer via
    removable media such as a USB key or CD - DVD.

    Look at the sites of the manufacturer for drivers - and the manufacturer of the device manually.
    http://pcsupport.about.com/od/driverssupport/HT/driverdlmfgr.htm

    Installation and update of drivers under Windows 7 (updated drivers manually using the methods
    below is preferred so that the latest drivers from the manufacturer of system and device manufacturers are
    found)
    http://www.SevenForums.com/tutorials/43216-installing-updating-drivers-7-a.html

    Download - SAVE - go where you put it - right click – RUN AS ADMIN.

    You can download several at once however restart after the installation of each of them.

    After watching the system manufacturer, you can check the manufacturer of the device an even newer version.
    (Those become your fonts of rescue system manufacturer).

    Repeat for network (NIC) card and is a good time to get the other updated drivers as windows
    7 love the updated drivers.

    ======================================

    If necessary:

    How to do a repair installation to repair Windows 7
    http://www.SevenForums.com/tutorials/3413-repair-install.html

    -----------------------------------------------------

    Check this box:

    Strange problem with Internet in Vista (and Windows 7)
    http://www.catonett.com/blog/archives/194

    Windows Vista cannot obtain an IP address from certain routers or some non-Microsoft DHCP servers
    http://support.Microsoft.com/kb/928233/en-us

    ----------------------------------------------------

    And:

    Network connection problems
    http://windowshelp.Microsoft.com/Windows/en-us/help/33307acf-0698-41ba-B014-ea0a2eb8d0a81033.mspx

    I hope this helps.

Maybe you are looking for