Computer Security & Viruses/Expert Profile

Ask A Question


I cover Windows, Linux, TCP/IP and Ethernet security questions. I do not cover Mac, smart phones, or other networking issues.

Experience in the area

Books by Carolyn Meinel: wrote a chapter for The Hacking of America book (see My article Code Red for the Web for Scientific American was reprinted in the book Best American Science Writing 2002 (see My book The Happy Hacker: A Guide to Mostly Harmless Hacking is now in 4th edition with a Japanese edition (see




See a list with some online links at


MS, Industrial Engineering, The University of Arizona Took a course in computer forensics at the University of Texas at Austin/

Past/Present Clients

DARPA, SAIC, Palmer Labs

What do you like about this subject?

We are a threat to anyone who is an enemy of freedom in cyberspace. What they try to hide, my friends and I reveal. What they try to keep secret, we broadcast to the world.

What do you still hope to achieve/learn in this field?

Learning without limits! "I teach you the superman. Man is something to be surpassed." -- Friedrich Nietzsche in Thus Spake Zarathustra

Something interesting about this subject that others may not know:

"Meinel describes how a fictional hacker might penetrate a corporation's computer system. Is publishing it irresponsible? Obviously, we think not? We can best inform readers about how to defend themselves by explaining what attacks to expect." Editor-in-chief John Rennie explaining his decision to run an article by Meinel, Scientific American, Oct. 1998 issue, pg. 6.

Something controversial or provocative about this subject

"Carolyn P Meinel is its [the Hacking for Girliez gang] public enemy number one." Adam Penenberg, "Tracking the Hack," Forbes, Nov. 16, 1998, page 136. "Carolyn Meinel taught us how to hack?" Hacking for Girliez gang message left on the New York Times web site, Sept. 13, 1998 "What were you doing the morning of Sept. 13?" FBI's Doug Beldon questioning Meinel, Nov. 12, 1998.

Average Ratings

Recent Reviews from Users

Read More Comments

    K = Knowledgeability    C = Clarity of Response    P = Politeness
randy11/22/15101010Had a response super fast. Very good .....
Hashem09/14/151010Thank you.
zzz08/28/15101010Very Good suggestions. Thank you.
Jaye06/09/15101010Thank you for your kind response!!

Recent Answers from Carolyn Meinel

2016-03-06 Wifi security:

Anyone, not just the administrator of the network, who is within range of an unsecured WiFi network could grab data passing though it. The problem is defining what is "within range." Some hackers use an

2015-11-21 ransome virus:

The Fixme stick oftentimes solves the problem, but not always. In addition, if you have important files you don't want to lose, the Fixme Stick might just quarantine them if they are infected with viruses

2015-09-11 Payments security:

Smart Hide IP, even if it works as advertised, will do nothing to protect your online payment/credit card data.    It is advertised as a way to prevent a website from being able to record information about

2015-08-25 Windows XP lost functions:

Your biggest problem is that Microsoft no longer supports Windows XP. That means that it is full of vulnerabilities to worms, viruses and all other manner of malicious attacks. So if you want to protect

2015-06-08 Misc. Computer Question:

There is a very slight possibility that the installation files are in your Downloads folder. Look for a file or directory dated the day you download-installed this program.     Normally, however, these


Ask A Question

Computer Security & Viruses

All Answers

Answers by Expert:

Ask Experts


©2016 All rights reserved.