You are here:
I cover Windows, Linux, TCP/IP and Ethernet security questions. I do not cover Mac, smart phones, or other networking issues.
Books by Carolyn Meinel: wrote a chapter for The Hacking of America book (see http://www.amazon.com/exec/obidos/ASIN/1567204600/happyhacker) My article Code Red for the Web for Scientific American was reprinted in the book Best American Science Writing 2002 (see http://www.amazon.com/exec/obidos/ASIN/0060936509/happyhacker). My book The Happy Hacker: A Guide to Mostly Harmless Hacking is now in 4th edition with a Japanese edition (see http://happyhacker.org/hhbook/).
See a list with some online links at http://cmeinel.com
MS, Industrial Engineering, The University of Arizona Took a course in computer forensics at the University of Texas at Austin/
DARPA, SAIC, Palmer Labs
We are a threat to anyone who is an enemy of freedom in cyberspace. What they try to hide, my friends and I reveal. What they try to keep secret, we broadcast to the world.
Learning without limits! "I teach you the superman. Man is something to be surpassed." -- Friedrich Nietzsche in Thus Spake Zarathustra
"Meinel describes how a fictional hacker might penetrate a corporation's computer system. Is publishing it irresponsible? Obviously, we think not? We can best inform readers about how to defend themselves by explaining what attacks to expect." Editor-in-chief John Rennie explaining his decision to run an article by Meinel, Scientific American, Oct. 1998 issue, pg. 6.
"Carolyn P Meinel is its [the Hacking for Girliez gang] public enemy number one." Adam Penenberg, "Tracking the Hack," Forbes, Nov. 16, 1998, page 136. "Carolyn Meinel taught us how to hack?" Hacking for Girliez gang message left on the New York Times web site, Sept. 13, 1998 "What were you doing the morning of Sept. 13?" FBI's Doug Beldon questioning Meinel, Nov. 12, 1998.
|randy||11/22/15||10||10||10||Had a response super fast. Very good .....|
|zzz||08/28/15||10||10||10||Very Good suggestions. Thank you.|
|Jaye||06/09/15||10||10||10||Thank you for your kind response!!|
Anyone, not just the administrator of the network, who is within range of an unsecured WiFi network could grab data passing though it. The problem is defining what is "within range." Some hackers use an
The Fixme stick oftentimes solves the problem, but not always. In addition, if you have important files you don't want to lose, the Fixme Stick might just quarantine them if they are infected with viruses
Smart Hide IP, even if it works as advertised, will do nothing to protect your online payment/credit card data. It is advertised as a way to prevent a website from being able to record information about
Your biggest problem is that Microsoft no longer supports Windows XP. That means that it is full of vulnerabilities to worms, viruses and all other manner of malicious attacks. So if you want to protect
There is a very slight possibility that the installation files are in your Downloads folder. Look for a file or directory dated the day you download-installed this program. Normally, however, these
Answers by Expert: