256 Kilobytes

Information Security Comments

Type CommentsResponses to top-level threads. Category Information SecurityContent about computer security. Tag All

Profile Photo - Univa

Reply to Got the error "Ping transmit failed. General failure"?

Comments in Information Security | By Univa

Published 1 month agoTue, 16 Apr 2019 07:32:48 -0700

Profile Photo - Univa

If the default gateway entry is missing,...

MoreIf the default gateway entry is missing, the message “General failure” could appear. This happens, when the computer tries to reach a host...
🗨
1
🐏
0
👁
126
Profile Photo - amifriskin

Reply to How to tell if you are being ddos'ed?

Comments in Information Security | By amifriskin

Published 1 month agoSat, 30 Mar 2019 16:05:35 -0700

Profile Photo - amifriskin

Focus on tracking normal activity so you...

MoreFocus on tracking normal activity so you can recognize if anything is a unusual. Improve you capacity so it is high enough to carry the load for optim...
🗨
1
🐏
0
👁
91
Profile Photo - -alxl_

Reply to How to DDoS someone with their IP?

Comments in Information Security | By -alxl_

Published 1 month agoSat, 30 Mar 2019 15:56:19 -0700

Profile Photo - -alxl_

A DDOS is short for a distributed denial...

MoreA DDOS is short for a distributed denial of service. A DOS - denial of service is when a service is made unavailable usually through flooding the serv...
🗨
1
🐏
0
👁
97
Profile Photo - thegstocersson

Reply to How to get around OpenDNS?

Comments in Information Security | By thegstocersson

Published 1 month agoSat, 30 Mar 2019 15:21:57 -0700

Profile Photo - thegstocersson

There are a lot of different opinions on...

MoreThere are a lot of different opinions on this. After reading a lot of different pages on this subject I believe this one is the easiest to follow. htt...
🗨
1
🐏
0
👁
89
Profile Photo - Graln_of_Truth

Reply to Where does Avast store boot scan log?

Comments in Information Security | By Graln_of_Truth

Published 1 month agoSat, 30 Mar 2019 15:18:53 -0700

Profile Photo - Graln_of_Truth

You can find it by going to C:ProgramDat...

MoreYou can find it by going to C:ProgramDataAVAST SoftwareAvast eport and the file you're looking for should be called "aswBoot". If you need more help r...
🗨
1
🐏
0
👁
83
Profile Photo - -alxl_

Reply to What does "receptacle blocked" mean?

Comments in Information Security | By -alxl_

Published 1 month agoSat, 30 Mar 2019 15:04:19 -0700

Profile Photo - -alxl_

It most likely means they couldn't get t...

MoreIt most likely means they couldn't get to the Mail Box to drop off the letter. Someone may have parked/blocked the front of the mail box or there was...
🗨
2
🐏
0
👁
84
Profile Photo - w3nsi012

Reply to What can people do with your IP address?

Comments in Information Security | By w3nsi012

Published 1 month agoSat, 30 Mar 2019 14:44:58 -0700

Profile Photo - w3nsi012

They can't get any info from just your I...

MoreThey can't get any info from just your IP address, the only thing anyone can do it leach off your power and slow your connectivity down.
🗨
1
🐏
0
👁
89
Profile Photo - Zhaybib

Reply to Enable IPSec pass through?

Comments in Information Security | By Zhaybib

Published 1 month agoSat, 30 Mar 2019 14:42:03 -0700

Profile Photo - Zhaybib

Since you want to make sure you are doin...

MoreSince you want to make sure you are doing everything right in terms of enabling IPSec pass through, make sure that you check out here, https://www.tom...
🗨
1
🐏
0
👁
77
Profile Photo - Zhaybib

Reply to How to fix MalwareBytes Real Time Protection?

Comments in Information Security | By Zhaybib

Published 1 month agoSat, 30 Mar 2019 14:35:27 -0700

Profile Photo - Zhaybib

Since you say you have limited skills in...

MoreSince you say you have limited skills in fixing Malware, you should check out this site here that will tell you how to fix MalwareBytes Real Time Prot...
🗨
1
🐏
0
👁
78
Profile Photo - Graln_of_Truth

Reply to How to open port 25565?

Comments in Information Security | By Graln_of_Truth

Published 1 month agoSat, 30 Mar 2019 14:19:51 -0700

Profile Photo - Graln_of_Truth

If you want to port forward, you'll need...

MoreIf you want to port forward, you'll need to access your router configuration page and head to the Port Forwarding tab. To find the URL and login info...
🗨
1
🐏
0
👁
60
Profile Photo - Zhaybib

Reply to Windows firewall log viewer?

Comments in Information Security | By Zhaybib

Published 1 month agoSat, 30 Mar 2019 14:18:02 -0700

Profile Photo - Zhaybib

Since you are wondering about how to pro...

MoreSince you are wondering about how to protect your information on your computer, you can find out how to look at the windows firewall log viewer here,...
🗨
1
🐏
0
👁
78
Profile Photo - Graln_of_Truth
Profile Photo - Graln_of_Truth

Search for "firewall" within your comput...

MoreSearch for "firewall" within your computer and click "Windows Defender Firewall", click "Allow an app or featuer through firewall" and locate the appl...
🗨
1
🐏
0
👁
75
Profile Photo - ThiLastShah79

Reply to What can you do if you know someone's IP address?

Comments in Information Security | By ThiLastShah79

Published 1 month agoSat, 30 Mar 2019 13:39:38 -0700

Profile Photo - ThiLastShah79

There are plenty things someone can do w...

MoreThere are plenty things someone can do when they know your IP address. They can block you from a site their hosting, a hacker can gain access to your...
🗨
1
🐏
0
👁
97
Profile Photo - Univa

Reply to What does "receptacle blocked" mean?

Comments in Information Security | By Univa

Published 1 month agoThu, 28 Mar 2019 10:59:55 -0700

Profile Photo - Univa

Receptacle blocked means the mailbox was...

MoreReceptacle blocked means the mailbox was inaccessible or that there was nowhere to post the package and that the letterbox was blocked. Which also mea...
🗨
2
🐏
0
👁
84
Profile Photo - Univa

Reply to Malwarebytes web protection keeps turning off?

Comments in Information Security | By Univa

Published 1 month agoFri, 22 Mar 2019 13:26:54 -0700

Profile Photo - Univa

This problem usually comes when the Malw...

MoreThis problem usually comes when the Malwarebytes is not updated. So first check to see if it is entirely up to date.  You can also uninstall,...
🗨
1
🐏
0
👁
95
Profile Photo - Boats, LLC

Reply to Sucuri vs. CloudFlare, what's your choice?

Comments in Information Security | By Boats, LLC

Published 1 month agoWed, 20 Mar 2019 17:11:36 -0700

Profile Photo - Boats, LLC

Cloudflare has great security according...

MoreCloudflare has great security according to PC Magazine and many other outlets, but Sucuri is up and coming. If you're looking for security and speed,...
🗨
4
🐏
0
👁
40
Profile Photo - drewstring

Reply to Sucuri vs. CloudFlare, what's your choice?

Comments in Information Security | By drewstring

Published 1 month agoWed, 20 Mar 2019 12:29:37 -0700

Profile Photo - drewstring

In my opinion, Sucuri would be the bette...

MoreIn my opinion, Sucuri would be the better choice for your network and information security. Compared to CloudFlare it is less expensive and offers bet...
🗨
4
🐏
0
👁
40
Profile Photo - Jemgrip

Reply to Sucuri vs. CloudFlare, what's your choice?

Comments in Information Security | By Jemgrip

Published 1 month agoWed, 20 Mar 2019 12:01:00 -0700

Profile Photo - Jemgrip

I found the answer to your question on t...

MoreI found the answer to your question on this link... https://www.wpbeginner.com/opinion/sucuri-vs-cloudflare-pros-and-cons-which-one-is-better/ Hope th...
🗨
4
🐏
0
👁
40
Profile Photo - Edgelady43069

Reply to Sucuri vs. CloudFlare, what's your choice?

Comments in Information Security | By Edgelady43069

Published 2 months agoWed, 20 Mar 2019 01:46:55 -0700

Profile Photo - Edgelady43069

Sucuri and CloudFlare are online service...

MoreSucuri and CloudFlare are online services that offer website firewall, CDN, and DDoS protection services. CloudFlare does a little better in the conte...
🗨
4
🐏
0
👁
40
Profile Photo - Univa

Reply to How to do a boot time scan with Avast?

Comments in Information Security | By Univa

Published 2 months agoFri, 15 Mar 2019 08:11:14 -0700

Profile Photo - Univa

METHOD: Schedule a Boot-Time Scan

MoreMETHOD: Schedule a Boot-Time Scan First open the Avast, from the left side click on the protection tab » ‘Scans‘ in the left m...
🗨
1
🐏
0
👁
89
Profile Photo - roxblade

Reply to Avast passwords extension not activated?

Comments in Information Security | By roxblade

Published 2 months agoSat, 09 Mar 2019 11:10:41 -0800

Profile Photo - roxblade

A re-install of the Avast Passwords exte...

MoreA re-install of the Avast Passwords extension for browsers would solve the problem, given that you still have subscription to your Avast. Fire up your...
🗨
1
🐏
0
👁
68
Profile Photo - Huevos Rancheros

Reply to The Insane, Unholy Life of John McAfee – A Biography

Comments in Information Security | By Huevos Rancheros

Published 3 months agoWed, 20 Feb 2019 03:15:23 -0800 | Last update 3 months agoWed, 20 Feb 2019 04:58:37 -0800

Profile Photo - Huevos Rancheros

@Hash Brown yeah, just without the whole...

More@Hash Brown yeah, just without the whole rape thing, if that's true
🗨
2
🐏
2
👁
2,804
Profile Photo - Hash Brown
Profile Photo - Hash Brown

I think I have a new hero in my life.<br...

MoreI think I have a new hero in my life.
🗨
2
🐏
2
👁
2,804
Profile Photo - roxblade

Reply to How to use Grabify?

Comments in Information Security | By roxblade

Published 3 months agoFri, 15 Feb 2019 03:00:57 -0800 | Last update 3 months agoTue, 19 Feb 2019 01:32:25 -0800

Profile Photo - roxblade

For people who don't know how to use or...

MoreFor people who don't know how to use or navigate the Grabify website, their staff has made a really well-done video about it. You can watch the vid...
🗨
1
🐏
0
👁
99
Profile Photo - roxblade

Reply to How long does scanning and repairing a drive take?

Comments in Information Security | By roxblade

Published 3 months agoTue, 12 Feb 2019 03:07:43 -0800

Profile Photo - roxblade

Depends on how clean the disk in questio...

MoreDepends on how clean the disk in question is. By clean I don't mean how much space is taken up by data. Some huge zip files or ISO files will take muc...
🗨
1
🐏
0
👁
78
Profile Photo - roxblade

Reply to Everything you need to know about decompression bombs?

Comments in Information Security | By roxblade

Published 3 months agoTue, 22 Jan 2019 07:14:29 -0800

Profile Photo - roxblade

Decompression bombs, zip bomb, or zip of...

MoreDecompression bombs, zip bomb, or zip of death is an archived malware. The first job it does is shut down your antivirus, at least that's the most...
🗨
3
🐏
0
👁
169
Profile Photo - Hash Brown
Profile Photo - Hash Brown

thought so

Morethought so
🗨
3
🐏
0
👁
169
Profile Photo - August R. Garcia
Profile Photo - August R. Garcia

MTurk / 10

MoreMTurk / 10
🗨
3
🐏
0
👁
169