Questions tagged [internet]

The Internet is a global network consisting of many networks connecting billions of devices together via a variety of network technologies.

The Internet is a global network consisting of many networks connecting billions of devices together via a variety of network technologies.

Related reading

The Internet

330 questions
16
votes
1 answer

Can all your public files on Dropbox be accessed by anyone with one of the links?

Dropbox is one of the most famous cloud storage and sharing platform. Dropproxy's website claims that there is a weakness in the Dropbox security: Lots of people use Dropbox. Lots of people share public Dropbox links. But not everyone knows that…
Treko
  • 303
  • 2
  • 6
3
votes
4 answers

Does altering characters of a file url lead to another file?

I have a link to a file which is stored in cloud: https://docs.google.com/file/d/0B8Tf19cw9c8SNnFPamhRWGFwaTq (I have edited a character from the original for privacy) So if the garbage string at the end is altered, what is the chance that a…
Treko
  • 303
  • 2
  • 6
3
votes
2 answers

Securing login redirects

If somebody were accessing a protected page while logged out, they would be redirected to a login page: /login?next=/something/123/manage?sort=desc If a successful login, they should be redirected to the page they have been intending to view: if…
Jesvin Jose
  • 519
  • 1
  • 5
  • 10
1
vote
2 answers

Can my internet administrator see what I'm uploading?

Can the internet administrator on my school where I teach see what I'm uploading to my students on Blackboard. I.e. if I upload a file: "exercises_class1A.pdf", would they be able to see and open the files that I upload to my students? Or would they…
Joey Adams
  • 111
  • 3
1
vote
1 answer

How to circumvent an isolated domestic internet connection?

Perhaps this is off-topic or too broad to answer but I'm thinking that there must be solutions. Some countries are talking about unplugging from the internet and creating their own isolated domestic internet. Russia, recently, ran their own tests…
Mou某
  • 141
  • 4
1
vote
1 answer

Is possible to build a firewall for all I/O devices and interfaces on a PC?

Lately there is a trend were input/output devices and interfaces are used for either exploits (taking advantage of their vulnerabilities) or to blatantly "copy" near by audio/video information. So, could a firewall be build to control data…
Kover Paul
  • 13
  • 3
0
votes
2 answers

How should I report a security vulnerability?

I've found an SQL injection vulnerability in a website and I want to go reporting it. I do have contact email, but I'm afraid that they'll sue me because I found a way to hack into their site. (No, I didn't run any SQL commands). So... aside from…
0
votes
1 answer

Why to place an email as image or replacing "name@email.com" with "name at email dot com"

I noticed it in, for example, the profiles of some Stack Exchange users. So I wonder: did they want to protect themselves from spamming bots this way, or ...? Does it have to do with security? Because I guess that the bots can easily convert…
nicael
  • 111
  • 6
0
votes
1 answer

What kinds of security risks do wifi enabled laundry machines and other internet of things appliances pose?

I am an old fashioned person and have never heard of wifi enabled laundry machines until recently, I don't care for it and have trouble seeing the benefits outweigh unknown risks. I don't know if there's a security risk posed, or if it could eat up…
user1821961
  • 121
  • 4
0
votes
1 answer

What are the benefits of shutting down a modem router when it is not in use?

Are there any security benefits of shutting down a modem router when it is not in use? It is now widely known that devices such as D-Link have been insecure. Assuming that this remained undisclosed, are there any added advantages of shutting down an…
Motivated
  • 1,523
  • 1
  • 15
  • 30
0
votes
1 answer

Login webpages not loading correctly

Sorry for the vague description as i do not know how to properly describe this problem. When some web pages are loaded, the formatting will be the wrong size and in strange places. in addition every drop down menu appears without prompting and it…
0
votes
1 answer

Can an attacker who has wiretap access to my phone line intercept internet traffic?

At what points on a (wired) phone connection can a wiretap occur? At any of these points, if an attacker gains access, is it possible to intercept/read/modify internet traffic that uses the line?
user942937
  • 983
  • 8
  • 14
0
votes
1 answer

IP address- is it dangerous for someone to know?

The last couple days I was talking to someone online, and this person said that my IP address was this and that, out of nowhere... Which was wrong, probably because I was connected to a VPN (not the point) but still, I'm worried now, how can you…
noname
  • 1
  • 1
0
votes
3 answers

Is connecting to the Internet directly (without a hardware firewall) risky?

I use Ubuntu with ufw enabled. I connect to the Internet directly without a firewall. Are there any risks ?
linuxyogi
  • 19
  • 5
0
votes
1 answer

How to obfuscate outgoing traffic if we don't want to use VPN?

If we say that I cannot trust my internet-service-provider regarding privacy, how can I obfuscate the outgoing traffic on my line? So the ISP will not see that what am I actually doing. Randomly generate false traffic? Use ToR?
LoukiosValentine79
  • 1,581
  • 2
  • 11
  • 13
1
2