Official forum for Utopia Community
You are not logged in.
first of all, I'm new to web development. I'm building a site from scratch with dream weaver and a friend told me, that html can be stolen and php not.
What is the difference between them?
AND
Does php needs something to be protected?
Thanks in advanced
As evidenced in the news our governments, ISPs and such log such things. It's unclear how to make them forget such today.
For internal drives you use Bitlocker and for external VeraCrypt.
If you would use VeraCrypt for Windows, it would break a lot of security features which Bitlocker provide.
Performance wise both are fine if you're hardware support AES natively
Windows 10 Version 1803 (OS Build 17134.765)
I recently started a new job. Over the past few weeks, a former employee whose presence we do not desire has been remotely accessing their old desktop in the office. The computer has an antivirus and has been scanned with both Malwarebytes and Super Anti Spyware, so I am posting this here and not in the malware-related forums. This person appears to be using legitimate software to access the PC.
Here's how it goes. Someone will be using the computer, when all of a sudden the cursor starts moving around the screen and clicking on things by itself. This happens intermittently, probably once every few days. I took a look at the computer and noticed that remote access was allowed, so I disabled it. It has had no effect. Just this morning, it happened again, so I disconnected the internet cable from the computer. For a brief moment, a Windows pop-up appeared in the lower right corner which said something to the effect of "(name) has disconnected". Unfortunately, the PC was still connected to our 5G network so the intrusion continued. Bear in mind that just this one PC is being remotely accessed as far as I know, and not any other computers on the network.
Clearly, the former employee has some means by which they are accessing the PC legitimately. I just can't figure out how. I took a look through the program list, and didn't see anything that was obviously for remote use (although I'm not the most tech-savvy person, so maybe I just missed something). Having disabled the remote access function on Windows, how is this guy still getting in?
I cannot answer your direct question, and probably no one can.
There are so many techniques for getting around security that can be used that there is likely some way something might get in.
The fact of the matter is that the vast majority of viruses and malware of all types are directly "invited in" via end-user action. Very few sneak in, as they don't need to.
If you follow even half of the recommendations in Quietman7's Best Practices for Safe Computing it is highly unlikely that you'd ever get an infection of any sort. I've run under an administrator account (and ideally one shouldn't) for decades now, following my own subset of the recommendations Quietman7 makes, and I have not had an infection on any machine I use within memory (and I'm not losing my memory, thank heaven).
An ounce of prevention generally obviates the need for a pound of cure, and that ounce of prevention comes from what you, the end user, actually do.
That depends on who might some day come looking. If it's just the average person, maybe even the average IT professional, simply deleting the history via the browser is enough. If you're really paranoid, I think everyone has copied Firefox's Private Browsing mode by now, where basically the browser doesn't even store history or anything like that. If you're really paranoid about privacy, you shouldn't be using IE or even Chrome. IE is made by Microsoft, which tends to default to permitting anything and everything until it comes back to bite them and Google may have made its start as a search engine, but these days makes the bulk of its money off of advertising. I don't have any hard evidence that Chrome does anything untoward on its own, but it is tied pretty heavily into Google's other services, which in turn serve up plenty of text based ads and the like. Firefox is the only independent browser out there for the most part.
Anyway, short of someone who is specifically looking to recover your browsing history, which is probably very few people, simply deleting it is fine. It's pretty much impossible to completely keep it from someone who's determined and skilled enough to get it. Just think of it this way. Using yourself as an example, do you know how to recover a deleted file? Now, of all the people who might access your computer, rate their skill relative to your own. How many do you think might be able to recover a deleted file, if they had the time, motive and opportunity? We'll ignore some of the JavaScript methods websites can use to grab this info, because there's not a whole lot you can do about that short of an extension like NoScript. There's nothing even remotely as effective for IE or Chrome, making the matter kind of moot.
Can someone please explain what exact changes are happening and why do all the people decided to refuse from it?
As I know, WhatsApp is a Facebook child and everyone knew before that they scan all the data, etc. Is it even more insecure now?
Hi,
I have a VPN program called Private Internet Access. It is really designed to run from an Administrator account. When I log onto my Administrator account on the computer, the VPN starts automatically and connects me to the VPN service. If I log on to my User account (which is what I usually use) the VPN does not start. However, if I right-click the Private Internet Access icon and select "Run as Administrator" then the VPN will start and connect me to the VPN service.
The reason that I almost always operate the computer as a User is that this provides much better security when surfing the internet, as compared to operating as an Administrator. But if I am running the VPN as an Administrator does this make me just as vulnerable to internet threats as if I were actually logged on as an Administrator, or do the Administrator rights only extend to the Private Internet Access program?
Thanks in advance.
Sure, can find tutorial video's here: https://www.youtube.com/UtopiaEcosystem
Thanks for helping! I'll learn the question and will get back to you if I'll still have any problems with that.
And I believe that wide known doesn't mean safe or something. Sometimes the unknown apps turn out to be better as they're created with soul and by the enthusiasts who want to present something new to the world. I believe Utopia is exactly like that. If I'm not mistaken, it exists more than a year already and I've never seen any negative about data leak or something similar.
Seems like they're not very enthusiastic about that question I've found some information in the help section how it can be done, but I want to speak to the people who already did any websites here to understand how much time can it take and what skills are needed.
Dear Utopians,
as I've seen in some channel, there is a number of websites created inside the Utopia and also this forum appeared recently.
It's been a long time I planned to create my forum, but I want it to be anonymous. So here is the best place, I guess.
So the question is how can I do that? I'm sure here are the people who can help with that.
Thanks!
It's not a question that can be answered easily. Most of people here know that. To stay safe online, you have to follow lots of rules, starting from choosing the right social media and not sharing everything, continuing with strong passwords, secured network, VPN, proxy, etc.
What exactly do you want to secure?