Is this site (see inside) as safe from hackers as they claim to be?

1 Answer

Answer :

I don’t like trusting any site with any more information than I have to. I keep it all on my machine at home. If someone wants it, they could break in and steal the machine and if they worked really hard, they could decrypt my passwords, for all the good it would do them. There is still crucial information missing that is kept only in my head and probably couldn’t be figured out. It is not susceptible to hacking, I don’t think.

Related questions

Description : Is the following site a safe and legitimate one (details inside)?

Last Answer : I just looked it over. I can’t say if it is safe or not, but I will tell you I did some searches for different authors and most came up not there. Even some big names like Dean Kootz came back with no results.

Description : Firefox (remmeber password or Master Pw feature) Safe from hackers?

Last Answer : answer:Unplug your phone cable. Done that? Now you're safe. It's unlikely that someone will specifically pick on you to get your password. But sure, if someone found your master password and had access to ... 't be that paranoid, surely, I hope all goes well though and that you never get hacked :)

Description : Are electronic health records safe from hackers?

Last Answer : No information stored online is ever safe from hackers. Although many companies are working hard at protecting your medical information online, there are new methods of hacking being developed everyday.

Last Answer : Install SSL on the site Please , admin Password Numbers With Name With Give No. A little Special Numbers Or Numbers Put ( e.g .: 4F-xV? XG2% B $), r Regular Of the site File And Of the database Backup With Keep it. Hope I'm doing These Obey Let's go Site One hundred percent Safe There will be.

Description : Did this woman (and her article in the Daily Mail) deserve such online hatred? See details inside.

Last Answer : While I would not have been as harsh, she is at most a 7/10. The fake smiles do not help either.

Description : When was the last time you didn't feel safe?

Last Answer : Last week with Irma, then Jose, then Maria heading my way. Luckily, the only one that did any damage was Maria. But it was pretty hairy for about a week.

Description : Is there a safe website that lets you download karaoke videos off of youtube and is legal?

Last Answer : You can use dvdvideosoft's youtube to mp3 converter. if you use firefox, it will also install a plugin, that will put a download mp3 button below the youtube video, that will download the video ... you. Make sure to do a custom installation and deselect all the adware that it wants to install.

Description : Is it always safe to open zip files?

Last Answer : It’s pretty obviously some bullshit spam.

Description : How safe is the internet?

Last Answer : To take the internet down as a whole would be a mammoth task indeed. With the networked nature of the internet, there's hundreds if not thousands of elements which would need to cease functioning for ... down, you've got bigger things to worry about than not having access to your music and photos.

Description : What do hackers get when they hack a Facebook profile?

Last Answer : For one thing, many people use the same password for multiple websites.

Description : These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to? a) White hat Hackers b) Elite Hackers c) Licensed Penetration Testers d) Red Hat Hackers

Last Answer : b) Elite Hackers

Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers

Last Answer : d) Black Hat Hackers

Description : These types of hackers are the most skilled hackers in the hackers’ community. Who are “they” referred to? a) White hat Hackers b) Elite Hackers c) Licensed Penetration Testers d) Red Hat Hackers

Last Answer : b) Elite Hackers

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Do you think there should be one site for a*holes on the Internet and they should all be required to stay there?

Last Answer : Yes, A**holeville.

Description : What would you do if someone sent you a private message admitting that they did something on this site or another site that would get them banned?

Last Answer : Others may disagree, but I think you should leave it alone.

Description : Do you agree with this father's decision to sue Facebook? (Details inside)

Last Answer : I believe he does not. I believe it is the parent’s responsibility to educate their children about proper safety and computer usage. The ‘threat of pedophiles’, so to speak, is rather everywhere and most molesters and abusers aren’t strangers that find pics on FB but are in the kids’ lives already.

Description : Skype issues, and I need your help (details inside)

Last Answer : Uninstall and reinstall Skype.

Description : Is it safe to click on this? (Please see details inside.)

Last Answer : answer:I don’t know much about YouTube, but if you can view the videos anyway then don’t click on it. Good for you for being safety conscious.

Description : Are corporations and goverment agencies helpless against hackers for ransom?

Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.

Description : Can hackers use your webcam without making the indicator light turn on?

Last Answer : I don’t think that’s possible not 100% sure though.

Description : If the hackers of Yahoo have the the password how do people sign in?

Last Answer : If you remember the password ( I hope) and if hasn’t been updated by hackers ( hopefully) then you don’t need security question information to change your password. You’ll require it only when you have forgotten your password.

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : How to report hackers on Runescape?

Last Answer : answer:I believe there’s a contact link somewhere on the support site. If you can tell them your original password as proof that you really own the account they’ll probably give it back to you. I hope you have set a bank pin, so even if the hackers got your account, they can’t empty your bank.

Description : What exactly can hackers do with your bank account number?

Last Answer : answer:They can empty your account if they want. I think it was Jeremy Clarkson of Top Gear who also mocked this, and he showed his bank account number on TV, thinking that you couldn't do ... lost money from his account. Don't give your bank account number to people you do not trust completely.

Description : Was it just a matter of time before our cellphones were hit by hackers?

Last Answer : Of course! But if you think that’s bad, just wait until there’s a direct computer-to-brain interface and people start hacking THAT! One morning you’ll wake up naked and sore in a strange bed, the victim of “brain-hacking!” Mwahahaha! : D

Description : Was there news about hackers hacked (added: all the) Fortune 500 companies last week?

Last Answer : First I’ve heard of it.

Description : How can we defend ourselves against the new social sites bot hackers?

Last Answer : I’m glad I have Norton 360 virus protection then. It has keystroke protection so hackers can’t tell what numbers or letters I’m entering when I’m typing. How to combat the problem other than virus protection programs? I really don’t know.

Description : Differentiate between hackers and crackers. -Technology

Last Answer : Differences between hackers and crackers are as follows:HackersCrackersA hacker is a person intensely interested inthe arcane and recondite working of anycomputer operating system.A cracker ... andnever intentionally damage data.Crackers can easily be identified because theiractions are malicious.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : Differentiate between Crackers & Hackers. -Technology

Last Answer : In computing, a hacker is any skilled computer expert who uses their technical knowledge to overcome a problem or otherwise gains remote access to a protected computer system mainly to get thrill ... , crackers destroy vital data, deny legitimate users service, or cause problems for their targets.

Description : what better among us not hackers or fornit or roldox?

Last Answer : a

Description : Want to know about Bangladesh Black Hat Hackers ?

Last Answer : Bangladesh Black Hat Hackers is an organization of hackers based in Bangladesh which is mainly discussed by declaring cyber war against India . Issues such as border killings , construction of Tipaimukh Dam, etc. by ... Bangladesh Cyber Army and Expire Cyber Army also joined them.

Last Answer : There are three types of hackers. 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker.

Description : Use A Firewall To Keep Hackers Out?

Last Answer : There are always hackers who are looking for ways to get into any exchange serve that they think they can access. You need to keep them out at all times, especially if this server is located at a ... not have the right access codes. It can also block automated programs that hackers may have set up.

Description : What are hackers capable of?

Last Answer : Hackers are capable of doing anything on the internet or anything that involves internet and satellite. They can tap into your phones and hear what you're doing. They can hack your webcam and ... internet or anything, BE SAFE because anything can happen. Use stuff like Kaspersky or any Antivirus.

Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers

Last Answer : e) break into other people's computers

Description : CEH stands for a) Certified Ethical Hackers b) Cyber Ethical Hackers c) Computer Ethical Hackers d) None of these

Last Answer : a) Certified Ethical Hackers

Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above

Last Answer : d) All of the above

Description : Most computer crimes are committed by a) Hackers b) Inteenational spies c) Highly paid computer consultants d) Web designers

Last Answer : a) hackers

Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers

Last Answer : d) Nation / State sponsored hackers

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : ______ are the combination of both white as well as black hat hackers. a) Grey Hat hackers b) Green Hat hackers c) Blue Hat Hackers d) Red Hat Hackers

Last Answer : a) Grey Hat hackers

Description : Hackers who help in finding bugs and vulnerabilities in a system & don’t intend to crack a system are termed as ________ a) Black Hat hackers b) White Hat Hackers c) Grey Hat Hackers d) Red Hat Hacker

Last Answer : b) White Hat Hackers

Description : Which federal law is most commonly used to prosecute hackers? A. Title 12 B. Title 18 C. Title 20 D. Title 2

Last Answer : B. Title 18

Description : Which type of hacker represents the highest risk to your network? A. Disgruntled employees B. Black-hat hackers C. Grey-hat hackers D. Script kiddies

Last Answer : A. Disgruntled employees

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is an grey hat hacker A)Black Hat Hacker B)White Hat Hacker C)Combination of White and black hat hackers D)None

Last Answer : C)Combination of White and black hat hackers

Description : Hackers are also called as a. Good Guys b. Bad Guys c. Both of the above d. None of the above

Last Answer : b. Bad Guys