Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

5 important security questions...


  • This topic is locked This topic is locked

#1
kingneil

kingneil

    New Member

  • Member
  • Pip
  • 7 posts
I have some important security questions that I would like answered.
 
1. If you were to strip down a web browser to remove all plugins and Javacsript... are there any browser exploits that would work...? Can it still be hacked..?
 
2. How would you go about downloading something like Tor or Tails properly, given that the NSA has packet injection systems like QUANTUMINSERT (see Snowden docs)..? Couldn't they just send you a fake version of Tor, which has spying built into it..?
 
3. Can the BIOS of a computer communicate with the network, or not...? I've heard about BIOS keyloggers, but how could the BIOS even transfer that keylogged data to anywhere else on the system...? Surely, unless the main operating system requested data from the BIOS, then it couldn't obtain it in the first place...? Surely the BIOS can't just push out this data over the network by itself...?
 
4. If you were to use a tool like DBAN to totally write over the hard drive, would that totally wipe out any viruses...? I guess this goes back to the question on whether viruses can really hide in BIOS or not...
 
5. If you were to use a recording app on a phone or computer, would this prevent someone listening to the microphone in the background... picking up background noise...?? I have noticed on a computer that a microphone can only be accessed by one application at a time... Like, if you use Audacity and Windows sound recorder at the same time, it won't let you.... So, if I had an app constantly recording in the background, would that prevent someone from using a hack to listen to me in the background...? 
 
Thanks

  • 0

Advertisements


#2
Dakeyras

Dakeyras

    Anti-Malware Mammoth

  • Expert
  • 9,684 posts
Same topic posted here. Plus this part of the forum is for specific Virus, Spyware, Malware Removal assistance.

This topic is now closed.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP