Question about Belkin Computers & Internet

1 Answer

How do i make my belkin54 secure - Belkin Computers & Internet

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points


    An expert that got 10 achievements.


    An expert that got 5 achievements.


    An expert who has achieved Level 3.

  • Master
  • 538 Answers

You will need to log into that device(should be instructions with it, if not, go to and support by model number=

Posted on Oct 16, 2008

1 Suggested Answer

  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:

1 Answer

Can any one tell me how to remove the edu filter from my computer

To add, edit, or remove filter actions
  1. Create a console containing IP Security Policies. Or, open a saved console file containing IP Security Policies.
  2. Double-click the policy that you want to modify.
  3. Double-click the rule that you want to modify, and then click the Filter Action tab.
  4. To add a filter action, decide whether you want to use the IP Security Filter Action Wizard or add the filter action manually:

    • To add a filter action by using the IP Security Filter Action Wizard, confirm that the Use Add Wizard check box is selected, click Add, and then follow the instructions.
    • To add a filter action manually, confirm that the Use Add Wizard check box is cleared, click Add, and then define settings on the Security Methods and General tabs.
  5. To modify an existing filter action, select the filter action that you want to modify, and then click Edit.
  6. To remove a filter action, select the filter action that you want to remove, and then click Remove.
  7. If you are adding or modifying a filter action, choose a filter action type:

    • Click Permit to allow receiving or sending of packets in plaintext (unsecured traffic). Security will not be requested for these packets.
    • Click Block to discard packets. Security will not be requested for these packets.
    • Click Negotiate security to use the list of security methods in Security method preference order to provide security for packets that match this filter. Security requests will be accepted for these packets.
  8. If you chose Negotiate security, add new security methods or edit the existing ones for the filter action.
  9. If you do not want to block incoming, unsecured communications, but you want to ensure that all outgoing communications and subsequent two-way communications are secured, select the Accept unsecured communication, but always respond using IPSec check box.
  10. To enable communication with other computers that do not support IPSec, and ensure that communication continues if there is no response to a request for IPSec negotiation, select the Allow unsecured communication with non-IPSec-aware computers check box. After the initial IPSec negotiation has failed, IPSec negotiation will be retried at five minute intervals.
  11. To guarantee that no master keys or master keying material will be reused to generate the session key, select the Use session key perfect forward secrecy (PFS) check box.
  12. On the General tab, in Name, type a unique name.
  13. In Description, type a description. For example, you might type what security levels this filter action represents.

Oct 01, 2013 | Dell Computers & Internet

1 Answer

Data Breach SCDOR123

Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


Dec 31, 2012 | Computers & Internet

1 Answer

How can i tell if my router is secure?

If it is hard wired, it is secure. If it is wireless, then it may not be. If you just took it out of the box and hooked it up without setting a passphrase or security key, then it is probable not secure. Get a friend to try to connect to it from inside your house. If you are broadcasting your SSID, it will be the strongest signal. If his computer sees it, have him try to connect. If he can then it is not secure. If he is ask for a passphrase or security key, then it is secure. The reason I say to have a friend try it, is because your machine may already have the security info stored and that would not be a good test.

Get back to me with the brand and model number if you need directions to make it secure.

Sep 08, 2010 | Computers & Internet

1 Answer invalid security cirtificate iwant valid security cirtificate

Unless you set your browser up for high security, this certificate is bogus. Rarely does a security certificate notice appear on yahoo without having set your browser up for high security.
Lower your security if it set to high and see if the message disappears. If your browser security is set to normal, then this is a bogus certificate for a bogus yahoo site.

Aug 30, 2010 | Computers & Internet

1 Answer

Trying to connect new printer wirelessly, cannot get past the wpa security key

You may need to verify the wireless security enabled in your router. Check from your router's setup page the security type and security key enabled in it to connect your wireless printer.

Hope this helps!

Nov 13, 2008 | HP Computers & Internet

1 Answer

Security Update for Windows Media Player 10 for Windows XP (KB936782) Security Update for Windows XP (KB926247) Security Update for Windows XP (KB950749) Critical Update for Office XP on Windows XP...

Does windows always have this problem? I think it can be fixed through a <a href=""> computer check up</a>. Might want to have a good look at the website <a href=""></a>.

Jul 28, 2008 | Computers & Internet

1 Answer


To secure a network, you need to log into the router. Insert the router IP address in address bar and then type in router username/password to access the Settings page of router. You'd be concerned with the Security or Wireless Security page.

Jun 02, 2008 | Computers & Internet

1 Answer

How to secure my wireless connection?

Open IE, go to your router using and select Wireless security for the router you are using. Use WEP or WAP with 64 bit security. Use the same key on your desktop to connect to this secure connection.

Apr 19, 2008 | Computers & Internet

3 Answers

Windows xp updates

Download from this link service pack 3

Mar 31, 2008 | Computers & Internet

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

25 people viewed this question

Ask a Question

Usually answered in minutes!

Top Belkin Computers & Internet Experts

Prashant M
Prashant M

Level 3 Expert

2260 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18346 Answers

steve morris
steve morris

Level 3 Expert

1675 Answers

Are you a Belkin Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides