Question about Facebook Social Network

1 Answer

My computer is blocked and when i go to other we site to help access is says security risk blocked for your protection

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Genius:

    An expert who has answered 1,000 questions.

  • Master
  • 1,098 Answers

Thank you for your question.
If your school or company has blocked Facebook, they are blocking it for reasons; takes away the user's concentration from work or studies and the site uses a lot of bandwidth.
You can still access FACEBOOK by using a proxy server. One is www.facebookproxy.co.uk. However, using may not be safe. Also, if your companies/school server security feature detects that it your are using a proxy, it may be blocked as well. You can search google for list of facebook proxies that may work with Facebook.


Hope this helps you. Have a nice day!

Posted on May 25, 2011

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

6 Answers

How to open blocked site without any softwares


Here is the simplest step first follow this link Hero Proxy Rescuing Your Privacy then scroll down or in the middle you will see this

Start Your Anonymous Browser

type your site you want to visit then click change my ip address button. You will open the blocked site, have a blessed day.

May 17, 2014 | YouTube Videos

1 Answer

Data Breach SCDOR123


Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>

Dec 31, 2012 | Computers & Internet

3 Answers

Internet explorer blocked website from displaying content with securiy cartificate errors


it means internet explorer does not trust the website because the security certificate is not recognized by IE. you can right click the content blocked and click the allow option on the drop down menu.

Sep 29, 2011 | Facebook Computers & Internet

1 Answer

Facebook blocked me what do ido


If you are unable to log in to your account and are receiving a warning that your account appears to be compromised, Facebook has detected suspicious activity on your account and has temporarily suspended it as a security precaution. It is possible that your password was "phished," or stolen by a website designed to look like Facebook. You will be able to regain access to your account once you complete the automated security verification process. When you regain access to your account, please be sure to follow all of the suggested security precautions, including:
  1. Password Protection: You should select a unique and complex password for your account and keep this entirely to yourself. Be sure that you use a complex string of numbers, letters, and punctuation marks that is at least six characters in length. It should also be different from other passwords you use elsewhere on the internet.
  2. Private Browsing: Please make sure that you log out of your Facebook account and quit your browser when you're done using the site. This is especially important when using a public computer or someone else's mobile device. You should also never check the "Keep me logged in" box when logging in from a public computer, as this will keep you logged in even after you close your browser window.
  3. Secure Email: Since anyone who can read your email can probably also access your Facebook account, you should make sure that any email addresses associated with your account are secure. To ensure security, you should change the password for all of your email accounts and make sure that no two are the same. By varying your passwords, you can greatly decrease your account's risk of being compromised in the future.
  4. Security Question: If you have not done so already, you should add a security question to your account from the Account Settings page. You should choose a question and answer that you will remember, and no one else should be able to answer the question that you choose.
  5. Log in at Facebook.com: Make sure that when you access the site, you always log in from a legitimate Facebook page with the facebook.com domain. Do not click any unfamiliar links and do not run any executable files (files ending in .exe) on your computer without knowing what they are. If something looks or feels suspicious, go directly to www.facebook.com to log in.
  6. Run Anti-Virus Software: If your computer has been infected with a virus or with malware, you will need to run anti-virus software to remove these harmful programs and keep your information secure.

    For Microsoft http://www.microsoft.com/protect/viruses/xp/av.mspx http://www.microsoft.com/protect/computer/viruses/default.mspx

    For Apple http://support.apple.com/kb/HT1222
  7. Learn More: You should visit the following page for more information about Facebook security and how to report suspicious material in the future: http://www.facebook.com/security

Jan 20, 2011 | Facebook Social Network

1 Answer

I have a business requirenment that when user open the web browser it should get routed to a specific web site and then do a registration and after registrtaion he is free to use the internet and surf net....


If the user is outside your business you don,t need to it.If the user is on your network you can allow or restrict the access to the internet.The option you want to can be made in your web server by the webmaster.I think your bis is an internet cafe.So you need to make a page to do this kind of interface.If you run an internet network for your clients you need to let them to pay for it.

You can use a third party software to restrict user to access internet.

With iNet Protector you can restrict access to the Web and password protect Internet connection. You can restrict internet access at specified times or on demand. You can disable connection completely or limit Internet to work with allowed programs and services only. In order to fully enable Internet access, user defined password must be entered. You can easily schedule Internet availability. Timer allows you to disable Internet connection after specified amount of time. Very useful for parents and business owners.
Key features:
* Restrict Internet access at specified times
* Password protect Internet connection
* Enable and disable Internet on demand
* Allow Internet access for a specified amount of time
* Allow only specified services or programs such as e-mail
* For Parents - Protect your kids from using Internet too much
* For Businesses - Keep employees from online entertainment at work

Internet Access Controller is a leading software tool for controlling, blocking web sites and restricting internet & network access.Internet Access Controller can restrict internet access at specified times or on demand. You can password protect an internet connection. Protect your computer from viruses, trojans, worms that can be contracted from malicious websites or programs. Great for parental control or to prevent employess from inappropriate internet usage. You can block, limit or allow which programs and services have access to the internet. The timer feature allows you to disable the internet connection after a specified amount of time. IAC gives you complete control over your computer's network connection.
Key features and benefits
- Restrict internet and network access automatically at specified times
- Password protect internet and network connection
- Enable and disable internet on demand
- Allow internet access for a specified amount of time
- Allow only specified services or programs such as e-mail
- Allow only specified web sites
- Block specific web sites and allow the rest
- Set daily internet usage limits applied to all users or only specific users
- For Parents - Protect your children from the dangers of the web and limit online usage
- For Businesses - Keep employees from online abuse at work
Parents: Protect your children
- Limit time spent online
- Automatically turn off internet at night or at any other inappropriate time
- Block harmful programs, such as chat and online games
- Protect your computer from malicious websites or programs.
Businesses: Increase employee production at work
- Increase productivity by limiting temptation for inapporpriate web surfing.
- Only allow websites needed for daily tasks.
- Block unwanted websites or games.
- Only allow access to programs such as email, file sharing and business related programs.

If you use NTFS, you can use the file system's built-in permissions to restrict access to the Internet Options or Internet Tools Control Panel applet by performing the following steps:
  1. Start Windows Explorer
  2. Navigate to \%systemroot%\system32 (e.g., c:\windows\system32).
  3. Right-click inetcpl.cpl and select Properties from the context menu.
  4. Select the Security tab.
  5. Adjust the user and group permissions as appropriate, and ensure that the SYSTEM group has Full Control.

Nov 11, 2010 | D-Link DIR-615 Wireless Router

3 Answers

Cant go on anything on school computer


Your email is blocked? I feel really bad 4 u.. im my school's comp. bc my brothers' on the family one :) search "access blocked." here are some web.s that might work for you. tunneldirect.com ...and willowface.com

Jan 22, 2010 | Computers & Internet

2 Answers

Un block blocked web sites my space facebook and any blocked web sites on a government computer


Total Internet Privacy and the TIP Tunnel offer complete Private Internet Browsing,Private Internet Service, Anonymous Surfing, Anonymous Internet, web surfing through the webs best most secure and private web tunnel, with free private internet browsing tools. TIP is a complete encrypted VPN solution for private internet communications.
Tiptunnel is designed for individuals accessing the Internet from insecure Internet connections, such as wireless, or from countries with restrictive Internet filtering systems.
Anonymous Internet surfing by default simply doesn't happen but it is possible. The most basic way of protecting your identity is to use an anonymous VPN to hide your IP address when you are surfing. Your communications can still be intercepted as the majority of that web traffic is in the clear but it's less likely unless someone is deliberately targeting you, the main benefit is that your IP address is not left in the logs of the web servers and your web browsing will remain more private.
provides a secure, obscured VPN tunnel between your computer and our secure servers located in Asia or the US and the Europe.
TIP Tunnel Enterprise package includes:

* Anonymous surfing
* IP Address Obscurity, your real IP address is hidden
* Bypass Internet filtering by your ISP
* All traffic is 100% encrypted with AES 256 bit encryption
* Immune to packet sniffing, attacks and popups
* Real-time virus protection
* Real-time spam filtering
* Guaranteed 100% privacy with no logs
* Supported platforms include Windows, Linux and Mac
* Multiple server access worldwide
* Professional 24/7 Technical Support
http://tiptunnel.com

Jan 06, 2010 | Computer Associates Full Version ...

3 Answers

How can i get around blocked sites on this pc


type in the ip address instead of the website name. james.

Sep 17, 2009 | Microsoft Windows XP Professional

1 Answer

Norton Intenet Security 2009 after installation issue "Sec Risk"


It may be a false positive. Sometimes a system file gets tagged as a risk, which upon removal by norton, is automatically re-created by "windows system file protection".

Get as much details about the risk, such as file name, google it and if safe, add to norton's exclusion list.

Jul 03, 2009 | Symantec Norton Internet Security 2009

2 Answers

Are norton security says that are security status is at risk.tried fix now a few times,doesnt work.says spyware defs at risk.virus spyware scan at risk.protection updates at risk.please help


In my experience Norton can become flakey at times. Make sure your subscription to norton has not expired. Otherwise try un-installing norton and re-installing it. Part of it may have become corrupted.

Jei

Jul 28, 2008 | Computers & Internet

Not finding what you are looking for?
Facebook Social Network Logo

96 people viewed this question

Ask a Question

Usually answered in minutes!

Top Facebook Computers & Internet Experts

David Payne
David Payne

Level 3 Expert

14161 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18392 Answers

kakima

Level 3 Expert

102366 Answers

Are you a Facebook Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...