What is the security on this website? I recently got an email from a man who I never corresponded with ...

who had applied to a dating website but was waiting for approval and not yet a member. When I asked him how he got my personal email account which was NOT on there, he said that his "detector" told him. When asked for details this was his reply...
"I don't know how it works but my mozilla fire fox gave me an email address which was the same as your username of the site, So I think it just added the (my email provider) to your username that what I had and decided to message you."
Since Mozilla (I found this out when it was so difficult to find that contact us, was NO contact and found it difficult to find how to post a question and register) a basically self service site how did he do this? Is there a way one can delete the information from Firefox. I have a google chrome book and thus have not used Mozilla for years.
I am probably posting this on the wrong place in the forum from the trouble shooting answers i'm getting but don't know where else to post this.

I have called for more help for you.

Similar Messages

  • What is the point of this website?

    What is the point of this website? Questions asked but not answered. (I don't class the option to contact someone, at a certain time, in India, as a reasonable solution to what is a straightforward question). Has Adobe not got anyone qualified to answer my question? Is Elements 13 flawed? I've resorted to Elements 9 which works fine. If anyone asks me my opinion of Elements 13 I'll tell them "don't waste your money"!

    I would imagine it is this Photomerge problem:
    https://forums.adobe.com/thread/1654345?sr=stream <https://forums.adobe.com/thread/1654345?sr=stream&ru=3705263> &ru=3705263

  • The certificate is not valid and cannot be used to verify the identity of this website

    Question posted in Stack Overflow too: java - How to solve "The certificate is not valid and cannot be used to verify the identity of this website" error? - St…
    The question is, How to solve "The certificate is not valid and cannot be used to verify the identity of this website" error?.
    Here are the details:
    I have a signed applet that has been working fine, until I updated Java to 8u25 (1.8.0_25-b18). Now, the application shows an alert message "Do you want to continue? The connection to this website is untrusted". There is a note in this message too, "The certificate is not valid and cannot be used to verify the identity of this website".
    The applet is loaded without problems. But when the user tries to use a specific function of that application, the warning message is displayed.
    I've checked the java console when this happens, and this warning message is displayed right after these lines:
    security: Obtain certificate collection in SSL Root CA certificate store
    security: Invalid certificate from HTTPS server
    network: Cache entry not found [url: https://sub.domain.net:9876, version: null]
    The application is downloaded from a different domain, say "https://app.domain.net/ .....", so no jars are downloaded from "https://sub.domain.net:9876 ", but the applet connects to "https://sub.domain.net:9876 " to send/receive data.
    The applet is signed correctly, and so far, it meets all the security requirements according to Java. This issue seems to happen when the application tries to connect internally with an HTTPS url like https://sub.domain.net:9876. That sites' SSL certificate is valid, issued by GoDaddy and has not expired.
    Again, this started to happen after updating my JRE to 8u25. I've tested adding the offending URL to Java security exception list, with no success.
    Here are a few screenshot of this problem:
    This is the warning message displayed:

      For what it's worth we discovered what the issue was.  When we installed the new certificates onto our servers we also discovered that you have to install the certificates of all intermediate servers listed in your certificate.  This mean that all URLs listed on your certificate, have to have the intermediate certificate for the certificate authority installed.  This also includes all the Alt Names of your domains, even if they do not use the applet.

  • What does the PopUp "Prevent this page from creating additional dialogs" really mean and if I check the Box, how do I undo this if this was the Wrong Thing To Do?

    What does the PopUp "Prevent this page from creating additional dialogs" really mean and if I check the Box, how do I undo this if this was the Wrong Thing To Do?
    Details
    Constantly, while using Firefox (Beta v 11.0), and/or ESPECIALLY, when I have my eMail @ Mail.com open, I get this PopUp stating: "For security reasons, restarting mail.com Mail is possible only via the mail.com Mail Service. Please close this window and restart mail.com Mail" BUT Then there is a CHECKBOX: "Prevent this page from creating additional dialogs."
    I have no idea if Checking this Box is a Good Idea or if it will Screw-Up my mail.com Mail Service...
    Anyone have an answer or explanation of the Use of this Little Check-Box?
    BJ Orden [email protected]

    You do not get any pop-up windows on that website if you tick that box.
    That setting is stored in the cache and you should see pop-ups again if you reload the page and bypass the cache.
    Reload web page(s) and bypass the cache.
    *Press and hold Shift and left-click the Reload button.
    *Press "Ctrl + F5" or press "Ctrl + Shift + R" (Windows,Linux)
    *Press "Cmd + Shift + R" (MAC)

  • Somebody has created an apple id using my gmail id. So I gave forgot password option and reset the password of the id. But for resetting the security questions, link is going to some other email id which is created by the other guy.How can I resolve this?

    When I tried to create and apple id using my gmail account i found that somebody has already created an apple id using my gmail id. So I gave forgot password option and reset the password of the id. But for resetting the security questions, link is going to some other email id which is created by the other guy. Now the problem is that the other guy also can reset my password and access my account.
    I contacted apple customer care and they are not ready to help me saying that I need to give information about the last device I logged in using this id. How can I give it when I did not create it?:) Also they are saying this account has been verified and that could happen only if someone has hacked my gmail account and verified the id using the link sent by apple.
    Later I did some experiments and found that this is a security flaw from apple. Somebody has created the id and never used it(I tried to loggin to icloud and it was saying this account was not used it any apple device). The account became verified when I reset the password.(This is a bug, account should be verified only when we click on the verification link sent by apple).
    The other mistake apple did is that they allotted my gmail account to someone before it's verified eventhough it cannot be used unless verified. Actually apple should allot the account id only after verifying the email address.
    Apple customer care is not ready to help and I am tired of fighting with them. Can any of you guys suggest any means of getting back my gmail id to use it as apple id?

    I don't think you're going to be able to. I would guess the other person used your address by accident, and when he found he couldn't access the account (because you'd changed the password) he abandoned it. Your GMail address is now locked to that account and even if it was changed you can't use it to create another.
    You already have an Apple ID, which you use to log in here; you can use that to create an iCloud account if that's what you are trying to do. If you want to create a different Apple ID just get another free address such as a Yahoo one.

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • I am trying to reset my security questions and i am not getting an email from apple... can anyone please tell me what i need to do to fix this?

    i am trying to reset my security questions and i am not getting an email from apple... can anyone please tell me what i need to do to fix this?

    Forgotten Security Questions/Answers
    You need to contact Apple by:
    1 - Use the Express lane and start here:
    https://expresslane.apple.com
    then click More Products and Services>Apple ID>Other Apple ID Topics>Forgotten Apple ID security questions.
    or
    Apple - Support -form iTunes Store - Contact Us
    2 - Call Apple in your country by getting the number from here:
    http://support.apple.com/kb/HE57
    or           
    Apple ID: Contacting Apple for help with Apple ID account security
    3 - Use your rescue email address if you set one up
    Rescue email address and how to reset Apple ID security questions
    For general  information see:
    Apple ID: All about Apple ID security questions

  • I am trying to rent a movie on iTunes. It keeps telling me that I need to connect to wifi or download on a computer. I am connected. What is the issue? This is maddening!

    I am trying to rent a movie on iTunes. It keeps telling me that I need to connect to wifi or download on a computer. I am connected. What is the issue? This is maddening!

    If you are using a Windows based computer, try disabling anti virus software and turn off the Firewall.
    iTunes for Windows: Troubleshooting security software issues
    Then try downloading iTunes media.

  • What are the security post refresh procedures in general?

    Hi,
    Can anyone list me out What are the security post refresh procedures in general?
    Thanks and Regards,
    Damanaidu J

    >
    Damanaidu jawaharlal wrote:
    > Hi,
    >
    > Can you cite with respect to CUA.
    >
    > Thanks and Regards,
    > Damanaidu J
    CUA
    ====
    CUA behaves differently during a system/client copy and this is the approach we took and it was successful.  The goal is to take a backup of the source before CUA deletion then restore. Do not delete CUA and just attempt to rebuild it, all the roles will be gone.  Backup and restore will be the approach I recommend.
    a1.  Take a snap shot of your QA user and role assignments before copy.
    1.  (Basis) First make a backup of the source system.  This is important before step 2.
    2.  After successful backup delete the CUA from the source system. 
    3.  After successful copy to target system, restore backup to source system.
    4.  Depending how the copy was done, users and passwords should be in the target system but all the role assignments will be gone. 
    5.  Start assigning roles base on your requirements.  If you need to restore the old QA settings that is captured in a1.
    Perhaps others can add in other steps I might have missed.
    Good Luck!

  • HT1620 What is the security code?

    What is the security code to install the latest iPhone update?

    The iOS upgrade is seeking whatever code you use to unlock your iPhone or iPad device; your device passcode or PIN or password you're using to secure your device.
    This to avoid somebody random poking buttons and unexpectedly upgrading your temporarily-unlocked device.
    If you've forgotten the PIN or password that you had originally configured to unlock your phone, there is a reset sequence.

  • What is the security code

    Can someone tell me what is the security code asked for on Apple TV pror to renting movies. Thanks

    This is a link to the Wikipedia Page that tells you where the code is located.
    http://en.wikipedia.org/wiki/Card_Verification_Value
    You can also get this info on the Payment Page by hovering your mouse cursor over the blue and white question mark in the Payment section.
    I hope this helps?

  • TS1424 What is the security code on billing account?

    What is the security code on billing account?

    See this Discussion...
    https://discussions.apple.com/message/18877777#18877777
    From the  More Like This  on the right.

  • TS3212 I continue to try to install iTunes; when I attempt to open the newly installed iTunes, I receive errors that it was not correctly installed. I have followed the direction on this website, but I face the same error. Please help.

    I continue to try to install iTunes; when I attempt to open the newly installed iTunes, I receive errors that it was not correctly installed. I have followed the direction on this website, but I face the same error. Please help.

    latest message indicates I need Apple Application Update
    With the Error 2, let's try a standalone Apple Application Support install. It still might not install, but fingers crossed any error messages will give us a better idea of the underlying cause of the issue.
    Download and save a copy of the iTunesSetup.exe (or iTunes64setup.exe) installer file to your hard drive:
    http://www.apple.com/itunes/download/
    Download and install the free trial version of WinRAR:
    http://www.rarlab.com/download.htm
    Right-click the iTunesSetup.exe (or iTunes64Setup.exe), and select "Extract to iTunesSetup" (or "Extract to iTunes64Setup"). WinRAR will expand the contents of the file into a folder called "iTunesSetup" (or "iTunes64Setup").
    Go into the folder and doubleclick the AppleApplicationSupport.msi to do a standalone AAS install.
    Does it install properly for you?
    If instead you get an error message during the install, let us know what it says. (Precise text, please.)

  • HT1918 What is the security answer?

    What is the security answer?

    We are fellow users here on these forums, we won't know what you set them to.
    From http://support.apple.com/kb/HT5665 :
    If you have three security questions and a rescue email address, sign in to My Apple ID and select the “Password and Security” tab to send an email to your rescue email address to reset your security questions and answers.
    If you have one security question and you know your Apple ID password, sign in to My Apple ID and select the “Password and Security” tab to reset your security question.
    If you have one security question, but don't remember your Apple ID password, contact Apple Support for assistance. Learn more about creating a temporary support PIN to help Apple confirm your identity when you contact Apple Support.
    If you can’t reset them via the above instructions (you won't be able to add a rescue email address until you can answer your questions) then you will need to contact Support in the country where you and your iTunes account are to get the questions reset.
    Contacting Apple about account security : http://support.apple.com/kb/HT5699
    When they've been reset (and if you don't already have a rescue email address) you can then use steps 1 to 7 half-way down this page to add a rescue email address for potential future use : http://support.apple.com/kb/HT5312

Maybe you are looking for

  • Open PO

    Gurus, I have created LSMW to upload open PO's,using the object 0085 & program RM06EEI0. I have created 2 flat files one for Header & items. In header i have given the vendor & item also i have given the vendor. Header vendor A If  the PO is having l

  • I cannot see ios 6 update available on my ipod touch 4th gen

    i cannot see ios 6 update available in the update software section under general settings on my ipod.....i wanted to use delta update option but unfortunately i can't see any updates..... my itunes won't connect to update server i don't know why nor

  • 100% Sad for first year on Capital Excise

    Hi ,             I hope all are very well, i have one issue please guide me or plese share your views 1.In case of Capital goods, as per excise rules cenvat credit of excise ( CVD ) 10% plus cess 3% can only be availed to the extent of 50% in current

  • Cannot update 5G iPod setting after 1.2 update...

    Has anyone else run into this problem. I updated to iTunes 7 today along with the 1.2 update for my 5G iPod. I am running Mac OS X. After the update, my video playlists were removed from the iPod. Checking the iPod setting showed that the video playl

  • OCCI Error -  ORA-32102: invalid OCI handle

    Hi, I'm completely new to OCCI and Linux and trying to run the simple OCCI program given in oracle site (http://www.oracle.com/technology/tech/oci/occi/occibasic.html) to connect a remote Oracle DB server. #include <iostream> #include <occi.h> using