I don’t think I can tell you how to get Juniper Networks web blocking software off your computer… simply because I don’t believe it’s on your computer.
My daughter is using my email address to purchase goods instead of using her own email address. Is this a dangerous procedure?
It depends on two things: what you think of your daughter and what she thinks of you. 🙂
Now, I’m assuming that we are only talking about your email address and not your credit card. When you are handing over financial information to someone else, even your daughter, that’s a whole other game and a different set of issues.
When we come down to just the email address, things are actually relatively safe, but there are a few risks that you (and she) should keep in mind.
IP address blacklists are normally unreliable and a poor approach to controlling whatever it is people are trying to control. But administrators definitely use them.
Traditional ISPs are almost always location-centric. The company that connects through the telephone or cable connections that come into your home is the one that provides the internet.
Two different locations will almost always require two different traditional ISPs. Even if the ISP happens to be the same company in both locations, then you’re still typically looking at two separate accounts in those two locations: one for each.
There are few solutions.
Contrary to popular opinion, the registry isn’t broken.
The registry is just a structured database of information – nothing more, nothing less. Let me explain.
Typically, backup images and drives are not affected by malware. I have to say “typically” because things can happen, but it’s just not very common.