Unanswered | Answered

Computer Security

Parent Category: Computers
Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.
Library file is a collection of small programs which support  application to run efficiently and control the resources.   Basically we knows them as dll (dynamic link library) file.
Computer professional
It's been said: you can have your software good (quality), fast (onschedule), and cheap (within a limited budget) - but you can onlypick two. To have the software be reliable and on-time you mustmake sure your plan includes sufficient resources - both people(with the right skills) and the option to...
That's a pretty good explanation of what "non-repudiation" means.  Non-repudiation is typically implemented via some kind of digital  signature.
if you have connected your email to something that has your details  (IE Facebook) or that you have put your details in the actual email  address then, yes. If you haven't, then no.   please rate my answer :)
If any confidential information to do with clients is given out, it is a very serious matter as it may be causing a threat to others, types of information that could affect confidentiality and security are peoples personal details for example their PIN numbers, national insurance numbers or account...
Thankfully any sort of malicious cookie can and will be detected by  your Antimalware or Antivirus software - it's generally one of the  first areas that are checked! Cookies are just small bits of  information used by websites to enhance your browsing experience  and it is often considered a...
In computer science, you learn that when data is sent via a network  or even through different components, it gets a "label/wrapping"  called segments. These segments hold vital information so this  includes Origin address, size, New address along with check sum.   But this is only one type of...
User privileges gives the administrator power to control what the  user can & can not do.   Permission however, is like user privileges except that when people  want to do something and they are not administrator, they ask for  permission to that specific thing!
The OS makes calls to the system kernel (although sometimes the  kernel is bundled with the OS). Applications make their calls to  the OS, which then makes calls to the kernel.
You will have to be more specific. The web site spinout182.com does  not require a password. If you are looking to get into the forum  there, you just register and create your own password.   If that is not what you are asking about, you will have to provide  more information to differentiate...
Properly implemented, AES is FIPS 140-2 compliant.   A module implementing AES must undergo evaluation via the  Cryptographic Module Validation Program (CMVP)  to be certified as FIPS 140-2 compliant. Federal agencies and  departments can validate that the module in use is covered by an ...
You can't do anything without system software. To run every  application software, the computer has to have the coding as to how  it could understand the language the application software is  speaking and how could it emulate them into instructions it could  perform - are the necessities of...
There are two primary things needed to help protect against social  engineering, whether at work or in the home. First is awareness.  Companies need to provide ongoing user awareness training where  they show their employees the risks and various ways hackers  attempt social engineering. These...
Security normally refers to Confidentiality, Integrity and Availability. Briefly, your files must be: accessible: only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify or...
Hacking is a way to breaching the security of your Target Computer  for your miscellaneous use.or for getting information.and getting  your target computer controls on your hand.
It actually depends some on whether you are talking about the  TCP/IP model or the OSI model.    In general though, application layer protocols include (but are not  limited to):   HTTP (but not HTTPS which utilizes transport layer as well)   SSH   DNS   DHCP   STMP/POP  ...
 To encrypt a folder or file    Right-click the folder or file you want to encrypt, and then  click Properties.   Click the General tab, and then click Advanced.   Select the Encrypt contents to secure data check box, click OK,  and then click OK again.    
A block cipher divides plain text into a sequence of text groups.  It operates on each group to encode it, gives it to output, and  restarts with the next text group.    A nontrivial block cipher could perform several complex  transformations of the grouped text in a sequence. A trivial...
Database security refers to the collective measures used to  protect and secure a database or database management software from  illegitimate use and malicious threats and attacks.  It is a broad term that includes a multitude of processes, tools  and methodologies that ensure security within a...
Most spammers utilize very illegal means to broadcast their  messages. They usually use bot networks - groups of machines they  have compromised and turned into "zombies" - to launch their  massive email barrages. There are several reasons for doing this:   1) since spamming is illegal in many...
Encrypt the contents and either wipe or destroy them when you  dispose of them
You can setup your network firewall with your accessing router.  consider you are using the Belkin Router : than follow these steps  :   Access the Belkin router setup utility via the web browser. For  doing that, browse the Internet and enter the '192.168.2.1' in the  browser's address bar....
By definition, a successful DoS attack denies service, i.e. it  degrades or interrupts the availability of a system, application,  network, etc. Ultimately what it "accomplishes" depends on the  target and the response. It may cost a lot of money, embarrass,  threaten, or interfere with the...
Definition: An information system is a set of interrelated elements for the purpose of paying attention to the information demands of an organization, to raise the level of knowledge that allow better support to decision making and action development.
So that your money or personal is not stolen
As the length of the password increases, the amount of time it takes to find it through brute force increases exponentially.
In the movie "Hackers" where the security guard is exploited into giving information over the phone about the computer network.
However we know that this is a time saving and useful for everycompany. Its main aim is to keep an eye on employees their loginand logout.
Biometrics refers to the identification of  humans by their characteristics or traits.   Biometric identifiers are often categorized as  physiological or behavioral characteristics.   Fingerprints, face recognition, DNA, Palm  prints, hand geometry, iris recognition, retina and scent are ...
firewall functions by acting on traffic based on it's policy. A policy is comprised of a set of rules. A rule is an action taken on traffic that fit a certain criteria. A single rule is comprised of four basic elements:SourceThis is where the IP traffic is coming from and is comprised of the...
Network Security is the process of taking physical and software  preventative measures to protect the underlying networking  infrastructure from unauthorized access, misuse, malfunction,  modification, destruction, or improper disclosure, thereby creating  a secure platform for computers, users...
The Microsoft Baseline Security Analyzer is a program that attempts to assess some aspects of the security of an individual computer. It does this by checking two things: whether security updates released by Microsoft have been applied, and whether certain less-secure security settings are present....
Software is the programs that are needed toaccomplish the input, processing, output, storage, and controlactivities of information systems .
Operating system is low level computer software which is managecomputer peripherals and basic functions of computer whileapplication is any program, or bunch of programs, that is designedfor the end users.
Hacking is the practice of understanding the workings of a system. Hackers do not Break into systems, do anything illegal, or unlawful. Hackers are intelligent people who do not abuse privileges or discoveries. If you are trying to break into a system or something, You are committing a crime. This...
The security key on a Comcast Modem is located next to the serial  number of the unit. Sometimes the serial number is the number used  as a security code if it is not printed on the device.
A Teardrop attack involves sending mangled or corrupted fragments with overlapping, over-sized payloads to the target machine. This can crash various operating systems due to a bug in the code for their TCP/IP fragmentaion re-assembly. Windows 3.1x, Windows 95, and Windows NT OS as well as some...
Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and those devices that are part of information security control systems. The latter must be protected more thoroughly than the former, since networking subsystems are often the focal point of attacks...
▲Ease of use▲Graphical User Interface(GUI)▲Requirement of more powerful hardware▲Multi-platform capability▲Network capability▲Compatibility with other software ▲Object linking and embedding▲Group work capabilities▲Mail enabling▲Web enabling—
While a burglar can steal your physical property, a hacker can  steal your personal information such as credit card details. If a  burglar can steal what money is in your house, a hacker can drain  your entire bank account without leaving any traces.
Transport Layer Security (TLS) and its predecessor, Secure Sockets  Layer (SSL), both of which are frequently referred to as 'SSL', are  cryptographic protocols that provide communications security over a  computer network. TLS supports many different methods for  exchanging keys, encrypting...
A man-trap in modern physical security protocols refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens.
brobably 4 or 5 numbers mainly they input their dob it means six numbers.
The firs thing that comes to my mind is cyber terrorism. Sensitive information is often easily available to almost anyone on the Internet. Malicious tools and software can be found and downloaded on the Internet by anyone. What's worse is that most malicious activities do not require extensive...
When you send a packet across the network, it is typically destined for one host and one host only. This is called single casting. You "cast" (tell) the message to a single host. However, there comes a time when a message needs to be sent to more than one person at a time. For example, when you are...
In diffusion, the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext. This is achieved by having each plaintext digit affect the value of many ciphertext digits, which is equivalent to saying that each ciphertext digit is affected by many plaintext...
No, cookies are just small text files (of about 4 kilobyte) which  can be read and written to by web sites. They are used for storing  information. Some cookies may contain a unique code which a web  site stores so it can recognize you when you return to a web site.  This can be used to track...
There are many career opportunities with a IT security degree. Some entry level positions are: IT security technicians, firewall administrators, IT security assurance, and IT security manager. Your career can lead into several prestigious positions such as an information security officer or even a...
putting a virus on someones pc, smart phone, putting a RAT (remote administration tool) onto them as well, taking down a website using sql injection and over flowing it with data.
Using Hexadecimal system from 0123456789ABCDEF we can see that the last digit on both cards are changed. So there would be 10 cards in between the 2 initial ones and 12 including them.
The only real advantages of using Java for steganography is that it has built in support for reading and storing various image types (probably the most common medium used for steganography). Other than that, it's no more suitable than any other language than can read from and write to files.
you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely...
you can choose an security program to protect your computer from potential viruses and other threats from malicious software in real time, also your important or private data can be protected. i just use the program "avast! Internet Security ", which is powerful, and i can surf the Internet freely...
Utility software : A system software used to help analyze, configure, optimize or maintain a computer. Focus on computer infrastructure operation, i.e. Hardware, operating system, software and data storageApplication software :A program designed to carry out operations for any specific application....
Typically City networks are not locked down as completely as say a corporate network. They do not protect information on who is connecting to the network - thus less privacy. Their records are more open to the public than a corporate network. You need a subpoena to get the records from a private...
can you give me one example of a weak possword
a hacker is a person trying to brake in to a computer or website  and destroy somthing from a website doing bad things like puting in  a viris down loading and many more 
Symmetric encryption is the process of encrypting and decrypting data via a single shared key. The process begins when the sender wants to trasnmit data in a secure fashion. Unencrypted data is ciphered with the shared secret key. The encrypted data is then sent to the receiving host via the...
In my opinion,if you have Windows XP,i suggest you get Microsoft  Security Essentials (MSE). i just had 3 viruses found on my  computer, and i think 2 were already infected, and it STILL could  clean them. I love it. i think you would to.    NOTE: Microsoft officially ended support for...
  == One useful option ==   A good starting point for you would be to use the search term below in Google for software that provides Intellectual Porperty Rights.   You will notice that Black Duck software is listed therein!     Search term - software Intellectual Property...
It is nycnyschools (case sensitive no spaces). in my school, its hello in my school, its macadmin
kau na lang ang sumagot....di ko kasi alam ehhh...
Shielding keeps external electronic signals from disrupting operations.
threat is a unit of code....and a process can have ine or more threats..process is an execution of a programe
When a computer is in Sleep mode, the programs are ready to run  again but do not actually run. Therefore scans cannot be done in  Sleep mode with conventional Antivirus software.
As the password is hidden, it can be hard to check if the password is correct. Many passwords are case sensitive , which means that the case (lower or upper) has to be correct. Therefore, if the password is 'RABBiT', then typing in 'rabbit' or 'RaBBIT' will not work. Another common problem is that...
  It is a jump with condition. Condition needs to be calculated.   ex. if (a>5) { .. } else { .. }
A well chosen pass phrase can be used to generate an easy to remember password. The password can be generated by taking just the first letters of each word in the pass phrase and adding characters and numbers (or substituting them - like 4 or @ in place of A and 1 or ! in place of L etc). The...
padding meanse when we send some small data than it add some more bits and then sends it does not affect the original data.
Can be a victim of shoulder-surfing
Security is needed for home computers in two ways they are Background &Package Includes. For background security CISE (Certified Information Security Expert) is one of the most recognized certification this program covers all aspects of Information Security and Ethical Hacking Domain,CISE is...
Misuses of a computer include using it for a baseball bat, frisbee, and dinner plate. There are many misuses of a computer. Using one to spread viruses and spam is a major misuse.
In accordance with US Army regulations, MAC II has more stringent  protection requirements than MAC III. MAC I is the category with  the most protection requirements of all three.
Software development is the process that encompasses requirements engineering, design, implementation, testing, and maintenance in order to construct software. Software maintenance concerns all activities needed to keep the system operational after is had been delivered to the user.
Both SHA-1 and SHA-0 use a 160-bit hash value. Note that "SHA-0" is a retronym for the original SHA hash algorithm. SHA-1 corrected some significant flaws in the original algorithm that yielded some serious security weakness. The TIGER hash algorithm is designed to use a 192-bit hash, but also has...
I think this is best answered by the old aphorism that security is  everyone's responsibility. In practice there is likely to be a  member of the Board who has the overall accountability and this  person may be termed a Senior Information Risk Owner. Alternatively  it may be the Chief...
Password protection can prevent people accessing computer systems, accounts, files or parts of files by requiring a user to enter a password. This prevents people damaging files or getting into e-mail accounts or network accounts and disrupting them. It is a standard security precaution on many...
wish i bloody well knew too...
RBAC    Fingerprint  Access Control System - TTAC01 model we are implementing it has a  strictness entrance to a property, a building, or a room to  authorized persons.    Features Of Access Control : -   # Eliminates administrative costs pertaining to conventional swipe  cards and...
What impact will a flat world have on your standard of living