Unanswered | Answered

Computer Security

Parent Category: Computers
Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.
Library file is a collection of small programs which supportapplication to run efficiently and control the resources. Basically we knows them as dll (dynamic link library) file.
Computer professional
It's been said: you can have your software good (quality), fast (onschedule), and cheap (within a limited budget) - but you can onlypick two. To have the software be reliable and on-time you mustmake sure your plan includes sufficient resources - both people(with the right skills) and the option to...
Actually, an IDS does not sit on one particular layer. It has to examine packets for protocols, how they are being transported, number of packets transmitted, spoofing information, and application layer information. In general terms, Intrusion detection system and Intrusion prevention system is a...
That's a pretty good explanation of what "non-repudiation" means.Non-repudiation is typically implemented via some kind of digitalsignature.
probably hard drive crash, you should try the restore disk for your operating system. the data is either too corrupt from a virus or you will need a new hard drive. If you can at least get to that safe mode screen the computer should be fine if you try the restore disk.
There are many steps one might take, but I will go over just a few. 1) Cancel any credit card used in the fraud at once, contact the provider and let them know you suspect fraud and they can lock the card, provide a knew one and track any attempts to use the stolen information. Credit card...
, the DHCP relay agent is now available under the Network Policy Server. When installing this role, select a role service "Routing and Remote Access" to be installed. The rest is the same like in Windows Server 2003 - just configure it using RRAS administrative console.
Although there may be a top level management position that oversees the security effort of a company, ultimately each user of the organization is responsible for its security.
Basically, yes. It can also be more specific or more complex than this (such as WWANs and VLANs) but the gist of it is: A network is a group of communication devices which have intercommunication.
Yes, it has happened (Mitnick). But usually it's very hard for such people to gain trust because of what they did in the past.
if you have connected your email to something that has your details(IE Facebook) or that you have put your details in the actual emailaddress then, yes. If you haven't, then no. please rate my answer :)
The most common symptom is noticing new programs that you did not install yourself. There are other signs as well such as having your default homepage on your browser changed, pop up ads without having a browser open, programs letting you know there are viruses on your computer but require you to...
If you are communicating to a secure website via https (port 443) then the communications are encrypted by default. The use of https means a secure communication to another web server. The only way to ensure confidentiality (security) in the data transmission is to encrypt it. Since you don't know...
If any confidential information to do with clients is given out, it is a very serious matter as it may be causing a threat to others, types of information that could affect confidentiality and security are peoples personal details for example their PIN numbers, national insurance numbers or account...
bios jumpers 1,2 are closed normal boot bios jumpers 2,3 are closed it rests power-on password and the supervisor password on reboot the only time to have all jumpers open is when you need to recover from a bad bios flash or you messed up your bios badly rests on reboot to know how to set...
Thankfully any sort of malicious cookie can and will be detected byyour Antimalware or Antivirus software - it's generally one of thefirst areas that are checked! Cookies are just small bits ofinformation used by websites to enhance your browsing experienceand it is often considered a very small...
\nBiometrics is a very controversial subject. One of the main reasons it is disliked by some is because of the cost. There are some digital fingerprint reader for use that is $100. Another common concern is how a person's biometric, once collected, can be protected. People don't want their personal...
What does THAT have to do with Game Maker... Not as much as THIS video does... http://www.youtube.com/watch?v=BOFyorgw_Hs
Most likely the site does not provide service any more, or provides to only selected people.
In computer science, you learn that when data is sent via a networkor even through different components, it gets a "label/wrapping"called segments. These segments hold vital information so thisincludes Origin address, size, New address along with check sum. But this is only one type of sending data....
well, a firewall could do it, but an Intrusion Prevention System is the more obvious answer.
First of all need to have some evidence against that person, after that you call local office of FBI or just police and tell them about that problem. You better make sure that you have some proof because if it comes to point that you have accused somebody officially and you do not have a proof you...
User privileges gives the administrator power to control what theuser can & can not do. Permission however, is like user privileges except that when peoplewant to do something and they are not administrator, they ask forpermission to that specific thing!
1940s to 1958: vacuum tube computers, primary I/O magnetic tape or punched cards.
The OS makes calls to the system kernel (although sometimes thekernel is bundled with the OS). Applications make their calls tothe OS, which then makes calls to the kernel.
You will have to be more specific. The web site spinout182.com doesnot require a password. If you are looking to get into the forumthere, you just register and create your own password. If that is not what you are asking about, you will have to providemore information to differentiate it from the...
Properly implemented, AES is FIPS 140-2 compliant. A module implementing AES must undergo evaluation via the Cryptographic Module Validation Program ( CMVP )to be certified as FIPS 140-2 compliant. Federal agencies anddepartments can validate that the module in use is covered by anexisting FIPS...
You can't do anything without system software. To run everyapplication software, the computer has to have the coding as to howit could understand the language the application software isspeaking and how could it emulate them into instructions it couldperform - are the necessities of system software....
There are two primary things needed to help protect against socialengineering, whether at work or in the home. First is awareness.Companies need to provide ongoing user awareness training wherethey show their employees the risks and various ways hackersattempt social engineering. These sessions also...
Security normally refers to Confidentiality, Integrity and Availability. Briefly, your files must be: . accessible : only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify...
No, its not programmed into the software.
Hacking is a way to breaching the security of your Target Computerfor your miscellaneous use.or for getting information.and gettingyour target computer controls on your hand.
It actually depends some on whether you are talking about theTCP/IP model or the OSI model. In general though, application layer protocols include (but are notlimited to): HTTP (but not HTTPS which utilizes transport layer as well) SSH DNS DHCP STMP/POP Telnet FTP TFTP BOOTP SNMP Finger Whois...
You will have to decide for yourself whether it is important for you . This will depend in part on your personal preferences, and career goals.\n\n. CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4...
To encrypt a folder or file . Right-click the folder or file you want to encrypt, and thenclick Properties. . Click the General tab, and then click Advanced. . Select the Encrypt contents to secure data check box, click OK,and then click OK again. .
A block cipher divides plain text into a sequence of text groups.It operates on each group to encode it, gives it to output, andrestarts with the next text group. A nontrivial block cipher could perform several complextransformations of the grouped text in a sequence. A trivial blockcipher could...
A compressed zip folder is data that has been shrunk from its original size to take less disk space.
Database security refers to the collective measures used toprotect and secure a database or database management software fromillegitimate use and malicious threats and attacks. It is a broad term that includes a multitude of processes, toolsand methodologies that ensure security within a...
Most spammers utilize very illegal means to broadcast theirmessages. They usually use bot networks - groups of machines theyhave compromised and turned into "zombies" - to launch theirmassive email barrages. There are several reasons for doing this: 1) since spamming is illegal in many areas, they...
WireShark is a great tool for analyzing networks, finding bottlenecks, or for analyzing attacks.
There is no best but better. no program can give your computer complete protection, just try their best to do, now so many internet security programs we can choose, among these, avast or avg is better free one, and Kaspersky is better paid one. So you can choose as you want. From the site below you...
System administrator's intergrated network tool
Encrypt the contents and either wipe or destroy them when youdispose of them
E-Safety in internet safety - it's about utilizing information and communication technologies in a safe and responsible way. It can refer electronic safety for children, and it can be associated with websites such as Facebook, Bebo, Twitter, MSN and any other social network. Make sure you know...
You can setup your network firewall with your accessing router.consider you are using the Belkin Router : than follow these steps: Access the Belkin router setup utility via the web browser. Fordoing that, browse the Internet and enter the '192.168.2.1' in thebrowser's address bar. Click 'Enter' to...
People who hack online things such as emails, bank accounts, game accounts, and other information.
While in the process of making a good and strong password, oneshould ensure that it is easy to remember but contains both upperand lower case letters. The password should also contain numbersand special characters. password should not be easy to guess. password should be a combination of letters,...
By definition, a successful DoS attack denies service, i.e. itdegrades or interrupts the availability of a system, application,network, etc. Ultimately what it "accomplishes" depends on thetarget and the response. It may cost a lot of money, embarrass,threaten, or interfere with the mission of the...
Definition: An information system is a set of interrelated elements for the purpose of paying attention to the information demands of an organization, to raise the level of knowledge that allow better support to decision making and action development.
Businesses hire social engineers to test flaws in their business security policy so that the business may correct these flaws before someone exploits them for profit.
Asymmetric encryption employs the use of public/private key pairs.
So that your money or personal is not stolen
The Net+ exam is vendor neutral, but candidates are expected to know something about the various versions of Windows, Linux/Unix. This exam does not concentrate on Operating Systems, but there are a few questions related to them.
As the length of the password increases, the amount of time it takes to find it through brute force increases exponentially.
Resegmentation refers to a continued or repeated process ofdividing into segments. In computers, it is a method that isgenerally used in databases.
There are many ways to hack colony. The best way to hack would be to go to a site called colonyhaxors.webs.com *Warning* Use at your own risk, you may get banned if you too openly hack.
Some people believe that rules/laws are made to be broken. Hackers are especially the ones who feel a sense of nobility for what they do. Some believe they are challenging the code of security and "what is supposed to work" and they exploit it and say "fix it because people's lives are at risk....
Nope. As long as you have the community patch you will be fine. Go here to get it. It does not contain any spyware/virus thingies. That doesn't mean you will not find viruses on the winmx network though. As with all p2p programs, you should scan the files you download with an antivirus...
In the movie "Hackers" where the security guard is exploited into giving information over the phone about the computer network.
However we know that this is a time saving and useful for everycompany. Its main aim is to keep an eye on employees their loginand logout.
Biometrics refers to the identification ofhumans by their characteristics or traits. Biometric identifiers are often categorized asphysiological or behavioral characteristics. Fingerprints, face recognition, DNA, Palmprints, hand geometry, iris recognition, retina and scent areexamples of...
If you mean people you share the network with, the answer is yes. They can see what you are doing if they have proper software for that. The only way you can protect yourself is to use proxy server, or another kind of encrypted connection.
This is a very general question. How is it stored? Is it encrypted?Is it actually on the computer's storage or external? Whatconstitutes a "computer"? Before you can answer these questions and more it is impossible toanswer your question.
A method for controlling messages in a software system. The method activates a report-handling module when a subroutine has a message to send. The subroutine passes an identification to the report-handling module. The subroutine then passes a message and message level to the report handling module....
firewall functions by acting on traffic based on it's policy. A policy is comprised of a set of rules. A rule is an action taken on traffic that fit a certain criteria. A single rule is comprised of four basic elements: . Source . This is where the IP traffic is coming from and is comprised of the...
Network Security is the process of taking physical and softwarepreventative measures to protect the underlying networkinginfrastructure from unauthorized access, misuse, malfunction,modification, destruction, or improper disclosure, thereby creatinga secure platform for computers, users and programs...
File Transfer Protocol (FTP) is used for transferring files between an FTP client and an FTP server.
The Microsoft Baseline Security Analyzer is a program that attempts to assess some aspects of the security of an individual computer. It does this by checking two things: whether security updates released by Microsoft have been applied, and whether certain less-secure security settings are present....
Software is the programs that are needed toaccomplish the input, processing, output, storage, and controlactivities of information systems .
Operating system is low level computer software which is managecomputer peripherals and basic functions of computer whileapplication is any program, or bunch of programs, that is designedfor the end users.
Yes, DES can be used for network security, but it is a rather weak one that can be cracked easily.
Not on a end-user level. Manufactures belive it is impossible. But for use on an educational level and not to be used piracy you can search for a keygen program for what ever you are looking for. Keygens only work for the game, OS, or software they are built for. There is no keygen that works for...
The website is legal but the articles on it may or may not be legal.
Hacking is the practice of understanding the workings of a system. Hackers do not Break into systems, do anything illegal, or unlawful. Hackers are intelligent people who do not abuse privileges or discoveries. If you are trying to break into a system or something, You are committing a crime. This...
The security key on a Comcast Modem is located next to the serialnumber of the unit. Sometimes the serial number is the number usedas a security code if it is not printed on the device.
1. Unless you go to proprietory fibre, both can go to 1000Mb/s, so neither has a great speed advantate. 2. Wired is much cheaper. It's not the fibre that's expensive, but the terminations and the adapters. 3. Fibre can do much longer distances. Basic multimode 500 m. Monomode many kilometres....
Basically, instrusion detection -- either software installed on a computer or server or software built into a security appliance -- is for detecting and notifying you of any unuathorized attempt to gain access to your computer or network. There are several different schemes for intrustion detection,...
typically the router that you are using will take 192.168.1.1. It is a usable address, but it is already taken, so the first IP you can use for a device on that network would be 192.168.1.2 the last usable IP is 192.168.1.254 assuming you are using a subnet mask of 255.255.255.0 Keep in mind...
Yes. Viruses that add and delete files are most unwelcome on computers. Rule number 1, backup, backup, and backup. And the backup some more.
SSID is the name of any WIFI distributer. SSID name of the Network
A Teardrop attack involves sending mangled or corrupted fragments with overlapping, over-sized payloads to the target machine. This can crash various operating systems due to a bug in the code for their TCP/IP fragmentaion re-assembly. Windows 3.1x, Windows 95, and Windows NT OS as well as some...
Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and those devices that are part of information security control systems. The latter must be protected more thoroughly than the former, since networking subsystems are often the focal point of attacks...
You can't. If you do not know it and there is no other computers connected to the same router, there is no way you can get the key without setting up a new one.
This question cannot be answered from the information provided; for example, what is your definition of "cost effective"?