answersLogoWhite

0

A secure computer network is one that not connected to any other network.

That may sound simplistic and trite, but it is the truth. In this day and age of super sophisticated decryption algorithms, it is the only way.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

Where on the computer do you find out why you have this message Your computer is connected to a network that is not trusted?

If you have wireless, that is not secure.


What does ssh in Linux stsnds for?

SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.


How do you secure networks from hackers?

The best way to secure any computer network is by using an internet firewall or network security appliances. These appliances track the malicious activities in the network so that proper security action can be taken to protect the network from getting hacked.


What is telecommunication and networking?

Networking and telecommunications are responsible for keeping computer network systems running and secure


When was Secure Network created?

Secure Network was created in 2004.


How do you connect your laptop to a wireless network that your computer is using?

Right click on the wireless adapter choose "View available wireless networks". After that just double click on the network which you want to connect to. If you want to connect to a secure network you have to know the security key which you have to enter before you will be able to use the secure wireless network.


How do you make a Wireless network secure?

By encrypting the information between a computer and the wireless access point. Several methods are available of which WPA and WPA2 are now the most common


What is a remote terminal?

A remote terminal is a computer connected to a network, but is not physically in the same building as the rest of the computers on the network. For example, it might be a computer at the home of a business employee, connected over a secure link to their place of work.


How do you do study of computer network?

computer network


A technician wishes to secure the network authentication for all remote users Which security technology uses radio communication with a computer before accepting a username and password?

A technician wishes to secure the network authentication for all remote users. Key fobs is a security technology that uses radio communication with a computer before accepting a username and password.


When you download a file from a network you should use what kind of network?

secure network


What should be in a good computer network tutorial?

The components and guidelines in making a good computer network tutorial are the definitions of computer network tutorial, the basics of computer network tutorial and the other guidelines and specifics of computer network tutorials.