answersLogoWhite

0

It heavily depends on software installed on them.

For example, computers with Windows installed aren't very secure, unless they have a firewall and antivirus installed.

Linux is secure, unless somebody configures it to not be secure.

BSD is security-oriented, so it's very secure.

As for hardware - not very much, since one can take out a hard disk and read it elsewhere, boot a LiveCD/DVD and crack local password, etc.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What assets require protection in computer?

Everything on your computer should be protected by a firewall and anti virus software. Personal information and files should be password protected. Passwords should not be stored on the computer.


Can someone using your wireless network get your information?

If you computer and network is not protected, then yes, there is that possibility.


Why does your computer have an Administrator called PC protected?

The person that initially set the computer up created that account name. The name signifies that the account is protected against security risks. For more information on computer security visit Answers.com


Why is computer software protected by copyright?

The code is protected as a literary work.


What happen if you didn't protected your computer from viruses?

it will kill our computer


What is computer and internet security?

Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.


What is protected health information phi?

It is protected by FERPA laws


Which are things from which a computer must be protected?

Temperature


How do you remove a file from your computer if it is protected?

you dont


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act


Any damage to a protected computer system by fraudulent or related activities when that system is used in interstate commerce is usually reportable to the FBI under what USC statute?

TITLE 18 > PART I > CHAPTER 47 > § 1030Prev | Next(5)(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss


What is the acronyms PHI EPHI stand for?

PHI- Protected Health Information EPHI- Protected Health Information in Electronic form