answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

Lack of security and its effects to economy?

Privacy activity increase because lack of security and make economy of a country easily being hack

Advantages of ethical hacking?

Since security is week in all technical fields... ethical hackers are brought into work for the corporate sectors with high wages... All ethical hackers have a great scope in nearly future.. if you have any disagreement in my idea about ethical hackers you can mail your concepts to "pown.raj77@gmail.com" For futher informations about ethical hacking you can contact me through my mail id..

What are the advantages and disadvantages of steganography?

The obvious advantage of steganography is that you can hide a secret message in another message, be it text, image, audio, or whatever media you decide to hide your secret in. The main problem with this is that either you or the person you're sending the "secret" message to need to be able to find the message. And if you can find it, then the bad guys you want to keep the message a secret from can find it, too.

What are the 2 basic functions used in encryption algorithm?

Two basic functions used in Encryption Algorithms are * Substitution * Transposition

Why do networking components need more examination from information security perspective than from a systems development perspective?

Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and those devices that are part of information security control systems. The latter must be protected more thoroughly than the former, since networking subsystems are often the focal point of attacks against the system; they should be considered as special cases rather than combined with general hardware and software components.

What is interruption in Information security?

Stopping the message transfer between 2 persons , so that 2nd person can't receive the message.....

What is centralized test groups and decentralized test groups?

I require more details but let me answer in terms of team hierarchy.

Centralized test groups: A TCOE is formed in an organization which provide test resources (people) to projects as per their requiement. Training, skill, Time and billings are tracked. Mostly lead by Test Manager.

Decentralized: Project teams own test resouces. so a project manager/dev manager are leads and test team report to them dedicately.

Is ivi service peer to peer www.ivi.tv?

Yes.

Permission from You for ivi, Inc. to Use Your Computer and Bandwidth to Enable the Peer-to-Peer Viewing of Video on the Site and to Manage the Network of Computers Running ivi tvAs consideration for using ivi tv, you agree and understand that:

  1. ivi tv will utilize the processor, bandwidth and hard drive (or other memory or storage hardware) and/or cache of your computer (or other applicable device) for the limited purpose of facilitating the communication between, and the transmittal of data, content, programming, services or features to, you and other Service users, and to facilitate the operation of the network of computers running instances of the Service.
  1. ivi will take organizational and technical measures intended to protect the privacy and integrity of the computer resources (or other applicable device) you are utilizing, however, you acknowledge and agree that this is not a representation or warranty of ivi.

What is usage of Sequence Number in Relaible Transmission?

In reliable transmission protocols, the sequence number is used to uniquely identify each packet of data sent over a network. It ensures that packets can be delivered in the correct order, as well as enabling the receiver to detect any lost packets. By tracking sequence numbers, the sender can retransmit lost packets and manage flow control, ensuring data integrity and reliability in communication. This mechanism is crucial in protocols like TCP, where maintaining the order and completeness of data is essential.

Is WinMX harmful?

Nope. As long as you have the community patch you will be fine.

Go here to get it.

It does not contain any spyware/virus thingies.

That doesn't mean you will not find viruses on the winmx network though. As with all p2p programs, you should scan the files you download with an antivirus scanner just to be safe.

Although I've never really heard of an mp3 containing a virus... lol

Also you can search for any file type you wish.

http://winmxworld.com/

Make sure you get the community patch, otherwise you will be helping the network be attacked with fake files and flooded. Also network attackers have begun to try and "data mine" information off of the network. Help the network by blocking these horrible people by using the community patch! As of currently, the mxpie patch has been deemed inefficient when it comes to blocking these evil people!

Is there any source code for longitudinal redundancy check?

It depends on the language you want to use. Here is a VB example:

http://bytes.com/topic/visual-basic-net/answers/443023-lrc-calculation-algorithm

How can you get a network access code?

It must be provided initially by the organization offering the network service, be it the cable company, the satelite company, etc. It is usually a very long (aprox 25 digits) string and is alphanumeric (letter and numbers). I believe after a usser logs onto the service he/she has the option to enter their own key provided they follow the same format for length of characters. Normally when one signs up for service with a provider, they provide the network access key to the customer in case of system errors where the customer might be required to enter the key.

When was the first computer network created and by whom?

Contributions to computer networks were made by the following:

CERN in Switzerland

The first computer network was created at CERN the European research center for particle physics. it is in Switzerland.

UCLA in 1969

The previous comment "the first computer network was created at CERN" is not correct. In 1989, CERN added the WWW as a new feature to the already-existing Internet. The Internet itself was created in 1969 at UCLA. There were previous experiments in wide-area networking, e.g., in 1965. For more info, see "history of the internet" on isoc.org.

DARPA

The computer networking revolution began in the early 1960s and has led us to today internet technology. The Internet was first invented by DARPA (Defense Advanced Research Projects Agency) for military purposes, and then expanded to the purpose of communication among scientists. In 1957, the launch of Sputnik had spurred the U.S to create a network for communications links between military and university computers that would not be disrupted by bombs or enemy spies. In order to solve the problem, in 1968 DARPA (Defense Advanced Research Projects Agency) made contracts with BBN (Bolt, Beranek and Newman) to create ARPANET (Advanced Research Projects Agency Network).

Sergei Lebedev in the Ukraine

The first computer network in Ukraine by Sergei Lebedev for the USSR antimissile system. The system was operational in 1960 far before the idea of ARPANET.

SAGE air defence computer network

A network of vacuum tube computers connected by leased telephone lines and the first MODEMs used by the US to protect against bomber attacks. The system was operational in 1958.

Which functionality is NOT provided by security templates in Windows operating systems?

Type your answer here... Create new security parameters

Answer Explanation: Security templates do not provide new security functionality. Instead, they simplify administration by enabling centralized access and distribution for existing security features.

Four Major Elements in choosing a Firewall?

firewall functions by acting on traffic based on it's policy. A policy is comprised of a set of rules. A rule is an action taken on traffic that fit a certain criteria. A single rule is comprised of four basic elements:

  • Source
    • This is where the IP traffic is coming from and is comprised of the following
    • Single IP address or multiple IP addresses
    • One or more networks in the form of a network ID and subnet mask
    • A combination of IP addresses and Network addresses
  • Destination
    • This is where the IP traffic is going to and is comprised of the following
    • Single IP address or multiple IP addresses
    • One or more networks in the form of a network ID and subnet mask
    • A combination of IP addresses and Network addresses
  • Service
    • This is the type of protocol that the traffic is using and is comprised of the following
    • One or more destination TCP ports
    • One or more destination UDP ports
    • A group or combination of destination TCP and UDP ports
    • Although source port can be limited to a certain range, it is generally left wide open. It is the destination port that is primarily specified.
  • Action
    • The administrator chooses from the following options if all the above three criteria match
    • Reject the traffic
    • Drop the traffic
    • Permit the traffic
    • Encrypt the traffic on IPSEC VPN capable firewalls

Difference between ripv1 and ripv2?

The main difference between RIPv1 and RIPv2 is classless routing. RIPv2 incorporates the addition of the network mask in the update to allow classless routing advertisements. This is extremely important for the flexibility needed to efficiently utilize network assignments for an ever-shrinking pool of IP addresses.

There are other differences, as well. In RIPv2, the destination address for the updates is multicast, instead of broadcast, as in RIPv1. This reduces the burden on the network devices that do not need to listen to RIP updates. With broadcast, every device on the broadcast domain must at least open the IP packet and process the initial information to determine relevance. With multicast addressing, if a device needs that information, it will listen to that specific address. If it does not need the RIP information, it does not have to process the multicast address. The multicast address RIPv2 sends to is 224.0.0.9.

Another addition to RIPv2 is authentication. Authentication is used to ensure that routes being distributed throughout the network are coming from authorized sources.

Which level of the OSI model is affected when the telnet and FTP is blocked to prevent disasters caused by hacking?

FTP and Telnet are considered OSI layer 7 protocols. If you are blocking the service, then layer 3 or 4 (network or transport) is responsible.