answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

How do you get a Windows XP password from a password hash?

There are several tools that will determine the password from the hash. You can find them via any Internet search engine.

Is it possible to get hacked if the hacker doesnt know any of your info?

First of all, the hacker has no reason to hack you unless some important files are on your computer, and we're talking about super-important sensitive government documents, not school projects.

And no, the hacker can't hack you if he doesn't have any of your information. The only way you can get hacked is when you get a rootkit/backdoor virus which gives the attacker control over your computer or if a hacker is messing around with random IP adresses and attacks yours.

Lost network key for my router?

The router will have an administration page, normally accessible with a browser, where you can reset the network key. I assume the key is for a wireless network, so you can access the router without a key by hooking up with cable.

If you have lost the password for the administration page as well, the router can be reset to default settings with a tiny button somewhere on the box. (The reset button is normally so small that you need a pen or similar to push it.)

To find the administration page and the default password, check the router documentation. You can normally find the details on internet when you have the router make and model, or you can contact support department of a computer store.

What are the companies that use encrypted databases?

There are many thousands of companies that use encrypted databases. All banks use them.

What information does ADT have online about security?

ADT offers residential alarm monitoring at affordable prices as well as offering CCTV, fire and smoke sensors. They also placed facts to why you should buy an ADT product.

I need to access a website that keeps telling me the security certificate is not valid. Can anyone tell me how to get around this problem?

When it says the security certificate is not valid it should give you the option to proceed/allow or deny/exit. If not you need to change your internet security settings to the lowest security level.

Definitions of HRM by different authors?

human resource management defines the different aspects and functions of one department, how it works how it recruit employees and how it deals with the wages and salaries of organization.

What are the characteristics of firewalls?

Characteristics of Comodo personal firewall are:

Removes existing viruses instantly

Blocks all unwanted internet attacks

Protects your system completely

Live remote technical support

Best firewall brands today are: Comodo Personal firewall, Norton Internet security, AVG, etc.

What is static and dynamic channel allocation?

In static channel allocation voice channels(definite set of frequencies) is allocated to each cell.

But in dynamic channel allocation channels are provided at the time of request, a request is send to the base station which then sends a request to mobile switching center(MSC) asking for the set of frequencies to be used.

What is a network resource?

A network resource is an individual computer on a private network that users can connect to. It can either be a terminal server or a computer with remote desktop enabled. An example would be telecommunications media.

Given default priority what switch is elected to root bridge?

After looking at the priority, the second criterion used is the switch's MAC address. In either case, the lowest number wins.

After looking at the priority, the second criterion used is the switch's MAC address. In either case, the lowest number wins.

After looking at the priority, the second criterion used is the switch's MAC address. In either case, the lowest number wins.

After looking at the priority, the second criterion used is the switch's MAC address. In either case, the lowest number wins.

What is video encryption?

Video Encryption is a method of preventing a video signal from being viewed unless you have the ability to decode the signal. Older methods dropped the video interlace which caused a picture to roll or skew. Newer methods change the video image so that it is scrambled and unreadable unless processed with the decryption key. Since the signal must be decrypted on each frame, this has to be done 60 times per second (in the U.S.) and 50 times per second (in Europe). This requires hardware decoding because software cannot decode the entire picture image fast enough.

Satellite Television providers typically use two methods: they change the encryption key on a regular basis, and they send a disable signal to a receiver device when the subscription ends, which invalidates its stored keys and it can't read the signals.

Who is the best ethical hacker in India?

Benild Joseph the 22 years old world renowned Ethical Hacker | Information Security Consultant | Speaker | Author in Indian IT Industry was born in Calicut, A City of Kerala. Currently Acting as the Chief Executive Officer of "Th3 art of h@ckin9" - International IT Security Project. He has his credit to many registered and pending patents in cyber forensic and information security domain. He specializes in Web Application security, Penetration testing and Forensic investigation. His research interests include Computer Security, Networking, Data Forensic, Virtualization, Web Application Vulnerability and Information Security. He has been interviewed by several print and online newspapers where he has shared his experiences relating to Ethical Hacking, Scope in Indian Information Security field, Cyber War and Cyber Crimes.

Why user datagram protocol is used for transferring video signals?

Because UDP does not use handshaking, connection-oriented transmission, and is thus much faster.