Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

Asked in Computer Security

Can you use two firewalls at the same time on my computer?

User Avatar
Technically, there is nothing prohibiting a user from running multiple firewalls at the same time. However, each additional firewall will cause the computer's network connection to be able to process fewer packets of data in the same amount of time, increasing both latency ("lag") and throughput ("bandwidth", "speed"). It will also increase the complexity with attempting to run new software, as each firewall may need to be independently configured to allow the program. Therefore, in the interest of having a balance between performance and security, a user should choose just one firewall to protect their system. Ideally, the firewall should be a hardware firewall placed between their computer and the Internet, but software-based firewalls are also effective at blocking most malicious traffic for less overall cost.
Asked in Software and Applications (non-game), Operating Systems, Computer Security

What is the most secure operating system?

User Avatar
Security is a difficult and sometimes controversial thing to analyze. The only truly "secure" operating systems are those that have no contact with the outside world. The firmware in your DVD player is a good example. Among all modern general purpose operating systems (Windows, Mac OS X, Linux, Solaris, FreeBSD, NetBSD, OpenBSD) the most secure by defualt is by far OpenBSD. OpenBSD has an extremely stringent security auditing policy; only two remote attack vulnerabilities have been found in the last ten years. This is because OpenBSD doesn't create a large attack surface by running a large number of networked apps. Of course, the sad fact is that any networked operating system can be made insecure through careful misconfiguration. Window's problems with security stem mainly from the fact that it runs with a large number of network services on by default, and that it (XP and prior) let the user run with full privileges by default. Windows Vista attempted to fix this issue, but people rejected it as "too confusing" and complained that their old apps did not work correctly under limited accounts. Mac OS X is better about user permissions, but still has had a (in)decent number of remote exploits. Apple's slow response to patch many of these issues will be even more worrying if it gains significant market share. Most Linux distributions have an excellent policy of quickly patching known security vulnerabilities. Unfortunately, two of the top ten distros deliberately use outdated code (Damn Small Linux) or make it too easy to run as a privileged user by mistake (Damn Small Linux, Puppy Linux). Were these distros to gain significant popularity, their users would be exposed to a larger number of vulnerabilites than if they encouraged proper security policies.
Asked in Technology, Computer Security

How did early computer security work?

User Avatar
It was pretty simple- just passwords to protect one's computer. With the innovation of the internet, however, computers have increased security with firewalls and hundreds of anti-virus programs.
Asked in Computers, Computer Security

Is amazon a secure site?

User Avatar
it should be ok but i would go with eBay and craigslist although some people may scam you it is very very slim chance that that will happen Amazon is a secure site. They are found to be quite reliable compared to eBay and craigslist. Their customer service is responsive when you have an issue related to whatever you ordered.
Asked in Software and Applications (non-game), Computer Security

What is the primary function of a firewall?

User Avatar
Its primary function is to prevent accesses from untrusted (or undesired) external systems to internal systems and services, and to prevent internal users and systems to access external untrusted or undesired systems and services. More generally, its purpose is to implement security and performance policies. As an example, you can prevent external systems to access internal servers, as well as to prevent users to use P2P software or access social networks, for performance and security reasons.
Asked in Computer Mouse, Computer Security

Can wireless mouse carry a virus?

User Avatar
A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you suspect that pointer on the screen is not working properly or moving on its own its probably due to virus on your harddisk whose source is not WIRELESS MOUSE. This answer is false. Better go read up on USB device security as there is an exploit to use the USB firmware of the device (that little wireless dongle you plug into your machine to use the mouse) so that it can breach your network. You can find out more about this exploit at infoworld dot com by doing a search for yes-even-mouse-can-infect-your-network-967
Asked in Software and Applications (non-game), Computer Security, Linux Ubuntu

How do you see the current windows password with Linux I mean I know how to use chntpw but I want to know the current password and not clear it or edit it Any suggestions?

User Avatar
This is not possible Answer: Hmm... Well, actually if I'm not mistaken, there are rainbow tables available that have explored the entire naming space for some, if not all, versions of Windows. And there are password crackers like John the Ripper etc...
Asked in Internet Security and Privacy, Computer Security

Can police track an IP address after it has been changed?

User Avatar
Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this system as usual, it can generally be tracked. If the user uses a proxy service to make their IP address appear as if it is located in some random other part of the world, it may be more difficult to track.
Asked in Computer Security

What is the difference between a service pack and a security patch?

User Avatar
A service pack is a collection of security patches. For example, Service Pack 3 of Windows XP was the accumulation of all security patches that had been released up until the release of the service pack. The service pack is a novel concept, especially during a system recovery where Windows XP would have to be reinstalled on a PC, and just one large download would be required as compared to hundreds of small ones to bring your PC to the same security standpoint.
Asked in Computer Security

What is the difference between hacker and criminal?

User Avatar
okay, i think this is the easiest way to explain this is by explaining the different kinds of hacking. there are three kinds of hackers, there are white hat hackers, gray hat hackers, and black hat hackers. white hats to legal things for good purpose. gray hats do illegal things for good purpose black hats do illegal things for bad purpose (ex: to harm someone) for a true definition of a hacker check out the hackers manifesto. a criminal is someone who does anything illegal
Asked in Computer Networking, Computer Terminology, Computer Security

Is the public key more secure than private key?

User Avatar
The questions is not really which key is more secure - rather it is a question of "can you determine the private key if you know the public key?" Public and private keys are associated with asymmetric cryptography. They are generated as a pair. The security comes from the difficulty in determining the private key if you already know the public key and have some cyphertext that the private key has been applied to or encrypting text with the public key and determining what key would be required to decrypt it. Since each key can be used to decrypt cyphertext encrypted with the other key using the same algorithm, there is not inherent reason to think that one key is more secure than the other. In reality, one of the keys will be numerically a better starting point than the other when it comes to executing an attack on the encryption and deriving the other key. In practical terms, however, an attacker is always trying to start with the public key and discover the private key, without which messages encrypted with the public key cannot be decrypted (or without which the attacker cannot impersonate the holder of the private key).
Asked in Computer Terminology, Windows XP, Computer Security, Windows 7

What is administrator privileges when trying to install a download?

User Avatar
Answer Administrator privileges allows the user full access to a program or network second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able use a program, but not upgrade it. If you are installing a file or program and you don't have administrator privileges, you may not be able to install the program or file. If you don't have administrator privilege, you may not be able to change computer or network defaults. To get privileges if your running vista start menu\click on your display picture top right\turn on or off user account\tick the UAC box
Asked in Computer Viruses, Microsoft Windows, Computer Security

Is Windows Security essentials enough protection for your computer?

User Avatar
The quick answer is No Microsoft Security Essentials is average in many ways; it's OK but it isn't the best anti-virus software you can get, even for free. I suggest you check out some real world tests that put the anti-virus software through some tough tests and then list the results so you can see which is the 'best' or right one for you. A site like AV Comparatives is good for this.
Asked in Computer Networking, Local Area Network, Computer Security, How To

How to block traffic attempting to exit a LAN and discuss why an administrator would want to do this?

User Avatar
You would want to block suspicious outbound traffic because it may be a malicious program attempting to submit stolen data to its creator, or to open a backdoor
Asked in Software and Applications (non-game), Internet, Computer Security

Is edreams a safe website?

User Avatar
Yes, eDreams is a very secured website. It is one of the major online travel agency in Europe, having "physical" offices in Spain, Italy and France. It also has a Verisign certification to secure all the data and payments. In case of any doubt or question, the call center is available by phone or email Monday to Saturday.
Asked in Computer Security, Computer Network Security, Software Security

What is a firewall access control list?

User Avatar
A control list of your firewall that you can access. answer #2 -------------- an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.
Asked in Computer Security

How could one describe computer security?

User Avatar
Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.
Asked in Computer Security

Advantages of computer network security?

User Avatar
There are a number of advantages of having computer network security. It is used to protect the information shared between different systems on the network. It also protects the system on the network from any malicious attacks.
Asked in Computer Hardware, Computer Networking, Computer Security

What are the principal elements of a public key cryptosystem?

User Avatar
Public key cryptography is also called asymmetric cryptography. In this cryptography technique there are two parts of key . These two parts are a) secret key and b) public key.
Asked in Computer Security

What is data encryption?

User Avatar
Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. Originally, data encryption was used for passing government and military information electronically. Over time as the public has begun to enter and transmit personal, sensitive information over the internet, data encryption has become more widespread. Nowadays web browsers will automatically encrypt text when connecting to a secure server. You can tell you are on a secure, encrypted website when the URL begins with "https", meaning Hypertext Transmission Protocol, Secure.
Asked in Computer Security, Computer Network Security

What is availability for IA security?

User Avatar
One of the basic themes of IA is that it is composed of three principles - which have the memorable acronym CIA. C = confidentiality: only those who should be able to see the data can see it. I = integrity: the data is only changed by those authorized to change it and is not being corrupted accidentally or intentionally. A = availability: users can access the data when they want to or need to. Attacks against availability include denial of service (DoS) attacks which tie up resources and bog down networks to the point that legitimate users are not able to access them. Availability is also attacked by anything that causes the computer or the networks that provide access to it to crash. Availability is protected in IA through various methods including (but not limited to) redundancy, rerouting, disaster recovery plans, and contingency planning.
Asked in Computer Terminology, Internet, Computer Security

Can you give an example of an alphanumeric password?

User Avatar
Here are some: ae7fehfe6f6 slf03f78f6fh JY6sh6gs4f Basically, they contain numbers and letter only and no special characters.