answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

500 Questions

What is the purpose of the administrator password?

User Avatar

Asked by Wiki User

The computer needs at least one account with full privileges in order to allow the installation of software. By default, the computer will come with such an account - the default administrator account. Since the account has full privileges it really needs to be protected such that only someone who is supposed to have full privileges on the machine can access it. The protection comes in the form of password protecting the account.

What are ten industries that depend on networking?

User Avatar

Asked by Wiki User

1. Airlines

2. Education

3. E-commerce

4.Apple Company

5.Banking Maintains.

6.Super Market Controlling

7.CCTV Security Organization

8.Laptop Company

9.BBC

10.BT Telecom

Purpose of the UAC box in Windows Vista?

User Avatar

Asked by Wiki User

UAC is the User Account Control. That is an added security measure to prevent certain manipulations to the system. That would include messing with the system root or the program files, adding or removing programs, installing drivers, installing ActiveX controls, adding or removing user accounts, configuring Windows Update, running programs with Administrator privileges, changing another users files, defragging the drive, etc. It is a way to temporarily grant Administrator privileges without having those privileges available all the time. That way, malware cannot do those things.

What security software should your computer have?

User Avatar

Asked by SMDawn1

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

cutt.ly/bh7OIkg

Is ethical hacking course and network security courses the same?

User Avatar

Asked by Wiki User

No, CCNA (Cisco Certified Network Associate) is an certification that validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN.

Security ethical hacking, goes more in detail about computer/software/network security.

What is difference between user privileges and permission?

User Avatar

Asked by Wiki User

As the question was posed in the Windows section, I'll answer this from Microsoft's perspective.

User rights generally refer to logon capabilities: who can logon interactively, as a batch job, as a service, over the network, over Terminal Services, etc. These all require a certain "right" and these rights can also be denied to groups or individual users.

Permissions relate to the capability of accessing an object, such as a file, a registry entry, a service, a printer, a share, etc. Again these can be granted or denied but there is more granularity here as there are several permission types: read, write, delete, etc. Permissions are collected into Access Control Lists (ACLs) with each entry being termed an Access Control Entry (ACE).

To complete the trio in common parlance, there are privileges. These relate to overriding capabilties within Windows such as backup, restore, take ownership, debug, etc. If you hold the backup privilege, for example, you are allowed to read all files, regardless of permissions on those files. Privileges trump permissions.

Confusingly, privileges are sometimes referred to as rights, even in official MS documentation. in the days of NT4, some were also called "abilties" so you'll note the careful use of the generic term, "capability" above.

And finally, in the Novell world, permissions are called user rights.

Which file system is specially design to provide more security?

User Avatar

Asked by Wiki User

Generally, you are referring to the class of Filesystems known as Cryptographic file systems. A crypto filesystem uses a symmetric algorithm to encode the contents of disk; it requires a special key to be able to use.

Several common filesystems now support a Cryptographic mode.

How do you remove McAffe from PC?

User Avatar

Asked by Wiki User

Start>My Computer>Local Disk>Program files>McAfee>McAfee Shared components>Shedder << delete this folder For those of you trying to install Norton but it keeps telling you to uninstall McAfee Shredder first, I came across the easiest answer that worked straight away for me. Go download this freeware registry cleaner: http://www.majorgeeks.com/download.php?det=460. On the Uninstall Menu, remove McAfee Shredder and it takes care of it immediately.

How does Public Key Encryption work?

User Avatar

Asked by Wiki User

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works.

An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages.

Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to.

To get more details on the mathematics of encryption and decrption using Public Key

Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

The OSI model and protocols involved in each layer?

User Avatar

Asked by Wiki User

Go to the Wiki for OSI model -that discussion and listing is very good.

How do you set your laptop to lock when you close your screen in Windows 7?

User Avatar

Asked by Wiki User

Hold Windows key and press L

That will lock your account.

If your account is password protected then you will get a password prompt to enter that account again.

Which type of case form factor is best desgined to keep a sytem cool?

User Avatar

Asked by Wiki User

The BTX is the answer the design focuses on reducing heat with better airflow and improved fans and coolers, its also gives better structural support for the motherboard than does ATX. Answer #2 = The BTX (Balanced Technology Extended) was designed to take full advantage of serial ATA, USB 2.0, and PCI Express technologies. The BTX form factor focuses on reducing heat with better designed airflow and implimenting improved colling fans and coolers.

Can someone find out your info from your email address?

User Avatar

Asked by Wiki User

Yes, you can doctors' email addresses easily by using the email scraper software. You can find an email database of doctors for any country, city, or, state by using this Cute Web Email Extractor software.

Contact Me:

Mobile Number: 03084471774

Why would someone want a domain name on their computer?

User Avatar

Asked by Wiki User

A domain name identifies the location of an area on a server.

How can hacking be prevented?

User Avatar

Asked by Wiki User

You can get antivirus programs that help you from getting hacked, the best antivirus out there right now is BitDefender Total Security 2009.

If you are a cracker: serials for it can be found on cracking sites and video sites.

If you are looking to prevent hacking games such as runescape or WoW:

change your password atleast once a week.

Hoped this helped.

-Kristian Boy Genius

Age 10

Why is data security important in cloud computing?

User Avatar

Asked by Wiki User

Put all eggs in one basket, Even how hard the basket !

Two devices that can be used to protect computer from fluctuations in electricity?

User Avatar

Asked by Wiki User

You need a good power surge strip or a UPS. Make sure the computer plugs into the surge strip or the UPS, and then plug the strip or UPS into the wall. Some good UPS devices actually do power conditioning which is better, but more expensive.

What is Automated Data Processing?

User Avatar

Asked by Wiki User

it support the business owners with the payroll,human resource management wit all business sizes

What is the worlds hardest password?

User Avatar

Asked by Wiki User

TsEhGUOt. This is the world's toughest Password ever created. By Mr. Vivek Joshi Indore (M.P.)INDIA You can Get him on tanishq237@rediffmail.com.His Educational Qualification is MCA.

How do backup and recovery procedures help achieve RTO?

User Avatar

Asked by Wiki User

By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO.

Two examples of good passwords are what?

User Avatar

Asked by Wiki User

Good passwords are random with numbers and letters. You want a great password add symbols (*&?><) to a password that is alpha numeric. Examples * dktn9+1 * qkdit>4~