answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Who created avg?

AVG antivirus was invented by Grisoft

What is the use of having physical security system?

Because an advanced firewall and world class virus checking software doesn't help if someone can just walk into the office, sit down by a computer and do all the stuff the remote attacks or viruses tried and failed to.

Or in a context where a company is concerned about secret data: Stealing a laptop from an employee might work just as well as breaking in over the network. Plus if the employee has a VPN connection and has the password stored in the laptop, cracking the laptop would give you the network for free.

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards

How do i reset my user id and password?

go to administrator and set password| If you want to reset the Windows passwords I suggest you to use this password reset tool

http://www.resetwindowspassword.net

Advantages and disadvantages of ethical hacking?

The disadvantage of computer hacking is that very confidential information can fall in the hands of the hackers who can use it maliciously. The advantage of computer hacking is that it can be used to recover lost information.

What are some examples of good passwords?

Something that you can easily remember that other people will not be able to guess easily. Alternatively, you can create a random jumble of letters and numbers and write it down. The advantage of the first method is that there's no paper for people rummaging around in your stuff to find, and the advantage of the second method is that it would be incredibly hard to guess without it (which would make remote access much harder)

Good paswords also consist of capital letters and numbers as well. Say you want to use the name of one of your schools for a password, you can add the (first, last, whatever) year that you were there to make it more secure.

Try not to forget it i know that's has already been said but it is really not a good idea to forget your password cos then you cannot get into whatever it is that the password is for.

You want to uninstall the deep freeze without knowing password?

Unfreeze your system by holding SHIFT and DOUBLE CLICKING the deep freeze icon in your system tray, then entering your password and choosing the unfreeze option. After rebooting, run the installer you used to install deep freeze and choose the uninstall button.

Your machine will reboot, and Deep Freeze will be uninstalled.

Deep Freeze is installed on my computer. I would like to uninstall it. How is this done?

Disable Deep Freeze before uninstalling it.

To disable Deep Freeze:

  1. Hold down the shift key and double-click the Deep Freeze icon. Alternatively, you can press CTRL+ALT+SHIFT+F6.
  2. Enter your password and click OK.
  3. If you have not yet entered a password you should be able to click OK without entering a password.
  4. The Boot Options dialog is displayed. Select "Boot Thawed" and click OK. This will disable Deep Freeze on the next reboot.
  5. Reboot your computer. After the computer reboots, you are ready to uninstall Deep Freeze.

To uninstall:

  1. Locate the installation file you used to install Deep Freeze on your computer. By default, the name of this file is called "DF5Std.exe" for versions 5.X and "DF6Std.exe" for versions 6.X.
  2. Run the installation file (DF5Std.exe or DF6Std.exe).
  3. Select the option to "Uninstall"

Deep Freeze is uninstalled and your computer is rebooted.

If this has not resolved your Issue, you may check some inks to Other Information:

  • http://www.out-of-warranty.com/how-to-uninstall-faronics-deep-freeze-in-three-different-ways/

What is oasis2service1.0?

Oasis2Service appears to be installed by Sony with its Vaio messenger program. It apparently allows Sony to send you hints and tips on using your laptop. When I uninstalled the program, the Oasis2Service was removed as well.

Here is the description of the program and a link to Sonys site on it.

VAIO Messenger is a software utility that provides hints and tips about using your VAIO® computer. It also offers optional accessories that are compatible with your computer and available for purchase.

VAIO Messenger can be uninstalled through the operating system and can only be reinstalled by performing a C: Drive recovery or a full system recovery.

What security loopholes come to the fore in the situation described.how can these be plugged?

a) What security loopholes come to the fore in the situation described? How can these be pluggewas found that out of the 364 desktops at the corporate office; more than half did not have their antivirus software updated with recent virus signature files. Three - fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, system manager of SystemX wondered about the situation at the seven branch offices across the country.

SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. These loopholes come into our mind.

These loopholes can be plugged, if they update their antivirus which is virus signature files free. Because they use e-mail, and Net extensively so they need strong security measure in order to secure their system.

In short we can say;-

Security loopholes in the random number generator of windows which is fond

In research. This is a program which is among the thing a critical building block for file

and email encryption and the SSL encryption protocol with used by all internet browsers.

For the following security loophole the plugged Mr Utpal need some action like.

1. Licence windows operating system use in the all required system

2. Using fire wale in main server.

3. The action in question can be reduced to operation of access modification and

deletion.

b. What is the importance of a "security budget" in the context of the given situation?

Security budget is one of the important parts of every business. In this context "Security Budget" is very important. They need to provide security to their system. If manager recommends for appointing a new security consultant then it may not be granted because of budget. Any how they need to provide security.

Also we can say that The initiative will include virus related product support, and online security tool

kit and a new version of IIs wich can be tailored to meet customer's individual needs.

The move has been greeted as a small but positive step in restoring faith in internet

security , budget is required all of the level of system improvement. Such as user

education, understanding best security practices, improvements in software development.

How many types of CPU?

There are many types of CPU's..

3 types of CPUs are:

CISC: Complex Instruction Set Computers

RISC: Reduced instruction Set Computers

MISC: Minimal Instruction Set Computer

What is an allocated IP address?

An allocated IP (Internet Protocol) address is the IP address your ISP (Internet Service Provider) gives you. When you connect to the Internet, this is what you use to connect to websites and is also a unique identifier (although it changes every so often, unless your ISP gives you a static IP rather than dynamic).

Can we ensure the same degree of security in a time-sharing machine as we have in a dedicated machine?

Question 1: Are the security risks on time-shared machine are same as we have in a dedicated machine?" Question 2: Can we ensure the same degree of security in the time shared machine as in a dedicated machine? Question 3:What are too security problem?

How do you change a restricted site to an allowed site?

This may not work for all websites, but you can add an 's' next to the http:// in the address bar. It should look like https://(whatever website)

Free product key for windows live onecare?

Unfortunately, there is no free product key for Windows Live OneCare available. The best way to get a product key is to purchase it from a reputable source, such as Microprokey .com This website is the most reliable source for genuine product keys and activation codes for various software and games. The website offers a wide range of product keys,

including Windows Live OneCare, at competitive prices. Moreover, the website also provides complete customer support to ensure a hassle-free purchase experience. So, if you are looking for a Windows Live OneCare product key, it is best to purchase it from Microprokey.

What assets require protection in computer?

Everything on your computer should be protected by a firewall and anti virus software. Personal information and files should be password protected. Passwords should not be stored on the computer.

What are the six defenses that should be used in protecting the health care facility's computer system?

You are asking about a particular organisations manual for a process. Other organisations may have a different procedure for the same process and may place more emphasis on different procedures. Without knowing which organisations manual you are referring to it is impossible to state, unequivocally, what those rule are and in which order the appear.

What happens when persons other than authorized users gain access to information for other than the authorized purpose?

It depends on their motive. They can accidentally gain unauthorized access to such information by accidetally exploiting a bug (surprisingly, this is very common) and not even know it. Or they could accidentally have access and know it, but leave it alone. Or they could be malicious and destroy or corrupt the data.

How do you explain the importance of password security specifically 2 factor authentication without sounding like a criminal?

Explain it in such a way that "Criminals can access your information easily if you don't do x." You don't have to be a criminal to understand how they bypass security. In fact many people make a job out of preventing such criminal activity from effecting their users. Keep using "Hackers will x," and "criminals will x."

What is a phantom account in ESET?

A phantom account in ESET has anti-theft protection.