answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do to recover stored password in computer?

Method one: Log into an alternate account

Often many users will leave the administrator account alone and/or have other accounts with administrator rights. If you're not logging into the computer as administrator or have other accounts follow the below steps to reset your other accounts password.

1 Reboot the computer into Safe Mode. Additional information about getting into Safe

2 When logging into Safe Mode you should be prompted with an option to what account you wish to use. Select the Administrator account. If prompted for a password try simply pressing Enter on the keyboard for no password. If this does not work, try other passwords you may have used. If you're unable to log into the Administrator account skip to the next suggestion.

3 Once you've logged into the Administrator account open Control Panel and User Accounts.

4 In User Accounts select the account you wish to change the password for, click change password and then enter the new password or click remove the password to remove the password from the account.

Method Two: Using the forgotten password diskette

If you have forgotten your Windows XP password, however have created a forgotten password diskette earlier to use the diskette follow the below steps.

1 At the Windows XP login prompt when the password is entered incorrectly click the reset button in the login failed window.

2 Insert the password reset diskette into the computer and click Next.

3 If the correct diskette Windows XP will open a window prompting for the new password you wish to use.

Method Three: LOGON.SCR password reset trick

LOGON.SCR changing administrator or domain admin password hack works on Windows NT 4.0 and some versions of Windows 2000. The simple trick uses Cmd.exe as screen saver that triggered by system when idle, allowing users to access to command prompt to change password.

Method Four: Use a third party software that is designed to recover a password automatically. The programs that are used for password recovery can be free or one you purchase.

What is piggybacking in computer security?

ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP

How do you bypass the password on a personal computer?

Do you have a password hint or a password reset disk to make the process easy?

If you don't, you will need to try and crack the password. Check the related links for some tools to help you.

Disadvantage with layered approach to protocol?

The processing and data overhead. There is processing overhaed because there are many as seven layers or modules invoked to move data from the application through the communications software. There is data overhead because of the appending of multiple headers of the data. Another disadvantage is that there must be at least one protocol standard per layer.

What does a cyber security employee do?

Cyber Security Engineers help businesses by protecting their computer and networking systems from potential hackers and cyber-attacks. They safeguard sensitive data of a business from hackers and cyber-criminals who often create new ways to infiltrate sensitive databases.

What is an example of a software suite?

go to this website:

http://www.jhigh.co.uk/ComputingSG/GPPs/IntegratedPkgs/IntegratedPkgs_Exmple.html

Can a WiFi connection be accessed without configuring a wireless modem?

Yes, it can. Usually default settings include configured DHCP server, no security, no mac filtering, broadcast SSID is on. In another words, it's configured in a way it's very easy to establish connection with it.

Why should measures of capacity matter to computer users?

I m also looking for its answer. i m doing MBA and this question is in Using Information Technology Edition 7. Chapter 4.

Who created avg?

AVG antivirus was invented by Grisoft

What is the use of having physical security system?

Because an advanced firewall and world class virus checking software doesn't help if someone can just walk into the office, sit down by a computer and do all the stuff the remote attacks or viruses tried and failed to.

Or in a context where a company is concerned about secret data: Stealing a laptop from an employee might work just as well as breaking in over the network. Plus if the employee has a VPN connection and has the password stored in the laptop, cracking the laptop would give you the network for free.

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards

How do i reset my user id and password?

go to administrator and set password| If you want to reset the Windows passwords I suggest you to use this password reset tool

http://www.resetwindowspassword.net

Advantages and disadvantages of ethical hacking?

The disadvantage of computer hacking is that very confidential information can fall in the hands of the hackers who can use it maliciously. The advantage of computer hacking is that it can be used to recover lost information.

What are some examples of good passwords?

Something that you can easily remember that other people will not be able to guess easily. Alternatively, you can create a random jumble of letters and numbers and write it down. The advantage of the first method is that there's no paper for people rummaging around in your stuff to find, and the advantage of the second method is that it would be incredibly hard to guess without it (which would make remote access much harder)

Good paswords also consist of capital letters and numbers as well. Say you want to use the name of one of your schools for a password, you can add the (first, last, whatever) year that you were there to make it more secure.

Try not to forget it i know that's has already been said but it is really not a good idea to forget your password cos then you cannot get into whatever it is that the password is for.

You want to uninstall the deep freeze without knowing password?

Unfreeze your system by holding SHIFT and DOUBLE CLICKING the deep freeze icon in your system tray, then entering your password and choosing the unfreeze option. After rebooting, run the installer you used to install deep freeze and choose the uninstall button.

Your machine will reboot, and Deep Freeze will be uninstalled.

Deep Freeze is installed on my computer. I would like to uninstall it. How is this done?

Disable Deep Freeze before uninstalling it.

To disable Deep Freeze:

  1. Hold down the shift key and double-click the Deep Freeze icon. Alternatively, you can press CTRL+ALT+SHIFT+F6.
  2. Enter your password and click OK.
  3. If you have not yet entered a password you should be able to click OK without entering a password.
  4. The Boot Options dialog is displayed. Select "Boot Thawed" and click OK. This will disable Deep Freeze on the next reboot.
  5. Reboot your computer. After the computer reboots, you are ready to uninstall Deep Freeze.

To uninstall:

  1. Locate the installation file you used to install Deep Freeze on your computer. By default, the name of this file is called "DF5Std.exe" for versions 5.X and "DF6Std.exe" for versions 6.X.
  2. Run the installation file (DF5Std.exe or DF6Std.exe).
  3. Select the option to "Uninstall"

Deep Freeze is uninstalled and your computer is rebooted.

If this has not resolved your Issue, you may check some inks to Other Information:

  • http://www.out-of-warranty.com/how-to-uninstall-faronics-deep-freeze-in-three-different-ways/

What is oasis2service1.0?

Oasis2Service appears to be installed by Sony with its Vaio messenger program. It apparently allows Sony to send you hints and tips on using your laptop. When I uninstalled the program, the Oasis2Service was removed as well.

Here is the description of the program and a link to Sonys site on it.

VAIO Messenger is a software utility that provides hints and tips about using your VAIO® computer. It also offers optional accessories that are compatible with your computer and available for purchase.

VAIO Messenger can be uninstalled through the operating system and can only be reinstalled by performing a C: Drive recovery or a full system recovery.

What security loopholes come to the fore in the situation described.how can these be plugged?

a) What security loopholes come to the fore in the situation described? How can these be pluggewas found that out of the 364 desktops at the corporate office; more than half did not have their antivirus software updated with recent virus signature files. Three - fourths had not changed the default e-mail password (it was the user name) and no one had installed OS patches. And one of its local mail servers seemed to be an open relay! For a fleeting moment, system manager of SystemX wondered about the situation at the seven branch offices across the country.

SystemX used the Net extensively in dealing with its branches, customers and suppliers. Information like contract documents, marketing plans, Cheque and Draft numbers, bank account details and collection details were regularly transmitted by e-mail. These loopholes come into our mind.

These loopholes can be plugged, if they update their antivirus which is virus signature files free. Because they use e-mail, and Net extensively so they need strong security measure in order to secure their system.

In short we can say;-

Security loopholes in the random number generator of windows which is fond

In research. This is a program which is among the thing a critical building block for file

and email encryption and the SSL encryption protocol with used by all internet browsers.

For the following security loophole the plugged Mr Utpal need some action like.

1. Licence windows operating system use in the all required system

2. Using fire wale in main server.

3. The action in question can be reduced to operation of access modification and

deletion.

b. What is the importance of a "security budget" in the context of the given situation?

Security budget is one of the important parts of every business. In this context "Security Budget" is very important. They need to provide security to their system. If manager recommends for appointing a new security consultant then it may not be granted because of budget. Any how they need to provide security.

Also we can say that The initiative will include virus related product support, and online security tool

kit and a new version of IIs wich can be tailored to meet customer's individual needs.

The move has been greeted as a small but positive step in restoring faith in internet

security , budget is required all of the level of system improvement. Such as user

education, understanding best security practices, improvements in software development.

How many types of CPU?

There are many types of CPU's..

3 types of CPUs are:

CISC: Complex Instruction Set Computers

RISC: Reduced instruction Set Computers

MISC: Minimal Instruction Set Computer

What is an allocated IP address?

An allocated IP (Internet Protocol) address is the IP address your ISP (Internet Service Provider) gives you. When you connect to the Internet, this is what you use to connect to websites and is also a unique identifier (although it changes every so often, unless your ISP gives you a static IP rather than dynamic).

Can we ensure the same degree of security in a time-sharing machine as we have in a dedicated machine?

Question 1: Are the security risks on time-shared machine are same as we have in a dedicated machine?" Question 2: Can we ensure the same degree of security in the time shared machine as in a dedicated machine? Question 3:What are too security problem?

How do you change a restricted site to an allowed site?

This may not work for all websites, but you can add an 's' next to the http:// in the address bar. It should look like https://(whatever website)

Free product key for windows live onecare?

Unfortunately, there is no free product key for Windows Live OneCare available. The best way to get a product key is to purchase it from a reputable source, such as Microprokey .com This website is the most reliable source for genuine product keys and activation codes for various software and games. The website offers a wide range of product keys,

including Windows Live OneCare, at competitive prices. Moreover, the website also provides complete customer support to ensure a hassle-free purchase experience. So, if you are looking for a Windows Live OneCare product key, it is best to purchase it from Microprokey.

Trending Questions
What does it mean that address line must be between 8 and 30 chars? Why do cryptologists recommend changing the encryption key from time to time? What are some examples of technology-specific security policies. What types of technology is being controlled? How can you stop the threats on your computers? What is KOV-26 Talon? What firewall keeps track of the state of the state of network connections traveling through the firewall? Are ogg files viruses why do they constantly multiply and how do you delete it. every time the files get deleted they just keep coming back. PLEASE HELP? What assets require protection in computer? How much personal info is on your computer? Closing of a port by blocking? List different ways that this program can be sabotaged so that during execution it computes a different sum such as 3 to 20? Is the public key more secure than private key? How does the rogue system sensor find rogue machines on the network? At least four differences between command line interface and graphical user interface? 10 bytes of data are stored memory location 8085 Transfer the entire block of data to new memory location 8070? Is bit slicer safe to download? How can you stop lanschool? Can a subscriber share his private signing key with? What protocols operates in the network osi layer and is able to communicate with the transport osi layer and the data link layer? What component of UEFI helps to prevent malware from hijacking a system during or before the operating system load?