answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How the use of computer networks can improve communication for the individual?

My caterpillar kidnapped the man who had murdered Mr. Carrot who (believe it or not) was going to be the caterpillars tea so the caterpillar cried so much that his tears drowned the monkey so the gorilla squashed the caterpillar.

P.S. I'm flying evil rainbow firebreathing pineapples

What are disadvantages of using a star topology?

If the server dies, the computers get unseen for each other. It isn't a good idea in every situation to leave the whole network to only 1 computer, because if it ets an error, your network is dead.

Hacking is it a crime?

That depends on what you hacked and what way you hacked it. Did you know it's actually illegal to add/remove a user account on a computer that's not yours, if you on a limited account. In a court of law, this is considered hacking.

In Ireland there was a case a while back in which a person ended up in court for the above reason being tried as a computer hacker.

Yet about 3 months later somebody happened to stumble upon a flaw in a prominent politicions website, he published his findings, got caught, and was told "he was nothing more than a router with too much time on his hands who got lucky" and this particular man had studied IT in one of the best colleges in the country.

How do you protect against a power surge?

The easiest way is to use an UPS. It's a device that provides voltage during a limited period of time. If you are more than a real company their are other solutions like a generated but keep in mind that this cost you a lot of $.

In a multiprogramming and time-sharing environment several users share the system simultaneously This situation can result in various security problems?

Two possible security problems could be: copying another user's data; using system resources (CPU, memory, disk space) without proper accounting.

How does data encryption help keep data secure?

When data is stored or sent, it can be sent as it is, when over a network this would be packets.

But when data is encrypted, its simply like saying, if i sent you an email that says

Hi, How are you

H = 103343

i = 408300

, = 985742

The numbers are sent not the letters so the computer on the other end, Decrypts this data for your display.

How many people hack?

Well, Many people consider hackers to be crazy people who really try and spend all their time "hacking" people, but really hacking isn't as easy as many people think it is, this question is hard to answer but it would actually be a lot less than many would think.

How do to recover stored password in computer?

Method one: Log into an alternate account

Often many users will leave the administrator account alone and/or have other accounts with administrator rights. If you're not logging into the computer as administrator or have other accounts follow the below steps to reset your other accounts password.

1 Reboot the computer into Safe Mode. Additional information about getting into Safe

2 When logging into Safe Mode you should be prompted with an option to what account you wish to use. Select the Administrator account. If prompted for a password try simply pressing Enter on the keyboard for no password. If this does not work, try other passwords you may have used. If you're unable to log into the Administrator account skip to the next suggestion.

3 Once you've logged into the Administrator account open Control Panel and User Accounts.

4 In User Accounts select the account you wish to change the password for, click change password and then enter the new password or click remove the password to remove the password from the account.

Method Two: Using the forgotten password diskette

If you have forgotten your Windows XP password, however have created a forgotten password diskette earlier to use the diskette follow the below steps.

1 At the Windows XP login prompt when the password is entered incorrectly click the reset button in the login failed window.

2 Insert the password reset diskette into the computer and click Next.

3 If the correct diskette Windows XP will open a window prompting for the new password you wish to use.

Method Three: LOGON.SCR password reset trick

LOGON.SCR changing administrator or domain admin password hack works on Windows NT 4.0 and some versions of Windows 2000. The simple trick uses Cmd.exe as screen saver that triggered by system when idle, allowing users to access to command prompt to change password.

Method Four: Use a third party software that is designed to recover a password automatically. The programs that are used for password recovery can be free or one you purchase.

What is piggybacking in computer security?

ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP

How do you bypass the password on a personal computer?

Do you have a password hint or a password reset disk to make the process easy?

If you don't, you will need to try and crack the password. Check the related links for some tools to help you.

Disadvantage with layered approach to protocol?

The processing and data overhead. There is processing overhaed because there are many as seven layers or modules invoked to move data from the application through the communications software. There is data overhead because of the appending of multiple headers of the data. Another disadvantage is that there must be at least one protocol standard per layer.

What does a cyber security employee do?

Cyber Security Engineers help businesses by protecting their computer and networking systems from potential hackers and cyber-attacks. They safeguard sensitive data of a business from hackers and cyber-criminals who often create new ways to infiltrate sensitive databases.

What is an example of a software suite?

go to this website:

http://www.jhigh.co.uk/ComputingSG/GPPs/IntegratedPkgs/IntegratedPkgs_Exmple.html

Can a WiFi connection be accessed without configuring a wireless modem?

Yes, it can. Usually default settings include configured DHCP server, no security, no mac filtering, broadcast SSID is on. In another words, it's configured in a way it's very easy to establish connection with it.

Why should measures of capacity matter to computer users?

I m also looking for its answer. i m doing MBA and this question is in Using Information Technology Edition 7. Chapter 4.

Who created avg?

AVG antivirus was invented by Grisoft

What is the use of having physical security system?

Because an advanced firewall and world class virus checking software doesn't help if someone can just walk into the office, sit down by a computer and do all the stuff the remote attacks or viruses tried and failed to.

Or in a context where a company is concerned about secret data: Stealing a laptop from an employee might work just as well as breaking in over the network. Plus if the employee has a VPN connection and has the password stored in the laptop, cracking the laptop would give you the network for free.

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards

How do i reset my user id and password?

go to administrator and set password| If you want to reset the Windows passwords I suggest you to use this password reset tool

http://www.resetwindowspassword.net

Advantages and disadvantages of ethical hacking?

The disadvantage of computer hacking is that very confidential information can fall in the hands of the hackers who can use it maliciously. The advantage of computer hacking is that it can be used to recover lost information.

What are some examples of good passwords?

Something that you can easily remember that other people will not be able to guess easily. Alternatively, you can create a random jumble of letters and numbers and write it down. The advantage of the first method is that there's no paper for people rummaging around in your stuff to find, and the advantage of the second method is that it would be incredibly hard to guess without it (which would make remote access much harder)

Good paswords also consist of capital letters and numbers as well. Say you want to use the name of one of your schools for a password, you can add the (first, last, whatever) year that you were there to make it more secure.

Try not to forget it i know that's has already been said but it is really not a good idea to forget your password cos then you cannot get into whatever it is that the password is for.

You want to uninstall the deep freeze without knowing password?

Unfreeze your system by holding SHIFT and DOUBLE CLICKING the deep freeze icon in your system tray, then entering your password and choosing the unfreeze option. After rebooting, run the installer you used to install deep freeze and choose the uninstall button.

Your machine will reboot, and Deep Freeze will be uninstalled.

Deep Freeze is installed on my computer. I would like to uninstall it. How is this done?

Disable Deep Freeze before uninstalling it.

To disable Deep Freeze:

  1. Hold down the shift key and double-click the Deep Freeze icon. Alternatively, you can press CTRL+ALT+SHIFT+F6.
  2. Enter your password and click OK.
  3. If you have not yet entered a password you should be able to click OK without entering a password.
  4. The Boot Options dialog is displayed. Select "Boot Thawed" and click OK. This will disable Deep Freeze on the next reboot.
  5. Reboot your computer. After the computer reboots, you are ready to uninstall Deep Freeze.

To uninstall:

  1. Locate the installation file you used to install Deep Freeze on your computer. By default, the name of this file is called "DF5Std.exe" for versions 5.X and "DF6Std.exe" for versions 6.X.
  2. Run the installation file (DF5Std.exe or DF6Std.exe).
  3. Select the option to "Uninstall"

Deep Freeze is uninstalled and your computer is rebooted.

If this has not resolved your Issue, you may check some inks to Other Information:

  • http://www.out-of-warranty.com/how-to-uninstall-faronics-deep-freeze-in-three-different-ways/

What is oasis2service1.0?

Oasis2Service appears to be installed by Sony with its Vaio messenger program. It apparently allows Sony to send you hints and tips on using your laptop. When I uninstalled the program, the Oasis2Service was removed as well.

Here is the description of the program and a link to Sonys site on it.

VAIO Messenger is a software utility that provides hints and tips about using your VAIO® computer. It also offers optional accessories that are compatible with your computer and available for purchase.

VAIO Messenger can be uninstalled through the operating system and can only be reinstalled by performing a C: Drive recovery or a full system recovery.