answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What type of security was dominant in the early years of computing?

During these early years, information security was a straightforward process composed predominantly of physical security and simple document clasification schemes.

What is cleartext?

A term used to describe any data that is not encrypted. For example, telnet transfers network data as cleartext data, meaning if the network was being sniffed, a username and password could easily be obtained. Users concerned about their security should never store or transfer their data as clear text. This text you're reading is considered cleartext.

What is cleartext in Linux?

A term used to describe any data that is not encrypted.

What is use of cybersitter?

a cibersitter is bad its kind of like a cookie its not very bad but you should get rid of it.

Is beatrice okay to use for your password?

"beatrice" would probably be a lousy and easily cracked password. It is too short, and since it is a reasonably common name, it would probably be contained in any decent dictionary used for a dictionary attack.

How can someone steal my password when not on my computer?

There are a multitude of ways someone can gain access to someone's password without physical access to the computer:

  • Through a keylogger or some form of spyware
  • Through a spoofed login page to a website (phishing)
  • Through the compromise of a website that does not store account information securely (many pieces of software like web forums may store passwords in plaintext)

Where is the uninstall shield?

Removing 1 Click Spam Shield thru Add/Remove Programs on Control Panel is the most common way used by many computer users. Generally, you can take the following steps:

1. Exit all the programs open.

2. Click Start, and click Control Panel tab.

3. Find out Add/Remove Programs applet in Windows XP or Windows 2000, and then Click Uninstall a Program in Windows Vista.

4. Click the Change or Remove Programs button on the top of the left list.

5. Scroll down the list and highlight 1 Click Spam Shield, then click Remove to uninstall 1 Click Spam Shield in Windows XP or Windows 2000; Click Uninstall in Windows Vista.

6. Click Yes when prompts to reboot the computer.

Good luck!

What are two examples of computer cracking?

Example One: A Hacker getting your computer's password by use of a brute-force attack.

Example Two: A Hacking gaining access to a database by cracking the encrypted password.

How kernel ensures security of computer systems?

The kernel ensures the security of computer systems by implementing a strict access control mechanism, managing permissions for user processes and system resources. It isolates processes through memory protection, preventing unauthorized access and modifications between them. Additionally, the kernel enforces security policies and can utilize features like user authentication, encryption, and secure inter-process communication to safeguard data integrity and confidentiality. By operating at a privileged level, the kernel serves as a critical barrier against malicious activities and vulnerabilities.

Problems of computer security in an unsafe environment?

In an unsafe environment, computer security faces significant challenges such as increased vulnerability to cyberattacks, data breaches, and unauthorized access. Poor physical security can lead to theft or tampering with hardware, while weak network defenses may expose sensitive information to malicious actors. Additionally, the lack of security protocols can result in inadequate employee training, leading to human errors that compromise systems. Overall, these factors create a precarious landscape for maintaining the integrity and confidentiality of digital assets.

What are the problem of using biometrics door lock system?

1. It takes time for one person to enter the door with a biometric reader. Fingerprint account is usually combined with a users card, and iris recognition also takes time, so the main question is, how many people use that door per minute.

2. Fingerprint is recognized by the number of matching minutiae (http://en.wikipedia.org/wiki/Fingerprint_recognition), and the result of each reading is a certain number, that varies as a result of temperature, humidity, user behavior, etc.
You got to find a fine compromise between having a secure scanner, and not making a queue at the door.


If the access system is too tough on users, they will seek a way to bend the rules, by leaving the door open, or giving pass for more people at the same time.

Dr Watson program used for?

Dr. Watson was a machine debugger for Windows. When an application crashed, Dr. Watson could be forwarded the dead application so it could perform a virtual autopsy and figure out why the program failed.

How can installation of firewall give an organization a false sense of security?

Firewalls can be one of the most effective forms of computer security. In order to do this, they need to be configured properly, by someone with intimate knowledge both of the network and of computer security in general. Too many large organizations will buy a firewall, have it installed, and leave it at that. They feel that just because the firewall is "out there" that they will be safe.

Why are hacking websites illegal?

Generally hacking websites are illegal because they involve sharing information on how to perform illegal actions or share information that was gained illegally.

Can you use 3 user kaspersky internet security on one computer only?

No, it's called "3 User", because you can install it on 3 different PCs, for a total of 3 users. The user part is not referring to different user accounts on your PC.

What is cipher in cryptography?

Encryption and decryption algorithms are called ciphers in cryptography

What are some examples of bad passwords?

password

god

your username

the name of one of your pets

the name of one of your kids

the name of your significant other

the current month

your birthday

any word that can be found in a dictionary

What happens in symmetric encryption?

A key is used to encipher something. The same key can be used to decipher it.