answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How does automatic updates help enchance security fo your computer?

Well when you update your computer it will secure your computer because windows has found errors. Sometimes there are back doors in Windows and Microsoft will send out updates to fill in that back door, so no one bad gets in. Just make sure your computer is up-to-date and make sure automatic updates are on. The Service Packs are packs of updates, almost like a mini operating system. Also, clean your computer for best performance.

You have security problem with your PC?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

candely.club/CIBCkob

Can you add a fingerprint reader to an HP laptop?

Simply asking hp is a very broad statement. Its not who's its by its what format it includes. What operating system it uses. This are the components that are going to decide it. In my opinion Yes you can a a fingerprint reader to an hp laptop in most cases. But I won't do it because it is very costly and sometimes people can not log in because of some accident.

How the firewall blocks the site?

A web firewall usually has a least of hundreds of bogus, and malicious URL or websites. If it comes across a website that is on the least than it will inform the PC user of the dangerous content before he or she actually visits it. Most firewalls in schools and business block sites by their content not by their name. this is how it works an administrator configures the firewall to block certain categories of websites. Some commonly blocked websites are audio and video sharing, proxy servers and ofcourse adult video. Firewalls are helpful when it comes to protecting your computer and the people who view it. But it is also sometimes bad. Firewalls sometimes block some sites like youtube, sites like this one and gaming. The best method is knowing what your needs are and how to configure the firewall to let you do this. Firewalls slow down performance a little but its worth it.

What is the meaning of 128 bit key in encryption?

In encryption, a key is the information used to encrypt the data. 128 bit means that the key is 128 bits long (a bit is a single unit, or "bit" of data, either 0 or 1). The longer the key, the more complex the encrypted data becomes. 128 bits is considered a strong key length.

Computer related operation in business?

Information systems are a network of computers linked to perform many different functions in business. Information systems connect the accounting, marketing and information technology departments.

How do you reset a password?

usualy when you go to login to a website there is something at the bottom that says forgot password? you click on that and fill out the info then they send you an email.

PowerPoint of lack of computer security and its effect on industryeconomy and government?

Powerpoint of lack of security of computer and its effect on industry,economy and government

What does e-safety mean?

E-saftey is all about being safe e.g. don't meet people who you don't know and don't see people who you don't know.

How can installation of a firewall give an organization false of sense of security?

Installation of a firewall can give a false sense of security, because many users do not understand the limitations of a firewall. Specifically, a firewall primarily defends against unsolicited incoming attacks: a hacker tries to access the internal network from the outside.

Firewalls often fail to effectively protect from threats from the inside: viruses (malware of all sorts, worms, etc), once active on the inside, may be able to spread within the network, and spawn network activity that traverses the firewall in both directions.

What industries depend on computer networking?

1. Airlines

2. Education

3. E-commerce

...

Pretty much all industries these days. Even farming is networked now.

Full from of ccna?

Cisco Certified Network Associate.

Where can you close your unInstall Shield?

Task Manager Right click application (UnInstall shield) click goto process then end.

What is the difference between CCNA and CCNA security?

The CCNA exam is the qualifying exam available to candidates pursuing a single-exam option for the Cisco Certified Network Associate CCNA certification

CCNA Security Certification meets the needs of IT professionals who are responsible for network security.

What is the best complete internet security suite that will not bog down your computer you currently have Mcaffe but your subscription is soon going to run out?

Definitely not Norton or Mcafee, If you want one that is not a computer hog and has good rock solid protection try PC Tools Internet security or AVG Internet security. They are both good and i have had no problems with either of them.

What are two important criteria that make a good password?

While in the process of making a good and strong password, one should ensure that it is easy to remember but contains both upper and lower case letters. The password should also contain numbers and special characters.

password should not be easy to guess.

password should be a combination of letters, numbers, and non-alphanumeric. password should use at least eight characters

Include numbers, symbols, upper and lowercase letters in passwords. Avoid any password based on repetition, letter, number sequences, usernames, relative or pet names.

You can also use a good password manager. There are many tools out there, take your pick. I use a free VeriSign secured tool called Billeo to manage my passwords. It safely stores my passwords and saves the hassle of writing them down.

Two Important criteria for good, secure passwords include:

  • Whenever possible, use at least 14 characters or more
  • The greater the variety of characters in your password, the better.

There are many important criteria but if I had to pick just two?

  1. Not a common use word or something associated with you. Ergo, not your birthday or your wife's name or your favorite dog. Not your social security number or Medical ID or anything some one would be able find out in surprisingly little time.
  2. Long and random. Make a mnemonic string. This helps make the password more "nasty" and also keeps you from forgetting the longer password.
For example..
  • "I took my future wife to the beach where I asked her to marry me."
Would become..
  • "1tkmyftrw1f32th3be@chf0rmaRr1@g3" Or what have you.

Some form of strings you can remember. You could also use the first letters like..

  • "itmfw2tbwiah2mm" is a rather strong password.

Is hacking legal?

It really depends on how you are using the term.

Let me start out by saying that the general public has a tendency to use the term 'hacking' to mean breaking into someone else's computer systems without permission; and in that context than:

Most acts of computer hacking are illegal.

However, not all hacking into someone's computer is illegal - sometimes, companies hire professional security testers to purposely hack into their systems to determine how safe they are. This is known as penetration testing, also called "white-hat hacking" and "ethical hacking." While such activities are technically hacking, they are not illegal because the attackers have permission.

This doesn't mean that any hacking for which permission has been granted is legal, however. If someone gives you permission to hack their system, but they do not own the system or its network resources, it can be illegal.

Now; set aside the 'hacking into someone's computer' version of hacking and realize this: Engineers (programmers) who use the term hacking are often talking about something entirely different.

Hacking originally referred to anyone that added new code to a computer program, you were 'hacking into' what was there and improving it, adding to it, evolving it. Whether you were working as part of a team and hacking on your portion of the project or rewriting your own code and hacking in new ideas; the use of the term 'hacking' originally had nothing to do with any form of illegal activity.

In this context, most computer programmers considered themselves hackers, they all hack in new code and expand on what's there, it is how code is written.

So the reality is that hacking is just the concept of adding new code to something; which in theory is how all new programs are written. The act of hacking in and of itself is therefore not illegal at all.

It is only what you apply the hack to that can become illegal. Asking if hacking is legal or illegal is a bit like asking if a crowbar or a tool is illegal. Well no, a crowbar is not illegal and there are many legal uses for a crowbar. You can pry up boards and do perfectly legal things with a crowbar all day long. The moment you pry open someones door with it and steal from them, now you have a burglars tools and the crowbar is evidence in a crime.

The same thing happens with hacking. Is hacking illegal? not really, its just the process of hacking in new code and expanding a program. Engineering and programming are not illegal. We would have no computers and nothing to do on them if there was no hacking. The moment you use your skills to hack in a piece of code that does something bad to someone else in an illegal way; now you've done something illegal with your hacking tools.

Either way, the tool itself is not what is illegal whether that tools is a crowbar or hacking. It's what you do with it that is legal or illegal.

To the general public untrained in engineering terminology, the term 'hacking' has simply been misunderstood and most people automatically jump to the conclusion that you are talking about 'hacking something without permission'; which is simply an illegal misuse of the tool.

So yes, hacking actually is legal. Just like owning a crowbar is legal. They both have very legal uses. They can also be used to commit crimes, but than most tools or skills can be abused for illegal purposes if you really stop to think about it.

How do you remove restricted access to control panel on your own computer?

Log in as the Administrator then change the conditions of your user account

How much money does and Internet security specialist make in Georgia?

The typical Base Salary for a Computer Security Specialist in Canada is C$52,292 to C$73,315.

How do you get downloader.small.13.AN off a windows 2000 machine?

You need to run these 5 essential steps to remove all the spyware on your computer.

1. Run Deckard's System Scanner (DSS)

2. Run Malwarebytes Anti-Malware

3. Run the anti spyware removal programs spybot

4 Run Superantispyware

5. Run a complete scan with free curing utility Dr.Web CureIt!

Install threat fire which will enhance your antivirus protection