answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Is it easy for people to steal someone else's passwords?

The ease or difficulty depends almost entirely on two factors: (1) the ease with which the server containing the relevant passwords can be hacked, i.e. if you want Jane's Amazon password, this metric would concern the difficulty of hacking into Amazon, and (2) the ease with which the individual computer where the password is used can be breached, i.e. access to Jane's computer. The third most important factor, but it is distant, is the simplicity of the password. Passwords like bu6iFL5apgt70pXa are much harder to crack than 123456.

However, hacking is a crime in almost every country and should not be performed. This answer is only to demonstrate the ease or difficulty of performing such an activity.

Which hash algorithm is a 160 bit hash value?

Some well-known hash algorithms with a 160-bit output:

  • RIPEMMD-160
  • SHA-0/SHA-1
  • Tiger-160

How do you think computers will be used in school in the future?

Educational software will continue to improve to the point where artificial personalities deliver lectures and instruction tailored to each student's personal needs. The computers themselves will be flexible touch screens one can roll up and store in a pocket, and clean by rinsing with warm water. They will come with cameras equipped with magnifying lenses for identifying objects and minerals, and giving students close up views. They will also be able to patch in to orbiting telescopes to provide real time views of the planetary surface for maps, as well as celestial objects.

Imagine classrooms without walls. School will occur on the subway, park benches, lawns, up in a tree, while mountain climbing, or anywhere the student happens to be and can spend time interacting with the "magic scroll." Tests and coursework will be designed to incorporate the student's immediate environment. Virtually anything and everything can be used to create an educational atmosphere. The beauty of computers is that they never get bored, and can conduct math drills until they detect signs of weariness in the pupil.

Imagine each student progressing at his or her own pace, unencumbered by the knowledge limits of the professor or needs of other students. You want to learn about Galois Groups--the information is readily available, and presented at a level suitable for the individual student at that time. Real world examples will be presented, and the software can design suitable test questions on the fly.

Currently the man/machine interface consists of awkward input devices like keyboards, mice, touch screens and microphones for voice recognition. Further into the future computers will be implanted and accessible by thought. The human/computer interface may involve artificial symbiotes--organisms designed to assist the human/machine connection. Education by then will not consist of rote memorization of information, but methods for compiling, accessing and using databases. Imagine a world where you can communicate with anyone, anywhere, at any time--and not only that but view the world through their eyes, hear what they hear, smell, feel and experience the world just as they do. All experiences can be readily shared. Problems will be solved by crowd sourcing. Instead of just one or two collaborators endeavoring to solve some particular problem in physics, tens of thousands or hundreds of thousands of people may weigh in, each offering their own unique ideas and suggestions. We expect the rate of technological progress to increase significantly under these circumstances.

Lack of security and its effects to economy?

Privacy activity increase because lack of security and make economy of a country easily being hack

Which single factor can make or break a security plan?

There is no single factor. Every good security plan has layers of protection. If you try and rely on just one level of protection the plan will fail. As a quick example, your plan might be to protect a high value computer system from unauthorized access. It would NOT be sufficient to just password protect the system. You would have to address physical security, remote access paths, backup power, access controls and procedures and many other less obvious factors.

Which law is broken by hackers?

There are state and Federal laws that apply to hacking. The prevalent Federal law is 18 U.S.C. 1030. Fraud and Related Activity in Connection with Computers. It's too long to post here, but you can find it on the Department of Justice website at http://www.usdoj.gov/criminal/cybercrime/1030_new.html

Justin Petersen

What is the EOP?

Executive Office of the President

Engine Oil pressure sensor

Emergency Operating Plan

Educational Opportunity Program

Exchange Online Protection

the Executive Office of the President (EOP) was created in 1939 by President Franklin D. Roosevelt. The EOP has responsibility for tasks ranging from communicating the President's message to the American people to promoting our trade interests abroad.

How do passwords and usernames work and how are they encrypted?

A username is an account set up by a computer administrator. An administrator has full access of the data stored and can do such things as add or remove software. A username is good because it allows multiple people to use the same computer but at the same time restricting access if desired. Passwords are group of characters that are encrypted to prevent or slow down access to unwanted users. Most PC user do not have the software like ophcrack to hack and obtain passwords.

What are the measures for preventing a social engineering attack on your computer?

AVG anti-viruses is a very good program that protects you from hackers and viruses. Also zonealarm is very a good program it is a firewall and a anti-viruses program.

In terms of software development the answer is more complex. A large number software security issues can be mitigated by performing proper input validation.

What is the HTML code for enter?

Use <br /> for a new line. Use <p></p> for a new paragraph.

or if you want to link to a website or another page you put

<html>

<body>

<a href="the page or site you want to link">button text here</a>

</body>

</html>

Which language is predecessor to C programming language?

hi everyone..

predecessor to C is B..

don think it's a joke..

in UNIX OS , the assembly code was machine dependent..

so,the version could not be portable..

so Ken Thompson rewrite the whole UNIX code in the new language called B..

But B missed several necessary aspects for real life programming..

so, Ritchie invented the new language called C which solved the inadequacies of B..

that's all...

be happy.. be cool..

What is the role of encryption in data transfer?

putting a password on a file, or coding the data so to anyone able to open it is unable to read it unless they decode it. usually decoding is very hard and almost impossible for those who dont posess the decode thing usually sent to the other guy who is receiving the document.

What are the advantages and disadvantages of steganography?

The obvious advantage of steganography is that you can hide a secret message in another message, be it text, image, audio, or whatever media you decide to hide your secret in. The main problem with this is that either you or the person you're sending the "secret" message to need to be able to find the message. And if you can find it, then the bad guys you want to keep the message a secret from can find it, too.

At least four differences between command line interface and graphical user interface?

The command line interface is just a type of GUI (Graphical User Interface) ie. windows 2000, xp, vista, 7. They all look different because of the different GUIs.

CLI(Command Line Interface) is more advanced, beginner users may struggle to use a CLI

GUI(Graphical User Interface) is more user friendly with graphics allowing mouse clicks etc.

CLI uses less computer resources due to being a simple command line so has its advantages over GUI.

GUI hogs more computer resources due to graphics etc.

CLI can be used to do more advanced commands and do alot of very technical processes.

GUI is very secure and offers users the things they need in plain site, point and click.

Where can I get CompTIA SY0-401 Dumps for free?

Here are some lesser-known study materials and resources that can help you pass the Security+ exam:

• Eaxms4sure: Eaxms4sure offers a wide range of free online resources, including videos, study groups, and study notes.

• Cybrary Security+ Course: Cybrary offers a free online Security+ course, including over 16 hours of video content and practice quizzes.

• Security+ Flashcards: Flashcards are an effective study tool for memorizing exam objectives and concepts. There are various Security+ flashcards available for purchase or download.

1 KB equals how many MB?

1KB (kilobyte is smaller than 1MB (megabyte)

1MB = 1024KB

so

1KB = 0.0009765625 MB

Hope that helps

Cheers

How can you encrypt your computer system safely at no cost?

It looks like you could try TrueCrypt, which some people suggest.

I've stumbled across some others, but I don't know how good they are.

Their names are:

Comodo Disk Encryption

Dekart Private Disk Light

DiskCryptor

FreeOTFE

CompuSec

Has there been a lot of coumper hacking?

All I can tell you is that the issue is fraught with hype. A lot of people make a lot of money by making out that computer hacking ('cracking') is a bigger problem than it really is.

'hacking' and 'cracking' are two different things. Technically it would be impossible to be arrested for 'hacking' because hacking is completely legal. 'Cracking' is illegal.

What is Auto-archive?

AutoArchive is a feature in Outlook that moves old mail and other items to a separate personal folder file on your computer's hard drive, a workgroup or on a server. By default, Outlook will prompt you before archiving items every 14 days and delete expired email messages from your mailbox.

Which functionality is NOT provided by security templates in Windows operating systems?

Type your answer here... Create new security parameters

Answer Explanation: Security templates do not provide new security functionality. Instead, they simplify administration by enabling centralized access and distribution for existing security features.

Why won't ksensors display hddtemp information running as daemon either in user or root mode?

ksensors does not need hddtemp to run as deamon set suid root on hddtemp (debian: dpkg-reconfigure hddtemp) and run ksensors as a normal user.

How do you get past system error 5?

Ok, so let's start from the beginning. System Error 5 occurs when an unauthorized user tries to do something in command prompt that's gonna effect your computer. For example, if I were a standard user on Windows and tried to do "net user", my access would be denied. Here is what it would look like...

C:/User/Owner>net user Nathan *

Type in a new password for the user:

Retype the password to confirm:

System Error 5 has occured

Access is denied.

This would be because I wouldn't be an Administrator, thus unauthorized. There is no way to get around it in my research, your only hope is to become and administrator or get the rights to run it as an administrator.

You can do more research if you want to learn how to make yourself an administrator.