answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do you block unauthorized pen drive access to your computer limit pen drive activity and make it so your pen drive is only accessible on your computer when there is no networking and LAN?

To revert and re-enable the drive access for removable USB mass storage device driver, change back the value data for Start to its original default of 3.

The change will take effect immediately to block any USB mass storage device such as USB flash drive, USB key and portable harddisk from been used in the system, while still allowing hardware components to work properly via USB connection. The hack works in most Windows operating system such as Windows Vista, XP, Windows Server 2008, 2003 and 2000.

For user who dare not to modify the registry manually, simply download the following registration entries file to enable or disable the USB drive. Extract the downloaded content in .ZIP format, and then double click on the .REG file to open and apply or merge the registry values to system.

Download DisableUSBDrive.reg

Download EnableUSBDrive.reg

IntelliAdmin also has a free tool named USB Drive Disabler that automatically change the registry key value accordingly to enable or disable the USB drives on Windows 2000, 2003, 2008, XP and Vista system with just one click. In Windows Vista, the program has to be run as administrator.

Select Disable USB Drives or Enable USB Drivers and then click on Apply to set the registry setting accordingly.

Is the public key more secure than private key?

The questions is not really which key is more secure - rather it is a question of "can you determine the private key if you know the public key?"

Public and private keys are associated with asymmetric cryptography. They are generated as a pair. The security comes from the difficulty in determining the private key if you already know the public key and have some cyphertext that the private key has been applied to or encrypting text with the public key and determining what key would be required to decrypt it. Since each key can be used to decrypt cyphertext encrypted with the other key using the same algorithm, there is not inherent reason to think that one key is more secure than the other. In reality, one of the keys will be numerically a better starting point than the other when it comes to executing an attack on the encryption and deriving the other key. In practical terms, however, an attacker is always trying to start with the public key and discover the private key, without which messages encrypted with the public key cannot be decrypted (or without which the attacker cannot impersonate the holder of the private key).

What is the New Microsoft Certification?

In 2007 upon the release of Windows Sever 2008, Windows Vista, and numerous enterprise server products; Microsoft retooled their certification program. I believe your question is referring to what certifications replaced MCSA\MCSE. The MCSA certification was replaced by MCTS and the MCSE certification was replaced by MCITP. However, keep in mind that these are not direct translations of the previous certifications; and you will now have to select from a specialization in each, that require completely different tests. Microsoft did this in an effort to give HR representatives a better feel for selecting technicians geared to the type of work they are needed for. MCSA, MCSE, MCDST, along with a few others have "upgrade" examinations allowed to move to the new certifications.

From Microsoft.com:

Q. Does MCSA equate to MCITP: Server Administrator and does MCSE equate to MCITP: Enterprise Administrator?

A. No, not exactly. The MCITP on Windows Server 2008 certification requires a new skill set-in some cases, a more robust one-that differs from the skill set needed for MCSA and MCSE certifications.

MCITP: Server Administrator certification covers more operations-related job skills than the MCSA certification.

MCITP: Enterprise Administrator maps to an actual job role profile, whereas the MCSE certification does not. The latter combines technology and job skills.

Q. Are the MCTS and MCITP certifications replacing the MCSA and MCSE certifications?

A. No. The MCSA and MCSE certifications are not being replaced. There is no change to the Microsoft Windows 2000 Server and Windows Server 2003 tracks and certifications. The MCTS and MCITP certifications are for Windows Server 2008.

How do you use HTML to create a login screen?

If you want specific pages to require a login, then you can use .htaccess and .htpasswd (check related links below for more info)

If you want to make your own login, linked to a database, you'll have to use another language, like PHP. (you can find a video tutorial in the related links)

Quick heal total security 2009 crack?

To Get Quick Heal Total Security 2009 GOTO:- http://quickhealcrack2009latestworking.blogspot.com/

What is White Hat Alliance?

You might not have heard of the White Hat Alliance before. But that's just the way they tend to like it. They're an anonymous (though not Anonymous) network of hackers from around the world working together for some big name clients to find the flaws in their digital security. They claim to have worked with companies from Exxon Mobil through to JPMorgan Chase, and via Macy's, practicing ethical hacking techniques to help these organizations protect themselves from the less ethical hackers that are out there.

They've been around since 2011, though have kept themselves pretty secret - except to their clients. Until now their Twitter feed (@thewhitehatteam) was pretty much their only public facing system. They've now launched a website, <thewhitehatalliance.com>and seem to be happy to announce their existence to the world - and for the first time one of their members has publicly announced his identity.

Robin Haynes, also referred to by his code alias 'Black Mamba', this week publicly declared his involvement with WHA. The young hacker is part of the UK team that works with WHA's UK clients, and is known as a bit of a whizz kid. He built a bit of a reputation for himself through some early, but benign, hacks, proving his abilities by finding flaws in the security of a few major banks as part of a WHA team. He's a strictly ethical hacker, which is likely a big part of his willingness to disclose his identity, since he's never hacked with any malicious intent.

WHA started pretty big, landing Wells Fargo as their first client, along with a few other banks, and helping to prevent password attacks as well as a major bot attack. Suddenly they had the attention of some pretty big corporations. They've gone from stride to stride since then, attracting bigger clients, all while keeping their profile low.

It's now reported that the network has grown to more than 60 hackers from across the globe, with 800,000 computer bots between them. They tend to recruit exclusively based on referrals and recommendations by existing members, but even that hasn't stopped them from opening up to each other, as many members preserve their anonymity even with each other. For the first time they now have publicly available contact details on their website, seemingly reversing their previous system, which was to only ever approach clients directly themselves, rather than giving clients the opportunity to find them.

What is it - rundll32 exe application error What is the reason of rundll errors?

It can be file or registry corrupt - you can fix it with Rundll Error Fix Wizard - this one helped me (google it).It can also be a virus - if so scan your PC with antivirus with latest updates.

How can you find about that your computer is secure?

There is no way to say that a given computer system is 'secure'. The only things one can do are to run various tests to verify that the common, known problems of a given operating system have been patched or fixed on the system you are examining. Security is an ongoing task, so if a system is given a 'clean' bill of health one minute it may be vulnerable to a different (possibly at the time unknown) problem at a later date.

There are many security packages one could use to do the initial testing, but considering that security changes from moment to moment there is no clear method of saying you are 'secure', other than at that particular moment in time.

How do you prevent files from being copied?

If you want to protect files on computer from being copied, you can use Kakasoft Shared Folder Protector. This program allows you to configure other users' permissions to the protected folder, only admin of the folder has full control. For example, you can use it to set a User 1 group and then prohibit copy, modify, and delete permissions to this group, and set this group as default logon account; after this configuration, all users who don't know admin password of this folder can access the folder but can't copy, modify or delete content in it.

If you want to protect files in USB flash drive, you can try another program called USB Copy Protection.

How can you be protected from being hacked?

Use a good suite of computer security programs (firewall, antivirus, etc) and update them regularly.

Use separate strong passwords for each site you enter.

Practice safe computing

Back up your files - just in case.

What is scan engine?

It is part of your anti virus and may use the internet to scan your computer for malicious files and/or spyware. Scans can also show files that seem suspicious to the anti-virus!

What is a key lock switch?

One meaning of "key lock switch" is a switch that requires a physical key to turn. Many computers come with such switches installed. They cannot be turned on or turned off except by persons who have the key.

Another meaning is switch that can enable or block traffic from a keyboard. When the switch is thrown, the keyboard becomes inert. In some cases it can be set up like a screen-lock, where a password must be inserted or a physical key inserted in order to enable the keyboard.

W a n?

Your question is completely unintelligible, break your question into specifics and be clear about what you are asking.

What is the difference between Nessus and Metasploit?

Put simply, Nessus identifies potential vulnerabilities, whereas Metasploit exploits the vulnerability. Metasploit is basically a list of exploits you can use against a target, Nessus tells you which one you should pick a bit like asking a shop assistant what would work best to hack the said computer, the shop assistant (Nessus), will say: "Yes of course sir, I think you will want this." as he points to an item on the shelf (Metasploit).

What difference does it make if you remove a period in a hash?

It makes a big difference because if you compared the hash:

abcde.fg = hash 1

to

abcdefg = hash 3

The results hash 1 and hash 3 are not equal.

What is a computer use policy?

A set of rules and regulations that the user agrees to abide by whilst using that computer.

How many bits does it take to represent the number 457?

When you convert this decimal number to the binary format, we have 111001001 that has 9 digits so 9bits is required to represent it in normal case. To convert decimals to binary visit http://acc6.its.brooklyn.cuny.edu/~gurwitz/core5/nav2tool.html