answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How does a terminal server work?

A terminal server is a specialized computer which aggregates multiple communication channels together. Because these channels are bidirectional, two models emerge: Multiple entities connecting to a single resource, and a single entity connecting to multiple resources. Both of these models are widely used. Both physical and virtual resources can be provided through a terminal server: centralized computing can provide multiple users access to a remote virtual operating system. Access Providers often use terminal servers to terminate physical connections to their customers

To see the working of the terminal server visit

http://technet.microsoft.com/en-us/library/cc755399.aspx

Answer:

Terminal server as allows windows Small Business Server 2003 and windows XP to host multiple remote desktop session. Terminal service provides for application deploment in windows server 2003,windows server terminal services that client computer connect to a remote computer, remoter desktop connect from to type in run mstsc /span. windows server 2003 system family provides a client license management systme known as teminal server licesing.

Remote desktop connection by default installed in windows XP, remote desktop used to initiate a terminal services session from client side. To open remote desktop type mstsc in the runbox then enter.

Create a Terminal Services From client disk. We are creating client disk a) Click start point to programs then administartative and after that click Terminal Services client creator. b) Create installation disk in dialog box, click the version of the clients disk then ok. c) Insert the disk then ok ,you have now created a teminal services client disk.

Microsoft windows terminal services built into windows 2000 server and windows server 2003 and then windows xp remote desktop. using terminal services connect the internet will require that you open port 3389, used by the remote protocol and then check the firwall setting. and tcp connection is configured for the terminal server network to allwow users will be connect. To disable or enable the Remote desktop service on a windows xp or windows serve 2003 computer, perform the follwing steps :- 1) Click start and then contorl panal and then select the system. 2) And then click the Remote tab. 3) After that Remote desktop, unchecked the Allow users to connect remotely to this computer .

How many kinds of hacking r there like website hacking password hacking?

Cracking is the proper term for referring to performing malicious attacks. Some important categories of attacks are access, modification and denial of service attacks. Each of these attacks can be carried out in an infinite number of ways and apply to all systems. These types of attacks threaten confidentiality, integrity and availability respectively.

How do you get a password?

A user usually defines his own password unless it is assigned by someone else.

In most cases (as, for example, when signing on to this very website) you get a password because you created it yourself. Otherwise, the person who did create a password for something can tell it to you. Other than that there do exist techniques for "hacking" (as it is known) or decrypting a password. You can make a shrewd guess.

Why my laptop sounds like roow?

Do you have pets? Most likely your heat sink is blocked and needs to be cleaned out. I would suggest taking it to a qualified repair shop for this.

What is the meaning of stack-based buffer overflow?

A buffer overflow occurs when you put more stuff into it than it can hold. For a stack, it means you put or pushed onto the stack more information than the size of the stack.

If I have a stack that can hold 10 entries, then putting 11 in the stack will overflow it.

What is unidentified network?

an unidentified network is one where the SSID cannot be detected

What type of filtering restricts access to a WAP by restricting the MAC address that allowed to connect to it?

You're talking about a feature most commonly called "MAC address filtering" - it takes advantage of the fact that each networked device must have a physical address - the MAC address - even before an IP/IPX address (or any other, higher-layer address) is assigned to it, or even before any communication commences.

The MAC address is composed of manufacturer ID (assigned externally) and manufacturer-specific information (assigned internally). MAC addresses are only "visible" within their physical networks, as they are used to identify physical paths to form physical connections from point A to point B (from hop to hop). While these may occasionally coincide within a network (be the same), the probability of this occurring is extremely rare in most cases.

This type of security isn't bulletproof, however - a network device can have its behavior altered so that it reports a MAC address different from the one assigned to it by its manufacturer (most commonly routers have this option, so that they can be connected to cable modem networks employing this kind of user control), but it is often a good first step towards controlling outside access to a wireless (or any network) access point.

Two most common types of configurations are: blacklist mode (anything is allowed, except for what is on the blacklist) and whitelist mode (everything is blocked, except for what is on the whitelist). The particular method you are referring to is MAC address whitelisting.

What is python 2.6 pywin32-212?

Python 2.6 is a release of Python is a general-purpose, high-level programming language whose design philosophy emphasizes code readability.

pywin32 is a release of python 2.5 designed to run on 32-bit Windows machines.

pywin32-212 is build 212 of pywin32.

What is the difference between discretionary and mandatory access control?

In the most common implementations of Discretionary Access Control, users "own" their directories and the files and programs they contain. They can grant and deny access and execution privileges for these to other users. Users can also be parts of groups. They may be able grant or restrict access to all members of a group.

In Mandatory Access Control the operating system controls the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. The object or target can be something like a process, a file, a directory, a program, or a memory segment. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernal compares these security attributes to the policy and decides whether the access or operation will be allowed. With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted.

What is new in science?

There are a number of things which are new in science. This is mostly in terms of technology where now almost everything can be done online including shopping, medical diagnosis, work, meetings and so much more.

How many times will user accounts be locked out after authentication is attempted?

Most operating systems allow the number of authentication attempts to be set to any of a range of numbers. Best practice is to cause a user account to be locked after 3 to 5 consecutive failed authentication attempts. Beyond that, some lock the account only for a period of time, like 15 minutes to an hour, or may lock it until an administrator intervenes to unlock the account.

Is a listening port the same as an open port?

Ports are somewhat like doors, traffic can flow either way though them but you can set them up so that it can only flow one way. A listening port is open and waiting for something to come in. It is possible to configure things so that a port can be used to receive traffic, but not send anything out through it. It is also possible to configure things so that a port is not listening but it is open for SENDING out information. Usually when we speak of an "open port" it is open for traffic both ways.

What are the feature that distiguish a man from a lan and wan?

by man im assuming you mean a node/client. Lan is intranet wan is internet. on the lan the node has a ip that it talks to other nodes with, on wan your computer's ip talks to your modem which talks to the internet with the modems IP.

Hope that helped.

Why have you got a loud hum on your audio playback?

This is usually an electrical short or electrical interference somewhere in the audio pipeline. First, try using a different audio jack, if you have more than one choice (most computers have one on back and one on front, sometimes more). If that does not clear up the hum, try using a different set of speakers or headphones. If that does not work, look at nearby appliances, such as cable boxes, cordless phones, etc, and see if unplugging/turning off these devices corrects the problem. All devices should be FCC Part 15 compliant, but sometimes they are not if the shielding breaks after inspection. Other less common problems can include faulty sound card, motherboard, audio converter, or power supply, but these should be checked only after exhausting all less troublesome options.

What are the common data security concerns for a business?

Typically data security is concerned with three broad categories: Confidentiality, Integrity, and Availability. You might also want to include Non-repudiation.

Confidentiality encompasses making sure that data that is supposed to be restricted to the company only or to only a few people within the company or to the company and business partners isn't divulged to anyone else. Companies worry about someone hacking into their networks, about industrial espionage, about insiders deliberately disclosing confidential information, about employees being careless with information, about mobile devices like laptops and smart phones containing sensitive data being lost or stolen, and about how to protect the data without making it too difficult for authorized persons to get access to the data.

Integrity involves making sure that there are no changes to data except those you want to happen - like when an executive updates a policy document or when the amount of money in an account is changed as accounts receivable are paid. Companies worry about corruption of transmitted data, deliberate and accidental changes by hackers, malicious changes by insiders, etc.

Availability is being able to get the data when you need it. Companies worry about losing data from hard disk crashes, accidental file deletions, getting locked out of accounts, denial of service accounts on the company computers and web site(s), authorized persons being denied access, lost encryption keys that would thus render encrypted files unreadable, etc.

Non-repudiation is being able to prove what was sent, when it was sent, and who sent it as well as what was delivered, when it was delivered and who received it. This is especially important in financial transactions and contracts.

What is an example of a possessed object?

I own one! It's an old, antique hand mirror that my adopted grandma gave to me. It belonged to her own grandma. It's old and a bit dirty, but the mirror part has remained whole and uncracked. It's not really possessed, more just haunted. Sometimes, when I look in the mirror, I can see a woman standing somewhere behind me. She only appears in the hand mirror, though. Not in any other mirrors.

I locked my computer and don't know the password to get back on. It's one of those locks that you set with ctrl alt delete. How do I remove it completely?

Using another computer or account on the computer (most Windows computers have a Guest account feature built in to them), download the program Ophcrack.

This will alow you to recover your password, as long as it was not too long. Over 10 characters may be recoverable, but the time it will take could outweigh the benefits.

Simply download it to a USB and boot your computer from the USB to run Ophcrack.

What number does a bit that is turned on represent?

When a bit is turned on, it represents a "1". When it is turned off, it represents a "0". The exact value depends on where the bit is within the byte it is part of.

In the binary number 0000 0001, the last bit is set to 1 and represents the number 1.

In the binary number 0000 0010, the second to last bit is set to 1, which corresponds to the "2's" place relative to decimal numbers.

In the binary number 0000 1000, the bit that is set to 1 represents the value "8" in decimal numbers.