answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Why my laptop sounds like roow?

Do you have pets? Most likely your heat sink is blocked and needs to be cleaned out. I would suggest taking it to a qualified repair shop for this.

What is the meaning of stack-based buffer overflow?

A buffer overflow occurs when you put more stuff into it than it can hold. For a stack, it means you put or pushed onto the stack more information than the size of the stack.

If I have a stack that can hold 10 entries, then putting 11 in the stack will overflow it.

What is unidentified network?

an unidentified network is one where the SSID cannot be detected

What type of filtering restricts access to a WAP by restricting the MAC address that allowed to connect to it?

You're talking about a feature most commonly called "MAC address filtering" - it takes advantage of the fact that each networked device must have a physical address - the MAC address - even before an IP/IPX address (or any other, higher-layer address) is assigned to it, or even before any communication commences.

The MAC address is composed of manufacturer ID (assigned externally) and manufacturer-specific information (assigned internally). MAC addresses are only "visible" within their physical networks, as they are used to identify physical paths to form physical connections from point A to point B (from hop to hop). While these may occasionally coincide within a network (be the same), the probability of this occurring is extremely rare in most cases.

This type of security isn't bulletproof, however - a network device can have its behavior altered so that it reports a MAC address different from the one assigned to it by its manufacturer (most commonly routers have this option, so that they can be connected to cable modem networks employing this kind of user control), but it is often a good first step towards controlling outside access to a wireless (or any network) access point.

Two most common types of configurations are: blacklist mode (anything is allowed, except for what is on the blacklist) and whitelist mode (everything is blocked, except for what is on the whitelist). The particular method you are referring to is MAC address whitelisting.

What is python 2.6 pywin32-212?

Python 2.6 is a release of Python is a general-purpose, high-level programming language whose design philosophy emphasizes code readability.

pywin32 is a release of python 2.5 designed to run on 32-bit Windows machines.

pywin32-212 is build 212 of pywin32.

What is the difference between discretionary and mandatory access control?

In the most common implementations of Discretionary Access Control, users "own" their directories and the files and programs they contain. They can grant and deny access and execution privileges for these to other users. Users can also be parts of groups. They may be able grant or restrict access to all members of a group.

In Mandatory Access Control the operating system controls the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. The object or target can be something like a process, a file, a directory, a program, or a memory segment. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernal compares these security attributes to the policy and decides whether the access or operation will be allowed. With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted.

What is new in science?

There are a number of things which are new in science. This is mostly in terms of technology where now almost everything can be done online including shopping, medical diagnosis, work, meetings and so much more.

How many times will user accounts be locked out after authentication is attempted?

Most operating systems allow the number of authentication attempts to be set to any of a range of numbers. Best practice is to cause a user account to be locked after 3 to 5 consecutive failed authentication attempts. Beyond that, some lock the account only for a period of time, like 15 minutes to an hour, or may lock it until an administrator intervenes to unlock the account.

Is a listening port the same as an open port?

Ports are somewhat like doors, traffic can flow either way though them but you can set them up so that it can only flow one way. A listening port is open and waiting for something to come in. It is possible to configure things so that a port can be used to receive traffic, but not send anything out through it. It is also possible to configure things so that a port is not listening but it is open for SENDING out information. Usually when we speak of an "open port" it is open for traffic both ways.

What are the feature that distiguish a man from a lan and wan?

by man im assuming you mean a node/client. Lan is intranet wan is internet. on the lan the node has a ip that it talks to other nodes with, on wan your computer's ip talks to your modem which talks to the internet with the modems IP.

Hope that helped.

Why have you got a loud hum on your audio playback?

This is usually an electrical short or electrical interference somewhere in the audio pipeline. First, try using a different audio jack, if you have more than one choice (most computers have one on back and one on front, sometimes more). If that does not clear up the hum, try using a different set of speakers or headphones. If that does not work, look at nearby appliances, such as cable boxes, cordless phones, etc, and see if unplugging/turning off these devices corrects the problem. All devices should be FCC Part 15 compliant, but sometimes they are not if the shielding breaks after inspection. Other less common problems can include faulty sound card, motherboard, audio converter, or power supply, but these should be checked only after exhausting all less troublesome options.

What are the common data security concerns for a business?

Typically data security is concerned with three broad categories: Confidentiality, Integrity, and Availability. You might also want to include Non-repudiation.

Confidentiality encompasses making sure that data that is supposed to be restricted to the company only or to only a few people within the company or to the company and business partners isn't divulged to anyone else. Companies worry about someone hacking into their networks, about industrial espionage, about insiders deliberately disclosing confidential information, about employees being careless with information, about mobile devices like laptops and smart phones containing sensitive data being lost or stolen, and about how to protect the data without making it too difficult for authorized persons to get access to the data.

Integrity involves making sure that there are no changes to data except those you want to happen - like when an executive updates a policy document or when the amount of money in an account is changed as accounts receivable are paid. Companies worry about corruption of transmitted data, deliberate and accidental changes by hackers, malicious changes by insiders, etc.

Availability is being able to get the data when you need it. Companies worry about losing data from hard disk crashes, accidental file deletions, getting locked out of accounts, denial of service accounts on the company computers and web site(s), authorized persons being denied access, lost encryption keys that would thus render encrypted files unreadable, etc.

Non-repudiation is being able to prove what was sent, when it was sent, and who sent it as well as what was delivered, when it was delivered and who received it. This is especially important in financial transactions and contracts.

What is an example of a possessed object?

I own one! It's an old, antique hand mirror that my adopted grandma gave to me. It belonged to her own grandma. It's old and a bit dirty, but the mirror part has remained whole and uncracked. It's not really possessed, more just haunted. Sometimes, when I look in the mirror, I can see a woman standing somewhere behind me. She only appears in the hand mirror, though. Not in any other mirrors.

I locked my computer and don't know the password to get back on. It's one of those locks that you set with ctrl alt delete. How do I remove it completely?

Using another computer or account on the computer (most Windows computers have a Guest account feature built in to them), download the program Ophcrack.

This will alow you to recover your password, as long as it was not too long. Over 10 characters may be recoverable, but the time it will take could outweigh the benefits.

Simply download it to a USB and boot your computer from the USB to run Ophcrack.

What number does a bit that is turned on represent?

When a bit is turned on, it represents a "1". When it is turned off, it represents a "0". The exact value depends on where the bit is within the byte it is part of.

In the binary number 0000 0001, the last bit is set to 1 and represents the number 1.

In the binary number 0000 0010, the second to last bit is set to 1, which corresponds to the "2's" place relative to decimal numbers.

In the binary number 0000 1000, the bit that is set to 1 represents the value "8" in decimal numbers.

How do you remove a program from the all programs menu?

you first go to the start menu then search up add or remove hardware.

\

How do you upgrade my laptop speed?

To prevent and stop computer crashing, you have to avoid overheating. We all know that if the computer is being running too long, the CPU will become very hot. Hence, some of the hardware will become too hot and fail to respond, which results in the unexpected computer crashes. So do remember to let your computer have a break if it is running for a long time and place your computer into a well-ventilated room, and check your fan is always working well.

Secondly, guard your PC from spyware attacks. Spyware refers to any technology that is specifically developed to silently collect your personal or private information for illegal profits. Once your computer has been compromised by spyware, it starts to damage your system and try to gather your personal or commercial information from the disk and then transfer it to pre-defined remote servers. In addition, spyware can secretly track your online activities and browser behaviors for obtaining your login credentials to online bank account or credit card account. You should not miss this aspect when trying to fix computer freezing or suffering from some other errors like serms.dll error or error 80028EA1.

Also, you can re-install any software causing the computer crashing problem. The main cause of errors is going to be through the "software" of your PC. This is basically all the programs that your system will be using to run, and will likely be the fact that a specific application will be causing all the issues your PC may have. The good news is that re-installing any corrupted / damaged software on your computer will allow Windows to run much smoother - which can be done by following these steps:

* Click "Start"

* Locate "Control Panel"

* Click on "Add / Remove Programs"

* Locate the program causing problems

* Click "Remove"

* Restart your PC

What is logging off?

Suppose you have two users A and B who can access your computer.You login to user account A and does some work.Now it may be possible that A account has limited user priviledges.So you LOG OFF user A and goes to user B.Logging off just shutdown one user and gives you option to work with another.If you wish to use both users without closing programs on any of them than you can use the option SWITCH USERS