answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What would happen if i don't follow the rules on real-wishes?

if you don't follow the rules on real-wishes.com your 'wish' wouldn't come true.

that's basically it from what I've heard. (;

Is it safe to browse the dark web?

This is akin to asking, "Is it safe to drive through downtown Detroit?" It depends on what you are doing. Generally, as long as you keep your wits about you and don't go "looking for trouble," you will be fine. The Dark Web is the "seedy underbelly" of the Internet where one can find various websites that are not as commonly viewed and can deal with both legal and illegal topics, purchases, and more. If your interest is only to look around and see what is there, then you should be safe enough. The issue comes when you try to interact with those who inhabit the Dark Web, such as to purchase some item. After all, there is no way for you to know whether it is stolen, potentially used in a crime, or even if you will receive the item in question. Then again, one runs the same risk when dealing with the likes of eBay out in the regular Internet world.

So, is it safe? Reasonably so, provided you don't do anything foolish.

Is spam a form of privacy or security risk?

Not most of it. Spam is generally mail that is unwanted or not useful.

However, a significant amount of spam is encoded in HTML that contains links to images on web sites owned by the spammers. The links also contain unique identifiers that allow the spammers to know the e-mail address to which the spam was sent so that, if your mail reader automatically loads the images, the spammers will know that you received and opened the e-mail--thus verifying your address as an active spam target. Many people consider that a violation of their privacy and some mail readers have features to turn off automatic image loading.

Most spam does not represent a direct security risk. However, some spam contains links to web sites that will attempt to download malware to your machine if you click on them. That is more of a Trojan horse/browser problem than simply a spam problem.

Similarly, some spam attempts to trick people into divulging account names and passwords by directing you to a fake web site which simulates a legitimate site. This is generally called "phishing". Once again, it is not the spam itself, but the web site that it links to that is a threat.

In such cases, the spam could be considered an indirectsecurity risk.

Used to manage network resources this type of computer can be dedicated a specific task?

It is a server. A server manages network resources through the use of administrative software, and they provide desktop computers with acess to the network. They can handle a variety of resources and can be dedicated to specific tasks.

What is multicast routing?

Multicast routing is done by sending one packet to several destinations (those destinations were announcing their interest by joining the multicast group). See [multicast].

What kind of attack are hashed passwords vulnerable to?

Any password is vulnerable to a number of attacks. With hashed passwords it depends on a number of issues;

  • What is the length of the key
  • Can the attacker gain control of the hashes
You could use a brute force attack, for example. Hashes can be particularly sensitive to attacks utilizing rainbow or pre-computed hash tables as well.

What are the differences between Hash algorithms and MD5 and SHA-1?

Hash algorithms are functions that take an input and produce a fixed-size string of characters, which is typically a digest that represents the input data. MD5 and SHA-1 are specific types of cryptographic hash algorithms; however, they differ in terms of security and collision resistance. MD5 produces a 128-bit hash value and is considered insecure due to vulnerabilities that allow for collision attacks. SHA-1, while more secure than MD5 with a 160-bit hash, has also been found to be susceptible to collision attacks, leading to its decline in usage in favor of more secure algorithms like SHA-256.

How do get rid of a BOT?

You can try AVAST or Tucows, both are pretty good Free virus software products. But it almost certainly take a good virus software to get sense it & get rid of it. Look them up online. Be careful with the free products that promise to clean up your system, they are often just there to install spyware on your machine & are often very hard to remove!

What are cyber threats?

Cyber threats are anything adversely affecting computer security. This includes malware, phishing, hacking, or anything else that destroys data, compromises computers or steals information.

Can mom legally check history on 16 yo son computer without his permission?

Yes of course she can. Her house, her internet connection and she is responsible for what you are doing.

How do you stop security tools from popping up on your screen every 2 mins and Can you restore the computer to an earlier date before singing into windows. i have a toshiba satellite L500 windows 7?

This sounds like a virus that i have had about 4 times. im sorry to say this is a huge pain in the a$$. find out what the name of the tool(s) it is trying to have you install (and usually buy) go to another computer and google the name, you will find instructions on how to uninstall it. My advice is while you are searching keep that computer turned off or at minimum unplug it from the internet so the virus cannot spread.

Enhanced Due Diligence?

Enhanced due diligence is often required before accepting new customers, employees, and clients. Enhanced due diligence includes a check of name, physical address, date of birth, social security number or tax id number, background check, education check, business incorporation check, and/or bank statements.