answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Is spam a form of privacy or security risk?

Not most of it. Spam is generally mail that is unwanted or not useful.

However, a significant amount of spam is encoded in HTML that contains links to images on web sites owned by the spammers. The links also contain unique identifiers that allow the spammers to know the e-mail address to which the spam was sent so that, if your mail reader automatically loads the images, the spammers will know that you received and opened the e-mail--thus verifying your address as an active spam target. Many people consider that a violation of their privacy and some mail readers have features to turn off automatic image loading.

Most spam does not represent a direct security risk. However, some spam contains links to web sites that will attempt to download malware to your machine if you click on them. That is more of a Trojan horse/browser problem than simply a spam problem.

Similarly, some spam attempts to trick people into divulging account names and passwords by directing you to a fake web site which simulates a legitimate site. This is generally called "phishing". Once again, it is not the spam itself, but the web site that it links to that is a threat.

In such cases, the spam could be considered an indirectsecurity risk.

Used to manage network resources this type of computer can be dedicated a specific task?

It is a server. A server manages network resources through the use of administrative software, and they provide desktop computers with acess to the network. They can handle a variety of resources and can be dedicated to specific tasks.

What is multicast routing?

Multicast routing is done by sending one packet to several destinations (those destinations were announcing their interest by joining the multicast group). See [multicast].

What kind of attack are hashed passwords vulnerable to?

Any password is vulnerable to a number of attacks. With hashed passwords it depends on a number of issues;

  • What is the length of the key
  • Can the attacker gain control of the hashes
You could use a brute force attack, for example. Hashes can be particularly sensitive to attacks utilizing rainbow or pre-computed hash tables as well.

What are the differences between Hash algorithms and MD5 and SHA-1?

Hash algorithms are functions that take an input and produce a fixed-size string of characters, which is typically a digest that represents the input data. MD5 and SHA-1 are specific types of cryptographic hash algorithms; however, they differ in terms of security and collision resistance. MD5 produces a 128-bit hash value and is considered insecure due to vulnerabilities that allow for collision attacks. SHA-1, while more secure than MD5 with a 160-bit hash, has also been found to be susceptible to collision attacks, leading to its decline in usage in favor of more secure algorithms like SHA-256.

How do get rid of a BOT?

You can try AVAST or Tucows, both are pretty good Free virus software products. But it almost certainly take a good virus software to get sense it & get rid of it. Look them up online. Be careful with the free products that promise to clean up your system, they are often just there to install spyware on your machine & are often very hard to remove!

What are cyber threats?

Cyber threats are anything adversely affecting computer security. This includes malware, phishing, hacking, or anything else that destroys data, compromises computers or steals information.

Can mom legally check history on 16 yo son computer without his permission?

Yes of course she can. Her house, her internet connection and she is responsible for what you are doing.

How do you stop security tools from popping up on your screen every 2 mins and Can you restore the computer to an earlier date before singing into windows. i have a toshiba satellite L500 windows 7?

This sounds like a virus that i have had about 4 times. im sorry to say this is a huge pain in the a$$. find out what the name of the tool(s) it is trying to have you install (and usually buy) go to another computer and google the name, you will find instructions on how to uninstall it. My advice is while you are searching keep that computer turned off or at minimum unplug it from the internet so the virus cannot spread.

Enhanced Due Diligence?

Enhanced due diligence is often required before accepting new customers, employees, and clients. Enhanced due diligence includes a check of name, physical address, date of birth, social security number or tax id number, background check, education check, business incorporation check, and/or bank statements.

Would adding or deleting files on an unaware individuals computer considered invasion of privacy?

Yes. Viruses that add and delete files are most unwelcome on computers. Rule number 1, backup, backup, and backup. And the backup some more.

Is it possible to encrypt a hard drive and use a USB flash drive to unlock it?

A person could use the software TrueCrypt or Kakasoft USB security program Or one could buy a flash drive that already has encryption software already installed.

What can you use to prevent the theft of data from a computer?

You can prevent theft of data from a computer through using strong passwords.

Which is an example of private key encryption?

Sending an encrypted message while other party has the (same) private key to decrypt the message. The trouble is how to transmit the key safely first. Usually there's a third party involved with a public key.

What kind of minimum knowledge is required to perform basic network hacking?

Firstly you will need to know a basic programming language, you cannot go straight into as all "Hackers" are skilled computer programmers. Also you need to have knowledge about the consequences of the act that you may perform.

What is SATA raid?

RAID stands for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks). It is a technology that provides increased storage functions and reliability through redundancy. There are several different types of RAID -

  • RAID 0 just spreads a file between different disks. This speeds up data storage and retrieval. Of all the types of RAID, this one alone does not provide increased reliability because there is no redundancy. It can, however, be combined with other RAID types to get the protection.
  • RAID 1 writes the same data to 2 disks so if one disk fails you still have a backup on the other disk.
  • RAID 2 (bit-level striping with dedicated Hamming-code parity) has all disk spindle rotation synchronized, and data is striped such that each sequential bit is on a different disk. Hamming-code parity is calculated across corresponding bits on disks and stored on at least one parity disk. If one disk fails, the original data can be reconstructed from the rest of the disks as long as the Hamming-code parity is still available.
  • RAID 3 is much like RAID 2 except that it is sequential BYTES that are stored on different disks with parity calculated and stored separately
  • RAID 4 and RAID 5 are the same except that RAID 4 stores all parity data on a single drive while RAID 5 spreads it out among the drives. They distribute the data between drives and require all drives but one to be present to operate; the array is not destroyed by a single drive failure. Upon drive failure, any subsequent reads can be calculated from the distributed parity such that the drive failure is masked from the end user. A single drive failure still results in reduced performance of the entire array until the failed drive has been replaced and the associated data rebuilt.
  • RAID 6 is like RAID 5 except that it uses doubledistributed parity so that the system can continue to function while the data is rebuilt even if a second drive fails during the rebuild process.

Different types of RAID's can be combined for additional protection; for example in RAID 1+0: (a.k.a. RAID 10) mirrored sets in a striped set (minimum four disks; even number of disks) provides fault tolerance and improved performance but increases complexity. The array can sustain multiple drive losses so long as no mirror loses all its drives.

Serial ATA (SATA or Serial Advanced Technology Attachment) is a computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives. Serial ATA was designed to replace the older ATA (AT Attachment) standard (also known as EIDE), offering several advantages over the older parallel ATA (PATA) interface: reduced cable-bulk and cost (7 conductors versus 40), native hot swapping, faster data transfer through higher signalling rates, and more efficient transfer through an (optional) I/O queuing protocol.

SATA RAID is thus RAID implemented using SATA. Since SATA supports hot swapping and most types of RAID allow operations to continue even with the loss of a single drive, failed drives in a SATA RAID can be hot swapped without shutting down the system.

Why backups are needed?

backups are needed for security reasons for any organization data is most important but if due to any reason (accident , virus ,human etc.) data get corrupt or get loss then it is big problem for organization there for these backups are needed

What do you do if your email is returned undeliverable?

Try to find out the correct e-mail address.

Make sure the address you sent it to was correct. It could also be a problem with the recipients mail box being full or the server malfunctioning.