answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is internet safety and how is it important?

In order to understand why you need to safeguard your privacy and maintain Internet safety standards, it is very important to be aware of the dangers or the risks associated with unsecured Internet access. Here some of the common issues in Internet safety: Unauthorized Network Access or Hacking

Unauthorized access is one of the major threats as far as Internet safety is concerned. Network security consists of the provisions made in an underlying computer network infrastructure, to protect the network and the network-accessible resources from unauthorized access. Hacking means that people can hack your accounts, that is acquire your passwords and access your account. Once they have access to your account, they have complete control over all your transactions and can misuse your account for illegal or objectionable purposes. In case your online bank account is hacked, hackers can rob your money online as well.

How do you authorize elevation on the computer?

Depending on the system, you will see a dialog box asking confirmation (i.e. allow/deny or yes/no), or you will be asked to enter a password, either your own or the system administrator's. In any event, you have to follow the system's method for allowing elevation. Note that elevation can be granted automatically, but it is not recommended that you enable the feature, as it makes drive-by attacks more likely to succeed.

Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.

Is it safe to download files from the internet?

It's only safe to download files from the internet if you KNOW that the source is trustworthy. If you are uncertain, then the answer is a definite NO. The files MIGHT be safe - but it's high risk if you don't know. Even from sources you THINK should be trustworthy there is still some residual risk if you mistype the URL or go to the site from an email link or if the site gets compromised.

How can you make a good strong software?

The key to making secure software is to adopt a clean and consistent coding style (follow standard coding rules and comment your code), and keep an eye out for any vulnerabilities in your program. Test your program by executing EVERY path of code. This means not only testing the main code, but also the numerous error paths and check to see if the results are what you want. Always check for major vulnerabilities in your program, including buffer overflows, code injection, format string attacks, privilege escalation, dangling pointers, and others.

Can you get a PC tower protector i have a really nice PC and its on my floor and friends often kick it no knowing its there and also water spills by it?

They do sell plexy glass or plastic casings that computers can fit into with keylocks and a few fans built in they usally sell them at compusa or micro center they are not cheap but they work. usally made or ITs

Which cryptographic algorithms is a symmetric encryption method?

Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.

What is the difference between hacking and electronic fraud?

Hacking is the process of gaining entry to another computer or server without the owner's permission.

e.g. hacking into your e-mail and sending weird e-mails to your friends.

Fraud is trying to trick someone to gain an advatage.

e.g. never delivering the product you paid for when buying on internet.

. :]

How many keys are utilized in asymmetric encryption?

Asymmetric encryption uses at least 2 keys - hence the asymmetry. The keys for encryption and decryption are not the same, so they are not "symmetric". Usually only 2 keys are used - a public key and a private key. The public key is published to a key registry or sent separately to those the key-pair owner wants to communicate with. The private key is retained by the owner. Messages encrypted with the private key can only be decrypted using the public key. If the source of the public key is trusted, this provides some proof of the source of the message. Messages encrypted with the public key can only be decrypted using the private key - so only the owner of the private key should be able to decrypt messages encrypted with their own private key.

What should you do about remadm-pskill detected by mcafee?

I quarantined remadm-pskill after a scan and found I had difficulties performing tasks on IE8, such as deleting browsing history or changing settings in Internet Options. Upon restoring remadm-pskill, the issues disappeared.

If a firewall is placed between the internet connection and the web server what should be included in the firewalls configuration so that consumers can still reach the website?

The web traffic on port 80 (http on port 80) of the firewall should be allowed from the Internet to the web server. Generally, this is done through the rules configuration. It will basically not allow any traffic from the Internet to the webserver since there is a rule of implicit deny on most of the firewall, so go to the rules configuration and add a new rule in this way:

Source- Any

Destination- IP of webserver

Port: 80 (if configured otherwise, than custom port)

Action: Allow

How do you recruit zombie computers for a ddos?

Most commonly this is done via mIRC (Internet Relay Chat) where bot nets are controlled. For example, where the clients communicate w/ the zombie (infected computers). Typically lazy hackers will just run an IRC bot spamming some stupid message that will infect the mIRC chat script the user is running who is tricked into clicking a link etc. You don't recruit a Zombie, you maliciously infect someones computer w/o their consent and this is illegal.

It all boils down to the fact that you need to get a Trojan on their PC to connect the PC to one of your clients in order to send commands and have a two way connection to the victims computer.

How do you remove ms removal tool from your computer?

MS Removal Tool cannot be detected by antivirus, so you may better try a manual removal.

How many passwords are possible if the length of the password is 6 and ATLEAST one of them is a number?

604,661,760 if you use 0-9 and A-Z where it isn't case-sensitive

thats 10x(36^5)

the 10 is for the AT LEAST ONE NUMBER and the 36^5 for the other 5 letter/number slots (26 possible letters plus 10 possible numbers)

if the password is case-sensitive there would be 52 letters so the math would be as follows:

10 x (62^5) = 9,161,328,320 possibilities

this doesn't take into account any characters/symbols that may be used

How will the Silk Road anonymous marketplace avoid detection by law enforcement as they scale their operations?

well silkroad is running as a tor hidden service so both the server and the sellers/buyers are close to inposible to trace.

the currency they use is bitcoin a peer to peer crypto currency known for its almost anonymous transaction.

the biggest risk is that the buyer needs to give his address to the seller but most sellers have their public key on their profile so if you use that to encrypt your address only the seller should be able to decrypt it with hiss privat key.

Why would ISPs ban outbound port scanning by their customers?

There are few if any legitimate reasons to allow port scanning. In some cases sites may protect themselves from port scanning by blocking the site they are being scanned from resulting in other users of that scanner's ISP being blocked from that website. Also since recent worms have used port scanning to look for systems to infect, blocking port scanning
helps to reduce the rate at which these worms spread.


If there is a legitimate reason for finding out what ports are open on a server there are more appropriate ways of finding this out.

A device that can protect a computer from power surges and lightning is a?

That would be a "surge protector". Note that many UPS (uninterruptable power supply) units include this functionality too.