answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do you remove ms removal tool from your computer?

MS Removal Tool cannot be detected by antivirus, so you may better try a manual removal.

If a firewall is placed between the internet connection and the web server what should be included in the firewalls configuration so that consumers can still reach the website?

The web traffic on port 80 (http on port 80) of the firewall should be allowed from the Internet to the web server. Generally, this is done through the rules configuration. It will basically not allow any traffic from the Internet to the webserver since there is a rule of implicit deny on most of the firewall, so go to the rules configuration and add a new rule in this way:

Source- Any

Destination- IP of webserver

Port: 80 (if configured otherwise, than custom port)

Action: Allow

How many passwords are possible if the length of the password is 6 and ATLEAST one of them is a number?

604,661,760 if you use 0-9 and A-Z where it isn't case-sensitive

thats 10x(36^5)

the 10 is for the AT LEAST ONE NUMBER and the 36^5 for the other 5 letter/number slots (26 possible letters plus 10 possible numbers)

if the password is case-sensitive there would be 52 letters so the math would be as follows:

10 x (62^5) = 9,161,328,320 possibilities

this doesn't take into account any characters/symbols that may be used

How will the Silk Road anonymous marketplace avoid detection by law enforcement as they scale their operations?

well silkroad is running as a tor hidden service so both the server and the sellers/buyers are close to inposible to trace.

the currency they use is bitcoin a peer to peer crypto currency known for its almost anonymous transaction.

the biggest risk is that the buyer needs to give his address to the seller but most sellers have their public key on their profile so if you use that to encrypt your address only the seller should be able to decrypt it with hiss privat key.

Why would ISPs ban outbound port scanning by their customers?

There are few if any legitimate reasons to allow port scanning. In some cases sites may protect themselves from port scanning by blocking the site they are being scanned from resulting in other users of that scanner's ISP being blocked from that website. Also since recent worms have used port scanning to look for systems to infect, blocking port scanning
helps to reduce the rate at which these worms spread.


If there is a legitimate reason for finding out what ports are open on a server there are more appropriate ways of finding this out.

A device that can protect a computer from power surges and lightning is a?

That would be a "surge protector". Note that many UPS (uninterruptable power supply) units include this functionality too.

How do you protect files and folder on a USB Hard drive?

You have a few options. You could either make a password protected folder within the HDD and place your files in there. You could also encrypt the entire HDD with encryption software such as truecrypt. There are many options available for File protection / Encryption.

You can try to use third party software to lock the flash drive, for example Kakasoft USB security

What are the types of password attacks?

There are several types of password attacks: Brute Force, Dictionary, Rainbow Table, pattern checking, word list substitution

Why does your new Gmail go to trash?

If your incoming messages are automatically placed in Trash, the cause is a misconfigured filter, or a setting on your Forwarding and POP/IMAP tab.

To resolve this issue, please make sure you haven't created any filters with the action Delete it that would affect the messages in question.

If you have many filters or have complicated filters in place, you may need to edit the Delete it action to guarantee that they are not at fault.

If you've enabled forwarding in your settings, please ensure that you have not selected delete Gmail's copy in your forwarding options.

If you're using a POP1 client to access Gmail, please ensure that you have not selected delete Gmail's copy in step 2 of your POP download options.

Finally, if you're accessing your Gmail from multiple POP clients, please verify that you have selected 'Leave a copy of messages on server' in your client configuration settings.

What wall is used for computer protection on the internet?

This "wall" is refereed to a firewall. A firewall helps to prevent unauthorized access to computers. The program works off of a set of rules or criteria, that determines if an attempted access to the internet should be permitted or denied. In basic terms a firewall acts as a gate between your computer and the internet, determining what goes in and out.

What do all in one security systems protect against?

I depends on your provider there is usually an anti-virus and email protection, possibly a firewall too.

What is different between network and networking?

A network is an architecture to communicate between servers, clients, and outside world.

Networking is the method to build up the network architecture..........

Is Windows Security essentials enough protection for your computer?

The quick answer is No

Microsoft Security Essentials is average in many ways; it's OK but it isn't the best anti-virus software you can get, even for free. I suggest you check out some real world tests that put the anti-virus software through some tough tests and then list the results so you can see which is the 'best' or right one for you. A site like AV Comparatives is good for this.




Does cmos setup offer the option to set a supervisor password?

Most CMOS allow the administrator to add or edit a supervisor password. Enter your CMOS using whichever key your motherboard needs to open the CMOS (this will be displayed on the first screen of bootup), then find the general settings tab or a name similar and press enter on the password field. After that, enter your password and when you boot to your CMOS it will ask for your password.

Can wireless mouse carry a virus?

A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you suspect that pointer on the screen is not working properly or moving on its own its probably due to virus on your harddisk whose source is not WIRELESS MOUSE.

This answer is false. Better go read up on USB device security as there is an exploit to use the USB firmware of the device (that little wireless dongle you plug into your machine to use the mouse) so that it can breach your network.

You can find out more about this exploit at infoworld dot com by doing a search for yes-even-mouse-can-infect-your-network-967

Can you get ink poison from printer ink?

Yes it is very possible to get ink poisoning from printer ink. Im not verry shore but i think any ink or let that you drink or swolow is very possible to be poison . I wold recormed not drinking it

Advantages of Client Server system using LAN?

Almost every protocol uses Client/Server architecture, LAN and WAN alike.

Advantages of client server system .

* Centralization - access, resources, and data security are controlled through the server * Scalability - any element can be upgraded when needed * Flexibility - new technology can be easily integrated into the system * Interoperability - all components (clients, network, servers) work together