Is there a way to determine a known IP address from a possible physical address?
A very intelligent question...
Actually it is possible if you have an backdoor access to the switch or router of your ISP. If you know what I mean.
But in general terms, it is NO!
This one is easy, the answer is the user is disconnected from Windows Explorer and a partition of the hard-drive.
Windows Explorer is everything that allows you to navigate a windows operating system: documents, taskbar, desktop... ect, so when the user 'logs off' the computer, windows explorer process is shutdown.
The user is also disconnected from the hard drive but the system is not, this is because if there are multiple accounts on the computer, then other accounts can access their personal space on the hard drive.
Aslong as the computer is switched on, even at logon screen power is still being consumed to run the computer's operating system and files which are ready for the user to log back on.
How you can record keyboard strokes?
it depends on which programming language you are using.
the basic idea is to check when a key is hit on the keyboard for eg in C u can use kbhit() function. It returns a non-zero integer if a key is in the keyboard buffer. It will not wait for a key to be pressed.
however in VB, C# you can use keypressdown event to check which key is pressed.
Once you know which key is pressed you need to record the finding some where for eg in a file.
Also you need to do is to run your program as startup so that it is started as soon as the system boots up.
Is my supervisor asking me to disclose my password illegal?
Your supervisor can request you password for company computer systems or email..etc. He/She cannot legally make you give up your personal passwords.
During a job interview, the interviewer may want to establish your character qualifications for the position. You may be asked for a password to review your facebook or other social network personality. You can not be forced to give your password, but it may impact your ability to get hired.
What is the history of digital signature?
In the famous paper "New Directions in Cryptography", Whitfield Diffie and Martin Hellman first described the notion of a digital signature scheme, although they only conjectured that such schemes existed.[5][6] Soon afterwards, Ronald Rivest, Adi Shamir, and Len Adleman invented the RSA algorithm that could be used for primitive digital signatures[7]. (Note that this just serves as a proof-of-concept, and "plain" RSA signatures are not secure.) The first widely marketed software package to offer digital signature was Lotus Notes 1.0, released in 1989, which used the RSA algorithm. Basic RSA signatures are computed as follows. To generate RSA signature keys, one simply generates an RSA key pair containing a modulus N that is the product of two large primes, along with integers e and d such that e d = 1 mod φ(N), where φ is the Euler phi-function. The signer's public key consists of N and e, and the signer's secret key contains d. To sign a message m, the signer computes σ=md mod N. To verify, the receiver checks that σe = m mod N. As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result. This approach can be proven secure in the so-called random oracle model. Other digital signature schemes were soon developed after RSA, the earliest being Lamport signatures[8], Merkle signatures (also known as "Merkle trees" or simply "Hash trees")[9], and Rabin signatures[10]. In 1984, Shafi Goldwasser, Silvio Micali, and Ronald Rivest became the first to rigorously define the security requirements of digital signature schemes[11]. They described a hierarchy of attack models: # In a key-onlyattack, the attacker is only given the public verification key. # In a known message attack, the attacker is given valid signatures for a variety of messages known by the attacker but not chosen by the attacker. # In a chosen message attack, the attacker first learns signatures on arbitrary messages of the attacker's choice. They also describe a hierarchy of attack results: # A total break results in the recovery of the signing key. # A universal forgery attack results in the ability to forge signatures for any message. # A selective forgery attack results in a signature on a message of the adversary's choice. # An existential forgery merely results in some valid message/signature pair not already known to the adversary. They also present the GMR signature scheme, the first that can be proven to prevent even an existential forgery against a chosen message attack.[11] Most early signature schemes were of a similar type: they involve the use of a trapdoor permutation, such as the RSA function, or in the case of the Rabin signature scheme, computing square modulo composite n. A trapdoor permutation family is a family of permutations, specified by a parameter, that is easy to compute in the forward direction, but is difficult to compute in the reverse direction. However, for every parameter there is a "trapdoor" that enables easy computation of the reverse direction. Trapdoor permutations can be viewed as public-key encryption systems, where the parameter is the public key and the trapdoor is the secret key, and where encrypting corresponds to computing the forward direction of the permutation, while decrypting corresponds to the reverse direction. Trapdoor permutations can also be viewed as digital signature schemes, where computing the reverse direction with the secret key is thought of as signing, and computing the forward direction is done to verify signatures. Because of this correspondence, digital signatures are often described as based on public-key cryptosystems, where signing is equivalent to decryption and verification is equivalent to encryption, but this is not the only way digital signatures are computed. Used directly, this type of signature scheme is vulnerable to a key-only existential forgery attack. To create a forgery, the attacker picks a random signature σ and uses the verification procedure to determine the message mcorresponding to that signature.[12] In practice, however, this type of signature is not used directly, but rather, the message to be signed is first hashed to produce a short digest that is then signed. This forgery attack, then, only produces the hash function output that corresponds to σ, but not a message that leads to that value, which does not lead to an attack. In the random oracle model, this hash-and-decrypt form of signature is existentially unforgeable, even against a chosen-message attack.[6] There are several reasons to sign such a hash (or message digest) instead of the whole document. * For efficiency: The signature will be much shorter and thus save time since hashing is generally much faster than signing in practice. * For compatibility:Messages are typically bit strings, but some signature schemes operate on other domains (such as, in the case of RSA, numbers modulo a composite number N). A hash function can be used to convert an arbitrary input into the proper format. * For integrity: Without the hash function, the text "to be signed" may have to be split (separated) in blocks small enough for the signature scheme to act on them directly. However, the receiver of the signed blocks is not able to recognize if all the blocks are present and in the appropriate order.
What is the significance of digital imaging in forensics?
Digital imaging is allows for block to block copying of a suspect storage device. Imaging differs from drag & drop copying, in that it makes an identical copy of the drive (to include slack space) instead of just copying the files themselves. A write blocker may be required in some cases to prevent unintentional writing by the OS.
Once the original has been imaged at least twice, either an MD5 or SHA1 hash (digital fingerprint) is made to compare it against the images. If they match, then it is trivial for a forensic analyst to prove to the client that the evidence has been unaltered, and anything acquired is identical to what the suspect had on his original drive.
How can you get past your schools security system?
You can't You have to log on as an admin first. Even if you do you probably get screwed real bad
Answer: Try to disable "eset nod32" temporarily; then download a popular Internet Secutiy utility on a 30-day free trial basis. It is a state-of-the art computer security suite that will probably resolve your problem. Simply Copy http://www.avira.com/en/downloads/avira_antivir_premium.html and Paste it into your browser. You must ensure that eset nod32 is either disabled or uninstalled; otherwise, the doenloaded utility will not function.
Penetration Testing Process involved at Avyaan:A penetration testing services :
# Planning & Reconnaissance
#Scanning and Vulnerability Analysis
#Exploitation:Most interesting phase of pen testing
#Privilege Escalation
#Final Report
Answer
Memory hog is a subjective term because what is memory intensive to me is not necessarily memory intensive to you. However, a number of users report major changes in system performance after installing BitDefender. If you are also seeing your computer slowing down then uninstall BitDefender and install another anti-malware program. I recommend Avast Free Antivirus. It is important to note your computer slowing down can be due to a number of issues not related to BitDefender.
E-Safety in internet safety - it's about utilizing information and communication technologies in a safe and responsible way.
It can refer electronic safety for children, and it can be associated with websites such as Facebook, Bebo, Twitter, MSN and any other social network. Make sure you know who your child is talking to online, not just on computers, but also laptops and mobile phones.
It can also refer to protecting personal information, such as credit card numbers, phone, address, social security number, and any other information that can be used to compromise your credit or identity.
How does a commercial-grade firewall appliance differ from a commercial-grade firewall system?
Firewall appliances are stand-alone, self contained combinations of computing hardware and software. A commercial grade firewall system consists of application software that is configured for the firewall application and run on a general-purpose computer.
What is The essential ingredients of asymmetric cipher?
Symmetric ciphers use only one key. By contrast, an asymmetric cipher will use two keys. One key is kept "private" by the the owner while the other is "published" or otherwise released to the public (hence known as the "public key"). Data encrypted by one key can only be decrypted using the other key.
Is bit slicer safe to download?
depends where you get it from but in general, the open-source code modifier is safe
Is giving away your PC specs and Internet speed safe?
Yes it is, no one can access your personal information unless they have passwords. Passwords are means of protection. Giving away anything BUT your passwords is just fine.
CIA triangle stand for confidentiality,integrity and availability. confidentiality mean that only relavant information given to relavant people. integrity mean data must be available in original form. availability mean when we need data,it is available for use for information purpose to take decisions.
How many level computer languages?
Languages are usually classified at two levels, low level programming and high level programming, although some experts also make a distinction of very high level languages and very low level languages. So, depending on who you ask, there are either two, three, or four. The most common set is probably three: low, high, and very high.
Issue specific security policy?
(ISSP)
A statement of the organization's position which functions to instruct employees on proper use of technologies and processes as they pertain to a specific issue.
What is the McAfee Security Center pane?
I have McAfee Security Scan Plus icon on the desktop. I am looking for McAfee SecurityCenter pane. Where can I find that?
How can you stop the threats on your computers?
There are general steps to prevent computer threats.
Proactive Support: Find the best anti-virus and anti-malware tools, according to your computer habits and needs.
Prevention: Understand how viruses and other sorts of malware can infect your computer.
Virus Removal: If your computer does become infected with a computer virus or spyware, you will need expertise on removing individual viruses.
How is a cookie used in the computer?
Cookies that are stored in your computer can aid faster uploads of certain visited websites.
How do i pull up your keylogger?
It depends on the keylogger you use.
Each keylogger has its one way.
Some will be opened when you hit their hotkey.
And some like All In One Keyloger will be open when you type the keylogger password in any application you want.
How do you remove security from folders in windows 7?
Security on folders in Windows 7 can come in several forms.
You can change some of the security properties of a folder by right clicking on the folder and selecting "properties" from the drop-down menu.
From there, you can change security in three places: under the General tab (click on the Attrbutes button), under the Sharing tab, and under the Security tab.
Under the General tab/attributes button you can set whether the folder and contents are stored as encrypted.
Under the Sharing tab you can add or remove sharing of the folder with others on the network
Under the Security tab you can change the permissions. If you really want to strip most of the security from the folder, this is where you would do most of it. If you grant "full control" of the file to others besides the owner and the administrator, you have essentially removed all security from it. To do so, either:
Click on the Edit button, select the entity you want to grant full control to, click on the "full control" box to put a check in it, then click on Apply
OR
Click Advanced button, click on "change permissions", slect the entity you want to grant full control to, click on edit, and then check the box for "full control."
Note that it is possible to set the local security policies to deny access to these options (they will appear grayed out). If that is the case, then you would have to change the security policies using the Administration tools. If you don't know how to do this, then you really need to get an experienced computer person to walk you through it in person since there are a lot of possible variables that have to be examined in order to do it right and not open up more than you meant to.
What is the best software for cleaning registry There are a lot of what to choose?
From personal experience i recommend Registry Mechanic From PC Tools I have seen a lot of solution to clean registry, but the solution from Security Stronghold seemed to be reliable enough. It has 21 levels for perfomance tweaking to fix registry quickly enough. I use it and I enjoy )) have Fun in using the thing! See related link.