answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Is giving away your PC specs and Internet speed safe?

Yes it is, no one can access your personal information unless they have passwords. Passwords are means of protection. Giving away anything BUT your passwords is just fine.

What is cia triangle?

CIA triangle stand for confidentiality,integrity and availability. confidentiality mean that only relavant information given to relavant people. integrity mean data must be available in original form. availability mean when we need data,it is available for use for information purpose to take decisions.

How many level computer languages?

Languages are usually classified at two levels, low level programming and high level programming, although some experts also make a distinction of very high level languages and very low level languages. So, depending on who you ask, there are either two, three, or four. The most common set is probably three: low, high, and very high.

Issue specific security policy?

(ISSP)

A statement of the organization's position which functions to instruct employees on proper use of technologies and processes as they pertain to a specific issue.

What is the McAfee Security Center pane?

I have McAfee Security Scan Plus icon on the desktop. I am looking for McAfee SecurityCenter pane. Where can I find that?

How can you stop the threats on your computers?

There are general steps to prevent computer threats.

Proactive Support: Find the best anti-virus and anti-malware tools, according to your computer habits and needs.

Prevention: Understand how viruses and other sorts of malware can infect your computer.

Virus Removal: If your computer does become infected with a computer virus or spyware, you will need expertise on removing individual viruses.

How do you remove security from folders in windows 7?

Security on folders in Windows 7 can come in several forms.

You can change some of the security properties of a folder by right clicking on the folder and selecting "properties" from the drop-down menu.

From there, you can change security in three places: under the General tab (click on the Attrbutes button), under the Sharing tab, and under the Security tab.

Under the General tab/attributes button you can set whether the folder and contents are stored as encrypted.

Under the Sharing tab you can add or remove sharing of the folder with others on the network

Under the Security tab you can change the permissions. If you really want to strip most of the security from the folder, this is where you would do most of it. If you grant "full control" of the file to others besides the owner and the administrator, you have essentially removed all security from it. To do so, either:

Click on the Edit button, select the entity you want to grant full control to, click on the "full control" box to put a check in it, then click on Apply

OR

Click Advanced button, click on "change permissions", slect the entity you want to grant full control to, click on edit, and then check the box for "full control."

Note that it is possible to set the local security policies to deny access to these options (they will appear grayed out). If that is the case, then you would have to change the security policies using the Administration tools. If you don't know how to do this, then you really need to get an experienced computer person to walk you through it in person since there are a lot of possible variables that have to be examined in order to do it right and not open up more than you meant to.

How is a cookie used in the computer?

Cookies that are stored in your computer can aid faster uploads of certain visited websites.

How do i pull up your keylogger?

It depends on the keylogger you use.

Each keylogger has its one way.

Some will be opened when you hit their hotkey.

And some like All In One Keyloger will be open when you type the keylogger password in any application you want.

What is the best software for cleaning registry There are a lot of what to choose?

From personal experience i recommend Registry Mechanic From PC Tools I have seen a lot of solution to clean registry, but the solution from Security Stronghold seemed to be reliable enough. It has 21 levels for perfomance tweaking to fix registry quickly enough. I use it and I enjoy )) have Fun in using the thing! See related link.

What is the best way to prevent virus from entering your computer?

This is the anti-virus work [ anti virus program ] What you just have to do is :

  1. Make sure your anti virus is working good
  2. Make sure you have a good anti virus
  3. scan every while
  4. see the results and do not go to bad websites [ work with your anti virus ]

that for preparing , but if the virus is on your computer ;

  1. scan your computer
  2. if the anti virus doesn't work with it then :
  • Sorry but in this i really don't know what you have to do!

What are Conduits for asset-backed securities?

Buys loans and securitizes them. It will sell them to the special purpose vehicle (SPV) once there are enough loans to securitize.

What are WPA2 passwords encoded in?

WPA2 implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security.

For more information, go to the Wikipedia link attached to this post.

What is Request-response paradigm?

request response paradigm is somthiing which define how request and response work in the web application or in real world.

First when the user open browser and hit any URL, request object is created.

This request object then send to the server. server finds the appropriate resources for that request and executes the logic (if any) ans send back response to the browser. Browser interprets the response and display result

Advantages and disadvantages of zombie computers?

Unless you're the hacker in control of the zombie, there is no advantage.

Disadvantages include:

* Losing partial or complete control of your computer. * Contributing to spam, DDoS attacks, and any number of computer related crimes. * Being blamed for the above actions.

Why ccna is important?

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

Are firewalls considered an Environmental Threat?

Just an online threat, unless you take the term 'firewall' literally and light up a forest. :P

Can you give some good password examples that raise the security level?

The key to having a high security level is easy. The trick is to not only have letters in your password, but numbers.

Examples:

GY2Y5698T

HUG4115TWL

Make them long about 10-15 numbers or letters. Make a password that you will know that know one in a lifetime would even think of.

What are the principal elements of a public key cryptosystem?

A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal elements could be categorized as:

1) the algorithm for generating the asymmetric key pairs (private key and public key)

2) the algorithm to encrypt a message using the private key or to "sign" the message

3) the algorithm to decrypt a message using the public key or to authenticate it from the digital signature

4) a means to publish the public key

5) a means to authenticate that the public key actually belongs to the entity it purports to belong to - sometimes omitted in "public-key cryptography". PKI provides a means to achieve this.

There are many different public key encryption algorithms. Some of the more popular ones are: SSL (Secure Socket Layer), TLS (Transport Layer Security), PGP (Pretty Good Privacy), and GPG (Gnu Privacy Guard). A mathematical algorithm is used to generate a private key which is held by the owner while the public key is provided to everyone that the owner wants to communicate with. The owner of the private key uses it to encrypt the message. Someone receiving it can only decrypt it by using the author's public key. This provides some authentication of the source of the message - if the recipient is confident that the public key they are using really belongs to the purported author. A user's public key can also be used to encrypt a message so that only the holder of the corresponding private key will be able to decrypt it. This provides confidentiality for the sent message. Two people can achieve secure communications by using each others public keys to encrypt messages so that only the recipient can read each message.

Asymmetric encryption algorithms can also be used to digitally sign messages. In this case a message digest is created and then encrypted using the private key. The recipient can duplicate the message digest, then decrypt the digital signature using the originators public key and compare the two digests. If the message has been tampered with, then the digests will not match.

Authentication of the public keys, i.e. being certain who a public key really belongs to, can be achieved in different ways:

  1. a web of trust - you get public keys from people or entities you personally know and trust and build up a "key ring" of those keys. If someone whom you have a public key from sends you a public key for another entity, you can decide whether or not you trust them enough to add the new key to your key ring. You have to install each certificate manually in order to be able to use it with the other person.
  2. PKI - in this scenario, you have a Certificate Authority (CA) that vouches for the ownership of a public key. PKI permits each certificate to be signed only by a single party: a certificate authority (CA). The CA's certificate may itself be signed by a different CA, all the way up to a 'self-signed' root certificate. These root certificates are maintained by a "Registration Authority" (RA). Root certificates must be available to those who use a lower level CA certificate and so are typically distributed widely. They are for instance, distributed with such applications as browsers and email clients. In this way SSL/TLS-protected Web pages, email messages, etc. can be authenticated without requiring users to manually install root certificates. Applications commonly include over one hundred root certificates from dozens of PKIs, thus by default bestowing trust throughout the hierarchy of certificates which lead back to them. An important additional feature is needed for this approach. You must also have a mechanism for revoking expired or compromised certificates and getting that information out to users.
  3. A third alternative is Simple Public Key Infrastructure (SPKI). SPKI does not associate users with persons, since the key is what is trusted, rather than the person. SPKI does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in SPKI terminology, where authorization is integral to its design. In this case, the entity originating a connection with a subsidiary node sends a message including the key it plans to use for communication with the subsidiary node. Each entity is identified by its public key.

What is the difference between ip spoofing and ip hiding?

When you spoof an IP address, you make it look like you're connecting to the internet with a computer that you're not.

When you hide your IP address, it's so people trying to find your IP address can't find it.

What will happen if you uninstall ASUS live update?

You will not able to update your ASUS software automatically and you will have to do that manually.

Is Microsoft Fixit safe?

Yes. There is nothing bad about the software and is recommended on the Microsoft website (of course).

How can you save your computer from virous?

The best (and perhaps usual) answer is to use an antivirus program.

For Windows, there are hoards of antivirus programs available like McAfee, Norton, Kaspersky, AVG, K7, Quickheal, Avast!, etc.

For Mac and Linux, there one AV software available called Clam AV (ClamAV.net).

How do you reset mail password?

You don't "reset" it, but you can change to a different password. The usual procedure (for online mail systems) is first to log in; then you search for an option to "change password". The details vary, depending on what mail system you use.