answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What is the best way to prevent virus from entering your computer?

This is the anti-virus work [ anti virus program ] What you just have to do is :

  1. Make sure your anti virus is working good
  2. Make sure you have a good anti virus
  3. scan every while
  4. see the results and do not go to bad websites [ work with your anti virus ]

that for preparing , but if the virus is on your computer ;

  1. scan your computer
  2. if the anti virus doesn't work with it then :
  • Sorry but in this i really don't know what you have to do!

What are Conduits for asset-backed securities?

Buys loans and securitizes them. It will sell them to the special purpose vehicle (SPV) once there are enough loans to securitize.

What are WPA2 passwords encoded in?

WPA2 implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security.

For more information, go to the Wikipedia link attached to this post.

What is Request-response paradigm?

request response paradigm is somthiing which define how request and response work in the web application or in real world.

First when the user open browser and hit any URL, request object is created.

This request object then send to the server. server finds the appropriate resources for that request and executes the logic (if any) ans send back response to the browser. Browser interprets the response and display result

Advantages and disadvantages of zombie computers?

Unless you're the hacker in control of the zombie, there is no advantage.

Disadvantages include:

* Losing partial or complete control of your computer. * Contributing to spam, DDoS attacks, and any number of computer related crimes. * Being blamed for the above actions.

Why ccna is important?

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.

CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.

Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.

Are firewalls considered an Environmental Threat?

Just an online threat, unless you take the term 'firewall' literally and light up a forest. :P

Can you give some good password examples that raise the security level?

The key to having a high security level is easy. The trick is to not only have letters in your password, but numbers.

Examples:

GY2Y5698T

HUG4115TWL

Make them long about 10-15 numbers or letters. Make a password that you will know that know one in a lifetime would even think of.

What are the principal elements of a public key cryptosystem?

A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal elements could be categorized as:

1) the algorithm for generating the asymmetric key pairs (private key and public key)

2) the algorithm to encrypt a message using the private key or to "sign" the message

3) the algorithm to decrypt a message using the public key or to authenticate it from the digital signature

4) a means to publish the public key

5) a means to authenticate that the public key actually belongs to the entity it purports to belong to - sometimes omitted in "public-key cryptography". PKI provides a means to achieve this.

There are many different public key encryption algorithms. Some of the more popular ones are: SSL (Secure Socket Layer), TLS (Transport Layer Security), PGP (Pretty Good Privacy), and GPG (Gnu Privacy Guard). A mathematical algorithm is used to generate a private key which is held by the owner while the public key is provided to everyone that the owner wants to communicate with. The owner of the private key uses it to encrypt the message. Someone receiving it can only decrypt it by using the author's public key. This provides some authentication of the source of the message - if the recipient is confident that the public key they are using really belongs to the purported author. A user's public key can also be used to encrypt a message so that only the holder of the corresponding private key will be able to decrypt it. This provides confidentiality for the sent message. Two people can achieve secure communications by using each others public keys to encrypt messages so that only the recipient can read each message.

Asymmetric encryption algorithms can also be used to digitally sign messages. In this case a message digest is created and then encrypted using the private key. The recipient can duplicate the message digest, then decrypt the digital signature using the originators public key and compare the two digests. If the message has been tampered with, then the digests will not match.

Authentication of the public keys, i.e. being certain who a public key really belongs to, can be achieved in different ways:

  1. a web of trust - you get public keys from people or entities you personally know and trust and build up a "key ring" of those keys. If someone whom you have a public key from sends you a public key for another entity, you can decide whether or not you trust them enough to add the new key to your key ring. You have to install each certificate manually in order to be able to use it with the other person.
  2. PKI - in this scenario, you have a Certificate Authority (CA) that vouches for the ownership of a public key. PKI permits each certificate to be signed only by a single party: a certificate authority (CA). The CA's certificate may itself be signed by a different CA, all the way up to a 'self-signed' root certificate. These root certificates are maintained by a "Registration Authority" (RA). Root certificates must be available to those who use a lower level CA certificate and so are typically distributed widely. They are for instance, distributed with such applications as browsers and email clients. In this way SSL/TLS-protected Web pages, email messages, etc. can be authenticated without requiring users to manually install root certificates. Applications commonly include over one hundred root certificates from dozens of PKIs, thus by default bestowing trust throughout the hierarchy of certificates which lead back to them. An important additional feature is needed for this approach. You must also have a mechanism for revoking expired or compromised certificates and getting that information out to users.
  3. A third alternative is Simple Public Key Infrastructure (SPKI). SPKI does not associate users with persons, since the key is what is trusted, rather than the person. SPKI does not use any notion of trust, as the verifier is also the issuer. This is called an "authorization loop" in SPKI terminology, where authorization is integral to its design. In this case, the entity originating a connection with a subsidiary node sends a message including the key it plans to use for communication with the subsidiary node. Each entity is identified by its public key.

What is the difference between ip spoofing and ip hiding?

When you spoof an IP address, you make it look like you're connecting to the internet with a computer that you're not.

When you hide your IP address, it's so people trying to find your IP address can't find it.

What will happen if you uninstall ASUS live update?

You will not able to update your ASUS software automatically and you will have to do that manually.

Is Microsoft Fixit safe?

Yes. There is nothing bad about the software and is recommended on the Microsoft website (of course).

How can you save your computer from virous?

The best (and perhaps usual) answer is to use an antivirus program.

For Windows, there are hoards of antivirus programs available like McAfee, Norton, Kaspersky, AVG, K7, Quickheal, Avast!, etc.

For Mac and Linux, there one AV software available called Clam AV (ClamAV.net).

How do you reset mail password?

You don't "reset" it, but you can change to a different password. The usual procedure (for online mail systems) is first to log in; then you search for an option to "change password". The details vary, depending on what mail system you use.

Who are the goons that attend defcon?

The goons- British radio comedy programme that was produced by BBC home service from 1951-1960.

Why does the websites you go to say the page is not responding?

Usually, this error means one of two things:

  • Your computer is not connected to the Internet
  • The server the website is hosted on is not responding. This might be because the server is 'down' (not connected to the Internet).

What is a firewall access control list?

A control list of your firewall that you can access.

answer #2

--------------

an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.

What does CIA stand for in terms of computer security?

A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and Availability; three key principles which should be guaranteed in any kind of secure system. This principle is applicable across the whole subject of Security Analysis, from access to a user's internet history to security of encrypted data across the internet. If any one of the three can be breached it can have serious consequences for the parties concerned.

What is the master password of folder lock 7?

The Master Password for Folder Locker 7.0 is the Registration Key given at the time of registration.

Do you need a separate phone line for dsl if your security system uses your phone line?

ADSL needs to be filtered and so does ALL other equipment on the line. This includes any alarm equipment (red care for example). Red care does work with ADSL but most alarm companies recommend a dedicated line.

Serial for F-Secure Internet Security 2010?

what is the serial key for f secure internet security 2010 for atleast 0ne year ????

How secure is MD5?

MD5 password scrambler used to be secure but now is no longer secure.

Why it's important to not have junk email and spam?

Why too waste your space on junk and spam which have no meaning and may contain inappropiate content.better to delete them rather than keeping.

What if remote Desktop is checked in Windows Firewarll?

This generally should not be a problem. This setting is, I believe, default.

However, if you do not use Remote Desktop, I would suggest unchecking that option, to make your computer just a little bit more secure. The choice is yours.

Trending Questions
Who demands payment to stop an attack on an organization's technology infrastruture? Is youwave secure for PC? What is the name for a program or set of instructions in a program that allow users to bypass security controls when accessing a program computer or network? What is calculated control in Access? Would loss of availability be an issue attributed to worms? Does Half Duplex use asynchronous transmission? What is the best software for cleaning registry There are a lot of what to choose? How do I remove the Recycler virus when my antivirus eset nod32 in not workin it keeps on saying communicating with extension eset nod32 kenel failed? 2 types of cpu? What can you use to prevent the theft of data from a computer? How do you block traffic attempting to exit a LAN? What type of software is used to collect information from users? What are some important considerations for data backups? Why public key criptography requires longer keys than single key cryptography? There are tons of errors on your computer now related to no disk space but I have 40 gigabytes of memory still left This happened after you installed need for speed world anyone know why? How canI remove a malware tntrax.com from my computer? How the limits of a particular electronic information system and the security level of users may affect the information that is accessible on that system? What does private key on your CAC do? A device that can protect a computer from power surges and lightning is a? How does asymmetric encryption provide confidentiality?