What is the best way to prevent virus from entering your computer?
This is the anti-virus work [ anti virus program ] What you just have to do is :
that for preparing , but if the virus is on your computer ;
What are Conduits for asset-backed securities?
Buys loans and securitizes them. It will sell them to the special purpose vehicle (SPV) once there are enough loans to securitize.
What are WPA2 passwords encoded in?
WPA2 implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security.
For more information, go to the Wikipedia link attached to this post.
What is Request-response paradigm?
request response paradigm is somthiing which define how request and response work in the web application or in real world.
First when the user open browser and hit any URL, request object is created.
This request object then send to the server. server finds the appropriate resources for that request and executes the logic (if any) ans send back response to the browser. Browser interprets the response and display result
Advantages and disadvantages of zombie computers?
Unless you're the hacker in control of the zombie, there is no advantage.
Disadvantages include:
* Losing partial or complete control of your computer. * Contributing to spam, DDoS attacks, and any number of computer related crimes. * Being blamed for the above actions.
You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.
CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.
Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.
You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.
CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.
Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.
You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.
CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.
Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.
You will have to decide for yourself whether it is important for you. This will depend in part on your personal preferences, and career goals.
CCNA is a certification exam, that certifies a certain level of knowledge in computer networks. It may also refer to the preparatory course (4 semesters) given at the Cisco Networking Academy worldwide. (The course is not a prerequisite for taking the exam - anybody can register for the exam.) In this course, you learn about computer networks, and especially about configuring switches and routers. Those are equipments needed for computer networks. I would say that the course is oriented towards medium-sized networks.
Many of my CCNA students were already working in networking when they took the course, for example at Internet Service Providers. Their company wanted them to have the knowledge and skills taught in the course.
Are firewalls considered an Environmental Threat?
Just an online threat, unless you take the term 'firewall' literally and light up a forest. :P
Can you give some good password examples that raise the security level?
The key to having a high security level is easy. The trick is to not only have letters in your password, but numbers.
Examples:
GY2Y5698T
HUG4115TWL
Make them long about 10-15 numbers or letters. Make a password that you will know that know one in a lifetime would even think of.
What are the principal elements of a public key cryptosystem?
A "public key cryptosystem" would be one using an asymmetric encryption algorithm. It is related to Public Key Infrastructure (PKI) and sometimes confused with it. The principal elements could be categorized as:
1) the algorithm for generating the asymmetric key pairs (private key and public key)
2) the algorithm to encrypt a message using the private key or to "sign" the message
3) the algorithm to decrypt a message using the public key or to authenticate it from the digital signature
4) a means to publish the public key
5) a means to authenticate that the public key actually belongs to the entity it purports to belong to - sometimes omitted in "public-key cryptography". PKI provides a means to achieve this.
There are many different public key encryption algorithms. Some of the more popular ones are: SSL (Secure Socket Layer), TLS (Transport Layer Security), PGP (Pretty Good Privacy), and GPG (Gnu Privacy Guard). A mathematical algorithm is used to generate a private key which is held by the owner while the public key is provided to everyone that the owner wants to communicate with. The owner of the private key uses it to encrypt the message. Someone receiving it can only decrypt it by using the author's public key. This provides some authentication of the source of the message - if the recipient is confident that the public key they are using really belongs to the purported author. A user's public key can also be used to encrypt a message so that only the holder of the corresponding private key will be able to decrypt it. This provides confidentiality for the sent message. Two people can achieve secure communications by using each others public keys to encrypt messages so that only the recipient can read each message.
Asymmetric encryption algorithms can also be used to digitally sign messages. In this case a message digest is created and then encrypted using the private key. The recipient can duplicate the message digest, then decrypt the digital signature using the originators public key and compare the two digests. If the message has been tampered with, then the digests will not match.
Authentication of the public keys, i.e. being certain who a public key really belongs to, can be achieved in different ways:
What is the difference between ip spoofing and ip hiding?
When you spoof an IP address, you make it look like you're connecting to the internet with a computer that you're not.
When you hide your IP address, it's so people trying to find your IP address can't find it.
What will happen if you uninstall ASUS live update?
You will not able to update your ASUS software automatically and you will have to do that manually.
Yes. There is nothing bad about the software and is recommended on the Microsoft website (of course).
How can you save your computer from virous?
The best (and perhaps usual) answer is to use an antivirus program.
For Windows, there are hoards of antivirus programs available like McAfee, Norton, Kaspersky, AVG, K7, Quickheal, Avast!, etc.
For Mac and Linux, there one AV software available called Clam AV (ClamAV.net).
What is the process of converting data from encrypted format back to its original format?
Decryption is the process of converting data from an encrypted format back to its original state.
How do you reset mail password?
You don't "reset" it, but you can change to a different password. The usual procedure (for online mail systems) is first to log in; then you search for an option to "change password". The details vary, depending on what mail system you use.
Who are the goons that attend defcon?
The goons- British radio comedy programme that was produced by BBC home service from 1951-1960.
Why does the websites you go to say the page is not responding?
Usually, this error means one of two things:
What is a firewall access control list?
A control list of your firewall that you can access.
answer #2
--------------
an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.
What does CIA stand for in terms of computer security?
A simple but widely-applicable security model is the CIA triad; standing for Confidentiality, Integrity and Availability; three key principles which should be guaranteed in any kind of secure system. This principle is applicable across the whole subject of Security Analysis, from access to a user's internet history to security of encrypted data across the internet. If any one of the three can be breached it can have serious consequences for the parties concerned.
What is the master password of folder lock 7?
The Master Password for Folder Locker 7.0 is the Registration Key given at the time of registration.
Do you need a separate phone line for dsl if your security system uses your phone line?
ADSL needs to be filtered and so does ALL other equipment on the line. This includes any alarm equipment (red care for example). Red care does work with ADSL but most alarm companies recommend a dedicated line.
Serial for F-Secure Internet Security 2010?
what is the serial key for f secure internet security 2010 for atleast 0ne year ????
MD5 password scrambler used to be secure but now is no longer secure.
Why it's important to not have junk email and spam?
Why too waste your space on junk and spam which have no meaning and may contain inappropiate content.better to delete them rather than keeping.
What if remote Desktop is checked in Windows Firewarll?
This generally should not be a problem. This setting is, I believe, default.
However, if you do not use Remote Desktop, I would suggest unchecking that option, to make your computer just a little bit more secure. The choice is yours.