answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What information contained in the official phreaker manual might help a security administrator to protect a communications system?

For a security administrator it can be helpful in giving a better understanding of the principals involved in hacks themselves. It goes through and focuses in phones with explanations of key components from building your own blue box to central office operations.

What can you do to prevent security Hacking?

Implement firewall hardware as well as firewall software on your computer/computer network and implement the use of Access Control Lists (ACLs) on your network's routers.

Confidentiality integrity availability What are they used for?

These are the terms of IP Confidentiality mean no one can see your private data while it traveling through the networks some hashing technologies are like SHA (secure hashing algorithm)

Integrity also the term of IP SEC . no one can change your data while data is traveling...some techniques are also utilized for this..like make a magazines etc

Availability..high availability of data for this purpose use SAN or NAS

What is Bogon filtering?

In the context of a peer to peer blocking filter a bogon filter will not allow a connection to a bogon. A bogon is a non existent ip address. These lists can change daily so it is important to update them regularly. Filtering these out should not stop any useful connections.

Full details of hacking?

WikiAnswers will not provide information to aid illegal acts.

What is Perflib Perfdata 53a?

Perflib stands for Performance Library and Perfdata means Performance Data

use ccleaner to clean out your temp files

Is AVG incompatible with Mozilla Firefox?

According to the AVG website, AVG is compatible with the IE, Firefox, and Google browsers.

Is youwave secure for PC?

Basically youwave download in android and windows mobile and its protect the game apps.

How do you use a MacBook?

The mousepad is one of the most complicated thing about a MacBook because it's totally different than any Windows computer. instead of clicking on the bottom left corner, you click down anywhere on the pad, and two finger click for a right click. you scroll up and down with two fingers, and left and right to go to previous or next page. Scrolling or swiping with three fingers will bring you to the desktop or any other open applications.

Pretty much, macbooks are now designed for one hand use. You can even open the lid with only one hand.

There are MacBook manuals on Apple.com that have everything you need to know about them. Go check it out for further information on how these computers work.

What is the way to turn off UAC user account control?

You can easily turn it off with Smart UAC Replacement - award winning software. It will help you to disable UAC and also provide you with higher level of security. It will never annoy you!! See related link.

I am a mac user at home my company uses rsa secure id to connect our vpn unfortunately i can't login from my mac because it says the mac is not secure enough i am looking for help please?

Mac OS X has had RSA support built in for some years now so it should be do-able but without details of what software you are using and at what point it fails it is hard to provide a definitive solution. RSA do provide a token for Mac OS X (See links below). Have you tried talking to someone at your company as they may have already solved the problem?

10 bytes of data are stored memory location 8085 Transfer the entire block of data to new memory location 8070?

LXI H,8085

LXI D,8070

MVI B,10

LOOP1:

MOV A,M

XCHG D

MOV M,A

XCHG D

INX H

INX D

DCR B

MOV A,B

SBI 0

JNZ LOOP1

Note: I am doing this from memory, and I don't have an active system to debug it with, so it might be erroneous. Debugging is necessary.

Why is WPA preferred over WEP?

WEP is a part of 802.11. WEP is not secure because its wickness in the encryption mechanism. Which is used by many wireless network scanners. It takes about 5 minutes to hack WEP. It's highly recommended to use WPA or WPA2-PSK AES over WEP.

How do you use an ESD wrist strap with a laptop?

Just wrap one end around your wrist and then clamp the other end to any metal part of the laptop. Same as a desktop just a little tighter.

How can you get an online tutorial on Cyber Security?

A very good option for a tutorial is to try one of the free college courses available online, or to watch something available on YouTube. Looks like khanacademy.org, ACADGILD, and NERSC have tutorials online, as well as many tutorial companies.

Do Isohunt torrents contain viruses?

NEVER trust software you download. For example, a downloaded bittorent client added a toolbar i EXPLICITLY asked not to have AND required a system restore to eliminate it. (the clue was that the download of a torrent i HAD NOT REQUESTED was proceeding while i could NOT google).

NEVER trust software you download.

(NOTE: the original answer said something along the lines of "bittorrent client ok, but you can get a virus from things you download".... why did you trust the original bittorrent client download?)

Is amazon a secure site?

it should be ok but i would go with eBay and craigslist although some people may scam you it is very very slim chance that that will happen

Amazon is a secure site. They are found to be quite reliable compared to eBay and craigslist. Their customer service is responsive when you have an issue related to whatever you ordered.

What is security planning in computer security?

Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations. It is essentially the strategic view of computer security as opposed to the tactical view that an intrusion detection analyst might have.

What does e safety involve?

E-safety (internet safety) involves being safe on the Internet. This includes things like using the latest antivirus, spyware, and firewall software. It includes safeguarding your personal information. It is often wise to avoid putting photos online, since it makes it easier for unsavory people to find you. Not giving out important/sensitive information about yourself is one of the best ways to stay safe. You never know who is on the other side of the computer screen.

Example: John, aged 14 met "Sarah" online. He gave her his phone number, address, date of birth and School he attended. After a couple of days they decided to meet up in real. "Sarah" turned out to be David, aged 46.

How do you fix the bugs in an existing application?

If a application is existing (You bought it or downloaded for free from the internet) then you cannot debug the application because the source codes are hidden and cannot be debugged. If you are talking about missing files then just download the missing file and paste them in the folder of the application.