answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

What are advantages of mini computers?

In a 1970 survey, the New York Times suggested a consensus definition of a minicomputer as a machine costing less than $25,000, with an input-output device such as a teleprinter and at least 4K words of memory, that is capable of running programs in a higher level language, such as Fortran or Basic. The class formed a distinct group with its own hardware architectures and operating systems.

What are applications of cryptography?

Cryptography is used for securing transmission of messages, protection of data, and to provide privacy and security in any situation where information is not intended for public consumption. Examples include political campaign plans, extramarital affairs, coverups, ecommerce, business transactions, and private communications.

Can police track a computer that's off?

No. without a signal it is impossible. If a stolen computer is turned on though, that is the only way the signal can be found. Same thing with cell phones.

Wireless network attacks What type of attack is most common?

It would probably be packet sniffing, although you do need to be rather close to your target to do that. My personal weapon of choice for penetration testing I have owner's consent though is a man in the middle attack where I get between the computer and the firewall and tell each one that I am the other to let them send me information. Also from afar most people would just Denial of Service your network which is sending so much information that it can't serve your users.

What are the Benefits of Cryptography in computer Security?

Without going into the fact the Cryptography has been used in some form or another for many hundreds, if not thousands of years, it's benefits when it comes to computers really come into their own. I will give some examples.

Cryptography allows us to hide information. Be it a letter, be it a file, be it a constant stream of video or audio over digital sources. Now computers are good at only one thing it's manipulating and processing truly staggering amounts of data and information of many kinds in a short period of time. Information that would take humans to work though many, many times longer.

There for the basis of breaking encryption becomes much easier with computers and logical/Turing machines which are constructed to apply mathematical force to a cytological methods until it finds the key. Normally it would take a bunch of people working on paper and pencil a insanely long time due to the complexity of modern cryto-methodology. So much so it's just not remotely feasible without some kind of computer. In fact, computer technology as we know it today is largely based on the work of men who created them as tools to, in fact, try and break codes during world war II.

So since computers make breaking codes much easier it therefore becomes necessary to use stronger and stronger methods of encryption and increasingly more complex keys. This has been a constant war for some time between those who built crypto-systems and those who break codes.

Since most of the data in the world these days flows over computers on either public or private network connection ranging from local to global it becomes necessary to have a strong, reliable encryption methods for your data because it's laughably easy for some one to just sniff packets off a network and read all the data you happen to be sending if it's not encrypted. So Crypto-systems are needed in order to maintain data secrecy (for Governments, Companies protecting intellectual property, individuals who seek private communication and yes, even criminals who seek to keep their data safe from the authorities) for the people in question.

The benefits could be compared to either pulling some one aside to speak to them privately (encrypted) or shouting the information across a crowded room (unencrypted). It all depends on your need for security and privacy.

This is a complex subject, but basically encrypting data if done correctly allows me to hide what I am saying to my friend/co-worker/boss from those I might not want to read my mail/conversations/files.

Hope that helps!

Why are computer passwords important?

Computer password is important to everybody including you because it won't be easy for hackers to hack your computer or any software you own, which is why passwords are important. They'd have to guess each time just to get it right (which would take like an eternity). It would only take an eternity if you make your password very complex, not too complex so you wouldn't remember.

In the defense in dept strategy what could be done to help prevent a system from booting into a alternate operating system?

When considering cyber security strategies we should always take a proactive risk management approach. Part of the process is identifying the threat vectors which in your case would be anything that could be used to circumvent the boot disk. On a PC, disabling any boot device (Network, CD, USB or other hard drive, etc.) other than your actual boot disk is a start. The bios setting must also be protected with at least a password to prevent someone from altering those settings. Consider putting a lock or rivet into your PC chassis to prevent someone from accessing the battery and internal components too.

These are things we do at Lazarus Alliance when helping corporations with proactive cyber security services such as IT Audit & Compliance (FedRAMP, PCI, HIPAA, SOX, SSAE 16, ISO 27001), IT Risk Management, IT Governance & Policies and Cybervisor services.

Hope this helped!

What is the characteristic of Imposter in operating system?

The most common symptom is noticing new programs that you did not install yourself. There are other signs as well such as having your default homepage on your browser changed, pop up ads without having a browser open, programs letting you know there are viruses on your computer but require you to purchase the program in order to remove them, and an abundance of processes running in the task manager.

Which is better encryption algorithm among DES Blowfish and MD5?

MD5 isn't a encryption algorithm, it's a hashing algorithm.

Encryption will 'hide' the meaning of the encrypted text, while MD5 will 'add up' all the text to come up with a number. This number can be compared to another time this file was 'added up', to provide a simple kind of check to see if the text has been changed or if it is the same.

What is the product key for gmail password hacker v2.8.9?

There is no product key for GM Password Hacker V2.8.9. This is because you need to purchase your own copy of the program in order to get the product key. Copying passwords without purchasing them is illegal.

Why all computer users should be concerned about computer security?

If you have no computer security, people can find out everything you have done on that computer. If you ordered something online then they could find your credit card number. They could get all of your passwords and email accounts. Basically your computer is at the mercy of the outside world.

How the OS communicate with CPU?

The OS communicates with the CPU via the "kernel" - which is actually a core part of the OS.

When an operating system is loaded into memory, the kernel loads first and remains in memory until the operating system is shut down again. It should load into a protected portion of memory that cannot be written to by any other process. A computer kernel interfaces between the three major computer hardware components, providing services between:

  • the application/user interface
  • the CPU, memory
  • other hardware I/O devices
The rest of the OS makes calls to the kernel, which then interacts with the CPU (or other hardware). If properly implemented, this enforces the principle of "least privilege" - one of the fundamental tenets of computer security.

What does a file shredder actually do?

A file shredder, is a program to completely remove a filefrom a hard drive or any Magnetic and Solid-State Memory device.

But what does actually do?

It overwrites the portion on the hard drive that was previously allocated to the designated file with carefully selected patterns or junk data of different lengths, (depending on the sofware you are using), it changes the file's attributes, such as the file's name, its date stamp and its modification time several times.

For windows file shredders, after this process has been made several times, the file is deleted the way Windows understands it, i.e. the listing of that file is removed from the Windows registry and the first character in the file allocation (FAT) table is overwritten to signal other applications that the disk space is now available for further use.

Why should remove shoes before enter the computer lab?

Two reasons, one, you don't want to track dirt and debris in. Two, helps eliminate ESD, static.

What is the aim of password based door locking?

It is because if you have a key hole people can find the right shaped key and use it to open the door whereas if there is a password only you would know how to open the door

Will php 4.4.7 server support php 5 files?

Yes php 4.4.7 server support php 5 files. But most of the php 5 features are not supported by php 4.4.7 version