answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do you install bit locker encription?

First, Download Bitlocker.

You can download it on the Softpedia Website.

After downloading, you can now double click the newly downloaded File and start the installation. Follow the steps. If you are propted with EULA (End-User License Agreement), select I agree..

After installing, insert the pendrive and right click it's icon, click the "Bit Locker" encryption icon.

Which access control list permission should you grant the user while following least privilege practices?

Under least privilege principles, a users should be granted full rights to their own files, e.g. create, read, write, modify, delete, execute, etc. The exact rights will depend some on what the underlying OS is. Beyond that, users may also be granted limited privileges to other files to enable them to perform their responsibilities. If they are a member of another group, they may be granted read, write, or execute privileges for "group" files. The way the privileges are assigned will depend on the access control model being used. Will it be Mandatory Access Control, Discretionary Access Control, Role Based Access Control, or some other model? Depending on the model, You may have to define other privileges like "take ownership", "give ownership", or "assign classification". You usually would only want to allow a user to have the "give ownership" rights for their own files, but have a higher arbiter having the "assign classification" rights.

Is java script necessary for hacking?

No. There are many way of breaking into a system without using JavaScript.

How do you do th decryption of passwords encrypted by one way hashing algorithm?

You can't decrypt them, that's why it's called one-way. The only way to get the password is to encrypt guess words with the same algorithm and checking if the result matches the encrypted password. So if your encrypted password is a9d82da, guess what it might be - maybe "frank"? - and encrypt that word, and if you get 29d8afd, you know the password is not "frank", so try another word. If one of them encrypts into a9d82da, then you know that's the password.
Passwords are often guessed this way by using a dictionary - a simple list of words - and automatically encrypting them one by one and comparing the result with the encrypted password. Another approach that takes much longer is to try every possible combination of characters, such as aa, ab, ac, aaa, aab, aac, aba, abb, abc, etc. This can take weeks, months, even years, depending on the algorithm used and the speed of your computer.

How do you construct other logic gates from nand gate?

NAND gates are universal gates and can be used to construct any of the logic gates (AND, OR, NOT, NOR, XOR, XNOR). The easiest way to figure this out is to use basic Boolean Laws. For instance, to create a NOT gate (A'), tie one of the NAND gate's input to logic high: (A+1)' = A'. To create an AND gate (AxB), use two NANDs in series, with the second one configured as an inverter: (AxB) = ((AxB)')'

Encryption algorithms AES is FIPS 140-2 compliant?

Properly implemented, AES is FIPS 140-2 compliant.

A module implementing AES must undergo evaluation via the Cryptographic Module Validation Program (CMVP) to be certified as FIPS 140-2 compliant. Federal agencies and departments can validate that the module in use is covered by an existing FIPS 140-1 or FIPS 140-2 certificate that specifies the exact module name, hardware, software, firmware, and/or applet version numbers.

Which mac level has the highest level of security?

all macs have the same level of security

but to be extra sequre and encrypt your local hard drive go to system_prefererences>security_and_privacy then turn on filevault

also to be extra secure restart your computer while holding down alt/option then selct recovery wait for it to start up and then select utilities and then firmware password. also encrypt usb sticks by right clicking on the drive and then select encrypt

What does the program Bonjour do in Windows Vista?

It is a piece of Apple Software which is installed silently when you install sofware like iTunes, Safari, Quicktime 7.

What are some consequences of hacking?

being jailed

need to pay a fine

lose you're rights to use a computer

Answer

In my opinion hacking is gaining access to a system and its servers or banks of information. There are are two types of hacking illegal and legal. Illegal is when you hack without a person's permission. Legal hacking is obtaining a person systems legally. The consequences of illegal hacking are thousands of dollars in fines, imprisonment, and the seizure of your computer.

Answer

Hacking is to know and understand how systems work. Cracking is doing harm with theses skills.

If searching for consequences of cracking then: Well, when detected... : probably, the crackers IP-adress is going to be traced and disabled acces to internet for a while. Than, when the cracking was real seriously, (like cracking government systems and such) the crackers PC, and thus the crackers location is located, and the cracker gets caught.

Answer

In Pennsylvania hacking is illegal. Hacking is known as "unlawful use of computer and other computer crimes - 18 Pa. Cons. Stat. § 7611" which is a third degree felony. Use of force for the protection of property - 18 Pa. Cons. Stat. § 507(c)Limitations on justifiable use of force (4)(ii)(B) such force is necessary to prevent the commission of a felony in the dwelling. What do you think the consequence of hacking illegally into my computer is, let's hope it is an arrest.
game being frozen i guess

What are the encryption algorithms used in ATM?

fot the past 25 years single des algorithm was used. But now triple des is used in atm cards for the encryption and decryption.

What is the most secure operating system?

Security is a difficult and sometimes controversial thing to analyze. The only truly "secure" operating systems are those that have no contact with the outside world. The firmware in your DVD player is a good example.

Among all modern general purpose operating systems (Windows, Mac OS X, Linux, Solaris, FreeBSD, NetBSD, OpenBSD) the most secure by defualt is by far OpenBSD. OpenBSD has an extremely stringent security auditing policy; only two remote attack vulnerabilities have been found in the last ten years. This is because OpenBSD doesn't create a large attack surface by running a large number of networked apps.

Of course, the sad fact is that any networked operating system can be made insecure through careful misconfiguration. Window's problems with security stem mainly from the fact that it runs with a large number of network services on by default, and that it (XP and prior) let the user run with full privileges by default. Windows Vista attempted to fix this issue, but people rejected it as "too confusing" and complained that their old apps did not work correctly under limited accounts.

Mac OS X is better about user permissions, but still has had a (in)decent number of remote exploits. Apple's slow response to patch many of these issues will be even more worrying if it gains significant market share.

Most Linux distributions have an excellent policy of quickly patching known security vulnerabilities. Unfortunately, two of the top ten distros deliberately use outdated code (Damn Small Linux) or make it too easy to run as a privileged user by mistake (Damn Small Linux, Puppy Linux). Were these distros to gain significant popularity, their users would be exposed to a larger number of vulnerabilites than if they encouraged proper security policies.

What is the security key to connect to the access point?

I am assuming you are referring to a wireless access point (WAP), if this is wrong, please restate your question with more clarification.

A wireless access point usually connects a wireless device to a wired network. In some instances it establishes connections between two wireless devices, but this is a much less common way to use an access point. Either way, it is usually in the form of a WiFi (802.11 protocol) router or bridge or Bluetooth device. While few Bluetooth devices has any kind of security key, most wireless routers can be configured to require a password or passphrase to connect to it. The router may ship with a default password, but the person setting it up can log onto it and set a new password. Some wireless routers also connect to an authentication server which provides additional authentication, a user can connect to the access point, but until they have authenticated via the connected authentication server, they cannot access the network the wireless router is connected to.

Which encryption algorithm is better and why?

If you're talking about symmetric key encryption (the kind where you just use one key for encryption and decryption), then arguably, the best encryption algorithm you can use is the Rijndael algorithm, better known now as AES (advanced encryption standard). It is the encryption standard used by the U.S. government for classified information. It is fast, requires little memory, and the only potential attacks against it are highly theoretical.

Rijndael beat out Twofish and Serpent in the AES standard contest, but those other two algorithms will provide more than enough security as well. In the end, it doesn't really matter, since most successful attacks are made simply by finding out your key through brute force, espionage or extortion, rather than pure data analysis.

Humans are almost always the weakest point when it comes to security, and it doesn't matter what algorithm you use if someone can guess your password.

What is calculated control in Access?

It contains data that has been calculated from other data. So it could be a text box that shows a total of two numbers in two other text boxes for example.

Where can you find FREE computer monitoring software?

Answer

A great place to go is download.com and search for AVG 9 Free. AVG is award winning, free and it is used by over 80 million users. What makes it so great is that Grisoft (the people who make AVG products) decided to give anti virus protection to users for free. Before I upgraded to AVG Internet Security, the free version got rid of countless infections. The only difference between the free and paid version is the paid version (Internet Security) includes a firewall, anti rootkit, anti spam, web shield.

Here's a link to the page I was talking about. The one you want is the second result

http://download.cnet.com/1770-20_4-0.html?query=AVG+9&tag=srch&searchtype=downloads&filterName=platform%3DWindows&filter=platform%3DWindows

Why is it important to have encryption in a digital world?

Encryption makes it so that your data cannot be viewed by anyone other than you, or who ever else you share that data or password with because you have people in this world who want to steal your information and sell it.If you like my answer check out my blog cheappcrepairs.com

What is the difference between an expoit and vulnerability in information security?

A vulnerability is a weak point in a system. This implies a risk, especially to confidential information.

An exploit is a means of taking advantage of the vulnerability and using it to take advantage of a system or network.

Just because something has been identified as a vulnerability doesn't mean that it has been used to compromise a system. The presence of the exploit means someone has successfully used that weakness and taken advantage of it.

How much is renderfarm?

Please see the related link below for information.