answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do you change the executable bit in Linux for a .exe file?

chmod +x is the command to set the executable flag in Linux but, Linux does not use exe files.

How can you turnoff your computer safely when it gets stuck?

Basically, you mean if your computer crashes.

There is no safe way to turn off the computer but the best way to from the power switch (normally hold down for around 2-3 seconds).

You would try and solve this crashing problem as it may cause problems in the future.

Who needs cyber security?

Everyone who uses an Internet-connected device requires some form of cyber security to protect their device and the information stored on it from harm, such as viruses, malware, or hackers attempting to steal your data.

What is a distributed trust model?

Three basic types of distributed trust models are:

Hierarchical trust model: Here one root Certificate Authority (CA) and one or more subordinate CAs will be present. The subordinate CAs provide redundancy and load balancing. The root CA is usually off-line. Here even if a subordinate CA is compromised, the root CA can revoke the subordinate CA, thus providing redundancy.

Web of Trust: Here CAs form peer-to-peer relationship. This model is difficult to manage as the number of CAs grow larger. This kind of trust relationship may happen when different divisions of a company have different CAs, and need to work together. Here CAs must be configured to trust one another.

Bridge CA (BCA) architecture: This architecture overcomes the complexity involved with Web of Trust model. A "bridge CA" acts as the central co-ordinate point. All other CAs (known as principals) trust the "bridge" CA.

How do you get read the computer security when it is expired?

by getting lots of problems in your computer such as virus, freezing of your computer etc..

What does MD5 encryption mean?

You are probably referring to the MD5 Message-Digest Algorithm which is a widely used cryptographic hash function that produces 128-bit (16-byte) hash values. A hash function is an algorithm that takes a block of data and creates a string of data (hash) of fixed length. By running the algorithm on a received block of data, a user should be able to detect whether the data has been altered because a given block of data should always yield the same hash unless it has been altered. Ideally a hash function will allow easy computation of the hash value for any given message but make it hard to start with the hash value and come up with a message that will yield that hash value. It should also be so difficult to modify a message without changing the hash that the time and effort necessary to do it exceeds the value of doing it and extremely difficult or impractical to find two different messages with the same hash.

Note that by its nature the MD5 hash is not supposed to allow you to recover the message that was processed. Usually when we use the word "encryption" we are talking about a process where a message is converted to something called "cyphertext" which is unreadable unless you have the right algorithm and key to decrypt it and convert it back to the original message. In this respect it is more accurate to refer to "MD5 hashing" rather than MD5 encryption. See the attached link for more details on the MD5 hash.

Will Ares inffect your computer?

ares the program its self is not a maleware of virus however the files you can download with it can be infected with maleware

Save

What are the pros and cons for iris scan?

PRO-Probably the main pro of iris reading software is that it is almost 100 % accurate. Not only is it accurate, but it offers the advantage of being convenient as well. Iris patterns do not require direct contact with the face and some biometric scanners can focus on the eye and find the meaningful patterns while people are several feet away. It is fast as well, which makes it an excellent choice for many companies.

CON-Although irises greatly differ, today's face scanners are not yet able to be as accurate as they should be which is a con to iris reading. Sometimes contacts, tears, long eyelashes, or dark eyes can throw off the machines, making them a choice that doesn't yet have the accuracy of other forms of face biometrics.

Should you use Webroot PC security or Norton PC security?

Norton which is obvious since it is far more superior. This is why Norton is so much more successful than any other anti-virus on the market simply because it is far more better and secure!

What is the difference between Primarey key and Forn Key?

establishing a relation between two tables called fornkey.......the colum name should be unique is called "primary key"...a table contain only one primary key...a table contain more then one fornkey....

What encrypts the information in a data transmission?

There are many different methods of encryption of data being transmitted and they are as varied, if not more so, then the methods of transmission themselves. It could be as simple as a SSL connection to another service or even HTTPS for browsing websites.

It could become more advanced such as a 128bit or 256bit AES VPN tunnel between one network to another, or to a proxy server. It could be custom crypto methods on radio packet transfer or even encryption on microwave or line-of-site laser communication.

I would need to know the method before I could give you any useful info.

What is the lower and upper case while creating password?

Upper case are the "capital" letters ABCDEFGHIJKLMNOPQRSTUVWXYZ. Lower case are the (obviously) lower case letters abcdefghijklmnopqrstuvwxyz. All other characters fall into the 'numeric", i.e. 0123456789, or "special characters" categories. "Special characters" may include `-=[]\;',./~!@#$%^&*()_+{}|:"<>? although some of those characters may be excluded from use because the are tied to commands.

What are the types of computer security risk?

Risks can be grouped in many ways, but here is how I group them.

Top level groupings

1. Risks that confidentiality will not be sustained

2. Risks that data integrity may not be sustained

3. Risks that the system may not be available

For confidentiality, the risks are usually one of three types:

  • unauthorized outsiders trying to gain access to information on the system
  • insiders with legitimate access to the system who try to get access to information on it that they are not authorized to have access to
  • inadvertent disclosure of information by mistakes made by authorized individuals - such as posting internal company information on the public website instead of the protected internal server or sending an email to the wrong person

For integrity, the risks are usually

  • malicious outsider breaking into the system to destroy or alter files
  • malicious insider abusing their access to destroy or alter files
  • accidental corruption of data through insider mistakes
  • physical damage to storage media leading to data corruption
  • corruption of data in transit

For availability, the risks are usually

  • denial of service attacks by malicious outsiders
  • denial of service attacks by malicious insiders
  • denial of service because of hardware failures
  • denial of service because of software failures
  • natural disasters like floods, fire, lightning, etc.

Which thing should be learned by engineering students of computer science besides the course?

Evey engineering student must make sure to get aware of the currently evolving technologies (which wont be taught in the course). Learn about basic web development, GUI based application development. These will assist you when you are doing projects as part of the course.

Follow up with technology news, read about developments in open source communities, and always be updated on the latest computer hardware and software.

WHAT IS Verify Password?

Verify means "check the truth or accuracy of..." So what it basically means is repeat the password to make certain that you have got it right.

What do hackers use magic discs for?

A magic disk usually contains a set of tools that they have compiled for their activities. This disk might contain viruses, war-dialers, serial keys, key-loggers, brute-force software, or any other number of features, possibly including an entire system-on-a-disk. A hacker's magic disk is akin to a plumber's tool belt or a mechanic's toolbox. It contains all the essential items that the person needs to do their job once they gain physical access.

Is bios or rom are same?

BIOS is software. It tells system software how to communicate with installed hardware.

ROM is hardware. It stores a copy of the BIOS, and automatically loads its contents into RAM (the BIOS) when power is first applied to the system.

Thus, while the two are related, they are not the same.

What is an example of physical security?

Fences, locks, chains, doors, walls, moats, etc. are all types of physical security.