answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

Why prime numbers are used in RSA algorithm?

Prime numbers are helpful in cryptography because it is MUCH easier to calculate the product (multiplication) of two prime numbers than to do the reverse process (find the prime factors of a big number).

The bigger the prime numbers are, the higher the difference in time between calculating the product, or factoryzing this product back into the two prime numbers.

When person A wants to tell B a secret, they could agree on two great prime numbers (in a secret way) and later use the product to communicate. A and B could easely calculate the other's factor because they know their own factor. Anyone else would have to try to factorize the huge prime number without any knowledge which would take, ideally, longer than 4.6 billion years (the age of the Earth).

This is a VERY simplified answer and more can be found by googling around.

Can the police track which websites someone has visited?

yes very easily .

All they need to do is to get the logs from your router or your ISPs router.

How can know administrative password in cmos setup?

You cannot decrypt the administrator password in BIOS. What you can do is to reset the BIOS by finding the correct jumper on your motherboard. This should be shown in your motherboard manual. If you do not have the manual, you should be able to download one from the internet. If you cannot locate the reset BIOS jumper, simply remove the battery from the motherboard (on almost all modern boards this is a CR2032, battery which is silver, round and quite flat). Leave the battery out for a while. The next time you power up the computer the password should have been cleared, along with all other BIOS settings including the date and time.

Six components of public key infrastructure?

1. Certification authority (CA)

2. Revocation

3. Registration Authority (RA)

4. Certificate publishing methods

5. Certificate Management System

6. 'PKI aware' applications

What are the asset's security requirements in banking?

The question may be asking about asset (as in bookkeeping) and security (as in collateral on a loan) rather than 'computer security'.

From a computer security standpoint, the requirements would include:

  • establishing records retention requirements for audit papers - since these can be electronic records, a policy and means to retain them and be able to locate the relevant records is required. Section 802 of the US Sarbanes-Oxley law mandates that companies and their auditors maintain accounting documents and work papers for a minimum of seven years.
  • establishing controls to protect the confidentiality of banking records - preventing unauthorized access to them
  • establishing controls to protect the availability and reliability of systems handling banking information
  • establishing controls to protect the integrity of banking information - no unauthorized changes to the records (think in terms of someone trying to conceal fraud, embezzlement, etc.)
  • establishing regular system auditing - to identify security breaches, unauthorized activity, suspicious activity, system failures, etc.

Senior management can't just certify controls ON the system, these controls also have to control the way financial information is generated, accessed, collected, stored, processed, transmitted, and used through the system - this means implementing appropriate controls to ensure the confidentiality, integrity, and availability of banking information

User habits that create security risks?

Like writing your password down on the back of your keyboard or the bottom of your office phone? Or not changing your password? Or using the same password for lots of web sites?

How do you activate uHook USB Disk Security v 2.2?

its simple, using the activation number or serial of uHook usb security!, lol

How can you scan your computer through internet?

If you are facing the problem with the viruses and the Trojans than you need to download any anti viruses software and install on your computer like (super anti spy ware, AVG anti virus)than you will be able to scan your computer through the internet.

What is allowed IAW AR 25-2?

Installation of software, configuration of an IS or connecting any ISs to a distributed computing environment with prior approval

What is ATA Security Mode?

The most modern ATA- and SATA hard disks (IDE=ATA) support the "ATA Security Mode Feature Set". This include special functions to:

  • protect the hdd for illegal access and
  • prevent the unauthorized set of a new password (by a Virus or other malware)

These "ATA Security Mode Feature Set" functions were originally developed for Laptops / Notebooks. Since Microsoft has used these functions for the XBOX, the most 3.5" hard disks support them.

The BIOS versions of the most computers has no or only partial support of the "ATA Security Mode Feature Set" functions. This is a security hole that is usable for malware which can set a hard disk password in background to lockout the user after the next power on and prevent the loading of the Operating System and any further hard disk access.

The "Heise Verlag" has published a really interesting article about hard disk security in the c't 8/2005 - article: "AT Your Disservice" It is suggested to check the computer and if necessary to update your BIOS.

Because many mainboard vendors update their BIOS versions only for a short time, I have written a BIOS Extension that

  • starts on boot
  • supports the "ATA Security Mode Feature Set" and
  • freezes the functions to prevent malware from setting a password.

So, the ATASX (ATA Security eXtension) BIOS was introduced.

This BIOS Extension can be integrated in a PC/Notebook in two methods.

Download:

What is the administrator password?

There's no way anyone could tell you the administrator password of a computer you have.

Do you mean what is the administrator account? It is the "boss" account that allows that user to perform all functions/

Where can you download a program that can use brute force to recover passwords on online forums?

http://www.hoobie.net/brutus/ Brutus will do the trick though unless your own both the site and the server you shouldn't use it as it would be illegal!

Theres a password recovery on most forums use it!!!!

What are the disadvantages of computers for research institutes?

Security and storage are the disadvantages of computers for research institutes. The two above-mentioned limitations -- which ironically also serve as advantages -- exist because of crashes, glitches, and hackings.

Why will e-commerce become simply one more part of everyday business practice in the near future?

Yes, eCommerce is currently a part of every day business practices. Many businesses have an online presence that generates money.

Difference between encrypted file and password?

  • encrypted file - a file that has been rendered unreadable by encryption, it still contains the same information but cannot be read until decrypted
  • password - a secret word used to prove that one has permission to go someplace or read certain things

Sometimes the word password is used to refer to the keyword used to encrypt/decrypt things.

List 3 things you must bear in mind when selecting a password in order for it to remain sure?

(1) Make sure the minimum length is 8 characters

(2) Generally we suggest at least one uppercase letter, at least one number, and at least one special character (eg !)

(3) A password is useless if you need to write it on a post-it. Come up with a mnemonic device.

How does a rootkit running in user mode normally hide?

A rootkit running in user mode intercepts the API calls between the time when the API retrieves the data and when it is displayed in a window.

It can prevent Task Manager from displaying the running rootkit process, or might cause Task Manager to display a different name for this process. The program filename might not be displayed in Windows Explorer, the rootkit's registry keys might be hidden from the Registry Editor, or the Registry Editor might display incorrect information.

What is the process for RSA decryption using a public key?

RSA decryption using a public key involves the recipient using the public key provided by the sender to decrypt the encrypted message. The recipient uses the public key to raise the ciphertext to the power of the public exponent, and then takes the result modulo the public modulus to obtain the original plaintext message.