answersLogoWhite

0

🚓

Computer Security

Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.

1,022 Questions

How do you catch a hacker?

Email hackers are generally tracked by Cyber crime police. They can track the IP address of the hacker. With the IP address, they can track the location of person.

Advantages and disadvantages of having international standards for network protocols?

Advantages:

  1. The adoption of international standards for network protocols results in the creation of equivalent, national standards that are substantially the same as international standards in technical content
  1. International standards is one way of overcoming technical barriers in international commerce caused by differences among technical regulations and standards developed independently and separately by each nation, national standards organization, or company. Technical barriers arise when different groups come together, each with a large user base, doing some well-established thing that between them is mutually incompatible.

International standards organizations remove any political advantage by publishing their network protocols publicly, and usually for free.

Disadvantage:

  1. International standards provide connections to different computers at different part of the world. So this may lead to differences such as appearance, o.s, and many other factors which results into conflicts in governmental regulations.

Why is using an ActiveX control considered a security risk?

Because it is designed to have access to the core components of Windows

What is the purpose of the administrator password?

The computer needs at least one account with full privileges in order to allow the installation of software. By default, the computer will come with such an account - the default administrator account. Since the account has full privileges it really needs to be protected such that only someone who is supposed to have full privileges on the machine can access it. The protection comes in the form of password protecting the account.

What are ten industries that depend on networking?

1. Airlines

2. Education

3. E-commerce

4.Apple Company

5.Banking Maintains.

6.Super Market Controlling

7.CCTV Security Organization

8.Laptop Company

9.BBC

10.BT Telecom

Purpose of the UAC box in Windows Vista?

UAC is the User Account Control. That is an added security measure to prevent certain manipulations to the system. That would include messing with the system root or the program files, adding or removing programs, installing drivers, installing ActiveX controls, adding or removing user accounts, configuring Windows Update, running programs with Administrator privileges, changing another users files, defragging the drive, etc. It is a way to temporarily grant Administrator privileges without having those privileges available all the time. That way, malware cannot do those things.

What security software should your computer have?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

cutt.ly/bh7OIkg

Is ethical hacking course and network security courses the same?

No, CCNA (Cisco Certified Network Associate) is an certification that validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation and verification of connections to remote sites in a WAN.

Security ethical hacking, goes more in detail about computer/software/network security.

What is difference between user privileges and permission?

As the question was posed in the Windows section, I'll answer this from Microsoft's perspective.

User rights generally refer to logon capabilities: who can logon interactively, as a batch job, as a service, over the network, over Terminal Services, etc. These all require a certain "right" and these rights can also be denied to groups or individual users.

Permissions relate to the capability of accessing an object, such as a file, a registry entry, a service, a printer, a share, etc. Again these can be granted or denied but there is more granularity here as there are several permission types: read, write, delete, etc. Permissions are collected into Access Control Lists (ACLs) with each entry being termed an Access Control Entry (ACE).

To complete the trio in common parlance, there are privileges. These relate to overriding capabilties within Windows such as backup, restore, take ownership, debug, etc. If you hold the backup privilege, for example, you are allowed to read all files, regardless of permissions on those files. Privileges trump permissions.

Confusingly, privileges are sometimes referred to as rights, even in official MS documentation. in the days of NT4, some were also called "abilties" so you'll note the careful use of the generic term, "capability" above.

And finally, in the Novell world, permissions are called user rights.

Which file system is specially design to provide more security?

Generally, you are referring to the class of Filesystems known as Cryptographic file systems. A crypto filesystem uses a symmetric algorithm to encode the contents of disk; it requires a special key to be able to use.

Several common filesystems now support a Cryptographic mode.

How do you remove McAffe from PC?

Start>My Computer>Local Disk>Program files>McAfee>McAfee Shared components>Shedder << delete this folder For those of you trying to install Norton but it keeps telling you to uninstall McAfee Shredder first, I came across the easiest answer that worked straight away for me. Go download this freeware registry cleaner: http://www.majorgeeks.com/download.php?det=460. On the Uninstall Menu, remove McAfee Shredder and it takes care of it immediately.

How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works.

An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages.

Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to.

To get more details on the mathematics of encryption and decrption using Public Key

Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

How do you set your laptop to lock when you close your screen in Windows 7?

Hold Windows key and press L

That will lock your account.

If your account is password protected then you will get a password prompt to enter that account again.

Which type of case form factor is best desgined to keep a sytem cool?

The BTX is the answer the design focuses on reducing heat with better airflow and improved fans and coolers, its also gives better structural support for the motherboard than does ATX. Answer #2 = The BTX (Balanced Technology Extended) was designed to take full advantage of serial ATA, USB 2.0, and PCI Express technologies. The BTX form factor focuses on reducing heat with better designed airflow and implimenting improved colling fans and coolers.

Can someone find out your info from your email address?

Yes, you can doctors' email addresses easily by using the email scraper software. You can find an email database of doctors for any country, city, or, state by using this Cute Web Email Extractor software.

Contact Me:

Mobile Number: 03084471774

How can hacking be prevented?

You can get antivirus programs that help you from getting hacked, the best antivirus out there right now is BitDefender Total Security 2009.

If you are a cracker: serials for it can be found on cracking sites and video sites.

If you are looking to prevent hacking games such as runescape or WoW:

change your password atleast once a week.

Hoped this helped.

-Kristian Boy Genius

Age 10

Two devices that can be used to protect computer from fluctuations in electricity?

You need a good power surge strip or a UPS. Make sure the computer plugs into the surge strip or the UPS, and then plug the strip or UPS into the wall. Some good UPS devices actually do power conditioning which is better, but more expensive.

What is Automated Data Processing?

it support the business owners with the payroll,human resource management wit all business sizes