answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

What is unauthorised access to computer systems and how can this type of computer crime affect a business.?

Concept: The entry of a user into a system that he does not have permission to use. A user gained access to another user's system. Access can be access to information as well as the power to send commands to maliciously change the system.

Effect: Case sensitive information is now freely available to anyone, and can be used for fraud like insider trading. Blackmailing can also take place. Information can be altered to portray biased information, and systems can be crashed by the planting of viruses and worms, in order to sabotage a company.

Disadvantages to using long passwords?

One of the disadvantages of the user name and password combination is that people often forget their log-in information. Also, many people use a password that is too obvious, such as 'password.' This can be a security issue for some people.

What are the benefits of using a proxy server?

The benefits of using a proxy server are that data can be exchanged remotely without a direct connection, his means that one's internet address remains private. Proxies can also be used to control access to certain websites by allowing or blocking them.

How you remove unwanted files from computer?

Well if you use internet explorer then you can go to the tools menu click delete browsing history then click delete all. This will delete cookies, history, temporary files, form data and passwords. Then you can visity your document folder and delete any document that are old and out of date and/or are not needed. Programs are a big memory taker. They take up alot of your hard drive so remove those un used or unwanted programs by clicking start,control panel, add/remove programs and then find the programs on the list and remove them.

Unless you are an experienced and capable administrator (i.e. someone who has learned from the mistake of doing this sort of thing incautiously), you should generally rely on simple and free tools to do this.

For the most basic of cleaning tasks, use Windows 2000 and XP's own built-in tools:

1. Click Start | Programs | Accessories | System Tools | Disk Cleanup (you can also just click Start | run | then type: cleanmgr).

2. This tool will scan the drive, then present some options about cleanup. You can delete temporary files, clear internet caches, etc. Basic stuff.

3. On the 'more options' tab you can uninstall applications and components you are no longer using, or clear restore points (which are created when you install drivers and important software).

Once you have run through these steps, it's always a good idea to run the Defrag program to more efficiently use all that recovered space.

For more advanced (but still easy and bulletproof) cleaning, run the Microsoft Live Safety Center tool. Free, web-based, and does an excellent job cleaning not only useless files and defragmenting your hard drive, but also removing malware in all its forms. A one-stop shop.

http://safety.live.com/

Just click 'Full Service Scan', let it install the plugin, choose 'complete scan', then sit back and watch the action.

You can set your folder options under My Computer, View to see hidden files, but that is dangerous to start deleting them. If you want a fresh start, you're better off to back up everything you want to keep onto another hard drive, CD burner, floppy, thumb drive, etc. then fdisk & format the hard drive to wipe it all out and reinstall your operating system and any games/programs, etc. you want on there. You can set your bios to boot from a windows CD or a floppy and it should walk you through the re-formatting of your drive.

......

I apologize but I do not agree to going to extreme lengths such as formatting drive unless the operating system is not responding. Temp internet files, adwares, cookies, unused dlls from improperly uninstalled programs - all cause problems such as slowing down computer. However, most of the problems of a slow computer are caused by cluttered registry files. A good registry cleaner usually speeds up [use softwares such as pccon, errorkiller, errordoctor, they are the best]. An overall cleaning utility, which has never failed me is - Ace Utilities. It has everything that is needed to keep up and running - a drive cleaner, registry cleaner, startup add remove, etc etc - check yourself. These are inexpensive and worth their price shareware programs. The freeware programs I have never tried, but would surely try them someday. Right now, these are the best up on my saddle. ...... :) Komalsoft

......

If you have broadband Internet your computer gets a lot of junk called data miners that monitor what you do and send this back to the company which send you pop ups. Very annoying. These data miners can take up a lot of room if they're left to accumulate and use up a lot of valuable CPU power so deleting them shows a considerable boost in power. They're usually very well hidden and it would take you from now till next year to delete them all as they're just continually downloading to your computer. There is software called Ad-Aware that will hunt them out and delete them. I seriously recommend it. lavasoftusa.com is the address I think.

in the search for files and or folders on the c: drive...search for specific files called *.tmp and delete all found.You can also delete all ie5 files found in the windows temporary internet directory. If you are using a computer with a :restore: such as gateway goback or even windows system restore make sure you have a normal running machine at startup (no virus etc...)then in system troubleshooting disable system restore and all your restore points. On a reboot your system comes back healthy and clean. here is something I found by playing around...for those on AOL... type in your screen name in the search for files named(your screen name)look at what you will find! delete them all...and again on reboot all is well. Funny little thing called windows!

well in my opinion never delete the programs manually do use the "add and remove" program in control pannel. bcoz in this way if u delete the installed program manually then some of the files ar eleft behind that are shared by other programs so in future this cause great problem.

secondly, if u want to remove the hidden files then u can goto views->folder option->files and folders->check the box with the option"show all files". then u can come back to ur drives and remove the files that u want to.

I agree with using the free Windows tool Disk Cleanup which also works in Vista. When you invoke it with Start/Run/type: cleanmgr you should check all the boxes for removal EXCEPT the maintenance files for Microsoft Office 2002-2003 (over 200 MB) which should be left intact or you will need the original CD for repair later when problems occur with Office. Office 2007 does not leave maintenance files available for Disk Cleanup in Vista or XP as the maintenance files are installed to a hidden msocache folder. In XP you will see an entry checkbox for Office 2007 temporary files which you can check for removal. To sum it up...in Vista check all Disk Cleanup boxes, in XP check all boxes except for Office 2002-2003 maintenance files

I also like CCleaner and Cleanup!, but have found CCleaner is better in Vista. Cleanup! does run in Vista, but is slower than its performance in XP. For CCleaner you should leave unchecked Cookies so your saved web passwords will not be purged. Everything else I delete. I am not a big fan of registry cleaners as I find they can get the typical user in a lot of trouble fast by deleting important Windows registry entries. The Registry is the brains of Windows and best left to more experienced users.

How often to run temporary file removers? Often...and once a day is not excessive.

The best way is to use a disk sanitizer, which will format the hdd and write useless information on it and then format it again, depending on the software. Classic formatting works, but data can still be recovered. If you use Linux or Unix, the shred command works great. <>

This program will remove:

Temp files

Temporary Internet files

Cookies

Junk in the registry

Stored search data

Etc..

And run Disk cleanup :-Click Start =>Programs=>Accessories=>System Tools=>Disk Cleanup

It is not uncommon to free up around 300MB after running this program the first time.

Caution Do not delete stuff in "Local Drive":\WINDOWS folder

This was probably allready mentioned. Open a folder. Tools>Folder Options click "show hidden files and folders" Delete everything that shows unless it says Can not Delete Access Denied.

Is there a need of physical security while using cryptography?

Yes. Decrypted or plain text - yet to be encrypted - messages need to be kept securely before they are encrypted and transmitted.

Damages caused by a computer virus?

When you get a computer virus your computer may get random pop-ups trying to make you download something or sell something to you. It can also spread itself across your P.C files and make it harder for you to remove it. If you do not have anti-virus software and are an inexperienced online user you should really get an anti-virus or just be more carful of what sites you go on.

What are the Features of network security?

Network security features include:

  • Firewalls: Block unauthorized access.
    
  • Intrusion Detection/Prevention Systems (IDS/IPS): Monitor and stop suspicious activity.
    
  • Encryption: Secures data in transit.
    
  • Access Control: Limits who can access the network.
    
  • VPNs: Create secure remote connections.
    
  • Anti-malware tools: Detect and block malicious software.
    
  • Security policies: Define user behavior and device use rules.
    
  • Network segmentation: Isolates parts of the network to limit breach impact.
    

These features work together to protect data and devices from threats.

How do you prevent your computer from getting the viruses?

Windows Solutions:

Run a good firewall. Windows XP and Vista & windows 7 have a built in firewall. Also, it's a good idea to have a hardware firewall, such as a router.

Run virus protection and keep it updated. Anti-Virus programs are only as good as the last update. (Also update Windows regularly.)

Run a good antispyware program such as Spybot Search & Destroy or SUPERAntiSpyware.

A lot of anti-malware is common sense -- Stay away from porno or warez and scan email attachments and downloads.

If you do get a virus -- Don't panic. That's the worst thing you can do.

Happyhot970:AVG is a good tracker for email virus scan your computer every day now to beware black outs from your computer

Make sure that if you are running in a network environment keep the sharing and permission specific for users , so that viruses will not be able to enter to that share folder.

What is web application firewall?

A network firewall prevents unlawful network access to your website. However, most website attacks are perpetrated via ports that must be kept open to allow legitimate HTTP, HTTPS and FTP traffic. This is where an application firewall is important because it inspects all the traffic and separates legitimate traffic from attack attempts against your website.

Companies as Incapsula.com provides every web application, regardless of its size, with enterprise-grade Web Application Firewall, ensuring that the website's web application is safe and available.

A web application firewall helps protect a website from illegitimate traffic

Are there any cheat codes for AQ Worlds?

yes there are cheats: Pet Rock

Go to Warlic's magic shop. Click the candle in the top left and drag it to the chest and you will get the pet rock. He does earth damage, and if you give it to Valencia, she will give you a travel pass.

Mouse Hole

Go to Yulgar's Inn and click the more button & you will see two people and a shelf with a potion click the potion and drink it & you will shrink to a size of a mouse and go inside a mouse hole

Pit

To find the secret pit go to Battleon and click around on the ground in front of Yulgar's Inn. The crusor will change to a hand when you find it. Then just click.

Change name / stats down

to change your name or put your stats down die.

then when the reeper comes up click the hourglass on the bottom of his robe he will give you a walk around quest. on it go into the purple swirly thing.if you are in a graveyard click the gravestone.a guy come up and you have to lose the battle to lower your stat. if twilly comes up then you can change your name. sometimes other stuff might come up just go along with it and then try again.

this is wath i all know... but there are more search on google. Teleportation:first add slattwob dust to the cauldron in the mage shop second add the magma leaf finally add mermazon kelp

Suppose an organization uses Kerberos for Authentication. In terms of security and service Availability what is the effect if AS or TGS goes down?

Q5. Suppose an organization uses Kerberos for authentication. In terms of security and service availability, what is the effect if AS or TGS goes down?

How do youremove a keylogger file on your computer?

1.Press the "Ctrl," "Shift" and "Esc" keys at the same time to start the Task Manager.

2.Click the "Processes" tab in the Task Manager's window.

3.Select "AKProg.exe" from the list of processes and click "End Process" button at the bottom of the window.

4.Close the Task Manager.

5.Go to the "Start" menu, "type "regedit" in the "Start Search" box and hit "Enter" to start the Registry Editor.

6.Browse to the following in the Registry Editor's window:

"Microsoft" > "Windows" > "Current Version" > "Policies" > "Explorer" > "Run" > "Application"

7.Click the "Application" folder at the end of the string and then delete the "AKProgram" value in the right pane of the Registry Editor's window.

8.Close the Registry Editor.

9.Go to the "Start" menu, type "cmd" in the "Start Search" box and hit "Enter" to start the command line window.

10.Type "regsvr32 /u hkdll.dll" in the command line window and hit "Enter" to unregister the DLL. Type "regsvr32 /u hprog.dll" in the command line window and hit "Enter" to unregister the DLL.

11.Close the command line window.

12.Go to the "Start" menu, type "hkdll.dll" in the "Start Search" box and hit "Enter." Delete all search results.

13.Repeat Step 1 for "hprog.dll," "AKProg.exe," "AKProg.exe.manifest," "Actual Keylogger Help.lnk," "Actual Keylogger.lnk," "Uninstall Actual Keylogger.lnk" and "Actual.lnk."

14.reboot your computer.

Why did Tim Harding leave Hi-5?

Tim had a motorcycle accident which left him in a wheelchair for several weeks. He decided to leave the group to allow himself to fully recover and to pursue other opportunities. He had been with the group for 9 years and said it was a "long time".

Whats the difference between a firewall and a antivirus system?

Answer

A firewall is a software componet that regulates the internet use of programs already installed on your system. Most firewalls do only that. However, there is something called a 2 way firewall. A 2 way firewall is a firewall that scans files being downloaded to your computer and stops unauthorized programs from using your internet connection to visit websites. Why is a 2 way firewall best. Well it helps to stop the potentially harmful code or malware as it usually called from infecting your computer. By anti virus system you must mean anti virus software. Anti virus software is programs that try to search for, find and remove or neutrilize a virus.

A simple firewall like the Windows Firewall in XP and Vista protects you from outside attack by making your computer's ports invisible to outsiders and by refusing to accept incoming data packets that were not requested. Third-party personal firewalls also control which programs can use your Internet connection to contact sites outside your computer - so they offer two-way protection.

An antivirus utility scans the files and Registry on your computer to detect and remove viruses and other malicious software. Its realtime component prevents malicious programs from installing or launching in the first place.

The two are quite different and both necessary.

What is the difference between inbox and spam in the Gmail?

Inbox is the primary place where emails are shown. Emails that you either archive or delete from your inbox will also be gone from other email accounts. Inbox is a more curated place for your emails, it does not require as much effort to find what you need as spam does.

Should a firewall policy only be concerned with in-bound traffic?

No. Concerning yourself with just the outside threats is one-sided - an infected computer could join the network or a networked computer could be infected through means other than the Internet itself (like inserting an infected pendrive), and that computer would then become a threat not just to the network behind the firewall, but also the Internet at large.

Monitoring inbound traffic is a way to stop incoming infections, but a firewall should be configured to catch threats inside (and outbound) as well, in order to help stop the infection from spreading when it's already "in".

What is an symmetric cryptography?

both parties share the same key to encrypt and decrypt


- Symmetric encryption means that an encrypted file can be decoded simply by reversing the way it was coded. If we consider it in terms of a padlocked box, the same key that was used to lock it, can be used to open it once again.


In terms of files this means that if you encrypt a file using a password, that same password can be used by anyone who knows it, to decrypt the data. The disadvantage of this is that whenever you encrypt a file and send it to someone, you must make sure that person also knows the password you used.


This is why asymmetric encryption exists whereby one person can encrypt and send a file to someone else using "public key cryptography". The short definition of this is that encrypted data is not decrypted in the same way which means that there is no need to have a prearranged password.


What is the history of computer viruses?

You can find the virus timeline on wikipedia what is wikipedia?

If you google the keywords "wikiepeda" the first link on google would give you that information.

If you google the keywords "history of computer viruses" this would give you all the documents with the virus timelines.

What is good and bad about msn?

Advantages

Disadvantages

Messages are sent in real-time and responses are instantaneous.

Emotions cannot be expressed as well as they can be when actually talking to a person.

Proper conversations can be held with another person without running up a large bill.

People can send viruses through files sent on instant messaging servers.

Files/pictures can be sent in instant messaging conversations.

Instant messaging systems are often used for gossiping and rumour spreading.

It is similar to talking face-to-face to a person.

It is free to use and quick to set up.

Instant messaging systems offer a safer environment than chat rooms.

You can monitor who is allowed to contact you at any given time and people can only 'add' you if they know your exact hotmail or IM address

It is possible to talk to many people at once.

Work can be done in groups, and (if still in school/higher education) the instant messaging system allows people to ask for help before going to their teacher.

Instant messaging systems allows people to talk to each other from different countries, allowing friends to keep in touch if one of them moves away.