answersLogoWhite

0

🚓

Internet Security and Privacy

Internet security and privacy includes everything from malware to phishing scams to spammers. Questions about general security practices when online belong here.

1,409 Questions

What does the message 'Bad checksum' mean why you try and download updates in Spybot?

There is a mathematical formula run across the binary form of a file. The answer to that formula is a files "checksum." This can be used later to ensure a file has not been tampered with either on purpose or by accidental corruption such as the results of a bad file transfer.

When Spybot gives you the "Bad Checksum" message it means that the file it received does not calculate to the same checksum as was recorded for the source file. The most common "fix" for this is to perform another transfer of the file. Spybot's update process being run a second time should resolve the problem.

Why does PC security interfere with downloading from the Internet?

Computer security is information security as applied to computers and networks.

The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. This included not only protection from unauthorized activities or untrustworthy individuals, but also from unplanned events and natural disasters. Bell-LaPadula model is one of the Computer security policy. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel.

What is Sandboxie?

It is a security software for Windows. Which allows you to install and run programs in a virtual sandbox environment without writing to the hard drive

My absolutely favorite FREE download is from Sandboxie [see Related Link below]. I have gotten NO virus' since I installed it. As their website states, it "runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer." ... It works.

What should a secure password NOT include?

Foreign words or phrases.
Upper and lower case letters.
foreign words or phrases

Properties Of A Secured Password
  • it cannot be found in any dictionary.
  • it contains special characters and numbers.
  • it contains a mix of upper and lower case letters.
  • it has a minimum length of 10 characters.
  • it cannot be guessed easily based on user information (birthdate, postal code, phone number etc.)
Learn to create a easy to remember secured password at [www.esecured.co.cc]

How can you torrent through a proxy so that other peers will not see your IP address?

I do not think that this is possible. Or if it is, it is not feasible because most proxy sites lag due to the large amount of traffic that they handle and P2P traffic like that would be horrible.

What kind of traffic is likely to pass through a firewall?

Browser traffic, Instant messenger traffic, file sharing traffic are some of the traffic which passes through a firewall

Why balanced modulator is called ring modulator?

the output from a balanced modulator consists of modulating freq also. this can be eliminated in a diode modulator by adding two more diodes, making a diode ring. therefore called ring modulator

What is cybeterrorism?

Cyberterrorism is where terrorists take control of one country's entire server network and crash it using a variety of methods, including, but not limited to: botnets, Trojan horse viruses. Once a cyberterrorist has control of a system they can take control of anything controlled by the internet, including the national power grid. They can also access anything that is connected to that network of computers, including home computers, but especially government computers.

Compare public key cryptography and Symmetric key cryptography?

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.

What was banned as a result of Near v Minnesota?

Prior restraints, under which a newspaper would be prevented from publishing

Deferentiate the internal system unit and the external system unit?

There is a wide difference between the internal system unit and the external system unit. The internal system unit is usually mounted on the motherboard inside the computer while the external system unit is independent of the computer like an external drive.