Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

1,047 Questions
Software and Applications (non-game)
Software Security
The Difference Between

What is the difference between application software and system software?

Answer:System software is an essential part of computer operations. The function of the systems software is to manage the resources of the computer, automate its operation and facilitate program development. It is generally provided by the computer manufacturer or a specialized programming firm (for example: Microsoft is a company that specializes in system software). While, the Application software are designed to perform specific data processing or computational tasks for the user. These programs are specifically designed to meet end-user requirements. (e.g: spreadsheets, word processors, media players and database applications).

:))

273274275
Software and Applications (non-game)
Computer Programming
Software Security

What is an important part of the system software which contains instructions that tell the computer how to perform the functions of loading storing and executing an application program?

The operating system is the part that take care of the communications between software and hardware.

012
Computer Network Security
Software Security

How does an encryption help security of an network?

One of the key objectives of computer security is confidentiality - information is only available to those who are supposed to have access to it. Encryption helps protect confidentiality of information transmitted over a network by (if it works as intended) making it difficult or impossible for someone who is not authorized to have the information to make sense of it if they intercept the information in transit. In cases of data stored on a network, if it is stored in encrypted form, it can make it difficult or impossible for an attacker to get anything useful from the encrypted file.

223224225
Computer Security
Computer Network Security
Software Security

What is a firewall access control list?

A control list of your firewall that you can access.

answer #2

--------------

an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.

167168169
Software and Applications (non-game)
Software Security
The Difference Between

What is calculated branching in software?

It is a jump with condition. Condition needs to be calculated. ex. if (a>5) { .. } else { .. }

147148149
Software and Applications (non-game)
Operating Systems
Software Security

What is the difference between operating system software utility software and application software?

  • An operating system is the software that bridges the gap between the system and the user.
  • Utility software performs actions essential for protecting, guiding, securing, and storing information or data appropriately in the system.
  • Application software manages specific actions, for example, browsers, word processors, etc.
132133134
Computer Viruses
Computer Network Security
Software Security

Can someone hack into your computer using Teamviewer?

No sir, if you have it running in the back ground than maybe, but i doubt they will get your password, it regenerates every time you restart your TV and if they get it wrong i believe you get a warning so you can generate a new one or shut it down fast :Pso yeahh NO :D

111112113
Computer Networking
Nintendo DS
Software Security

What is preprocessing in IDS?

Before analysis all the captured data needs to be organized in a particular format or pattern for the classification purpose this whole process of organizing data is known as preprocessing. In this process data that is collected from the IDS or IPS sensors needs to be put into some canonical format or a structured database format based on the preprocessing. Once the data is formatted it is further broken down into classifications, which totally depends on the analysis scheme used. Once the data is classified, it is concatenated and used along with predefined detection templates in which the variables are replaced with real-time data. Some examples are: * Detection of unexpected privilege escalation

* Detection of the modification of system log files

* ACKDOOR Matrix 2.0 client connect

* DDos stream handler to client

100101102
Software and Applications (non-game)
Mac OS
Software Security
The Difference Between

What does Asura software do?

Hi all, The ASURA software is a Distributed shared memory multiprocessor. It is a large scale, cluster-based, distributed, shared memory, multiprocesor being developed at Kyoto university and Kuboto corporation. Up to 128 clusters are interconnected to form an ASURA system of up to 1024 processors. The basic concept of the ASURA design is to take advantage of the hierarchical structure of the system. Implementing this concept, a large shared cache is placed between each cluster and the inter-cluster network. The shared cache and the shared memories distributed among the clusters form part of ASURA's hierarchical memory architecture, providing various unique features to ASURA

878889
Internet Security and Privacy
Social Engineering
Software Security

How can social engineering attacks be avoided?

Through education and clear security policies. Social engineering is targeted at the weakest link in any IT solution - the people, particularily their willingness to be helpful, truthful and trusting.

An attacker that specializes in social engineering tactics might, for example, impersonate a company officer in a very remote location and in a very tight spot - the supposed officer may be hours away from an important demonstration for the client, and his computer won't let him connect remotely to the office to download that last, most important spreadsheet he forgot. The impersonator may make a plea "for the sake of their job" or "for the sake of the big sale" and request confidential connection details.

This example attack takes advantage of a few things. The first and most easily visible problem is, that in most bigger companies, no one person really knows most of the workers in person, or even knows their voice. Maybe not even their gender. This allows the attacker to easily impersonate a company officer without even seeing them in person.

The other fact the attacker may have used in this example is two-fold: the abundance of company information usually available (the company's profile, their CEO list, their phone numbers etc.), and the abundance of further, more confidential details people like to share in the so-called "cloud" - sites like facebook or twitter, for example, may allow the attacker to know that that particular employee has been sent off to some remote corner of the world to do bussiness. And so, with the contact phone list in hand and a sob, fake story, the attacker sets out to convince a company worker that he is who he claims to be, and that his need is legitimate. And while there may be many employees he may target, he only needs to break one.

Social engineering attacks also exploit the fact that many companies do not have a strict policy regarding security enforced. Such a policy may well stop such an attack like the one in the example above dead in its tracks: for instance, there may be a closed-list pool of telephone numbers through which off-site officers may contact the company when in need of sensitive data - they may need to thoroughly authenticate by these means.

But such a policy is not yet enough - the company's employees must be educated thoroughly regarding this policy and the consequences if the policy is broken. Like I stated above, it takes just one person feeling sympathetic enough to give the sensitive information away (the attacker may have profiled this person specifically, maybe because a similar thing happened to the person under previous employer?). So the employees must know what might happen, and how to prevent it from happening.

Strong morale and integrity are also an important factor, but building these values is an important role of the company by any standard.

This answer could be improved greatly, as there are many aspects to dealing with these kind of attacks - they are much more espionage-related than computer-related, even though they commonly rely on the fallacies of modern technologies.

858687
Software and Applications (non-game)
Software Security
The Difference Between

Difference between software application development and software application maintenance?

Software development is the process that encompasses requirements engineering, design, implementation, testing, and maintenance in order to construct software.

Software maintenance concerns all activities needed to keep the system operational after is had been delivered to the user.

808182
Lincoln Continental
Ford Expedition XLT
Software Security

What is the function of the metal grey box just before the firewall on the 95 continental?

Need more info.

727374
Software and Applications (non-game)
Software Security
The Difference Between

What software is equivalent to black duck software?

A good starting point for you would be to use the search term below in Google for software that provides Intellectual Porperty Rights. You will notice that Black Duck software is listed therein! Search term - software Intellectual Property Protection

697071
Software Engineering
Software Security

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.

555657
Software Security
Computer Security Law

What is the BitLocker used for?

Encrypting hard drives

555657
Software and Applications (non-game)
Software Security
The Difference Between

What is the difference between system and application software?

System software is the code that defines what the computer is and how it controls and uses the hardware connected to it.

The computer that controls your VCR needs software to tell it how to use the display screen and what to do when the buttons are pressed etc.. The software that handles this is known as system software.

Application software is written to perform a specific task (or a group of related tasks). "Microsoft Word" for example is Application software. The application being a word processor.

484950
Software Security

What is cracked software?

A cracked program is a program that was on a try then buy basis, but someone bypassed that and now the program wont expire, this is most common on free trials like Photoshop and similar programs.

414243
Software Security
Software and Applications (non-game)

Compiler is system software?

Sometimes a compiler may be listed as system software. But, in general, a compiler falls under the heading of application software, because it is not necessary for the running or execution of the operating system, and that is what system software would be.

242526
Software and Applications (non-game)
Software Security
The Difference Between

What is VJSC software?

VJSC stands for V&J Software Consulting. "The Internet gateway." VJSC gets news,entertainment,and more and puts it on one place in the internet. VJSC.NET

394041
Software and Applications (non-game)
Inventions
Software Engineering
Software Security

Why is it called wiki software?

It comes from the Hawaiian word "wiki wiki," meaning quick. It is used to refer to software that many people can go in and change or add to. A wiki database has many authors, and people can collaborate by building on the work of others. For more information, see the "Related Links" section of this answer.

394041
Computer Viruses
Anti-Virus Software
Software Security

What is another good internet security to use besides norton internet security?

Matousec's Proactive Security Challenge hails a Comodo Internet Security Product as No. 1

AVG Internet Security 8.0 it works well and it doesn't slow down your computer.

McAffee also produces a well regarded internet security product. Kaspersky Labs does too. There are some pretty decent freeware and shareware products that perform almost as well as (or in some people's opinion - better than) the commercial products. Most of the non-commercial products provide less customer support however.

373839
Software and Applications (non-game)
Software Security
The Difference Between

What is cbt software?

Computer Based Training

363738
Computers
Computer Viruses
Computer Security
Software Security

What are the biggest threats to the security of your computer and it's contents?

Viruses and evil hackers who want information from you and the government . The most biggest threat is negligence about security from the user.

*Most "hackers" aren't evil, they are knowledgeable people who are looking for a way to expand and test their skills but do not have a proper outlet to do so. This leads to what looks like random, mean or senseless attacks on innocent people. Past this, the biggest security hole in computing is, indeed, the user. As the saying goes, "There is no patch for human stupidity".

363738
Software and Applications (non-game)
Software Security
The Difference Between

A software package that contains two or more software programs made by the same company is called?

good

A suite or package, Some software tools perform only one task and are limited. Software packages are a mix of tools and come together as a system. For example, MentorsoftPRO, it has statistical analysis tools for plotting diagrams, charts and scientific experiments, it has training videos that apply to Lean Six Sigma methodology, and it has a project tracking management system, which all together make a package. Any one of these can be separated as a tool. Look at this at http://www.dbar-innovations.com to get a better understanding.

333435
Software and Applications (non-game)
Windows XP
Software Security

What is software theft?

the soft will transfer or upload yr info onto their server,noknowing the ways will be used.someway,like the Spyware.

and for the Spyware,it is a type of malware which is installed sneakily and maliciously onto a personal computer and collects lots of information at a time about users without their permission. One of the ways that spyware enters the computer is when new programs are installed on your computer. Spyware will try everything to collect not only various types of personal information, such as Internet surfing habits and sites that have been visited but also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity.

thks,hope to help u.good luck!

333435

Copyright © 2020 Multiply Media, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Multiply.