answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

Why do people need to check their computer security all the time?

It is very much important to check and update your computer's security softwares and other related fumctions on a regular basis. Your system contains important data including files, photos, videos and your web browsers store your financial, bank and credit card details. Therefore, turn on your windows live update features to automatically pdate your system. Install the most recent version of anti-virus software like McAfee.

What is the most popular internet security software for window systems?

Norton by Symantec USA

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!

cutt.ly/djrhhFD

Is software the same as software application?

Parts are, but by definition, they are different things.

Application software can be defined as:

  • Designed to help the user to perform a singular or multiple related specific tasks.
  • A set of computer programs which work together to solve a particular problem or to be used for a particular user-defined application

System software can be defined as:

  • Designed to operate the computer hardware and to provide and maintain a platform for running application software.
  • A term for a complicated set of programs that act together to allow a computer & other programs to function.

Hi, they are different.

System software usually manages the computer systems of various independent hardware, enabling them to coordinate their work. It makes both users and software consider PC as a whole instead of different hardware. System software includes operating system and a series of basic tools.

Software application is developed for specific purpose. Sometimes, it is released as a specific program while sometimes it is a collection of programs.

How should you protect yourselves from hackers?

First it would depend on what type of browser one is using. As the hacks were launched against users using Internet Explorer you can either use a different browser( Firefox, Google Chrome, etc.) or you can use Protected Mode in Internet Explorer and enable Data Execution Prevention.

What is an OLAM software?

The word Olam in Hebrew means 'world'. It can also mean universe and realm

What are the Goal of software engineering?

Objectives

1) To define software engineering and explain its

importance

2) To discuss the concepts of software products and

software processes

3) To explain the importance of process visibility

4) To introduce the notion of professional

responsibility

What is the difference of between software application and the open source software application?

From OpenSourceSoftwarevsProprietarySoftware.htm and Wikipeadia

Since the dawn of the computing era, manufacturers and consumers of technology have strived to make things smaller. And though it may have seemed a pipe dream to the early pioneers, it's amazing to look back and see how far we've come.

From the immense complexity and size of Charles Babbage's Difference Engine in the 19th century and Alan Turing's Bombe code breaking machine in World War II, our computers have progressed beyond recognition. Cogs and gears gave way to vacuum tubes and then transistors took over. Finally, the silicon chip arrived and enabled computers to become more powerful and far smaller than anyone had ever imagined.

The fascinating world of mobile computing has only been around since the 1990s. Since then, devices that have been developed for mobile computing have taken over the wireless industry. This new type of communication is a very powerful tool for both businesses and personal use. Mobile computing is defined as the ability to use technology that is not physically connected to any static network. This actually used to mean radio transmitters that operated on a stable base, usually with the help of large antennas. 2 way radios used by police officers were also considered mobile technology but now, it means people can connect wirelessly to the internet or to a private network almost anywhere. As long as a person has one of the devices capable of wirelessly accessing the internet, they are participating in mobile computing. Chances are, you have done it with a laptop computer or a personal digital assistant or PDA.

These days, most laptops and personal digital assistants all have wireless cards or Bluetooth interfaces built into them for convenient mobile internet access. Mobile solutions are right under everyone's nose these days, and connectivity has never been easier. Other common tools for mobile computing include devices like global positioning systems and smart phones like the Cingular Blackberry. Tons of PDA software development has been going on in the past five years simply because companies have been trying hard to make PDA technology more available to the general public. These days, software companies almost make more software for PDAs and smart phones than for actual desktops.

Pocket PCs are another way to conveniently access the internet on the fly. Everyone has probably heard of the Palm Pilot. While they were the pioneers of the pocket pc, many other companies such as Dell, HP, and Toshiba have all delved into the market. Pocket PC software has also become much easier to use. Most Palms use the familiar Windows interface, allowing the general public to access the internet via the usual Internet Explorer or other ISPs. Also, people can easily download useful software, including games, Media editing tools, organization tools, and even electronic books.

Mobile computing has evolved from two-way radios that use large antennas to communicate simple messages to three inch personal computers that can do almost everything a regular computer does. People can't go to their local Starbucks and not see a laptop linked up to a hotspot these days, and mobile computing is still in its baby phase.

Compare and Contrast Proprietary and Open Source Software?

Open source software has become mainstream. Applications such as the Firefox Web browser and Linux operating system are available to aid in all areas of operation, including teaching and learning. Open source software has become a strong contender in online training and e-learning sectors. As technology continues to evolve, more open source offerings will continue to emerge in the area of e-learning, continuously changing the landscape of online teaching and learning both in academia and business fields. Open source software has grown to include: Learning management systems (LMS) Learning content management systems (LCMS) Course authoring tools Tools to create media elements such as animations, audio, and video Browsers and players to present content Courseware libraries

These resources have some important benefits: Open source software is free to download therefore lower in cost. Flexibility and customizability, Extensive active builder and user communities that forms a good technical support base. Many open source applications run on multiple platforms including Windows and Linux. Adherence to established standards, which is a high priority for open source software development. Ability to use and link to other open source software.Most proprietary software comes without the source code, which is the code originally written by the programmer. Without this code you do not have right to change the way the software is developed. When you buy proprietary software you are essentially buying the right to use the software in a specific way, and in many cases the company that developed it owns the software, and you just purchase rights to use it.

The main difference between commercial support for proprietary software and commercial support for open source software is that the proprietary software is obligatory and the open source software is optional. If you opt out of paying for support for proprietary software, you lose the right to use it in most cases. The costs incidentally tend to be quite high for proprietary software.

Perceived advantages of proprietary software include: 1) Reliable, professional support and training available;

2) Packaged, comprehensive, modular formats;

3) Regularly and easily updated.

The downside however is that it is: 1) Costly,

2) Has closed standards that hinder further development.

Open sources software has the advantage of: 1) Low cost and no license fees

2) Open standards that facilitate integration with other . Systems

3) It is easily customizable

The down side is: 1) Lack of professional support;

2) Evolving developer communities;

3) Lack of release co-ordination

4) Erratic updates

However, with such a large development and user-base, many discussion forums and help sites are available for users.

Generally, for smaller organizations and projects, Open source solutions seem to suffice. The difference in cost more than makes up for the perceived disadvantages mentioned above. Larger organizations seem to require more robust, high-quality product with high levels of service and support. They want responsibility, reliable assistance, and support from their suppliers. With rapid developments in technology, chances are you can find tools to meet your training needs in either the open source or commercial sector. But open source provides unique advantages which include filling the low-cost high-control niche that are difficult, if not impossible, to achieve through commercial, proprietary avenues.

Examples for Proprietary and Open Source Software.

Proprietary Software

Microsoft Windows, Adobe Flash Player, PS3 OS, iTunes, Adobe Photoshop, Google Earth, Mac OS X, Skype, WinZip and some versions of Unix.( such as BIND, Sendmail, X Window System, DHCP)

Open Source Software

Apache HTTPServer, the e-commerce platform osCommerce and the internet browser Mozilla Firefox. One of the most successful open source products is the GNU/Linux operating system, an open source Unix-like operating system

What is the difference between application software and software languages?

There is no difference between application software and "app" software as "app" is just the shortened version of application. Many things are shortened online to keep it easier to text them and not run up huge data fees.

What other software is similar to QuickBooks?

Sage Peachtree, Microsoft Office Accounting, Quickbooks is a all in one solution that can handle write up, pay bills, write checks, handle inventory, integrate with software like lacerte and perform tax returns, payroll, time management and much much more.

Why is it important to keep information safe and secure?

the somplest way to keep PC secure is to use a good antivirus and firewall software. and on the other hand keep a copy of your important data. best PC security must based on your right way in your using. this is a good antivirus resource for you. it is

AVG Anti-Virus Network Edition

http://www.globalshareware.com/Utilities/Security-Encryption/

hope to help you!

Is software engineer a real engineering disciplinehow can a software engineer justify that he is an engineer?

I'd say it is and many software engineers would agree with me. However, the field is still in its early stage and needs to mature more. I think in the near future, software engineering will become a full fledged engineering discipline.

What are some security measures for a home computer?

1) Install anti-virus software on the computer and keep it up-to-date with virus definition files and any applicable patches

2) Install anti-spyware software on the computer and keep it up-to-date with spyware definition files and any applicable patches

3) Use an OS based firewall

4) Keep the OS patched with the latest patches from the vendor (usually Microsoft, Apple, or whatever flavor of LINUX you favor)

5) Keep all browser software patches up-to-date

6) Keep all applications patched to their latest patch levels - especially applications that interact with browsers or that make connections to the Internet

7) Operate in limited privilege mode except when you must operate at elevated (administrator) privileges to perform actions.

8) Use usernames and passwords to log onto the computer

9) Disable the "guest" accounts if you have an OS that has them.

10) Turn off the computer when not in use (hackers can't attack it when it's not on-line)

11) Turn off popups if your browser has the capability

12) If you use a wireless connection, turn on the security on the router.

13) Change the default passwords on any peripherals (like the wireless router)

14) Use passwords with some complexity - at least 12 characters long, with a mixture of upper and lower case letters, numerals, and special characters.

15) Don't open emails from unknown sources

These are some, but not all, of the easiest security measures for home computers.

The weakest link in computer security?

register

-------------

more so the user and my oppinion below that would be the kernel. if you can edit the kernel you can do pretty much anything you want and its also less protected than the register.

Freeware software for data recovery software?

The name itself can explain data recovery service. This refers to services that will provide you solutions, not just advice, on how to process a data recovery. So whether it is a deleted message, photo or any file, may it be on your mobile or hard drive, it is possible to retrieve it! The primary purpose of this kind of service is to help you in getting back what you have lost.

How do you install software from other computers?

it is very dificult to do that so i would sugest finding out the programs and softwares that you want and go download or by them yourself. or you have to go through a long and hard process of sending through the computer cables and that takes forever. so the other way is easier. :D

What is the best security for sale for computers?

Having a computer security system is very important to protect one's computer from unauthorized access, change or destruction. The best security system is to change one's passwords on a regular basis.

What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure?

The only sure way of protecting a network is unplugging its outside connection. There is no one definitive answer as far as safeguarding a network is concerned. Cybervandals / Hackers are coming up with more ways of violating our networks, so a mixture of softwares (antiviruses, spywares, firewalls, etc) and a hardware firewall (running on either UNIX or LINUX) along with constant vigilance and a dose of common sense would be good for starters.

What is Pre Written software And customized Software?

Pre-Written Software:

There are two type of prewritten software

1:- Application Software

a:- General Purpose Software

b:- Special Purpose Software

2:- System Software.

a:- System Support Software.

b:- System Development Software.

c:- System Control software.

(Note:- You can take the definition from Wikipedia..)

Custom Made Software.

Custom software is software that is specially developed for some specific organization or other user. As such it can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.

Custom software can be developed by an in-house software development group, or be commissioned from a software house or independent software developer.

Large companies commonly use custom software for critical functions, including content management, inventory management, customer management, human resource management, or otherwise to fill needs that existing software packages cannot. Often such software is legacy software, developed before COTS software packages offering the required functionality became available.

Are computer cables a software?

Hardware is anything you can touch.

Software is programing.

How do computer risks infiltrate your computer?

Computer risks infiltrate your computer via downloaded content. This variates from simple cookies (temporary files saved into you computer by a specific site.) To movies,games etc. For example: If you download a file from an untrusted source, it might be infected with mal- or spyware. Be sure to always scan untrusted downloads, and be sure to have a good anti-virus software, in case you do get infected.

How can you evade a Wikipedia block?

You can contact WikiAnswers at e-mail Unblock @ Answers.com (remove spaces).

The reason for bans are violations of the Terms of Service. If you didn't read them, and inadvertently violated some of them, you could be reinstated. If a Supervisor provided guidance and it was ignored, or worse, and then you insulted the Supervisor, chances are pretty slim!

And posting bad language, spam, cyberbullying and vandalism aren't likely to be given a second chance.

What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.

What is Difference between software system architecture and building architecture?

Difference Between Software Architecture and Software Design

Software Architecture focuses more on the interaction between the externally visible components of the system where as the Design is about how the internal components of the system interact with each other.

Software Architecture is more about what we want the system to do and and Design is about how we want to achieve that.

Software architecture is at a higher level of abstraction than the Software Design.

Software Architecture is concerned with issues beyond the data structures and algorithms used in the system.

What is computer security risk?

This is a very general statement because many things are in fact, computer security risks. The foremost risk would probably come from malicious code like Viruses, Spyware, and Trojan horses. These can be infected on a system or number of systems through exploits in operating system software or web browsing software. Also a common trend is a technique known as "phishing" where a spammer will send an email that looks like its from someone else and by clicking on a link/opening an attachment you may be downloading malware.

Some forms of malware can "phone home" back to the attacker which is how bot-nets are created which can be used to take down entire websites or be used as a launchpad to send lots of spam.

The biggest computer security risk is actually the user behind the computer in most cases. That is why it is important to practice safe internet habits and keep virus protection up to date.

For more information visit www.microsoft.com and search security.

A risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited. All the items the first poster listed fit this description, but there are also other areas. Broadly, the sources of risks can be natural (like power surges, floods, fires, hurricanes, etc.) or man-made. The man-made can be both intentional (hackers, thieves, spammers etc.) and unintentional (coding mistakes, mistyping, loss of data storage media).