answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

Freeware software for data recovery software?

The name itself can explain data recovery service. This refers to services that will provide you solutions, not just advice, on how to process a data recovery. So whether it is a deleted message, photo or any file, may it be on your mobile or hard drive, it is possible to retrieve it! The primary purpose of this kind of service is to help you in getting back what you have lost.

How do you install software from other computers?

it is very dificult to do that so i would sugest finding out the programs and softwares that you want and go download or by them yourself. or you have to go through a long and hard process of sending through the computer cables and that takes forever. so the other way is easier. :D

What is the best security for sale for computers?

Having a computer security system is very important to protect one's computer from unauthorized access, change or destruction. The best security system is to change one's passwords on a regular basis.

What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure?

The only sure way of protecting a network is unplugging its outside connection. There is no one definitive answer as far as safeguarding a network is concerned. Cybervandals / Hackers are coming up with more ways of violating our networks, so a mixture of softwares (antiviruses, spywares, firewalls, etc) and a hardware firewall (running on either UNIX or LINUX) along with constant vigilance and a dose of common sense would be good for starters.

What is Pre Written software And customized Software?

Pre-Written Software:

There are two type of prewritten software

1:- Application Software

a:- General Purpose Software

b:- Special Purpose Software

2:- System Software.

a:- System Support Software.

b:- System Development Software.

c:- System Control software.

(Note:- You can take the definition from Wikipedia..)

Custom Made Software.

Custom software is software that is specially developed for some specific organization or other user. As such it can be contrasted with the use of software packages developed for the mass market, such as commercial off-the-shelf (COTS) software, or existing free software.

Custom software can be developed by an in-house software development group, or be commissioned from a software house or independent software developer.

Large companies commonly use custom software for critical functions, including content management, inventory management, customer management, human resource management, or otherwise to fill needs that existing software packages cannot. Often such software is legacy software, developed before COTS software packages offering the required functionality became available.

Are computer cables a software?

Hardware is anything you can touch.

Software is programing.

How do computer risks infiltrate your computer?

Computer risks infiltrate your computer via downloaded content. This variates from simple cookies (temporary files saved into you computer by a specific site.) To movies,games etc. For example: If you download a file from an untrusted source, it might be infected with mal- or spyware. Be sure to always scan untrusted downloads, and be sure to have a good anti-virus software, in case you do get infected.

How can you evade a Wikipedia block?

You can contact WikiAnswers at e-mail Unblock @ Answers.com (remove spaces).

The reason for bans are violations of the Terms of Service. If you didn't read them, and inadvertently violated some of them, you could be reinstated. If a Supervisor provided guidance and it was ignored, or worse, and then you insulted the Supervisor, chances are pretty slim!

And posting bad language, spam, cyberbullying and vandalism aren't likely to be given a second chance.

What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.

What is Difference between software system architecture and building architecture?

Difference Between Software Architecture and Software Design

Software Architecture focuses more on the interaction between the externally visible components of the system where as the Design is about how the internal components of the system interact with each other.

Software Architecture is more about what we want the system to do and and Design is about how we want to achieve that.

Software architecture is at a higher level of abstraction than the Software Design.

Software Architecture is concerned with issues beyond the data structures and algorithms used in the system.

What is computer security risk?

This is a very general statement because many things are in fact, computer security risks. The foremost risk would probably come from malicious code like Viruses, Spyware, and Trojan horses. These can be infected on a system or number of systems through exploits in operating system software or web browsing software. Also a common trend is a technique known as "phishing" where a spammer will send an email that looks like its from someone else and by clicking on a link/opening an attachment you may be downloading malware.

Some forms of malware can "phone home" back to the attacker which is how bot-nets are created which can be used to take down entire websites or be used as a launchpad to send lots of spam.

The biggest computer security risk is actually the user behind the computer in most cases. That is why it is important to practice safe internet habits and keep virus protection up to date.

For more information visit www.microsoft.com and search security.

A risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited. All the items the first poster listed fit this description, but there are also other areas. Broadly, the sources of risks can be natural (like power surges, floods, fires, hurricanes, etc.) or man-made. The man-made can be both intentional (hackers, thieves, spammers etc.) and unintentional (coding mistakes, mistyping, loss of data storage media).

What is software maintainance?

Software maintenance is an important component of software development. Maintenance involves debugging the software, and releasing periodic updates to correct problems and make the software work better.

What can be done to improve the security of business by using internet?

Most of the security problems encountered on the Internet are due to human mistakes.

The first level of security "leaks" usually occurs during the developpement of the website. If a website developper doesn't correctly plan or proof test his scripts, an eventual hacker could extract confidential information from the website itself. This is usually done by exploiting particular errors or by inserting some particular code snippets into an input field or website URL.

The usual way to fix this problem is to make better planning when coding your website and to further test your scripts, especially those dealing with private datas.

Another kind of security problem are problems due to users neglecting their own private informations. A good example of this kind of neglection is when someone gives away his or her email address on a public forum. Some "crawler bots" (small programs coded to collect email addresses) could find the address and add it to a mass-mail list, sending spam to the user. This may not be a dangerous "security" problem but the same can also happen with user names and passwords. Most of the big hacking cases occure simply because an important user of a particular network gave away his private information.

The main way to fix this problem is to be very careful to who and how you display confidential datas. The best thing being simply not to display them.

Another big security problem is the download of virus-infected files. Most of the virus will usually not affect your computer, still, some of them might contain damageable programs for your computer or even allow a distant user to take control of your computer. These programs are called a "Trojan Horse". While some people may believe the opposite, it is impossible for someone to download potentially damaging files to your computer without your content, as long as you don't let your computer filter your downloads. At the same time, it is barely impossible to simply "get a virus" by surfing on the Internet. Virus mostly come with downloaded files that you usually consented to download or in attached email files that you opened without previously checking it.

That being said, the trick here is again to be extremely careful when you download a file. Peer-to-peer networks are also good virus hives and it is preferable to stay away from them.

The last and probably most uncommon internet security problem is hacking itself. True hacking usually means that the hacker had no or few information on his target and does most of the breakthrough with his own knowledge. Common users are usually not the target of hackers, hackers will usually try to get through security barrier of big organisation's Internet servers or try to hack Website Servers. They usually get to do so by using some software engineering flaws that have yet to be fixed (most of Windows Xp auto patching aims to fix these flaws for example).

At large, there is no particular way to help in this case, unless you're the developper of that software. Simply report the case to the developper and wait for a security fix or a new version with better security.

Hopefully, some companies actively work at the elimination of all these problems. For example, Norton provides users with a whole array of security tools (e.g: Norton AntiVirus) that do make a difference when it comes to clean up (virus-wise) your computer. Microsoft is also developping a software called "Microsoft AntiSpyware" that aims to help the users keep their privacy, eliminating history datas and Spywares.

What you need to keep in mind is that most of the security problems on the Internet are due to the users misunderstanding of the media or human mistakes. You need to be extremely careful when transfering files or displaying private information and pay close attention to new kinds of virus or security leaks. It's best to also keep in mind that the Internet is not the only network, local or wireless networks are as much vulnerable than is the Net.

How did Apache HTTP Server get on your computer?

Apache would have to have been installed by a user at some point, or a program that was installed required the service.

What is the purpose of Encryption Software?

File encryption is a data security featue that offers reliable and advanced protection against security threats. Any data that can be used to identify an individual, group, company, or entity should be protected against unauthorized access during creation, transmission, operations, and storage. And that can achieved through file encryption only.

What is another good internet security to use besides norton internet security?

Matousec's Proactive Security Challenge hails a Comodo Internet Security Product as No. 1

AVG Internet Security 8.0 it works well and it doesn't slow down your computer.

McAffee also produces a well regarded internet security product. Kaspersky Labs does too. There are some pretty decent freeware and shareware products that perform almost as well as (or in some people's opinion - better than) the commercial products. Most of the non-commercial products provide less customer support however.

What is an explanation of software as a service?

one of three:

SaaS - Software-as-a-Service is a model of software deployment whereby a provider licenses an application to customers for use as a service on demand.

IaaS - Infrastructure-as-a-Service is the delivery of computer infrastructure (typically a platform virtualization environment) as a service.

PaaS - Platform-as a-Service is the delivery of a computing platform and solution stack as a service. It facilitates the deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers.

What are the Example of Application-Specific Software?

Specialised software is often written for specific companies or types of industries or organisations, that need it and it is not the kind of software you can just buy in a shop. If you want to do word processing, then it is very easy to go to a shop and buy a word processor. If you have your own company and want software to run some of your companies specialities, there would be no software that could do that in a shop, so you would get someone to write it for you. That would be specialised software. Software for companies like shops or financial institutions or for a doctor's surgery or for or managing online sales etc. would all be specialised. You would sell millions of copies of a word processor, but software that is specially written would only be used by very few people, so that is why it is not sold in shops and has to be specially designed. Ordinary computer users would have no interest in it, unlike a word processor, which almost anyone can use.

Application of maths in software engineering?

Math's and computer science influence each other. The goal of mathematics is to solve the problems in computer science and in other fields.

What program can be added to your home computer to improve its level of security?

Keep Windows Firewall on. Have an anti-virus program running all the time. Don't download anything from the web unless you are sure it can be trusted. You need an Anti Virus Program, and A Spyware program. My favorites are Kaspersky, Avast , NoAdware & Malwarebytes. Avast has a free version, and it works great. Malwarebytes Spyware has a free version also. Keep your virus programs up to date.

How can you prevent computer theft?

One can protect their PC from hackers by installing comprehensive anti-virus software programs such as AVG, Norton or Kaspersky. One should also try to find difficult to guess passwords and change them frequently, and use different passwords for different accounts.

How can you secure your personal computer?

since you want to protect your home pc, there is nothing important on business.but you may have some internet game accounts need protecting. so it is more important for you to get a game accout protection software or the antivirus.and then when you are in game, you had better not to talk with so many stragers.becouse they may bring you some danger. good resource for you;

avast! 5 Internet Security

http://www.globalshareware.com/Internet/Online-Privacy/avast-5-Internet-Security.html

What can be both a system software and an application software?

systems software interprets instructions from the application software and tells the computer what to do

It basically works when a person uses a program. It sends commands to the computer but since the computer is just a machine and can not understand the commands by its self, the operating system catches the commands and tells the computer what to do

How safe is password safe?

Answer

Passwords are essential to protect your identity in some cases, privacy and financial assests. A safe password is one that contains atleast 10 characters of letters, numbers and symbols. Remember the longer the password is the better. Also, remember to use both uppercase and lowercase letters. Don't use a password again and change all your passwords atleast every three months.