answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

What is security level 1 2 3 or 4?

Sorry, you do not have Security Clearance for this answer.

What security measures are available to the average computer user?

The average computer user can install or have installed virus protection software on the computer. This is the most basic security measure that can be easily applied.

What is software timer?

There are two types of timers: Hardware and Software.

Hardware timer is a small logic circuit with small piece of specific crystal which generate pulse at specific frequency. The problem with this kind of timer is that there are only a few of them in computer boards (some decades they did not use timer at all and instead electrical lines there used which was running precisely at 50Hz) and you might want to have more timers in your system. And here comes the software timer. Software timer is a descriptor in global timers table where all timers are checked every time hardware timer is triggered.

For example you have table (let it be your global timer table):

|Timer Id|Pointer to function|Time out|Init. value|Loop|

| 1 | checkIO | 1000 | 1000 |No |

| 2 | CleanBuffer | 9000 | 9000 |Yes |

| ....

Note: "Time out" and "Init. value" is in milliseconds.

Let's say my hardware timer is running at 1MHz, which means it is triggered a thousand times a second. Each time hardware timer is triggered I will be checking table to see if "Time out" column is equal to zero, if so I call function which pointer I have saved in "Pointer to function" column. If "Loop" is Yes "Time out" column is set to "Init. value". If "Loop" is No timer record from global timers table is removed.

This is very simple implementation of software timer. This was used only for example to better understand the difference of hardware and software timers.

Examples of application software?

Application software is any tool that functions and is operated by means of a computer, with the purpose of supporting or improving the What_are_examples_of_application_softwareuser's work.

Examples of application software are gyfguyhotmail

l

Ms What_are_examples_of_application_software2003 and 2007

mozilla firefox ( Browser )

Encarta

ms word

adobe acrobat

notepad

wordpad

and several others.

Is goanimate safe?

Go!Animate is very safe. You have the right to report inappropriate videos or mean comments. The GOA community members are almost always safe and kind. If you have any problems, talk to a site administrator about it.

What is preprocessing in IDS?

Before analysis all the captured data needs to be organized in a particular format or pattern for the classification purpose this whole process of organizing data is known as preprocessing. In this process data that is collected from the IDS or IPS sensors needs to be put into some canonical format or a structured database format based on the preprocessing. Once the data is formatted it is further broken down into classifications, which totally depends on the analysis scheme used. Once the data is classified, it is concatenated and used along with predefined detection templates in which the variables are replaced with real-time data. Some examples are: * Detection of unexpected privilege escalation

* Detection of the modification of system log files

* ACKDOOR Matrix 2.0 client connect

* DDos stream handler to client

How can you block a particuler sites?

Depending on your computer you can use parental controls with Microsoft Windows to block certain sites. You can also use the Windows Firewall to disallow certain outbound connections. Some anti viruses also allow you to blacklist sites.

What is software intensive system?

Software has become a central part of a rapidly growing range of applications,

products and services from all sectors of economic activity. Systems in which

software interacts with other software, systems, devices, sensors and with people

are called software-intensive systems. Examples include large-scale heterogeneous

systems, embedded systems for automotive and avionics applications, telecommunications,

wireless ad hoc systems, business applications with an emphasis on web

services etc.

What is KB2524375?

KB2524375 is a recently (as of April 2011) released downloadable (from the Microsoft website) update. It is related to a Microsoft Security Advisory dealing with nine fraudulent digital certificates issued by Comodo, a certification authority present in the Trusted Root Certification Authorities Store on all supported versions of Microsoft Windows. Comodo advised Microsoft on March 16, 2011 that nine certificates had been signed on behalf of a third party without sufficiently validating its identity. These certificates may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. It is suspected, but not yet confirmed, that a nation-state was involved in the compromise of the certificates. See the attached link for more information.

Which is an appropriate way to handle removable media and the information stored in it Encrypt only sensitive and unclassified information not cleared for public release True or False?

The requirement is to at LEAST encrypt all sensitive and unclassified information not cleared for public release that is stored on removable and mobile computing devices. That may very well mean that the entire media must be encrypted, but there are acceptable solutions that only a portion of the storage media - as an encrypted file or encrypted partition. It is important to select a truly effective encryption solution however. If the keys to decrypt the information are stored on the same device, it isn't going to provide much protection. Likewise, if it is easy to break the encryption it isn't going to help much. If temporary files store the information in unencrypted form, then again it isn't really protected. Once encrypted, the decryption key(s) need to be protected and maintained such that an authorized user can still access the data. If you lose the key and have no backup, you have just caused a self-initiated Denial-of-Service.

What are the different types of security?

  1. Large-company common stocks.
  2. Small-company common stocks (small caps).
  3. Corporate bonds (Long-term).
  4. Government bonds (Long-term).
  5. Immediate-term government bonds.
  6. Treasury bills (T-bills) / Short-term government bonds.

What is an example of system software and benefits of system software?

You can't do anything without system software. To run every application software, the computer has to have the coding as to how it could understand the language the application software is speaking and how could it emulate them into instructions it could perform - are the necessities of system software.

Prominent examples of system software are Mac OS, Linux, MS-DOS, Windows etc.

What steps could you take to help secure a computer against internet attacks for a small LAN with 12 computers connected via a hub?

  • The first step would be to install and maintain a good anti-virus, anti-spyware, and anti-adware software on your computer.
  • You should also enable the built-in firewall that probably comes with the operating system installed on each computer.
  • If the hub is a "dumb" hub, you probably can't do much with that, but if it is a "smart" hub, you can also configure it to provide some firewalling and traffic filtering capabilities. Refer to the manual for the hub to find out what, if any capabilities it might have.
  • If possible, install a firewall and/or proxy server between the LAN and the internet to protect all the computers on the LAN. Turn off the computers when they are not in use.
  • Use usernames and passwords on all the computers
  • If the operating system has the capability to have accounts with different permission levels - like "administrator" and "limited user" create limited accounts on the computers and always operate the computers under a limited account except when absolutely necessary to perform functions that require administrator level access - and then log off the administrator account as soon as you are done
  • Enable pop-up blocking on the browser(s)
  • Set the privacy/security settings on the browser(s) to the most restrictive level that is consistent with operational needs
  • Create an "acceptable use policy" document that spells out what is and is not acceptable use of the computer resources on the LAN and consequences of misuse, then have everyone who is authorized to use the computers on the LAN read the policy and sign an agreement stating that they have read the policy and agree to abide by it.
  • Train all users in best practices for computer security in personal computer use
  • Teach all users to recognize and avoid phishing and other social engineering attacks
  • Require users to change their passwords at least every 6 months - every 3 months or more often if you want to add to relative security
  • Keep all system patches up-to-date including both operating system patches and application patches
  • Only download patches from trusted sites - for example - only get Microsoft patches from the Microsoft site, not a 3rd party site.

An appropriate way to handle removable media and the information stored on?

Encrypt only Sensitive and Unclassified Information Not Cleared for Public Release

What is the best video accelerator?

Bywifi video accelerator is the best one because I have personally tried others like speedbit and it was nowhere near the speeds of bywifi.

What is ISV?

Indipendent Software Vendor

How can you block Vista Home Security 2011 from your computer?

Vista Home Security 2011 is a fake. You can do a system restore or remove the fake program. If you plan to remove Vista Home Security 2011 rather than using System Restore, see Related Links for a guides which may help.

Vista Home Security 2011 will start every time any program is run. Therefore, you will need to remove it properly. You can also use programs such as Malwarebytes to remove it.

A software package that contains two or more software programs made by the same company is called?

good

A suite or package, Some software tools perform only one task and are limited. Software packages are a mix of tools and come together as a system. For example, MentorsoftPRO, it has statistical analysis tools for plotting diagrams, charts and scientific experiments, it has training videos that apply to Lean Six Sigma methodology, and it has a project tracking management system, which all together make a package. Any one of these can be separated as a tool. Look at this at http://www.dbar-innovations.com to get a better understanding.

Would anything crazy or dangerous happen to your computer if you pause the Adblock computer program?

Nope - It's just a program that restricts most adverts form showing on your screen. Pausing it will not harm your computer (but may allow ads to be shown). I've used Adblock for a number of years without incident.

Two software applications that interact with each other?

Many applications interact with each other. For example, your operating system interacts with a regular program to get information one it. Also, your anti virus searches your computer for viruses, and will interact with other programs to extract information from them to see if their safe to use. There are so many examples to use, but mainly every program interacts with your operating system in one way or another.

Is there any software like comiclife?

Try JourneyMaker.

JourneyMaker can create comics, card, adventure type games:

Allow you to create interactive stories, comics, cards, choose-your-own-adventure type games with zero programming.

Include MP3 sounds and can be deployed as either "Web Folders" or Mac Applications which can be served over the internet (if you have a web host provider).

You can find it at http://www.brothersoft.com/journeymaker-204569.HTML

GHOUL