answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

An appropriate way to handle removable media and the information stored on?

Encrypt only Sensitive and Unclassified Information Not Cleared for Public Release

What is the best video accelerator?

Bywifi video accelerator is the best one because I have personally tried others like speedbit and it was nowhere near the speeds of bywifi.

What is ISV?

Indipendent Software Vendor

How can you block Vista Home Security 2011 from your computer?

Vista Home Security 2011 is a fake. You can do a system restore or remove the fake program. If you plan to remove Vista Home Security 2011 rather than using System Restore, see Related Links for a guides which may help.

Vista Home Security 2011 will start every time any program is run. Therefore, you will need to remove it properly. You can also use programs such as Malwarebytes to remove it.

A software package that contains two or more software programs made by the same company is called?

good

A suite or package, Some software tools perform only one task and are limited. Software packages are a mix of tools and come together as a system. For example, MentorsoftPRO, it has statistical analysis tools for plotting diagrams, charts and scientific experiments, it has training videos that apply to Lean Six Sigma methodology, and it has a project tracking management system, which all together make a package. Any one of these can be separated as a tool. Look at this at http://www.dbar-innovations.com to get a better understanding.

Would anything crazy or dangerous happen to your computer if you pause the Adblock computer program?

Nope - It's just a program that restricts most adverts form showing on your screen. Pausing it will not harm your computer (but may allow ads to be shown). I've used Adblock for a number of years without incident.

Two software applications that interact with each other?

Many applications interact with each other. For example, your operating system interacts with a regular program to get information one it. Also, your anti virus searches your computer for viruses, and will interact with other programs to extract information from them to see if their safe to use. There are so many examples to use, but mainly every program interacts with your operating system in one way or another.

Is there any software like comiclife?

Try JourneyMaker.

JourneyMaker can create comics, card, adventure type games:

Allow you to create interactive stories, comics, cards, choose-your-own-adventure type games with zero programming.

Include MP3 sounds and can be deployed as either "Web Folders" or Mac Applications which can be served over the internet (if you have a web host provider).

You can find it at http://www.brothersoft.com/journeymaker-204569.HTML

GHOUL

What is unauthorised modification?

Unauthorised modification is changing the contents of a file without the granted permission

Why are the people tricked into exposing themselves to computer security threats?

I can help you answer your homework question on computer security. Here, I've written a great summary in this attached file. Just double click to open it....

Is mywebface safe?

It is not safe. it's full of spyware.

Can someone hack into your computer using Teamviewer?

No sir, if you have it running in the back ground than maybe, but i doubt they will get your password, it regenerates every time you restart your TV and if they get it wrong i believe you get a warning so you can generate a new one or shut it down fast :Pso yeahh NO :D

What software is easybib.com?

easybib.com is a MLA, APA bibliography generator.

A passive threat to computer security is?

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.

What does Asura software do?

Hi all, The ASURA software is a Distributed shared memory multiprocessor. It is a large scale, cluster-based, distributed, shared memory, multiprocesor being developed at Kyoto university and Kuboto corporation. Up to 128 clusters are interconnected to form an ASURA system of up to 1024 processors. The basic concept of the ASURA design is to take advantage of the hierarchical structure of the system. Implementing this concept, a large shared cache is placed between each cluster and the inter-cluster network. The shared cache and the shared memories distributed among the clusters form part of ASURA's hierarchical memory architecture, providing various unique features to ASURA

Which of the following is a major security concern for mobile devices?

Device and data theft

Answer Explanation: Compared to other network equipment, a major security liability of mobile devices is theft or loss of the device and of its data. To minimize the impact of a lost or stolen device, you should transfer its data to a network location often. You should also implement secure passwords on the device, which will make unauthorized access a little more difficult. Another recommendation for mobile devices is to encrypt the information stored on a mobile device.

What is the appropriate way to handle and dispose of contaminated sharps?

Handle them very carefully. They need to be placed in a sharps container and taken to a disposal facility. Some hospitals offer this service.

How do you block adultfriendfinder site?

Go to tools up at the top left of your browser then click options then go to security and block all the sites you want.

Explain and distinguish between system software and application software?

System software is a software which controls and coordinates computer operation and makes the computer into functional.

example - MicroSoft Windows 2000, LINUX, Mac OS X, etc.

Application software is a set of methods, functions and procedures that perform useful tasks, simplify, automate or solve problems.

example - Microsoft Word, Microsoft Excel, Microsoft Visual Studio, EMACS, etc.