answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

How do you disable pop-up blockers when there is no pop-up mechanism-regulator at the bottom of internet explorer or in tools-internet options or privacy or security folders not have security center?

== == If you have SP2 installed, then Internet Explorer has a built in POP-UP blocker. Try clicking Tools or Do some research on line about this pop-up blocker and how to disable it. Solution: Just Right click internet explorer and select properties. go to security tab bottom side just uncheck or check .

What does software is a differentiator mean?

Software can divide a large task into smaller ones and then perform the tasks. This phenomena in software of breaking the task into smaller ones makes the software as differentiators.

What is primary goal of a rootkit?

It's used to try and hide or obscure the fact that a system has been compromised or hacked.

How do you find your password for zangle?

Talk to your school if you forgot your password. It is student information for teachers, parents, and students to share information on a student's progress.

Distinguish between system software application software with suitable example?

Distinguish between System software and Application software

System software would include the bios, operating system, and utilities (computing functions). Application software would include converters, drivers, tasks, etc...(hardware and user specific functions).

Why do computers need software and what software can be downloaded?

Because the computer needs the software to work. With out OS we cannot operate the computer. So we need softwares to run the computer. All the software can be downloaded and installed in computers nowadays.we lots of free download sites

What major trends are occurring in software and what capabilities do you expect to see in future software pakages?

Many trends are occurring in softwares.

Like at first the computers were very hard to maintain. But now-a-days softwares have made it very easy to maintain computers.The major trends or changes occurring in softwares are:

have too much of flexibility

now used for daily communication

are used for security systems

are also used for robbing(hacking)

Windows programs are so easy to maintain that even a 12 year kid can run them.

People use software such as Microsoft Outlook Express, Yahoo Messenger, MSN Messenger,etc., for daily communication.

Security systems in banks,offices,courts, etc. are being computerized.

People who know a lot about software rob banks, by breaking their security systems.This kind of robbing is known as Cracking.

Some software producing computers expect that by some years people will no more use the mouse or keyboard, they will use devices which will directly read the brains of people and will make the computer perform those jobs. The computer that lets Stephen Hawkins speak and do other jobs is an example of this kind of computers.

Software has too much flexibility: Flexibility has become one of the major attributes of modern softwares in the sense that, now developed software are becoming more easier to use .It does not really acquire tutorials or have to be thought before one can use a software on the market these days. This is due to cues and depicting of naturalness in software making it meaningful for users to see and use without haven to be explained before use. For example early versions of Microsoft Office were that uneasy to use but with current versions of this Application software (That is in 2007-2010), the organization is more simple therefore becoming more flexible because you can easily manipulate around with it.

Enables Multitasking: One major trend occurring in softwares these days include its Multitasking supportiveness. Multitasking refers to the ability of a system specifically CPU/COMPUTER SYSTEM to run more than one task simultaneously.Softwares these days has the ability to support Multitasking. Typical example is, The Microsoft XP PACK versions were able to support multitasking but not more effective as in Windows 7 which can carry more than 4 tasks at a time. It could copy, delete, install at the same time which shows how software evolving these days are Multitasking supported.

Is there a quiz about data security?

http://www.theq3.com/security-quiz.php Test your knowledge of data security by trying the Bosanova Q3 Data Security Quiz. Answer frequently asked questions about backup encryption, storage encryption, tape encryption & common misconceptions. You need 60% to pass the quiz and you can put the icon on your site/blog.

How does software different from hardware?

Hardware is the physical piece of equipment on which the software runs (i.e. the computer).

Software is the set of instructions that tells the hardware what to do (i.e. Microsoft Word).

6 How can a computer use ARP to break security?

But if the gateway computer's knowledge of the destination computer's MAC address is either missing or too old and expired, it must send a broadcast to all of the computers on the LAN network asking which specific computer is assigned to the IP address of the packet the gateway is trying to forward. To do this the gateway broadcasts an ARP Request that will be received by every computer on the Ethernet LAN. The request simply asks for a reply from the one machine that is currently assigned to the IP contained in the request. Each computer on the LAN checks to see whether the IP is (one of) its own. The computer finding a match with (one of) its own IPs will send an ARP Reply back to the requesting device. When the gateway computer receives the ARP Reply, it has the MAC address of the replying computer along with the replying computer's IP address, contained in the reply packet. The receiving machine enters this information into a "cache" of all similar IP-address-to-MAC-address pairings which is maintained for every machine it has communicated with on the LAN. This is known as the machine's "ARP Cache" since it retains the history of all previous unexpired ARP Replies which it has received. Every computer participating on the LAN maintains its own similar ARP cache containing the IP-to-MAC relationships that allow them to properly address IP packets with Ethernet MAC addresses.

Notice that in this example, our gateway computer added this new entry into its ARP cache upon the receipt of an ARP Reply packet. The ARP protocol is so simple - just asking who has the IP and replying "I have the IP" - that there is no provision for any sort of security or authentication of the replying computer. In other words, any computer on the LAN could claim to have the IP in question. The implementation of the ARP protocol is so simple and straightforward that the receipt of an ARP reply at any time, even when there are no ARP requests outstanding, causes the receiving computer to add the newly received information to its ARP cache. Consequently, if the gateway computer were to receive a SPOOFED ARP REPLY from an attacking computer claiming that it was assigned an IP that belonged to some other computer, the gateway would trustingly and blindly REPLACE its current correct entry with the maliciously misleading replacement! If at the same time the malicious attacking computer were to send a similar ARP reply to the computer being hijacked, maliciously replacing the ARP cache entry for the gateway computer, then any subsequent traffic bound for the gateway would instead be sent to the attacking computer. If the attacker forwards any of the redirected traffic it receives onto the proper original computer - after inspecting and perhaps even modifying the data - neither of the intercepted computers will detect that all of their communications is now being relayed through an unknown and probably malicious intermediary computer. By merely injecting two ARP reply packets into a totally trusting LAN, any malicious computer is able to receive all traffic going back and forth between any two computers on the LAN such as any target machine and the LAN's gateway.

What are some of the basic precautions a computer owner or network administrator can take to help make the computing environment secure What are some of the basic security threats that a user or adm?

Make sure your system is behind a firewall, use the NAT proxy service to hide your IP address, use of anti-spyware and anti-virus. Plus, make sure your applications and system software are up to date with all the latest patches.

If you were in charge of a large team implementing substantial software systems how would you ensure that the product was both reliable and finished on time?

It's been said: you can have your software good (quality), fast (on schedule), and cheap (within a limited budget) - but you can only pick two. To have the software be reliable and on-time you must make sure your plan includes sufficient resources - both people (with the right skills) and the option to pay overtime when necessary to relieve bottlenecks. The project plan should have built-in time and resource reserves to apply when Murphy's law comes into play so that bottlenecks don't force a choice between meeting schedule and producing a reliable product.

In project planning you have to identify at the outset what the dependencies are: all your finish-to-finish, finish-to-start, start-to-start, and start-to-finish dependencies. This makes it possible to identify key milestones early and plan for reviews at those points to keep the project on schedule. One important task to include is proper intermediate testing. You cannot consider a sub-task done until the code has been tested - but the testing cannot start until the coding is at least partially done. Defects found during testing must be re-worked and regression testing must be done once the defects are corrected.

If this is starting to sound a bit involved then you can see the value of having well defined change management and defect tracking/resolution processes. With these processes operating correctly, the project manager and the large team they are directing should always have a good handle on whether the product is on-schedule and whether it is meeting its quality (reliability) targets. If the schedule slips or reliability issues crop up, the reserves that were included in the plan at the beginning are available to keep things moving. Note that if the reserves were NOT included in the initial plan then the ad hoc "crap! what do we do now?" method of management may also result in unplanned overall schedule slip, degraded quality, AND increased costs.

==========

For reliable, you can obviously test it by making your own fake Trojan.

for finished on time, get an estimated date, then add 1 or 2 weeks just in case of any delay and just make sure to finish it a few days before release.

NOTE:

Obviously, no anti-virus can be 100% reliable as proffessional hackers can always find a loophole, just like when psn got hacked

What is calculated branching in software?

It is a jump with condition. Condition needs to be calculated. ex. if (a>5) { .. } else { .. }

Does any keygen have any effect on PC?

Some of them do add few spyware, malware.

Best to open a Keygen in a Sandbox (e.g. Sandboxie).

Security experts agree that average home computer users have very little knowledge regarding how to make their computers secure. What suggestions would you offer to make more users security competent?

-Use an antivirus/antimalware. A good commercial one is McAffee, among others such as Norton. For free, there's avast! or AVG Free edition. -Use Linux or a Unix system, such as Mac OS or FreeBSD. Ask yourself this: would you use Windows for a sensitive computing environment (e.g. top-secret gov't documents?) -If you use Windows, be careful. Don't use the Internet or connect your computer to any network w/o an antimalware suite. Be careful with downlaods, avoid Limewire and other filesharing apps. -Use long passwords (that you can remember) integrating numbers, symbols and the whole enchilada. -Always be around your PC when it's being repaired. You can't trust anyone these days, and even a nice, sharp-looking tech can whip out his flash drive and copy sensitive data to it while you are away pulling clothes out of the dryer. -Watch your children. Make sure they are only on limited accts so your four year old doesn't render Windows useless by opening the Command Prompt and coincidentally screwing things up--things like that. It always happens! Plus, you don't want them on sites that are bad. -Don't put foreign CDs, floppies, USB flashdrives, etc into your computer. Does this mean for example "don't put that original-looking Microsoft Office Install CD in?" No. But if you don't know where it came from, don't use it. -Stomp the living lights out of your hard disk drive if and when you dispose of your computer. A safer, sane and easier way to protect data before desposing/donating is to use a disk sanitizer. You'll find some on the Internet or maybe at your local Staples or CompUSA if you're lucky. -I would have two separate machines: one for Internet, and one for the "important" stuff. That way, if a virus creeps in or if some crook decides to spy on you, they'll find nothing or ruin nothing important. Your "important" computer will contain your important stuff and will not be connected to any network. Antimalware/antivirus software cannot possibly make your computer 100% virus/malware free, immune, whatever. Maybe the real number is around 88% or so. -My advice with buying with credit cards: If you get those prepaid credit cards at Rite Aid or something where they act like credit cards but are actually debit cards, you won't have the potential of someone damagaing your credit score. If someone does steal your credit card #, it will just be a minor inconvenience and you won't have to fight with your credit card co and the credit agencies. I wouldn't use a real credit card on the internet. -Stay away from online banking -there's more ways, I'm just wore out from typing... hope this helps.

Why would you want computer security?

For numerous reasons. With the number and nature of viruses out there, they can do anything from simply gumming up your computers operations to forcing you to delete everything and reload your operating system from the ground up [been there; done that]. Some can even cause physical damage forcing you to buy new hardware. But nowadays, that is just the tip of the iceberg - a good many viruses are content to use your system to send SPAM emails to your friends or force your browser to open websites you never wanted to see but others can program your computer to collect and secretly send information to hackers and organizations (including passwords and personal information), secretly intercept your website requests and redirect you to fake ones designed to trick you into giving critical personal info to thieves, or even install software to let hackers remotely control your computer and go through all the files on your computer at their leisure. There really isn't much viruses can't do.

Simply put, computer security is extremely important. It's worth doing your research and finding a good security program that will protect your system on several levels. Another simple thing you can do is NEVER surf the web using a user that has administrative authority. Set up a "power user" for your surfing and only "administrative" authority when downloading needed updates and programs FROM KNOWN SAFE SOURCES. This protects your computer because only 'administrators' can install programs that will affect your computer permanently. Power users can download songs and pictures and such, but they can't install programs. If you don't understand what that means, that's okay, just go talk with your favorite geek or make an appointment with a local computer repair service and have them help you set it up and explain how to use it. And look into a good computer security suite.

What is the difference between application software and system software?

Answer:System software is an essential part of computer operations. The function of the systems software is to manage the resources of the computer, automate its operation and facilitate program development. It is generally provided by the computer manufacturer or a specialized programming firm (for example: Microsoft is a company that specializes in system software). While, the Application software are designed to perform specific data processing or computational tasks for the user. These programs are specifically designed to meet end-user requirements. (e.g: spreadsheets, word processors, media players and database applications).

:))

What is the benefit of performing buckups?

Data Backups are either done on a regular basis or your data will be lost. Any person who has had a computer stop working on them suddenly - crash - will know from there own experience what a disaster it is. Those who have used desktop computers say there are 3 things you need to know about data storage - backup, backup, backup, backup. The more experience you have with computers the more backups you will make and the more places you will find to hold the backups in case something goes wrong with the data you have.

Computer security-protection mechanisms including encryption?

MACKEEPER DEALS

MacKeeperClario Tech Limited the UK-based company present product MacKeeper, an award-winning system utility which includes a set of powerful maintenance features for Mac Optimization, Security, Data Control and Cleaning. So it is like 911 for your Mac.

cutt.ly/ZjEqw5N

Netgear WRG614 v7 wireless router but you cant find the neccesery software for it to run with your computer and the software on the netgear website does not work?

Just use an internet browser (Mozilla, Internet Explorer and so). In the address bar type the router ip address (you are supposed to know it). If you did everything right you will see the page with an user box and password box. Enter the user name and password and press enter. In this way you get access to the router settings.

What is best internet TV software?

First things first... there are 100s if not 1000s of 3rd party free (freeware) and paid (shareware) Internet TV software (or whatever name applies) out there. Ask yourself what type of channels and shows do you really want to watch - favorite sports, sitcoms/episodes, uncensored TV, movies, etc. If you know already what you want, then search the Internet for PC satellite tv, internet tv, or some other search term.

Read reviews to find all the popular Internet TV software services and compare them. Stay away from freeware because they don't offer real value and perks. You want the complete package such as tech support, software upgrades, channel updates, and bonuses.

It's easy to recommend a software without knowing where your interest lie and not knowing your computer OS - but that would be a mistake. Sometimes a top leading brand isn't the answer, and keep in mind that any Internet TV software whether freeware or shareware can experience a rare crash on your computer.

Therefore, be sure to find an Internet TV software service that uses Clickbank, Plimus, PayPal, or some other highly reputable payment processor that offers an iron-clad money back guarantee.