answersLogoWhite

0

Software Security

Software security includes all techniques involved in securing your programs against malicious users. Questions about everything from input validation to avoiding buffer overflows belong here.

287 Questions

How are application software and system software the same?

Application software and system software are different in many aspects. However, they are similar in that they can be used in the same machine whereby users can modify and determine how they use them.

What is software security?

Security software provides protection for your computer, mobile gadgets, networks, or any computing-enabled devices. The most efficient and effective ones are the cloud-based security software because they provide real-time protection and don't clog your space and cause device slowdowns. It can come as antivirus software, encryption software, firewall software, and spyware removal software. Security software can manage access control, give real-time data protection and network or internet-based intrusions, and defends against other system-level security risks. Most are offered for free, providing robust protection at no cost, but definitely promises to provide more features when you upgrade to a premium account.

A premium example of reliable security software is Bitdefender Antivirus Plus. It keeps your financial and personal information protected against all cyberthreats and prevents your devices from being compromised. It has a highly-rated performance compared to other antivirus brands. It keeps your computer in optimum performance while working on the double to secure your data from ransomware and other malware attacks. It scans and safeguards your network connections as well to add another layer of protection. This is why it is one of the most popular, go-to brand in cybersecurity.

How can removable and non-removable media prevent hardware malfunction?

Removable media are used to transfer data between computers, creating backup copies of information and can be used to distribute commercial software between users. Non-removable media is permanently connected to the computer and provides fast access to data. It permits direct access to individual records. So its important to create a backup of data so that when the system crashes the data can be restored.

What is token in system software?

A token is kind of like a hall pass in school. It says where the user can go, and what they can do.

For example if the security permissions says Joe has access rights to "Joe's folder" and modify rights on "Joe's file" then when Joe signs on, he gets a token that will let him go to that folder and change that file.

If the permissions get changed while Joe is signed on, he will not be bound by that change, because the token still has the original privelege. Back to the hall pass scenario, if Joe is given a note by his teacher to go to the library to get a book then Joe leaves the room, and the teacher decides to write another hall pass to the restroom, Joe doesn't have the right to go to the restroom, because the note he has in his hand doesn't say that.

You are the legal owner of a software which came with a dongle can you change the computer hardware motherboard CPU ram graphics retaining hard disk and use them with dongle to run the software?

Maybe - it depends on what the dongle uses for determining legal use of the program.

Normally software protected with a dongle doesn't rely on binding to machine characteristics like CPU serial number because it's using the dongle for verification that the license is valid. One of the advantages of using a dongle, in fact, is the portability of the license from one machine to another.

Of course, not all vendors do it this way.

Where are the software licenses stored on computer?

It is stored in the Registry -- Click START then Click RUN -- Type in REGEDIT and it will take you into the REGESTRY --- Wildbilly Oki

How do you hack a college computer system?

Depends on what you mean by "hack" and different colleges would have different security levels and features

Why would a computer security specialist use software for the metasploit project?

A security specialist would use metasploit to determine that a change to their software was working correctly by developing a test that Metasploit could use repeatedly to test the solution.

What is difference between application layer and application software?

Application layer is a component of the OSI model of computer communication.

Application software is programs that run on computers so that you can "do something" such as write a document.

What is the difference between application software and an operating system?

Both are software, operating system is software that will make your computer boot up and run. while Application software is a program that will run on a functional operating system.

What is the difference between operating system software utility software and application software?

  • An operating system is the software that bridges the gap between the system and the user.
  • Utility software performs actions essential for protecting, guiding, securing, and storing information or data appropriately in the system.
  • Application software manages specific actions, for example, browsers, word processors, etc.

Give One difference between operating system software and applications software?

The OS makes calls to the system kernel (although sometimes the kernel is bundled with the OS). Applications make their calls to the OS, which then makes calls to the kernel.

What is difference between software Requirement Specification and user requirement specification in software?

Software requirement specifications include both installation and maintenance requirements, and functional aspects of software that a user needs.

User requirement specification in software is the specifications about functional and user interface specification.