Computer security is the prevention/detection of, and response to, any unauthorized actions by users of a computer system. Questions about security practices and principles belong here.
Asked in Technology, Computer Security
How did early computer security work?
When I hear the word "early computer security, all I can think of are human security men with guns, trying to protect the first huge computer from thieves trying to steal it. At that time, I don't think they were worrying about viruses as compare to real people stealing the computer which can take up to 6 people to carry. Then, I think people were the Virus you'll need protection from.
Asked in Computer Security
Can you use two firewalls at the same time on my computer?
Technically, there is nothing prohibiting a user from running multiple firewalls at the same time. However, each additional firewall will cause the computer's network connection to be able to process fewer packets of data in the same amount of time, increasing both latency ("lag") and throughput ("bandwidth", "speed"). It will also increase the complexity with attempting to run new software, as each firewall may need to be independently configured to allow the program. Therefore, in the interest of having a balance between performance and security, a user should choose just one firewall to protect their system. Ideally, the firewall should be a hardware firewall placed between their computer and the Internet, but software-based firewalls are also effective at blocking most malicious traffic for less overall cost.
What is the most secure operating system?
Security is a difficult and sometimes controversial thing to analyze. The only truly "secure" operating systems are those that have no contact with the outside world. The firmware in your DVD player is a good example. Among all modern general purpose operating systems (Windows, Mac OS X, Linux, Solaris, FreeBSD, NetBSD, OpenBSD) the most secure by defualt is by far OpenBSD. OpenBSD has an extremely stringent security auditing policy; only two remote attack vulnerabilities have been found in the last ten years. This is because OpenBSD doesn't create a large attack surface by running a large number of networked apps. Of course, the sad fact is that any networked operating system can be made insecure through careful misconfiguration. Window's problems with security stem mainly from the fact that it runs with a large number of network services on by default, and that it (XP and prior) let the user run with full privileges by default. Windows Vista attempted to fix this issue, but people rejected it as "too confusing" and complained that their old apps did not work correctly under limited accounts. Mac OS X is better about user permissions, but still has had a (in)decent number of remote exploits. Apple's slow response to patch many of these issues will be even more worrying if it gains significant market share. Most Linux distributions have an excellent policy of quickly patching known security vulnerabilities. Unfortunately, two of the top ten distros deliberately use outdated code (Damn Small Linux) or make it too easy to run as a privileged user by mistake (Damn Small Linux, Puppy Linux). Were these distros to gain significant popularity, their users would be exposed to a larger number of vulnerabilites than if they encouraged proper security policies.
Asked in Computers, Computer Security
Is amazon a secure site?
it should be ok but i would go with eBay and craigslist although some people may scam you it is very very slim chance that that will happen Amazon is a secure site. They are found to be quite reliable compared to eBay and craigslist. Their customer service is responsive when you have an issue related to whatever you ordered.
What is the primary function of a firewall?
Its primary function is to prevent accesses from untrusted (or undesired) external systems to internal systems and services, and to prevent internal users and systems to access external untrusted or undesired systems and services. More generally, its purpose is to implement security and performance policies. As an example, you can prevent external systems to access internal servers, as well as to prevent users to use P2P software or access social networks, for performance and security reasons.
Asked in Computer Mouse, Computer Security
Can wireless mouse carry a virus?
A big NO. Wireless mouse is nothing but a junk of hardware.It cannot be hacked or anything.If you suspect that pointer on the screen is not working properly or moving on its own its probably due to virus on your harddisk whose source is not WIRELESS MOUSE. This answer is false. Better go read up on USB device security as there is an exploit to use the USB firmware of the device (that little wireless dongle you plug into your machine to use the mouse) so that it can breach your network. You can find out more about this exploit at infoworld dot com by doing a search for yes-even-mouse-can-infect-your-network-967
How do you see the current windows password with Linux I mean I know how to use chntpw but I want to know the current password and not clear it or edit it Any suggestions?
Can police track an IP address after it has been changed?
Sometimes-for example, if the user has a dynamic IP address, and their IP address changes within this system as usual, it can generally be tracked. If the user uses a proxy service to make their IP address appear as if it is located in some random other part of the world, it may be more difficult to track.
Asked in Computer Security
What is the difference between a service pack and a security patch?
A service pack is a collection of security patches. For example, Service Pack 3 of Windows XP was the accumulation of all security patches that had been released up until the release of the service pack. The service pack is a novel concept, especially during a system recovery where Windows XP would have to be reinstalled on a PC, and just one large download would be required as compared to hundreds of small ones to bring your PC to the same security standpoint.
Asked in Computer Security
What is the difference between hacker and criminal?
okay, i think this is the easiest way to explain this is by explaining the different kinds of hacking. there are three kinds of hackers, there are white hat hackers, gray hat hackers, and black hat hackers. white hats to legal things for good purpose. gray hats do illegal things for good purpose black hats do illegal things for bad purpose (ex: to harm someone) for a true definition of a hacker check out the hackers manifesto. a criminal is someone who does anything illegal
Is the public key more secure than private key?
The questions is not really which key is more secure - rather it is a question of "can you determine the private key if you know the public key?" Public and private keys are associated with asymmetric cryptography. They are generated as a pair. The security comes from the difficulty in determining the private key if you already know the public key and have some cyphertext that the private key has been applied to or encrypting text with the public key and determining what key would be required to decrypt it. Since each key can be used to decrypt cyphertext encrypted with the other key using the same algorithm, there is not inherent reason to think that one key is more secure than the other. In reality, one of the keys will be numerically a better starting point than the other when it comes to executing an attack on the encryption and deriving the other key. In practical terms, however, an attacker is always trying to start with the public key and discover the private key, without which messages encrypted with the public key cannot be decrypted (or without which the attacker cannot impersonate the holder of the private key).
What is administrator privileges when trying to install a download?
Answer Administrator privileges allows the user full access to a program or network second only to the system account. If you don't have administrator privileges, you cannot do certain things You may be able use a program, but not upgrade it. If you are installing a file or program and you don't have administrator privileges, you may not be able to install the program or file. If you don't have administrator privilege, you may not be able to change computer or network defaults. To get privileges if your running vista start menu\click on your display picture top right\turn on or off user account\tick the UAC box
Is Windows Security essentials enough protection for your computer?
The quick answer is No Microsoft Security Essentials is average in many ways; it's OK but it isn't the best anti-virus software you can get, even for free. I suggest you check out some real world tests that put the anti-virus software through some tough tests and then list the results so you can see which is the 'best' or right one for you. A site like AV Comparatives is good for this.
How to block traffic attempting to exit a LAN and discuss why an administrator would want to do this?
Is edreams a safe website?
Yes, eDreams is a very secured website. It is one of the major online travel agency in Europe, having "physical" offices in Spain, Italy and France. It also has a Verisign certification to secure all the data and payments. In case of any doubt or question, the call center is available by phone or email Monday to Saturday.
What is a firewall access control list?
A control list of your firewall that you can access. answer #2 -------------- an access control list is a set of rules that are compared to each incoming or outgoing packet or access to determine if they are allowed to pass. The rules have different formats depending on the manufacture but they do the same thing. For example a rule may say drop all packets to port external port 155, or drop all web requests from the inside to a particular web site. In a properly configured firewall all traffic is blocked unless it matches a specific rule, this prevents an application (like a virus) using an oddball port to communicate and download more dangerous software. When a new virus is discovered one way to prevent its spread is publicize the ports it uses so they can be at least monitored if not blocked entirely.
Asked in Computer Security
How could one describe computer security?
Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.
What is the impact of specialised interface for use in hostile environment on society?
What are the principal elements of a public key cryptosystem?
Asked in Computer Security
What is data encryption?
Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. Originally, data encryption was used for passing government and military information electronically. Over time as the public has begun to enter and transmit personal, sensitive information over the internet, data encryption has become more widespread. Nowadays web browsers will automatically encrypt text when connecting to a secure server. You can tell you are on a secure, encrypted website when the URL begins with "https", meaning Hypertext Transmission Protocol, Secure.
What is availability for IA security?
One of the basic themes of IA is that it is composed of three principles - which have the memorable acronym CIA. C = confidentiality: only those who should be able to see the data can see it. I = integrity: the data is only changed by those authorized to change it and is not being corrupted accidentally or intentionally. A = availability: users can access the data when they want to or need to. Attacks against availability include denial of service (DoS) attacks which tie up resources and bog down networks to the point that legitimate users are not able to access them. Availability is also attacked by anything that causes the computer or the networks that provide access to it to crash. Availability is protected in IA through various methods including (but not limited to) redundancy, rerouting, disaster recovery plans, and contingency planning.