digplanet beta 1: Athena
Share digplanet:


Applied sciences






















The Computer security Portal

Monitor padlock.svg
Computer security is anything that has to do with protecting computer systems such as smartphones, desktop computers, company servers, IP phones, set-top boxes, etc. from spam, viruses, worms, trojan horses, malware and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems.

Selected article

The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).

Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.

The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.

This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).


Selected picture

Beast, a Windows-based backdoor Trojan horse

Beast, a Windows-based backdoor Trojan horse.

Selected biography

Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.

Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. [1]


Did you know...


  1. ^ "The Skein Hash Function Family". Retrieved 2006-10-31. 

Computer security topics

For further info feel free to visit http://www.virusradar.com/

Things you can do

  • Pages Needing Attention:Software
  • Design an icon for Computer Security
  • Find image of any security related software for Selected Picture that isn't copyrighted.


Purge server cache

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Portal:Computer_security — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
1000000 videos foundNext > 

Introduction to Computer Security - Information Security Lesson #1 of 12

Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...

TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...

Computer Security Basics

Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...

Computer Security

There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...

Computer Security Basic Principles

Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.

Offensive Computer Security 2014 - Lecture 01

This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...

Computer Security Basics

Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)

The Top Ten Free Computer Security Programs Of 2013 (part 1)

here we have the best of the best in the free security software world. do not listen to the liars and ignorant d' bags that say free security programs are no...

Cyber Security. Evolved.

In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend themselves, taking control of the situation...

Outdated Computer Security Idea. Dragon's Den Funniest Clip ever! Hilarious!!

Barracuda Security comes to Dragon's Den to sell their anti-burglary security system for desktops. Just watch it. it's Hilarious!! He tries to convince Rober...

1000000 videos foundNext > 

3070 news items

Campus Technology
Mon, 20 Oct 2014 14:43:32 -0700

You will need to use all of the computer security skills at your disposal to uncover and decipher critical evidence. Can you solve the mystery before it's too late?" Last year's event drew 2,000 teams from a thousand schools, organizers said. The goal ...
The Plain Dealer - cleveland.com (blog)
Fri, 17 Oct 2014 12:18:23 -0700

The very real computer demons that can infect your computer and steal your private information. Our next live chat, on Wednesday, is designed to give consumers and people who run small businesses and nonprofits reliable information about the latest ...
SC Magazine UK
Fri, 17 Oct 2014 08:03:40 -0700

Adi Shamir - currently Borman Professor of Applied Mathematics at the Weizmann Institute of Science and the co-developer of the RSA cryptographic system - revealed a proof-of-concept method of bypassing air-gapped computer security systems at Black ...

National Post

National Post
Thu, 25 Sep 2014 14:33:45 -0700

Internet security experts are warning a new programming flaw known as the “Bash Bug” may pose a serious threat to computers and other devices, such as home Internet routers. Even the systems used to run factory floors and power plants could be affected.

The Tennessean

The Tennessean
Sat, 18 Oct 2014 21:41:15 -0700

They had implemented a relatively new computer security model called “context-aware security.” Context-aware security adds a new layer to the standard user name and password security model that most of us use daily. With context-aware security, other ...
Vancouver Sun
Fri, 03 Oct 2014 13:58:12 -0700

HALIFAX — Mark is a disgruntled employee. So disgruntled that when he decamped from his job he downloaded critical files from his company computer, files he could sell to fund what he envisioned as an early retirement. Hot on his heels are the white ...
Columbus Dispatch
Sun, 12 Oct 2014 04:03:39 -0700

The organizers of National Cyber Security Awareness Month say that Americans can take simple steps to keep themselves, their assets and their personal information safe online. Their suggestions: Maintain a clean machine. • Keep security software ...

MetroNews Canada

CTV News
Wed, 15 Oct 2014 13:48:45 -0700

A Kitchener-based computer security expert was sentenced Wednesday to 60 days in prison for accessing child pornography. Paul Sop was charged in 2012 as part of Project Spade, a bust of an alleged international child pornography ring centred around a ...

Oops, we seem to be having trouble contacting Twitter

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!