digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

The Computer security Portal

Monitor padlock.svg
Computer security is anything that has to do with protecting computer systems such as smartphones, desktop computers, company servers, IP phones, set-top boxes, etc. from spam, viruses, worms, trojan horses, malware and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems.

Selected article

The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).

Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.

The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.

This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).

More...

Selected picture

Beast, a Windows-based backdoor Trojan horse

Beast, a Windows-based backdoor Trojan horse.

Selected biography

Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.

Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. [1]

More...

Did you know...

References

  1. ^ "The Skein Hash Function Family". Retrieved 2006-10-31. 

Computer security topics

Things you can do

  • Pages Needing Attention:Software
  • Design an icon for Computer Security
  • Find image of any security related software for Selected Picture that isn't copyrighted.

WikiProjects

Purge server cache


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Portal:Computer_security — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.

35171 news items

ConsumerAffairs

ConsumerAffairs
Wed, 29 Jul 2015 10:48:45 -0700

One good thing about Rowhammer, from a computer-security perspective, is that even if a hacker did take advantage of an exploit, it's very hard to control. Basically (and this is an extreme oversimplification of how both DRAM chips and the Rowhammer ...
 
The Daily Freeman
Tue, 28 Jul 2015 09:07:30 -0700

“We found that the [school] board did not establish an adequate acceptable use policy, a computer security plan, a disaster recovery plan, policies and procedures for disposal of computer equipment or a policy for security awareness training,” the ...
 
Oneida Dispatch
Wed, 29 Jul 2015 05:33:45 -0700

“We found that the [school] board did not establish an adequate acceptable use policy, a computer security plan, a disaster recovery plan, policies and procedures for disposal of computer equipment or a policy for security awareness training,” the ...

CNET

CNET
Wed, 29 Jul 2015 05:12:44 -0700

Security company FireEye says a Russia-sponsored group uses malware that mimics normal computer use while stealing sensitive files. by Laura Hautala · @lhautala; July 29, 2015 5:02 AM PDT. facebook. twitter. linkedin. googleplus. email. comments. more.

UW Today

UW Today
Wed, 22 Jul 2015 09:07:23 -0700

Those included computer security tools that go unused because they introduce roadblocks to information gathering, inadequate solutions for basic tasks like transcribing interviews and failing to consider potential risks from cloud computing and other ...

Geek

Techlicious (blog)
Thu, 23 Jul 2015 22:54:50 -0700

This week, a research group at Google released a paper on computer security that looks at the specific safety priorities of computer security experts. In it, Google's scientists talked to 231 security experts and 294 ordinary web users, obtaining three ...

Here And Now

Here And Now
Thu, 16 Jul 2015 08:43:56 -0700

... recent hack at the federal Office of Personnel Management. Steve Henn, NPR's technology correspondent, who also works on NPR's Planet Money podcast, joins Here & Now's Jeremy Hobson to talk about enhanced computer security, and why we need it.
 
Council on Foreign Relations (blog)
Mon, 20 Jul 2015 06:22:46 -0700

Meanwhile, 800 IT security experts and members of Computer Security Incident Response Teams (CSIRTs) from around the world met just a few blocks away at the annual meeting of the Forum for Incident Response and Security Teams (FIRST). Responding ...
Loading

Oops, we seem to be having trouble contacting Twitter

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!

Searchlight Group

Digplanet also receives support from Searchlight Group. Visit Searchlight