digplanet beta 1: Athena
Share digplanet:


Applied sciences






















The Computer security Portal

Monitor padlock.svg
Computer security is anything that has to do with protecting computer systems such as smartphones, desktop computers, company servers, IP phones, set-top boxes, etc. from spam, viruses, worms, trojan horses, malware and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems.

Selected article

The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).

Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.

The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.

This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).


Selected picture

Beast, a Windows-based backdoor Trojan horse

Beast, a Windows-based backdoor Trojan horse.

Selected biography

Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.

Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. [1]


Did you know...

Related portals

Computer security news


Computer security topics

For further info feel free to visit http://www.virusradar.com/

Things you can do

  • Pages Needing Attention:Software
  • Design an icon for Computer Security
  • Find image of any security related software for Selected Picture that isn't copyrighted.


Purge server cache

Cite error: There are <ref> tags on this page, but the references will not show without a {{reflist}} template (see the help page).

Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Portal:Computer_security — Please support Wikipedia.
A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
1000000 videos foundNext > 

Introduction to Computer Security - Information Security Lesson #1 of 12

Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...

TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...

Computer Security Basics

Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...

Computer Security Basics

Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)

Computer Security Basic Principles

Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.

Offensive Computer Security 2014 - Lecture 01

This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...

How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics

In this first lecture of the Fall 2010 series, Dr. Loveland and her special guest Eve Hacker take you on a precautionary journey regarding computer security,...

Brad Templeton - The Future of Computer Security

Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture...

Computer Security

There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...

The Top Ten Free Computer Security Programs Of 2013 (part 1)

here we have the best of the best in the free security software world. do not listen to the liars and ignorant d' bags that say free security programs are no...

1000000 videos foundNext > 

3709 news items

CNN International

The Economist (blog)
Tue, 08 Apr 2014 20:54:41 -0700

THE Heartbleed Bug sounds like a particularly nasty coronary complication. But it is in fact a software flaw that has left up to two-thirds of the world's websites vulnerable to attack by hackers. According to researchers who uncovered the bug in ...

Mac Rumors

Mac Rumors
Wed, 23 Apr 2014 12:34:16 -0700

Notable computer security researcher Kristin Paget, who worked on Apple's security team before leaving for Tesla in early 2014, has taken to her blog (via Ars Technica) to criticize Apple for fixing more than a dozen security flaws in iOS weeks after ...

The Inquisitr

The Inquisitr
Tue, 22 Apr 2014 08:37:15 -0700

Once upon a time, a word like “heartbleed” would have conjured images of a gruesome cardiac event requiring the immediate attention of a surgeon. Today, you might well be a victim of heartbleed, yet without negative implications of life expectancy ...

Boston Globe

Boston Globe
Fri, 18 Apr 2014 15:18:45 -0700

... the first person to be arrested for using Heartbleed to steal sensitive personal data. Continue reading below. And on Friday, the computer security firm Mandiant reported that Heartbleed was used by an online criminal to hack one of its clients ...
The Augusta Chronicle
Sun, 20 Apr 2014 19:26:15 -0700

COLUMBIA — South Carolina could spend as much as $27 million next fiscal year on continued efforts to secure taxpayers' personal data and provide another year of credit protection after the 2012 hacking at the state's tax-collection agency. The state ...

University Herald

The Gazette: Eastern Iowa Breaking News and Headlines
Tue, 22 Apr 2014 10:26:15 -0700

Anyone with questions can contact the ISU Foundation at 515-294-4607, the ISU Alumni Association at 515-294-6525, or Iowa State's computer security team at serverbreach@iastate.edu. Comments: (319) 339-3106; vanessa.miller@sourcemedia.net ...
Penn: Office of University Communications
Thu, 17 Apr 2014 07:03:45 -0700

With co-authors Jim Blythe of the University of Southern California and Sean W. Smith of Dartmouth College, Koppel studies what people actually do when working online without following computer security experts' rules. The researchers found that ...

Daily News & Analysis

Daily News & Analysis
Fri, 11 Apr 2014 23:31:06 -0700

Robin Seggelmann, a German national now works for T-Systems, a unit of Deutsche Telekom AG, who have handed out advise on Computer Security.The Telekom recommends its customers to use virus protection and secure passwords and be careful when ...

Oops, we seem to be having trouble contacting Twitter

Talk About Computer security

You can talk about Computer security with people all over the world in our discussions.

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!