digplanet beta 1: Athena
Share digplanet:

Agriculture

Applied sciences

Arts

Belief

Business

Chronology

Culture

Education

Environment

Geography

Health

History

Humanities

Language

Law

Life

Mathematics

Nature

People

Politics

Science

Society

Technology

The Computer security Portal

Monitor padlock.svg
Computer security is anything that has to do with protecting computer systems such as smartphones, desktop computers, company servers, IP phones, set-top boxes, etc. from spam, viruses, worms, trojan horses, malware and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems.

Selected article

The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).

Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.

The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.

This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).

More...

Selected picture

Beast, a Windows-based backdoor Trojan horse

Beast, a Windows-based backdoor Trojan horse.

Selected biography

Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.

Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. [1]

More...

Did you know...

References

  1. ^ "The Skein Hash Function Family". Retrieved 2006-10-31. 

Computer security topics

For further info feel free to visit http://www.virusradar.com/

Things you can do

  • Pages Needing Attention:Software
  • Design an icon for Computer Security
  • Find image of any security related software for Selected Picture that isn't copyrighted.

WikiProjects

Purge server cache


Original courtesy of Wikipedia: http://en.wikipedia.org/wiki/Portal:Computer_security — Please support Wikipedia.
This page uses Creative Commons Licensed content from Wikipedia. A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia.
1000000 videos foundNext > 

TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...

Introduction to Computer Security - Information Security Lesson #1 of 12

Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...

Computer Security Basics

Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...

10 Cyber Security Facts - WMNews Ep. 4

With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the weekly ...

Computer Security

There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...

Outdated Computer Security Idea. Dragon's Den Funniest Clip ever! Hilarious!!

Barracuda Security comes to Dragon's Den to sell their anti-burglary security system for desktops. Just watch it. it's Hilarious!! He tries to convince Rober...

Computer Security Basic Principles

Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.

Offensive Computer Security 2014 - Lecture 01

This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...

Computer Security Basics

Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)

Cybersecurity 101

The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA's C...

1000000 videos foundNext > 

46091 news items

Sun Sentinel

Sun Sentinel
Mon, 19 Jan 2015 11:21:58 -0800

When the hacker group Anonymous targeted the city's web site in November, the city shut down its Internet access to protect the information on its servers. It then spent $430,000 to make sure the city's information was adequately protected. When the ...

WTOP

WTOP
Thu, 22 Jan 2015 02:12:56 -0800

WASHINGTON — The recent barrage of stories about computer security attacks are enough to make you unplug your computer and go back to reading books and writing letters. Well, it turns out there's another one consumers need to have on their radar.
 
EFF
Fri, 16 Jan 2015 09:39:31 -0800

The Obama Administration is on a roll with proposing legislation that endangers our privacy and security. Over the course of two days, President Obama proposed a cybersecurity bill that looks awfully similar to the now infamous CISPA (with respect to ...

Center for Democracy and Technology (blog)

Center for Democracy and Technology (blog)
Wed, 21 Jan 2015 07:45:00 -0800

Although prohibiting cell phone unlocking may be this provision's most widely reviled impact to date, its application to computer security research is probably its most insidious. Because computer security research often requires testing and “breaking” ...
 
Fox 28
Fri, 23 Jan 2015 16:56:15 -0800

Those texts are apparently so easy to mimic that crooks could send you alerts that look like the real thing. Click on those links and the hacker could grab your login information, or fool you into divulging your credit card details. A computer ...

Government Technology

Government Technology
Tue, 20 Jan 2015 09:25:37 -0800

(TNS) — The city has spent $430,000 beefing up computer security since the hacker group Anonymous attacked the city's websites in December to protest recent city laws regarding homeless behavior. The cyber attack forced the city to shut down its ...

InfoWorld

InfoWorld
Tue, 20 Jan 2015 03:03:36 -0800

When I finally sorted it out, it was the realization that most computer security advice is an absolute waste of time -- and most of what isn't is barely useful. Even I'm guilty. Statements I've spouted in the past, like using long and complex passwords ...

GovInfoSecurity.com

New York Post
Sat, 24 Jan 2015 03:26:15 -0800

“My auditors, who are experts in computer security, have assured me that redacted information would not compromised transportation security,” he added. Pistole referred the IG's appeal back to “the head of the SSI program office — the very same office ...
Loading

Oops, we seem to be having trouble contacting Twitter

Support Wikipedia

A portion of the proceeds from advertising on Digplanet goes to supporting Wikipedia. Please add your support for Wikipedia!

Searchlight Group

Digplanet also receives support from Searchlight Group. Visit Searchlight