The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
Offensive Computer Security 2014 - Lecture 01
This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...
Computer and Network Security - Introduction
Computer and Network Security - Introduction.
Computer Security Basics
Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
Cyber Security. Evolved.
In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend themselves, taking control of the situation...
Outdated Computer Security Idea. Dragon's Den Funniest Clip ever! Hilarious!!
Barracuda Security comes to Dragon's Den to sell their anti-burglary security system for desktops. Just watch it. it's Hilarious!! He tries to convince Rober...
Wed, 29 Oct 2014 14:22:30 -0700
The Washington Post reported the incidents happened “two to three weeks ago.” The unnamed hackers are believed to be working for the Russian government. But the White House has not pointed fingers at any group, though we can't help but suspect the ...
Wed, 22 Oct 2014 06:06:10 -0700
This startup is called Illumio, and it seeks to better protect our online universe using a new approach to computer security. As Herrod says: “I think it can be bigger than Nicira.” Herrod admits this sounds like bluster, and certainly, his words ...
Thu, 30 Oct 2014 00:37:19 -0700
Romania faced a total of 42 million computer security incidents in 2013, which affected 2 million IPs, according to Sorin Encuţescu, state advisor to the Prime Minister, reports local Mediafax. Most attacks targeted the financial and banking systems ...
New York Times
New York Times
Tue, 28 Oct 2014 11:03:58 -0700
Continue reading the main story. Continue reading the main story. SAN FRANCISCO — For the second time in four months, researchers at a computer security company are connecting the Russian government to electronic espionage efforts around the world.
Washington Post (blog)
Tue, 28 Oct 2014 07:29:02 -0700
Sharyl Attkisson's new book, “Stonewalled,” treats readers to a lot of shadowy characters. As the former CBS News reporter narrates the story of the bizarre intrusions into her work and personal computer, she consults with a source that she identified ...
El Paso Times
Mon, 27 Oct 2014 23:00:00 -0700
Political blogger Jaime Abeytia on Monday was sentenced to one year probation after pleading guilty to accessing his ex-wife's email without permission. Abeytia, a former senior aide to County Commissioner Vince Perez, had been scheduled for a hearing ...
Tue, 07 Oct 2014 07:14:06 -0700
Any small-business owner is by definition a jack-of-all-trades, but a deep understanding of computer security is seldom among those skills. "Trying to protect your company's data valuables or brand without the budgets, staffing or know-how of Fortune ...
Fri, 03 Oct 2014 13:58:12 -0700
HALIFAX — Mark is a disgruntled employee. So disgruntled that when he decamped from his job he downloaded critical files from his company computer, files he could sell to fund what he envisioned as an early retirement. Hot on his heels are the white ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.