The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Tue, 16 Sep 2014 12:17:50 -0700
Bryan Seely and Ben Caudill say they've discovered one of the biggest potential security holes of the modern era. One that can leave your data and those of your kids exposed to any hacker willing to find it." "Within a couple of minutes we found social ...
Mon, 08 Sep 2014 06:57:05 -0700
I am asked probably twice a week to help somebody get a job in the security profession. Unfortunately, I can't help that many people individually, but perhaps this article will allow me to help many people all at once. I do have some firm thoughts on ...
Thu, 28 Aug 2014 07:51:36 -0700
ROBBING a bank used to require a gun and a getaway car. Now hackers can attack financial institutions with a few clicks of a computer mouse. According to reports on August 27th from Bloomberg, America's Federal Bureau of Investigation (FBI) is now ...
Sat, 06 Sep 2014 21:07:30 -0700
As investigators work to determine who stole and posted nude photos of several female celebrities online, including Oscar winner Jennifer Lawrence, efforts by the stars to have the images removed from websites made them increasingly difficult to find.
Detroit Free Press
Detroit Free Press
Mon, 15 Sep 2014 21:52:39 -0700
Even with the recent rise in two-factor authentication, nothing has fully supplanted them, and they remain a crucial portion of most computer security. □ Susan Tompor: Maybe it's time to change your password again. □ Related:Net breach an opportunity ...
Albuquerque Business First (blog)
Fri, 29 Aug 2014 05:11:15 -0700
Los Alamos National Laboratory scientists have developed a quantum random number generator that could change the face of computer security. Now, LANL has licensed the technology to Allied Minds, a science and technology commercialization firm in ...
Tech Page One
Thu, 28 Aug 2014 11:00:00 -0700
In light of this and similar threats, IT security and protecting sensitive data are more important than ever. Over time, computer security threats have become much more sophisticated and more damaging. But this evolution has happened over decades ...
Thu, 04 Sep 2014 15:41:15 -0700
Britt Johnson, a cyber security trainer there, said they've seen an uptick in interest in the computer security classes since the highly-publicized breaches. “Nationally, any time there is publicity about a security breach of the size and depth of the ...
Oops, we seem to be having trouble contacting Twitter
You can talk about Computer security with people all over the world in our discussions.