The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Tue, 25 Aug 2015 11:11:15 -0700
TRIBUNE FILE PHOTO - State data servers, similar to these, need better security to SALEM — A decade after lawmakers consolidated state computer operations, a new audit says there is still much to do to resolve security weaknesses in the State Data ...
Alabama's News Leader
Thu, 27 Aug 2015 07:02:17 -0700
Many people are simply handing hackers the tool they need to break into financial accounts. Former fugitive hacker Kevin Mitnick recently spoke about the problem. He now gets paid to find weaknesses in companies' security systems. Mitnick says the ...
Tue, 18 Aug 2015 03:04:31 -0700
Frequent readers of my blog know that I spend a lot of time complaining about the state of computer security and how little the things have changed. Now, however, is a great time to reflect on what has changed. It's been a wild ride. Certainly the ...
Thu, 27 Aug 2015 01:24:42 -0700
The Commonwealth Bank is warning that a global cyber-security skills shortage could open the way for more and more high-profile and damaging computer attacks. The Federal Government expects demand for computer security experts will grow by more ...
Mon, 10 Aug 2015 14:45:50 -0700
Joining me to talk about how these computer security companies do their work is NPR tech reporter Aarti Shahani. And, Aarti, let's start with Kaspersky, which, as we mentioned earlier, is a corporate sponsor of NPR News. We heard Corey say that people ...
Thu, 20 Aug 2015 06:07:30 -0700
The report — known within the FEC as the “NIST study” — also provides recommendations on how to fix the FEC's problems and bring its computer systems in line with specific National Institute of Standards and Technology computer security protocols.
International Business Times AU
Mon, 24 Aug 2015 20:56:15 -0700
The Defence Science and Technology Group developed the DVG to protect Aussies from cyber intrusions. Defence Science and Technology Group. Defence Science and Technology Group scientists have developed the Digital Video Guard (DVG) to keep ...
Tue, 04 Aug 2015 03:03:04 -0700
The vendor then fixes all those mistakes and resubmits the updated product for review -- whereupon the computer security review company does a cursory review, evaluating and testing the same items ... then declares the product bug-free. At the end of ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.