The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...
How to Hack a Web Site - Dr. Susan Loveland - Lunchtime Talks in Science and Mathematics
In this first lecture of the Fall 2010 series, Dr. Loveland and her special guest Eve Hacker take you on a precautionary journey regarding computer security,...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
Offensive Computer Security 2014 - Lecture 01
This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...
Cyber Security Tips for Your Computer
The training video provides helpful tips on protecting your computer.
Computer Security Basics
Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
Computer security, internet privacy: what should we worry about?
Talk given by Sebastian Lopienski, CERN Deputy Computer Security Officer, at the CERN Opendays 2013. To view this talk alongside the slides shown see http://...
Lawrence Journal World
Wed, 30 Jul 2014 22:01:10 -0700
The review, conducted by Legislative Post Audit, determined that the current level of computer security at state government agencies could leave Kansans' personal information vulnerable and that many Kansas agencies aren't complying with requirements ...
Tue, 29 Jul 2014 07:08:28 -0700
It says it will undertake a major overhaul of its computer security: “This could take approximately one year.” “NRC is continuing to work closely with its IT experts and security partners to create a new secure IT infrastructure,” the organization said ...
Mon, 21 Jul 2014 05:57:29 -0700
Weaknesses in Treasury Department computer systems that track federal debt are severe enough to disrupt accounting, according to a government audit. Newly discovered security vulnerabilities at the Bureau of the Fiscal Service, coupled with older ...
Fri, 18 Jul 2014 11:22:30 -0700
Computer security: Small firms in cyber alert. SMALL firms rely on mobile computing and remote working more than ever before, but spare barely a thought about the consequences of a security breach wiping out their records. By: Maisha Frost. Published ...
The Redding Pilot
Sun, 27 Jul 2014 09:52:30 -0700
The Danbury Area Computer Society (DACS) will discuss how to protect yourself, your computer, and your identity at its next general meeting. The featured speaker will be Bob Gostischa, who will describe Avast! security software, used by hundreds of ...
Wed, 23 Jul 2014 20:03:35 -0700
An audit by the state showed that IT security work by many state agencies is not up to standard, and that is drawing concern from tech experts and state lawmakers. The results of a state audit of its computer security systems produced unsurprising ...
Smart Data Collective
Smart Data Collective
Fri, 25 Jul 2014 14:11:15 -0700
When you get right down to it, computer security is all about being able to analyze the data. A company's security is largely dependent on the amount of data analysis they're capable of, along with the quality of that data. A company that can collect a ...
Thu, 31 Jul 2014 03:54:00 -0700
Small businesses are in a tight spot; every organisation needs a basic level of computer security even if they don't have any technical employees. Every small business and micro-enterprise is stretched and running one is all about finding the smartest ...
Oops, we seem to be having trouble contacting Twitter
You can talk about Computer security with people all over the world in our discussions.