The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary resear...
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, contr...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the weekly ...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class i...
Outdated Computer Security Idea. Dragon's Den Funniest Clip ever! Hilarious!!
Barracuda Security comes to Dragon's Den to sell their anti-burglary security system for desktops. Just watch it. it's Hilarious!! He tries to convince Rober...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-da...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
Offensive Computer Security 2014 - Lecture 01
This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat mode...
Computer Security Basics
Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
ShmooCon 2013: Ten Strategies of a World-Class Computer Security Incident Response Team
For more information and to download the video visit: http://bit.ly/shmoocon2013 Playlist ShmooCon 2013: http://bit.ly/Shmoo13 Speaker: Carson Zimmerman Toda...
Sun, 21 Dec 2014 15:15:00 -0800
Sony hack: British university trained North Korean elite in computer security. Westminster University provided bursaries worth £28,000 to teach computer skills to North Korea's top students. Westminster University said the scheme was intended to ...
Fri, 19 Dec 2014 09:03:45 -0800
A disgruntled employee could be responsible for the Sony hack attack that ultimately resulted in the cancellation of the movie "The Interview," computer security expert Vinny Troia told Fox News' "America's Newsroom." Troia said threats issued by ...
Wed, 17 Dec 2014 17:45:49 -0800
Against the backdrop of Edward Snowden's revelations of the UK's GCHQ mass data-harvesting from cables linking Ireland to Britain and North America, the multibillion-dollar computer security industry has become locked in a perpetual cat-and-mouse arms ...
Voice of America
Voice of America
Fri, 28 Nov 2014 11:35:36 -0800
Many people, they say, claim to care about computer security but behave in ways that put themselves at risk for getting viruses and other unwanted computer intrusions. Their new study aims to find out what goes on in the minds of these users. According ...
Tue, 16 Dec 2014 23:52:30 -0800
As major computer hacking scandals affect thousands worldwide - including recently at Sony Pictures - the city of Tustin hosted a computer security workshop for about 40 small business owners and employees. Representatives from the Federal Bureau of ...
Wed, 26 Nov 2014 08:52:30 -0800
SALT LAKE CITY — Computer security experts are warning the public of newer and sneakier ways that flash drives or USB drives have become infected with viruses and spyware. They say computer users could infect their home computer, or a whole office ...
Thu, 18 Dec 2014 04:32:01 -0800
It's a big subject and there are many, many points of view. So we'd really like to read about your perspective on the year just gone - what did you think of computer security in 2014? You can vote in our poll and leave your thoughts on the year in our ...
Topeka Capital Journal
Fri, 05 Dec 2014 12:03:45 -0800
American author and astronomer Clifford Stoll has been quoted as saying, “Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months.” While some people may want – and are likely required – to change ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.