The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, ...
How GCHQ Classifies Computer Security - Computerphile
The UK's Government Communications Headquarters deal in classified material, but how to decide if a computer is secure? - GCHQ asked Professor Uwe ...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the ...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class ...
Question: Should I Get a Masters Degree in Computer Engineering or Cyber Security?
First of all I would like to say that I admire your work on youtube and many times your videos helped a lot to go through my university's projects. I'm currently ...
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research ...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date.
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
Brad Templeton - The Future of Computer Security
Brad Templeton, chairman of the board of the Electronic Frontier Foundation (EFF), describes the future of online security, privacy and society. This lecture is ...
How To View Your Wifi Password (Security Key) On Computer
[WARNING]=- I'm not responsible of what you do or can do with this information. You use this technique at your own risk. I found this out on my own. If you find a ...
Charleston Post Courier
Washington Post (blog)
Tue, 16 Jun 2015 13:03:45 -0700
The federal personnel agency's watchdog said Tuesday that officials there have a history of failing to take basic steps to protect the security of their computer networks. Michael Esser, the Office of Personnel Management's assistant inspector general ...
Thu, 11 Jun 2015 02:36:10 -0700
Kaspersky, a high-profile company in the computer security business, has rather ironically, been hacked. In a blog post titled, “Kaspersky Lab investigates hacker attack on its own network,” the Russia-based outfit said it'd recently discovered an ...
Mon, 29 Jun 2015 10:56:50 -0700
In the mid-1990s, he published some of the first papers on a type of computer security vulnerability known as a buffer overflow. Later, he was the principal creator of some important security tools, including L0phtcrack, a widely-used password-auditing ...
Thu, 02 Jul 2015 03:52:30 -0700
With the launch of Windows 10, anyone who walks into your house and gets your Wi-Fi password for their PC could potentially let all their friends onto your network, thanks to a new feature that has ignited controversy online. Called Wi-Fi Sense, the ...
Thu, 25 Jun 2015 10:37:30 -0700
In response to public concerns about cryptographic security, the National Institute of Standards and Technology (NIST) has formally revised its recommended methods for generating random numbers, a crucial element in protecting private messages and ...
Mon, 22 Jun 2015 10:11:11 -0700
“If you're looking for computer security, then the Internet is not the place to be,” said Mudge, then 27 and looking like a biblical prophet with long brown hair flowing past his shoulders. The Internet itself, he added, could be taken down “by any of ...
SPAMfighter News (press release)
Wed, 24 Jun 2015 22:03:31 -0700
Government of US Runs Afoul of Computer Security. Washingtonpost.com reported on 18th June, 2015 stating that government of US might have run afoul of computer security once more in response to massive hacking of federal personnel data by China.
The Intercept - First Look Media
The Intercept - First Look Media
Mon, 22 Jun 2015 04:15:10 -0700
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.