- Wikipedia portals: Culture
- Geography
- Health
- History
- Mathematics
- Natural sciences
- People
- Philosophy
- Religion
- Society
- Technology
edit
The Computer security Portal
Computer security is anything that has to do with protecting
computer systems such as
smartphones,
desktop computers,
company servers,
IP phones,
set-top boxes, etc. from
spam, viruses,
worms,
trojan horses,
malware and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in
information systems.
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
- More...
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. [1]
- More...
edit
Computer security news
▼ Computer security
► Computer security companies
► Computer security exploits
► Information Risk Management
► Computer security models
► Operating system security
► People associated with computer security
► Computer security procedures
► Computer security qualifications
► Computer security software
► Computer security stubs
edit
Computer security topics
- Antivirus and Content Security
- Antivirus tools
- Firewall
- anti-Spyware tools
- Anti-Spam Software
| - Worms, Viruses, Trojan Horses
|
- Pages Needing Attention:Software
- Design an icon for Computer Security
- Find image of any security related software for Selected Picture that isn't copyrighted.
- Computer Security
- Computing
edit
Associated Wikimedia
- What are portals?
- Daftar/Tabel -- portals
- Featured portals
Purge server cache
Cite error: There are <ref>
tags on this page, but the references will not show without a {{Reflist}}
template or a <references />
tag; see the help page.