Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. Beneficiaries (technically referents) of security may be of persons and social groups, objects and institutions, ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Security mostly refers to protection from hostile forces, but it has a wide range of other senses: for example, as the absence of harm (e.g. freedom from want); as the presence of an essential good (e.g. food security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line); as containment (e.g. a secure room or cell); and as a state of mind (e.g. emotional security).
The term is also used to refer to acts and systems whose purpose may be to provide security (e.g.: security companies, security forces, security guard, cyber security systems, security cameras, remote guarding).
Security is not only physical but it can also be Virtual.
Why do most websites enforce the use of different sets of characters when creating a password? This is less secure than choosing a password from different sets of characters uniformly randomly.
If we take an example of a 2 characters password and the 2 sets "letters" and "digits", if we use the...
On a whim, I installed the PF app. It looks exactly the same. I assume there's maybe some extra security to it, but does it do anything obvious for me?
Should any Android apps be given access to its( Android) camera? Re a blackmailing email I recently received, I want to cover as many security angles as possible. So I recently checked the list of apps in my Android that have access to my camera. There were a few, WhatsApp and Google being...
I get that if I put current directory in PATH like said above, I can execute commands from any directory. But what's the problem in that? How's other person able to come and execute it? Why does it makes system unsecure compared to the case where we don't put current directory to PATH? Can you...
Hello. I need to ask about my folders. My 26,263 folders became 'date modified' in 8 minutes. I created those folders and I am aware they stood there. I think any human being can't be so quick.
It seems that this is a good news bad news scenerio, and the only good reason I can think of for...
I'm impressed by this article.
https://arstechnica.com/information-technology/2021/10/securing-your-digital-life-part-2/
It discusses more than just choosing passwords and more than Internet security..
Do you disagree with the article?
Do you have additional security tips that you use?
The above message keeps popping up several times per hour since this morning. I looked up the "SWF..." thing and Google seems to suggest it is some vulnerability associated with Adobe Flash.
The problem is, I can't seem to find Adobe Flash installed on my computer. I typed "Control Panel" and...
I live in Buffalo N.Y. and our building is owned by Peoples Inc. They just purchased our apartment buildings from Olmsted Inc. last year.
We were just given letters asking for our utility account numbers and our social security numbers so they can look at our accounts when ever needed for usage...
There was a Heap-based Buffer Overflow, allowing privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character.
The vulnerability was discovered earlier this month by researchers at Qualys and reported to the developers. Check out their...
Should one avoid logging into important accounts like Google / Gmail / e-commerce from a Raspberry Pi -- or is it just as safe as logging in from a regular PC?
Or, is it actually safer, considering that it is Linux?
I have a quick query. When I'm applying to jobs related to math and physics (software engineer, data analyst, data scientist, python developer, quantitative analyst, programmer, research analyst, etc), I am seeing a good portion of them requiring a security clearance.
Is this something others...
OFFICIAL SOLUTION:
d=e^(-1) mod 160=107
mp= c^(d) mod p=7
mq:=c^(d) mod q=7
MY THOUGHTS:
I understand how d = 107, but I got that by using m = (17-1)(11-1) = 160.
What I don't understand is the next two lines (from the official solution). I am aware of the P = C^d mod n (decryption) formula...
I emphasize that I am not posing a rhetorical question, and am not trying to make a political statement (and would ask all respondents to steer clear of politics), but would genuinely appreciate knowing whether the report in question is considered valid by those in the field who are impartial...
If one wants to buy ebooks or consult his own ebooks on his Kindle, he must link his Kindle with his Amazon account.
This means entering the password. The average Joe should use a password manager, and since Amazon allows extra characters to be used in the password, the average Joe should also...
The following quote caught my eye.
I presume that buffer overflow, heap management, and pointer validation are the shortcomings of C that lead to insecurity. But the broader implications make me curious.
What other features of a programming language directly aid security of the products...
So I had a friend that was catfish and he gave the catfish his google email. Some how the catfish was able to hack into his google account. my question is how ?
They did not know his password, so they would had had to tried thousands of combinations before guessing it right, why did Google not...
I'm in my second year in college and I've taken an Operating Systems course that has a project component.
I've been assigned Memory Forensics as my project topic.
On approaching the professor I was told that I need to attempt to attack the Linux Kernel ( I'm guessing that means I need to write...
I used to use Kaspersky Internet Security/Total Security, but recently Best Buy has stopped selling it for some political reason. What are other software tools that are best in protecting computers from viruses and other cyber threats?
Thanks in advance
I was wondering, I recently discovered, but don't have the article, that there is a security technology that involves the superposition of photons across a fiber optic link. I was wondering could a glass register more adequately create a quantum computer for peoples usage than an actual atomic...
I just got to learn about TI (threat intelligence) in my high school.
I need some advice - helpful website for get useful information and thesis dealing with cyber security
I have a PC at my home with Windows 7, 32-bit. It is used by my father and me, on the administrator account, which is the only user in the computer.
Since a few months, while clearing the contents of the "temp" folder (accessed by %temp% from Run option in start), I am finding that several...
I've been listening to the likes of neuroscientist Sam Harris and physicist Stephen Hsu (who seems to have turned his interests towards genomics research these days) discuss the future of human life, given genetic research and cutting edge knowledge in this area.
I think it was Hsu who said...
How much time does being a PC security professional require in general or at least? Is it possible to be a PC/IT security professional by only watching training videos? We learn maths via solving examples on paper how can a security professional student his or her topics? Are white-hat hackers...
I am a daily visitor to the Science and Maths Textbooks forum. I have enabled the option to watch the forum, so that everyone time a new thread is posted, I'm notified by email.
Recently, however, I got email notification for three threads that were spam. Two of them were already removed when I...
I have installed an antivirus. But one day I realized that somebody was controlling my PC. Then I installed a firewall. There are lots of attempts to my PC which are recoreded in the firewall. I am very confused why these are happening and who they are, how they can do this. Now some important...
Hi All,
There are certain options to protect information on Windows: restricting access to files, encryption, etc. Still, since it is possible to disable or change the admin password, is there any reasonable measure left to protect files (Assuming here that admin logins have unrestricted...
Hello,
I am going to start school soon for E.E with an emphasis in Power Systems Engineering, I live in NYC and am 21 y.o. I've been reading forum responses across the web from unemployed engineers (Unhealthy habit I know), people don't specify what they specialize in hence the query. I am...
I need a RF network that has this :
1) two way communication.
2) Security
3) can work in a 3.5 x 1.5 mile community : with houses, trees, buildings and a park ( https://en.wikipedia.org/wiki/Box_Hill_North,_Victoria).
4) have about 1000 endpoints.
5) low power and low cost
would Xbee be...
Hi friends!
My son is an Electronics and communication degree holder from India .He is keen to join MS in network security in Canada. One of our concern is Financial.Please guide .
Thanks!
Hello everyone!
Maybe someone good at this topic or met this problem before, because I was really confused reading about this
<< Link deleted by Mentors as Spam >>
Can someone tell me: does it actually work? And how terahertz radiation can influence on the human body, considering that THz waves...
I have a bachelor's in aerospace engineering, and currently doing my masters in mechanical&aerospace. I would like to work in the aerospace industry upon graduation.
I am interested in companies such as Space X, Boeing, Raytheon, Lockheed, NASA, etc... and I presume most of these would require...
The typing window, which on top of it has the text "Have something to add" and also the arrow pointing downwards, sometimes behaves slightly unpleasantly if you have multiple tabs open on the browser. It could be that I write something in one tab, change my mind, and erase what I wrote without...
For those out of the loop, it was shown that he broke a law(s) outlined in the Logan Act by performing diplomatic duties in contacting Russian government officials. There are a lot of rumors about what he said and the implications it has on how Trump is viewing his relationship with Russia...
Looks like a lot of good stuff, I know what I’m doing this weekend!
Summary document on SP 800-160: http://csrc.nist.gov/publications/nistbul/itlbul2016_12.pdf
SP 800-160, Systems Security Engineering: http://dx.doi.org/10.6028/NIST.SP.800-160
Hi.
I have lots of bookmarks to splendid physics Java applets, but most of them are a bit dated. Many of them get blocked by current Java versions. To make them work I have to go to the Windows control panel, open Java control panel, add the page to the exception site list and restart the...
My GF forgot the password of her old acer laptop, which she didn't use much. Now she asked to me to help her recover the password. I only know reinstall the os but this will erase the data on the computer. What is the method i can use to reset the password without losing any data?
Would somebody like to adivse me simple introductory books on computer security. I know I could make a Google search but I hope advises are better and there is no previous thread about introductory books on related topic.
Thank you.
Hi, some of my html and txt files have added the extension .crypt, i.e, they have become .txt.crypt and .htm.crypt. Now I deletes .crypt extension from .htm files but now they do not open correctly. How can I open correctly with internet explorer?
Thank you.
I create this thread to continue discussion with @jim hardy and @WWGD started elsewhere https://www.physicsforums.com/threads/any-popular-non-biased-and-reputable-sources-of-politics.827409/page-4#post-5422569
Any topic concerning computers and internet can be discussed here
I don't know, but...
Hello,
I'm a freshman in college, currently dual majoring in Nuclear Engineering and Physics. Recently, it has been brought to my attention that to secure an internship in the nuclear (or some physics) fields, I would need to obtain level L security clearance with the DOE, and further on to get...
Lately I have been getting interested in internet/network security (an area of study which I am guessing is a subset of computer security). I use to do a little bit of programming a long time ago, but since it has been so long, let's assume that I have no programming experience. I am a math...
Setting:
1) System should allow gov total surveillance of citizens (From the good side there would gov provided cloud computing, cloud storage and free WiFi equivalent for all. ;) ) Violent crime rate would be already low, the system is more planed for fighting tax evasion, suicide, wasting too...
Hello, I recently walked through the gates of my local library with my hard drive magnets clipped onto my fingers, and I noticed that they were vibrating. I've been looking on the internet and I also found radio-frequency identification systems. Could someone please explain the physics behind...
So I am going to be making some keys; and I want to make them more random... So I made this:
#I know that the code is pretty crude, but it works.
#P.S. it is an infinite loop, run at your own risk
import random
from random import randint
import string
import time
x=1
n=randint(5,90)...
Hello!
First of all, I am relatively new to these forums. I had a few nagging questions. I think this is the right place to post this thread...? But anyways, in college, I am currently pursuing a degree in Information Technology. I'm planning on focusing more on cyber security as I've always...
I am using Windows 8.1. Right-clicking on my drive C, where I install windows, and choosing properties shows me the security tab. I see some groups and users that have privileges to use the drive. What if I delete all of them and add only my own username in there ? For instance, can I still boot...
Can i work in IT security if I have a sealed juvenile record of petty theft?
I was 16 when i was caught shoplifting items worth $200 in total. Now 21 and studying Computer Science, I have to choose a concentration of Computer Science to study. I'm wondering if a SEALED juvenile record of...