I want to start this post in which i want to share some seecurity computing knowledge. In which i will explain the working of av's, database security, software security, os security etc....
If this is not against the rules of bytes will i start writing further posts.....
Thanx
>> ALI <<
8 1294
I don't see this as against the rules...
As long as you don't focus on the how to exploit the security holes.
Go ahead and post, I will take it under advisement that you are not wanting to write posts that encourage or help people do malicious things to computers. As long as you do you best to make sure that you are not crossing the line then you will be fine. If you do happen to cross the line I will delete the post, but I will not ban your account, we can then discuss in what ways your post broke the rules so that you have a better understanding of what is permitted and what is not.
-RedSon
Thanx
First let me explain what i will post in this thread....
How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
Now please mention which of the above topics i can discuss here....
Thanx
>> ALI <<
I bet it is all MS Windows related ...
kind regards,
Jos
This thread doesn't belong in the Cafe.
Moved to Misc. Discussions.
Moderator.
Thanx
First let me explain what i will post in this thread....
How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
Now please mention which of the above topics i can discuss here....
Thanx
>> ALI <<
Well, the first few parts are pretty easy, any sort of application you can go to Google and type 'harden <app>' such as 'harden XP' or 'harden Oracle'. Applications themselves are tougher because you don't have direct access to the source code, but there are suggestions out there such as good log monitoring and splitting components.
An antivirus uses preset signatures (much like a host intrusion detection system) to look at specific parts of your computer. This is why it is so easy for virus writers to come out with several versions of the same virus and have them infect computers, even when there is an 'antivirus definition' existing - it only covers one of the variants. You can remove virii by removing the corrupted and propagating material.
I personally think backdoors are pretty self-explanatory, so I'm going to skip that one. and the rest are information on malicious topics and have nothing to do with fixing them, so I'm not going to answer them.
NeoPa 32,556
Expert Mod 16PB
Monitoring.
I've seen nothing so far to give me concern, but as most of us know this is a complicated area and it's easy to miss things.
@RedSon
Seems like a sound way to proceed. I will be keeping an eye out too so if anyone finds anything to be at all suspicious I am there to discuss with.
@Ali
Any of those subjects seem fine. Be careful of submitting code though (or attachments). Small code snippets that are easily understood are probably fine.
thanx all.......
<< ALI >>
Sign in to post your reply or Sign up for a free account.
Similar topics
by: Andy |
last post by:
First of all, can I reassure you that this posting is NOT spam and not
market research. Please feel free to email me at the address below to
check/validate this message prior to doing the survey if...
|
by: Olaf Baeyens |
last post by:
Can someone out there point me to a URL or other reference how to use these
security stuff in .NET?
I know everything can be found online on the msdn but since I am new to this
security stuff, I...
|
by: Angelos Karantzalis |
last post by:
Is there a way to set Permissions based on user roles by using some
configuration file for my application ?
I'm coming from a Java background, where that could very easily be
accomplished but...
|
by: Mike MacSween |
last post by:
S**t for brains strikes again!
Why did I do that? When I met the clients and at some point they vaguely
asked whether eventually would it be possible to have some people who could
read the data...
|
by: Dave Stone |
last post by:
Last week I posted as follows, but no-one responded:
" I have security level 'Medium' and expression blocking set. If I set
security to 'Low', I get a dialog box which asks if I want to enable...
|
by: Andy |
last post by:
First of all, can I reassure you that this posting is NOT spam and not
market research. Please feel free to email me at the address below to
check/validate this message prior to doing the survey if...
|
by: Martin |
last post by:
Sorry, the prior message was multi-posted.
Here's a cross-posted version. Please disregard the other one.
Is there a way to create and encrypted database file?
What do people do when data...
|
by: ewingate |
last post by:
It seems that C#.Net is not especially secure. What I mean is that if
I were to write an application in C# and then try to sell this
application, someone else could just come along and decompile it...
|
by: Aaron Watters |
last post by:
So, in between skiing runs I noticed
a Business Week cover story on
"cloud computing". The article had
lots of interesting information in it like
about how somebody's mom used to
be an airline...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
| |