473,387 Members | 1,863 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Security Computing...

Ali Rizwan
925 512MB
I want to start this post in which i want to share some seecurity computing knowledge. In which i will explain the working of av's, database security, software security, os security etc....
If this is not against the rules of bytes will i start writing further posts.....

Thanx
>> ALI <<
Jun 12 '08 #1
8 1294
Markus
6,050 Expert 4TB
I don't see this as against the rules...

As long as you don't focus on the how to exploit the security holes.
Jun 12 '08 #2
RedSon
5,000 Expert 4TB
Go ahead and post, I will take it under advisement that you are not wanting to write posts that encourage or help people do malicious things to computers. As long as you do you best to make sure that you are not crossing the line then you will be fine. If you do happen to cross the line I will delete the post, but I will not ban your account, we can then discuss in what ways your post broke the rules so that you have a better understanding of what is permitted and what is not.

-RedSon
Jun 12 '08 #3
Ali Rizwan
925 512MB
Thanx
First let me explain what i will post in this thread....
How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
Now please mention which of the above topics i can discuss here....

Thanx
>> ALI <<
Jun 13 '08 #4
JosAH
11,448 Expert 8TB
I bet it is all MS Windows related ...

kind regards,

Jos
Jun 13 '08 #5
acoder
16,027 Expert Mod 8TB
This thread doesn't belong in the Cafe.

Moved to Misc. Discussions.

Moderator.
Jun 13 '08 #6
sicarie
4,677 Expert Mod 4TB
Thanx
First let me explain what i will post in this thread....
How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
Now please mention which of the above topics i can discuss here....

Thanx
>> ALI <<
Well, the first few parts are pretty easy, any sort of application you can go to Google and type 'harden <app>' such as 'harden XP' or 'harden Oracle'. Applications themselves are tougher because you don't have direct access to the source code, but there are suggestions out there such as good log monitoring and splitting components.

An antivirus uses preset signatures (much like a host intrusion detection system) to look at specific parts of your computer. This is why it is so easy for virus writers to come out with several versions of the same virus and have them infect computers, even when there is an 'antivirus definition' existing - it only covers one of the variants. You can remove virii by removing the corrupted and propagating material.

I personally think backdoors are pretty self-explanatory, so I'm going to skip that one. and the rest are information on malicious topics and have nothing to do with fixing them, so I'm not going to answer them.
Jun 13 '08 #7
NeoPa
32,556 Expert Mod 16PB
Monitoring.

I've seen nothing so far to give me concern, but as most of us know this is a complicated area and it's easy to miss things.

@RedSon
Seems like a sound way to proceed. I will be keeping an eye out too so if anyone finds anything to be at all suspicious I am there to discuss with.

@Ali
Any of those subjects seem fine. Be careful of submitting code though (or attachments). Small code snippets that are easily understood are probably fine.
Jun 13 '08 #8
Ali Rizwan
925 512MB
thanx all.......

<< ALI >>
Jun 13 '08 #9

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: Andy | last post by:
First of all, can I reassure you that this posting is NOT spam and not market research. Please feel free to email me at the address below to check/validate this message prior to doing the survey if...
6
by: Olaf Baeyens | last post by:
Can someone out there point me to a URL or other reference how to use these security stuff in .NET? I know everything can be found online on the msdn but since I am new to this security stuff, I...
12
by: Angelos Karantzalis | last post by:
Is there a way to set Permissions based on user roles by using some configuration file for my application ? I'm coming from a Java background, where that could very easily be accomplished but...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
0
by: Dave Stone | last post by:
Last week I posted as follows, but no-one responded: " I have security level 'Medium' and expression blocking set. If I set security to 'Low', I get a dialog box which asks if I want to enable...
0
by: Andy | last post by:
First of all, can I reassure you that this posting is NOT spam and not market research. Please feel free to email me at the address below to check/validate this message prior to doing the survey if...
29
by: Martin | last post by:
Sorry, the prior message was multi-posted. Here's a cross-posted version. Please disregard the other one. Is there a way to create and encrypted database file? What do people do when data...
5
by: ewingate | last post by:
It seems that C#.Net is not especially secure. What I mean is that if I were to write an application in C# and then try to sell this application, someone else could just come along and decompile it...
14
by: Aaron Watters | last post by:
So, in between skiing runs I noticed a Business Week cover story on "cloud computing". The article had lots of interesting information in it like about how somebody's mom used to be an airline...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.