Question about PC Desktops

1 Answer

Want to secure - PC Desktops

Posted by on

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    Hot-Shot:

    An expert who has answered 20 questions.

    Corporal:

    An expert that hasĀ over 10 points.

    Mayor:

    An expert whose answer gotĀ voted for 2 times.

  • Expert
  • 99 Answers

...with a password?...most secure way i can think of is to set a password in the BIOS(you can access BIOS by tapping on the delete key while booting, or by following the "setup" instructions as you boot up), setting a password there is secures you machine before your operating system loads...

Posted on Jun 07, 2008

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

Can any one tell me how to remove the edu filter from my computer


To add, edit, or remove filter actions
  1. Create a console containing IP Security Policies. Or, open a saved console file containing IP Security Policies.
  2. Double-click the policy that you want to modify.
  3. Double-click the rule that you want to modify, and then click the Filter Action tab.
  4. To add a filter action, decide whether you want to use the IP Security Filter Action Wizard or add the filter action manually:

    • To add a filter action by using the IP Security Filter Action Wizard, confirm that the Use Add Wizard check box is selected, click Add, and then follow the instructions.
    • To add a filter action manually, confirm that the Use Add Wizard check box is cleared, click Add, and then define settings on the Security Methods and General tabs.
  5. To modify an existing filter action, select the filter action that you want to modify, and then click Edit.
  6. To remove a filter action, select the filter action that you want to remove, and then click Remove.
  7. If you are adding or modifying a filter action, choose a filter action type:

    • Click Permit to allow receiving or sending of packets in plaintext (unsecured traffic). Security will not be requested for these packets.
    • Click Block to discard packets. Security will not be requested for these packets.
    • Click Negotiate security to use the list of security methods in Security method preference order to provide security for packets that match this filter. Security requests will be accepted for these packets.
  8. If you chose Negotiate security, add new security methods or edit the existing ones for the filter action.
  9. If you do not want to block incoming, unsecured communications, but you want to ensure that all outgoing communications and subsequent two-way communications are secured, select the Accept unsecured communication, but always respond using IPSec check box.
  10. To enable communication with other computers that do not support IPSec, and ensure that communication continues if there is no response to a request for IPSec negotiation, select the Allow unsecured communication with non-IPSec-aware computers check box. After the initial IPSec negotiation has failed, IPSec negotiation will be retried at five minute intervals.
  11. To guarantee that no master keys or master keying material will be reused to generate the session key, select the Use session key perfect forward secrecy (PFS) check box.
  12. On the General tab, in Name, type a unique name.
  13. In Description, type a description. For example, you might type what security levels this filter action represents.

Oct 01, 2013 | Dell PC Desktops

1 Answer

Data Breach SCDOR123


Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>

Dec 31, 2012 | PC Desktops

1 Answer

How can i tell if my router is secure?


If it is hard wired, it is secure. If it is wireless, then it may not be. If you just took it out of the box and hooked it up without setting a passphrase or security key, then it is probable not secure. Get a friend to try to connect to it from inside your house. If you are broadcasting your SSID, it will be the strongest signal. If his computer sees it, have him try to connect. If he can then it is not secure. If he is ask for a passphrase or security key, then it is secure. The reason I say to have a friend try it, is because your machine may already have the security info stored and that would not be a good test.

Get back to me with the brand and model number if you need directions to make it secure.

Sep 08, 2010 | PC Desktops

1 Answer

Us.data.toolbar.yahoo.com:443 invalid security cirtificate iwant valid security cirtificate


Unless you set your browser up for high security, this certificate is bogus. Rarely does a security certificate notice appear on yahoo without having set your browser up for high security.
Lower your security if it set to high and see if the message disappears. If your browser security is set to normal, then this is a bogus certificate for a bogus yahoo site.

Aug 30, 2010 | PC Desktops

1 Answer

Trying to connect new printer wirelessly, cannot get past the wpa security key


You may need to verify the wireless security enabled in your router. Check from your router's setup page the security type and security key enabled in it to connect your wireless printer.

Hope this helps!

Nov 13, 2008 | HP PC Desktops

1 Answer

Unable to extract e-mails web site cannot be connected to due to browser settings


Try these two methods for changing the security settings (if neither work go to Method #3):

Method #1
1. To lower the security setting in Internet Explorer:
2. In the browser's Tools menu, select Internet Options.
3. In the Internet Options dialog box, click the Security tab.
4. In the "Select a Web content zone" control, click the Internet icon.
5. In the "Security level for this zone" area, reset security to Medium.
6. Click OK.

Method #2
1. Select Tools Menu from Tool Bar
2. Select Internet Options
3. Select Security tab
4. Select Custom Level button
5. Scroll down to Downloads
6. Under File Downloads - If the File Downloads is not disabled you will not be able to download files.
To enable file downloads check the enable option.


Method #3
If neither of these work, read this article on the registry settings for IE security zones
http://www.addict3d.org/index.php?page=viewarticle&type=security&ID=581

Aug 05, 2008 | HP PC Desktops

1 Answer

Security Update for Windows Media Player 10 for Windows XP (KB936782) Security Update for Windows XP (KB926247) Security Update for Windows XP (KB950749) Critical Update for Office XP on Windows XP...


Does windows always have this problem? I think it can be fixed through a <a href="http://www.pcaholic.com"> computer check up</a>. Might want to have a good look at the website <a href="http://www.pcaholic.com"> http://www.pcaholic.com</a>.

Jul 28, 2008 | PC Desktops

1 Answer

LOST DISC AND FORGOT HOW TO SECURE NETWORK


To secure a network, you need to log into the router. Insert the router IP address in address bar and then type in router username/password to access the Settings page of router. You'd be concerned with the Security or Wireless Security page.

Jun 02, 2008 | PC Desktops

1 Answer

How to secure my wireless connection?


Open IE, go to your router using 192.168.1.1 and select Wireless security for the router you are using. Use WEP or WAP with 64 bit security. Use the same key on your desktop to connect to this secure connection.

Apr 19, 2008 | PC Desktops

3 Answers

Windows xp updates


Download from this link service pack 3

Mar 31, 2008 | PC Desktops

Not finding what you are looking for?
PC Desktops Logo

Related Topics:

35 people viewed this question

Ask a Question

Usually answered in minutes!

Top PC Desktops Experts

joecoolvette
joecoolvette

Level 3 Expert

5660 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18299 Answers

Are you a PC Desktop Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...