Security Computing...

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Ali Rizwan
    Banned
    Contributor
    • Aug 2007
    • 931

    Security Computing...

    I want to start this post in which i want to share some seecurity computing knowledge. In which i will explain the working of av's, database security, software security, os security etc....
    If this is not against the rules of bytes will i start writing further posts.....

    Thanx
    >> ALI <<
  • Markus
    Recognized Expert Expert
    • Jun 2007
    • 6092

    #2
    I don't see this as against the rules...

    As long as you don't focus on the how to exploit the security holes.

    Comment

    • RedSon
      Recognized Expert Expert
      • Jan 2007
      • 4980

      #3
      Go ahead and post, I will take it under advisement that you are not wanting to write posts that encourage or help people do malicious things to computers. As long as you do you best to make sure that you are not crossing the line then you will be fine. If you do happen to cross the line I will delete the post, but I will not ban your account, we can then discuss in what ways your post broke the rules so that you have a better understanding of what is permitted and what is not.

      -RedSon

      Comment

      • Ali Rizwan
        Banned
        Contributor
        • Aug 2007
        • 931

        #4
        Thanx
        First let me explain what i will post in this thread....
        How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
        Now please mention which of the above topics i can discuss here....

        Thanx
        >> ALI <<

        Comment

        • JosAH
          Recognized Expert MVP
          • Mar 2007
          • 11453

          #5
          I bet it is all MS Windows related ...

          kind regards,

          Jos

          Comment

          • acoder
            Recognized Expert MVP
            • Nov 2006
            • 16032

            #6
            This thread doesn't belong in the Cafe.

            Moved to Misc. Discussions.

            Moderator.

            Comment

            • sicarie
              Recognized Expert Specialist
              • Nov 2006
              • 4677

              #7
              Originally posted by Ali Rizwan
              Thanx
              First let me explain what i will post in this thread....
              How to secure Databases, How to secure Programes, How to build a secure OS, How to build an Anti Virus, What are backdoors, Where Virus is found in Your Computer, How can You remove Viruses, Kinds of Malicious Code, History of Virus.... etc etc...
              Now please mention which of the above topics i can discuss here....

              Thanx
              >> ALI <<
              Well, the first few parts are pretty easy, any sort of application you can go to Google and type 'harden <app>' such as 'harden XP' or 'harden Oracle'. Applications themselves are tougher because you don't have direct access to the source code, but there are suggestions out there such as good log monitoring and splitting components.

              An antivirus uses preset signatures (much like a host intrusion detection system) to look at specific parts of your computer. This is why it is so easy for virus writers to come out with several versions of the same virus and have them infect computers, even when there is an 'antivirus definition' existing - it only covers one of the variants. You can remove virii by removing the corrupted and propagating material.

              I personally think backdoors are pretty self-explanatory, so I'm going to skip that one. and the rest are information on malicious topics and have nothing to do with fixing them, so I'm not going to answer them.

              Comment

              • NeoPa
                Recognized Expert Moderator MVP
                • Oct 2006
                • 32661

                #8
                Monitoring.

                I've seen nothing so far to give me concern, but as most of us know this is a complicated area and it's easy to miss things.

                @RedSon
                Seems like a sound way to proceed. I will be keeping an eye out too so if anyone finds anything to be at all suspicious I am there to discuss with.

                @Ali
                Any of those subjects seem fine. Be careful of submitting code though (or attachments). Small code snippets that are easily understood are probably fine.

                Comment

                • Ali Rizwan
                  Banned
                  Contributor
                  • Aug 2007
                  • 931

                  #9
                  thanx all.......

                  << ALI >>

                  Comment

                  Working...