As you are using computer systems you know why a computer need to be provided security. But you may not be knowing how to provide security. This blog helps you in keeping your system secured.
Many secutity related softwares are available in the market but you need to pay some amount in order to download. Some softwares are available on trail basis so if you download them your computer will be secured for certain period only. But you can download softwares for free here.
Many of you might be using Internet Explorer, If so its better that you shift to Mozilla firefox for better, safe and fast browsing. Even I am using Mozilla Firefox- U can download it from here for ABSOLUTELY FREE, click on the banner left side to download now
FREE SPECIAL SOFTWARES FOR UR SYSTEM SECURITY FROM GOOGLE
Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive adware, browser hijackers, malicious ActiveX objects, Malware Trojans, tracking cookies, keyloggers, dialers, as well as other malware. When Spyware Doctor starts, the Main Status screen displays. From this screen, you can start scanning your computer for malware and activate real-time protection against future infections of malware.
Spyware Doctor will keep your system safe from viruses and will not let unothorised users to view your file when your system is connected. It will not let viruses or warms enter your system.
Norton Security Scan will assess your computer's explosure to security risks
---> Determine if viruses are present on your computer and remove
---> Detect if spyware and adware are present on your computer
---> Evaluate your computer's vulnerability to security risks
Nortan Security Scan provides the first step in computer protection detecting security risks that are already present on your system.
Windows Firewall will protect your system from external sourses that are likely to harm your system. Generally hackers will use a special kind of software for hacking the computers. These softwares will send messages to the computers that are connected. When the messages reach your computer it (if not protected) will respond to the message indicating that your computer is not protected. So this will give chance to hack your system. If Windows Firewall is installed on your system, the messages from the softwares are first reached to firewall. Firewall will not at all respond to the messages, so the softwares cannot even know that your system is existing.
Picassa is a wonderful software but not related to the security as the other softwares discussed above. This softwares will display all the images that are present on your system(including hidden files). This is really wonderful with lot of features actually I did not expect these before downloading. It will also display your web albus. You can email, create postures, print, lot lot lot of them are waiting for you. Its FREE to download with Google Pack. Lot of very very very beautiful and essential softwares are available with Google Pack for FREE
DOWNLOAD ALL OF THEM AT ONCE NOW FROM GOOGLE, click on the left side google pack icon to download now for FREE
source:wikipedia
computer Security
Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of 'secure' behavior on the operation of computers. The definition of 'secure' varies by application, and is typically defined implicitly or explicitly by a security policy that addresses confidentiality, integrity and availability of electronic information that is processed by or stored on computer systems.
The traditional approach is to create a trusted security kernel that exploits special-purpose hardware mechanisms in the microprocessor to constrain the operating system and the application programs to conform to the security policy. These systems can isolate processes and data to specifier domains and restrict access and privileges of users. This approach avoids trusting most of the operating system and applications.
In addition to restricting actions to a secure subset, a secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer against misuse using extreme measures:
“ The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts. ”
Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security.
It is important to distinguish the techniques used to increase a system's security from the issue of that system's security status. In particular, systems which contain fundamental flaws in their security designs cannot be made secure without compromising their usability. Most computer systems cannot be made secure even after the application of extensive "computer security" measures. Furthermore, if they are made secure, functionality and ease of use often decreases.
Computer security can also be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security.
Secure operating systems
One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed in the 1980s and used to produce what may be some of the most impenetrable operating systems ever. Though still valid, the technology is almost inactive today, perhaps because it is complex or not widely understood. Such ultra-strong secure operating systems are based on operating system kernel technology that can guarantee that certain security policies are absolutely enforced in an operating environment. An example of such a Computer security policy is the Bell-LaPadula model. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel. This forms the foundation for a secure operating system which, if certain critical parts are designed and implemented correctly, can ensure the absolute impossibility of penetration by hostile elements. This capability is enabled because the configuration not only imposes a security policy, but in theory completely protects itself from corruption. Ordinary operating systems, on the other hand, lack the features that assure this maximal level of security. The design methodology to produce such secure systems is precise, deterministic and logical.
Systems designed with such methodology represent the state of the art of computer security and the capability to produce them is not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information and military secrets. These are very powerful security tools and very few secure operating systems have been certified at the highest level (Orange Book A-1) to operate over the range of "Top Secret" to "unclassified" (including Honeywell SCOMP, USAF SACDIN, NSA Blacker and Boeing MLS LAN.) The assurance of security depends not only on the soundness of the design strategy, but also on the assurance of correctness of the implementation, and therefore there are degrees of security strength defined for COMPUSEC. The Common Criteria quantifies security strength of products in terms of two components, security capability (as Protection Profile) and assurance levels (as EAL levels.) None of these ultra-high assurance secure general purpose operating systems have been produced for decades or certified under the Common Criteria.