Professional Documents
Culture Documents
The turn of the new millennium has had a novel concern to the secure
and authentic operation on the best of human friends, the computer.
The Net has caused a great strength to the individual with instant
conversation and data transfer, but at the same time has lauded and
as a result landed scores of security concerns. In spite of the various
tokens being devised by the experts, there is always a sorry concern.
The next compose lies of the passwords and the security tokens, which
activates the system only via a password, learnt only to the user, but
alas, many techniques have been framed logically through program
softwares’ to leak them out to the limit. The usage of mechanical keys
for locking the systems or the keyboard are also in common, but that
activates physical undone to do. How secure is a box with a lock!!!
Next is the file access rights, with the aid of the software features as in
LAN settings, of naming user and supervisor in taste of working and
accessing files. The supervisor directs rights of append, deletion,
access or copy to specific users of the system in the case of multi-user
work environment. The specified rights are executed except the
‘access denied’ rights by the user.
Delete command at this juncture only puts a deletion tag to these files
but requires a purge command for the permanent deletion, or else it
can be undeleted using the salvage option, quoting the LAN server
workstation. The data backup lime lights the by default option of the
creation of a .bak file name for necessity. This is an extra but the
exact copy of the file saved by default by the same name but with the
BAK extension. But, sorry for the no-backup of the BAK files as the
media of storage remains common.
And finally, the copy protection of the usage software or files has had
VIRUS, the Vital Information Resource Under Seize, has had the top
seat to activate the comfort for the computer users all the way. A
computer virus is a computer program or a set of codes designed to
harm the computer or its software in hold. Internet offers free flow of
information from one end to the other around the globe in fraction of
seconds and minute to tally. With this flows the phobia and in reality
the virus programs causing harm to the masses as an attachment files
via e-mails or a part of the source code with the downloaded
programs/applications free on the Net. With all the above factual
points in discussion, the security of the computing arena is secured
with the unsecure logo!!!
Yes, no brigade has had and shall be able to combat the fight of
securing the master friend of the human brigade in totality. At one
end, we define the security and the other end phrases the definition by
unlocking the same logically with the assistance of the high powerful
computer coding. Let us hope for the computing to be more powerful
with the launch of the new tablets of security in the form of software,
hardware or intelligence of human identity. By having a sense to be
loyal to each other in the phase of computing and activating the latent
potentials of the computer in totality.
attention@computerscienceexpertise.com
www.computerscienceexpertise.com