DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts

DreamTeamDownloads1, FTP Help, Movies, Bollywood, Applications, etc. & Mature Sex Forum, Rapidshare, Filefactory, Freakshare, Rapidgator, Turbobit, & More MULTI Filehosts (http://www.dreamteamdownloads1.com/index.php)
-   General Computer/Android Help, News & Info + New Technology (http://www.dreamteamdownloads1.com/forumdisplay.php?f=97)
-   -   The 10 Immutable Laws of Security (http://www.dreamteamdownloads1.com/showthread.php?t=113719)

Ladybbird 06-09-11 02:32

The 10 Immutable Laws of Security
 
http://www.howtogeek.com/geekers/up/...e4c692e1f5.jpg





If you’re looking for a basic primer to share with friends and family who are a bit unclear on their role in their own computer security, this guide from Microsoft can help clear things up.
The list is somewhat of a classic Microsoft offering but despite being a few years old it’s a really solid overview, especially for people who are unclear on basic computer security principles. Here’s the first law:


Law #1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore



It’s an unfortunate fact of computer science: when a computer program runs, it will do what it’s programmed to do, even if it’s programmed to be harmful. When you choose to run a program, you are making a decision to turn over control of your computer to it. Once a program is running, it can do anything, up to the limits of what you yourself can do on the computer. It could monitor your keystrokes and send them to a website. It could open every do***ent on the computer, and change the word “will” to “won’t” in all of them. It could send rude emails to all your friends. It could install a virus. It could create a “back door” that lets someone remotely control your computer. It could dial up an ISP in Katmandu. Or it could just reformat your hard drive.


That’s why it’s important to never run, or even download, a program from an untrusted source—and by “source,” I mean the person who wrote it, not the person who gave it to you. There’s a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn’t—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you’ll usually be safe.


Click below for the full list;



The 10 Immutable Laws of Security [Microsoft TechNet via O'Reilly Radar]


All times are GMT. The time now is 21:25.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
SEO by vBSEO 3.5.2