Friday 8 August 2014

Why Computer Password Should Be Complex?Importance Of Computer Password.

کمپیو ٹر کے لیے پاس ورڈ کیو ں ضرو ری ہے اور کمپیو ٹر پر پاس ورڈ کی کیا اہمیت ہے۔


Passwords are principal device for restricting access to a machine or network. However, passwords can be guessed or stolen. To guard against theft or discovery, password should be changed frequently. Operating System (OS) is enforced a password changing policy upon its users. To counter guessing, quite simply, the password needs to be made as long and as complex as possible.
A single letter password chosen from (a-z) might be guessed after 26 attempts. A two letter password has 26 times more possibilities (676). The following table shows this sequence of increasing complexity.
1 - Letter password – 26 – possibilities
2 – Letter password – 676 – possibilities
4 – Letter password – 456976 – possibilities
8 – Letter password – 208827064576 – possibilities
Windows OS permits password of up to 127 characters, but recommends at least 8 character for a password.
A single letter password chosen from a to a gives a base of 26 elements, but if the choice of elements includes upper-case letters and other symbols, thus the complexity level will increased significantly, and the password integrity is strengthened.
The length and composition of a user’s password can be specified in security policy, either for an individual machine or for a domain.
In summary, for a password to be strong and difficult to crack, it should:
1-       Be at least 8 characters long
2-       Be significantly different form your previous password.
3-       Not contain your own name or user name. ( nor the name of spouse, children, pets etc)
4-       Not be a common word or name.
5-       Have at least one digit and one upper or lower case letter.
NOTE:

Any password should be changed after every 6 months.         

Computer Virus Trojan Horse

Backdoor Trojan A Trojan horse that grants unauthorized access to computer systems. A spying tool.


Boot sector virus A virus that infects the boot record on floppies or hard drives.

Bug
A programming error in a computer program. Viruses are sometimes incorrectly called bugs, “the love bug” for example instead of the virus’ real name VBS.Loveletter.

Direct action virus

A direct action virus does not remain active in the computer. It only activates when infected objects are used and terminates when the replication and/or
payload routine has been executed.

File virus A virus that infects executable program files.

Hoax. A chain letter that usually circulates as an email

message. Hoaxes are not related to viruses in any way, expect for the fact that many hoaxes warn
about a non-existing computer virus.

Host The object, file or other kind of object to which the virus is attached.

In the wild, ITW
A large number of viruses exist only in virus researchers’ collections because they rely on some
system or architecture that is no longer in common use. The viruses that are working in today’s
computer environment and encountered in real life are called “in the wild” viruses.
Joke A computer program that does something funny or tasteless, but does not harm the computer system.

Macro virus A virus that infects documents using application specific macro languages.

Malware A common term for all kind of unwanted software, such as viruses, worms, Trojans etc.


Memory resident virus

A memory resident virus remains in memory as long as the computer is turned on. This enables the virus to monitor system activities and infect other objects efficiently.

Multipartite virus

A virus that can infect several types of objects. Mostly used for hybrids that can infect both boot
sectors and 16-bit programs.

Overwriting virus A virus that overwrites the host file and destroys it.

Parasitic virus

Most viruses require an object to attach themselves to. These viruses are called parasitic, as they cannot exist without their host.

Payload The part of the code of the virus that does

Polymorphic virus A virus that changes its own code to avoid detection.

Replication mechanism The part of the virus’ code that replicates (copies) the virus.

Retro virus A virus that attempts to damage or disturb the function of anti-virus software.

Script viruses A virus that replicates using scripting languages.

Stealth virus A virus that attempts to hide its presence from anti-virus software.

Trojan horse (Trojan) A computer program that contains a hidden, malicious functionality.
Virus. A computer program that replicates by copying itself. The term virus is often used for both viruses and worms, which is not exactly correct from the technical point of view.
Virus creation kit A programming tool that makes it easy to create
viruses without actual knowledge about how a virus works.

Worm A more independent form of computer virus. Viruses usually depend on humans to copy objects, but worms are able to initiate the copying procedure by themselves.