I’m trying to find software for my business and I don’t know what it’s called that I’m even looking for. I’m trying to create barcodes quickly from a pad that I can send to a wireless printer, again, quickly, and then once they are scanned by our register, they are bull and void. So basically, looking for a program/app that will go into the pad and then a one that I can load onto my pos so that I can pay them out once printed
What are the key differences between them?
I find both of them would also be able to retrieve data from the host system and both also could cause harm. I do not understand why there are people who say hardware vulnerabilities post the greatest threat in the cybersecurity and vice versa.
For software, the threat would be ransomware. For hardware would be Meltdown and Spectre.
Are there any good softwares out there where I can input a list of edges and have it generate a graph visualization for me?
I recently discovered BeEF with which someone can gain access to another PC through XSS.
I was wondering if antivirus software can detect when a PC get’s hooked to BeEF.. An online search doesn’t give a clear answer.
Am I safe from being hooked to BeEF if I have an active and up to date antivirus?
I have a RYZEN 7, ROG ASUS LAPTOP. 16 GB RAM 512 GB SSD. What is the best antivirus program that uses the least space?
I have been using AVG Ant-virus for years, it has become bloated and intrusive. What do I need for good security? Is windows antivirus effective? Spybot Search and Destroy? Malwarebytes? How many do I use and which ones, or should I go with an all-in-one, as AVG has become, or Norton, etc.
Is there any evidence or research into the likelihood, as well as damage, via threats in previous versions compared to following iterations of software?
For example, with every software version is the likelihood of new security vulnerabilities. More importantly, those vulnerabilities will be unknown. Whereas by staying on the previous version, even if you’re now vulnerable to a possibly existing risk, it may be a threat that is documented. Of course, that may not always be the case but if it is an unknown threat in version 1, than it will be an unknown threat in version 1+. If that threat is mitigated in version 1+, than we’re back to the point of this question:
**unknown and known threats in
- Version 1: unknown and known threats, versus
- Version 1+:unknown and possible introduction of alternative threats
This is not a duplicate of other questions with similar titles because Im looking for facts, whereas a lot of other posts include much conjecture.
What problems does a university/college have that can be solved in the form of computer software development?
thought of Educational software development
I am searching for a guideline on how to conduct expert interviews. Preferable it would cover the evaluation of software architecture or system design. In particular, I am looking for a quotable scientific guideline.
So far I couldn’t find a guideline like this with search engines like google scholar.