Computer Viruses: Infection Vectors, And Feasibility Of Complete Protection
.... modems, and telephone lines. This is the vector most feared
by computer users, with infected files being rapidly passed
along the emerging information super-highway, then downloaded
from public services and then used, thus infecting the new system.
4. Spontaneous Generation: this last vector is at the same time
the least thought of and the least likely. However, because
virus programs tend to be small, the possibility exists that
the code necessary for a self-replicating program could be
randomly generated and executed in the normal operation of
.....
|
|
Fiber Optics
.... create a
highly focused beam of light that is cycled on and off at very high speeds.
Computers at the transmitting end convert data or voice into "bits" of
information. The information is then sent through the fiber by the presence, or
lack, of light. So, all of the data is sent light pulses. Computers on the
receiving end convert the light back into data or voice, so it can be used.
All of this seems to be a very "modern" concept, and the technology we use
is. The concept though, was the idea of Alexander Graham Bell in the late 1800's.
He just didn't have a dependable light source... some days the sun doesn't
shine .....
|
|
The First Generation Of Computers
.... on a televised newscast to project the winner of the Eisenhower-
Stevenson presidential race with stunning accuracy. That same year Maurice V.
Wilkes (developer of EDSAC) laid the foundation for the concepts of
microprogramming, which was to become the guide for computer design and
construction.
In 1954, the first general-purpose computer to be completely
transistorized was built at Bell Laboratories. TRADIC (Transistorized Airborne
Digital Computer) held 800 transistors and bettered its predecessors by
functioning well aboard airplanes.
In 1956, the first system for storing files to be accessed randomly was
completed. The .....
|
|
Get Informed! - Buying The Right Computer
.... drive. Why? Because by
the time you load you system (Windows95, DOS) and other software; your hard
drive is already filled up. How are you going to save your document you wrote
in WordPerfect when your hard drive is full? It's usually cheaper in the long
run to buy the biggest hard drive available. Plus, you always want to have room
for your games. After all, who wants to spend their whole life working?
As far as processors, I suggest the Cryrix 6x686 166+. It's the best
processor for the buck. It's one of the fastest. The processor costs about
$300 cheaper then the Pentium version. Its got plenty of processing power .....
|
|
The Internet
.... e-mail message
halfway around the world can arrive at its destination within a minute or two.
In comparison, a letter can take from a few days to a couple of weeks, according
to the distance it travels. Furthermore, e-mail is inexpensive. The cost of
connection to the Internet is relatively cheaper than that of cable television.
Evidently e-mail is both time-saving and cost-effective.
Discussion groups are a great way to interact with others in the world
and to expand the knowledge of one's horizon. The response is instantaneuos
just like the telephone except it is non-verbal (typed). Discussion groups are
on-line services th .....
|
|
Computers As Medical Treatment Devices
.... with the help of modern science and computers, it's possible to
use lasers in surgical procedures to reshape the lens.
The procedure consists of creating a "flap" on the outermost layer
of the cornea, and folding it back, allowing the laser to change the
refractive index of the old lens by effectively vaporizing the surrounding
layers.
This technology would definitely not have been possible had it not
been for computers. The laser itself has to be correctly aimed, so as to be
the most effective; and of course so as not to cause damage which could be
irreparable for the patient. This in itself could be considered a p .....
|
|
Government Intervention On The Internet
.... subjects are Internet privacy and Internet censorship.
At the moment, the Internet is epitome of our first amendment, free
speech. It is a place where a person can speak their mind without being
reprimanded for what they say or how they choose to say it. But also contained
on the Internet, are a huge collection of obscene graphics, Anarchists'
cookbooks, and countless other things that offend many people. There are over
30 million Internet surfers in the U.S. alone, and much is to be said about what
offends whom and how.
As with many new technologies, today's laws don't apply well when it
comes to the Internet. Is the .....
|
|
Hackers: Information Warefare
.... might wonder what it does and then move on. The hacker, the true hacker,
will see the box, stop, examine it, wonder about it, and spend mental time
trying to figure it out. Given the proper circumstances, he might come back
later to look closely at the wiring, or even be so bold as to open the box. Not
maliciously, just out of curiosity. The hacker wants to know how things
work.(8)
Hackers truly are "America's Most Valuable Resource,"(4:264) as ex-CIA Robert
Steele has said. But if we don't stop screwing over our own countrymen, we will
never be looked at as anything more than common gutter trash. Hacking computers
for th .....
|
|
Hacking To Peaces
.... illegal or deliberate network
abuse versus behavior that is merely annoying. Legal systems everywhere are
busily studying ways of dealing with crimes and criminals on the Internet"
(Voss, 1996, p. 2).
There are ultimately three different views on the hacker controversy. The
first is that hacking or any intrusion on a computer is just like trespassing.
Any electric medium should be treated just like it were tangible, and all laws
should be followed as such. On the other extreme are the people that see
hacking as a privilege that falls under the right of free speech. The limits of
the law should be pushed to their farthest .....
|
|
History Of The Internet
.... base to base. The network was designed to function when parts of it
were destroyed. The network could not have a center because it would be a
primary target for enemies. In 1969, ARPANET was created, named after its
original Pentagon sponsor. There were four supercomputer stations, called nodes,
on this high speed network.
ARPANET grew during the 1970's as more and more supercomputer stations were
added. The users of ARPANET had changed the high speed network to an electronic
post office. Scientists and researchers used ARPANET to collaborate on projects
and to trade notes. Eventually, people used ARPANET for leisure activ .....
|
|
Where Did UNIX Come From And Why Are There Different Versions Of UNIX?
.... much more interested in
marketing a commercial version of UNIX. And today we see that many companies
have now licensed their own version:
AT&T's System V,
Versions of System V such as SCO's Xenix and IBM's AIX
Berkeley's UNIX (called "BSD" for "Berkeley System Development"),
Versions of Berkeley UNIX such as Sun Microsystem's SunOS, DEC's Ultrix and
Carnegie Mellon University's Mach
(used on the NEXT).
.....
|
|
The Public Broadcasting System: Digital Technology And HDTV
.... community organizations or state and municipal groups,
operate approximately 350 member stations. All public television stations
highlight the importance of illuminating cultural and educational
programming, as well as distinguished programs on nature, science, and
public affairs. In PBS: Behind the Screen, Laurence Tarvik depicts this
unique organisation as "a $5 million appropriation" which over time, became
a "multi-billion worldwide multi-media empire" (xvii). Over four decades,
PBS has become a leader in using technology to further its educational
objective, such as, closed captioning, stereo television sound amd foreign
l .....
|
|
|