Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?
.... of more attention than it has in the past. Computerized break-ins and
criminal activity, have become fairly common occurrences in both commercial
and academic circles. Hackers are becoming more common, and quickly
learning new techniques and methods, which no longer leave computer systems
as 'safehouses'. The question of "what kind of person is a Hacker?" cannot
be answered simply. Hackers vary in race, style and preference. Since every
person is different, therefore so are hackers, "Each Hacker h .....
|
|
Is Your Information Safe?
.... are linked to
business computers and financial networks, and all are linked together via the
Internet or other networks. More than a hundred million electronic messages
travel through cyberspace every day, and every piece of information stored in a
computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank
robbers have become today's computer hackers. They can walk away from a computer
crime with millions of virtual dollars (in the form of information they can use
or sell for an enormou .....
|
|
ITT Trip Scheduling
.... system. I finish by talking about the actual
design, the construction, and the implementation of the new ITT system. I
finish the paper with a discussion of maintaining the system.
The first step in building any DSS is planning. Planning is basically defining
the problem. The planning also involves an assessment of exactly what is needed.
In this case I deal with trip scheduling. In the case description this would
include: How many trips to offer, the days of the week to have particular trips,
and w .....
|
|
DVD VS. DIVX: Consumer Product Investigation
.... let the reader make the decision if it's an option that is
really all that necessary.
DVD is a relatively new format, but it has made a huge impact in
the consumer video market since it's relapse only a year ago. DVD is DVD,
which stands for Digital Video Disc, Digital Versatile Disc, or nothing,
depending on whom you ask, is the next generation of optical disc storage
technology. It's essentially a bigger, faster CD that can hold video as
well as audio and computer data. DVD aims to encompass home entert .....
|
|
Journalism On The Internet
.... the
globe connected together by telephone wires. It was first made by the military,
"No one owns the Internet", to have a network with no centre. That way it could
never be destroyed by nuclear war. Since then, universities have used it and it
has evolved into what it is today. It is a library that contains mail, stories,
news advertising, and just about everything else. "In a sense, freenets are a
literacy movement for computer mediated communication today, as public libraries
were to reading for an earli .....
|
|
Lasers
.... a
single frequency but also coherent, with the light waves all moving along in
unison.
Lasers consist of several components. A few of the many things that the
so-called active medium might consist of are, atoms of a gas, molecules in a
liquid, and ions in a crystal. Another component consists of some method of
introducing energy into the active medium, such as a flash lamp for example.
Another component is the pair of mirrors on either side of the active medium
which consists of one that transmit .....
|
|
Virtual Reality
.... imagination, virtual reality may be
a toy for you.
What is VR?
Virtual Reality grew out of flight simulation research during World
War II and early computer graphics research in the 1960's. In 1965,
computer scientist Ivan Sutherland published a paper describing "The
Ultimate Display" and set the stage for research on the technology of
Virtual Reality. Here's an excerpt from his paper:
"The ultimate display would, of course, be a room within which
the computer can control t .....
|
|
Macintosh Vs. IBM
.... to meet a deadline.
They also teamed up with Intel to supply its chips for the first IBM personal
computer. When the personal computer hit the market it was a major hit and IBM
became a strong power in electronic computers. Phoenix Technologies went
through published documentation to figure out the internal operating system
(BIOS) in the IBM. In turn, they designed a BIOS of their own which could be
used with IBM computers. It stood up in courts and now with a non IBM BIOS, the
clone was created. Man .....
|
|
Which Computer Is The Fastest
.... is almost entirely apple based.
Recent surveys confirm that from kindergarten through college, Apple has
cornered the market in education, and remains number one in this U.S. market.
Apple Macintosh computers account for 60% of the 5.9 million machines in U.S.
schools for the 1995-96 school year. Only 29% of schools use the Microsoft/Intel
platform, and DOS only accounts for a measly 11%. Also it was reported that
18.4% of 4 year college students own the Macintosh. 55% of college students own
a co .....
|
|
Making Utilities For MS-DOS
.... its
sole purpose is to provide services to applications. And who would be able to
develop applications for an operating system if the documentation for that
system is confidential and available only to the company that developed it?
Obviously, only the company that has developed that operating system will be
able to develop software for it. And this is a violation of the Antitrust Law.
And now I start having a suspicion that this is happening with Microsoft's
operating systems. It should be no secret t .....
|
|
Computers: Productive Tools In Our Lives
.... of input devices like a keyboard or a
mouse. After all this so called sophisticated, next generation equipment, you
need some sort of software. Software is a set of instructions to the C.P.U. from
a source such as a floppy disk, a hard drive or a CD - ROM drive, in zillions of
1's and 0's. Each of these tiny little instructions makes up a bit. Then they
assemble to form a byte. Bytes make up a program, which you run to use the
computer's various applications.
Now that you know more about computers tha .....
|
|
Seatbelts And Airbags: They Save Lives!!!
.... into the dashboard. This mechanism can be used
like an ignition switch: just insert a key and turn the key and the airbag
will deactivate. Car owners have also had the airbag flat out removed from
the car. Car buyers also just plain avoid buying cars with a passenger
side airbag. Seatbelts, however, cannot be avoided. In the state of
Pennsylvania it is illegal to ride in an automobile without wearing a
seatbelt, yet we still do not wear them because they are uncomfortable. We
don't think about wha .....
|
|
A Tour Of The Pentium Pro Processor Microarchitecture
.... Pentium processor's pipelined implementation
uses five stages to extract high throughput from the silicon - the Pentium Pro
processor moves to a decoupled, 12-stage, superpipelined implementation, trading
less work per pipestage for more stages. The Pentium Pro processor reduced its
pipestage time by 33 percent, compared with a Pentium processor, which means the
Pentium Pro processor can have a 33% higher clock speed than a Pentium processor
and still be equally easy to produce from a semiconductor manuf .....
|
|
Microprocessors
.... the chip work. A really good analogy for the way the inner
workings of a chip operate can be found in How Microprocessors Work. In their
book, Wyant and Hammerstrom describe a microprocessor as a factory and all of
the inner workings of the chip as the various parts of a factory (Wyant and
Hammerstrom, 71-103). Basically a microprocessor can be seen as a factory
because like a factory it is sent something and is told what to do with it. The
microprocessor factory processes information. This most basic un .....
|
|
Microsoft Corporation
.... of the Bronze and Iron Ages to new
heights, and the advent of the locomotive, automobiles, cargo ships and
airplanes were the most evident by-products of such raw materials. Use of these
by-products from the earth's raw materials dramatically changed the world of
business and trade. With the subsequent invention of wire communications (i.e.,
tapping out Morse code and speaking over telephone lines), business and trade
grew exponentially. Wireless communications via the inventions of radio,
televi .....
|
|
|
|