Thursday, February 10, 2011

ACTiViTY 2...



" COMPUTERS 20 YEARS FROM NOW"



I think that this is an interesting take on the future of comupters, but this industry is a fickle and unpredictable one. You know that little quip about "never needing more than 640K of RAM" - that wasn't quite so true, now was it? Having said that the industry is unpredictable, you can't really fit its progression to a linear curve as you have - I'm sure that the industry would deviate from the line all over the place.

My prediction: in the next twenty years, society will push for greater integration between computers and their users - us. An intersting project codenamed "Digital Angel" sprang up about six years ago, with the intent of implanting people with GPS tracking microchips. I don't know what happened to this project, but to me, its some kind of precursor to the future of society. 

Actually, I am more amazed at how little the actual "user experience" has changed in the past twenty or more years. Let's face it, we're all using fancy-ass, super-fast Xerox PARCs with vintage 1970s technology: Keyboards, mice and windowing-OS's are almost thirty years old. If you go back thirty years before that, computers took up entire buildings and were programmed by hard-wiring!

When I was a kid I figured by now, I'd be having philosophical discussions with my own HAL 9000, not still banging on a QWERTY keyboard designed to keep speedtypists from jamming the keys on manual typewriters in 1868!!! Where are the universal speech inputs? Where are the eye-focal pointers? Where are the neural interfaces? Hello?

Even the speed itself of the "user experience" hasn't changed much since my Mac Plus. Even though my CPU is a few zillion times faster than a 68000, Word still takes half a minute to repaginate my manuscript... but it does it in 32 bit color... which is such a help when I'm writing a report... DUH! And my Mac Plus booted up in a few seconds... try that now with XP. So today I can Gigaflip and Gigaflop. Big frakkin' deal.

I'm massively unimpressed by today's computing experience. The vested interests embodied in Satan Gates and his Satyr Henchman Jobs have effectively frozen the computer "user experience" to about 1980 when they first got into the business. They have done more to hold us back than anything else by distracting us with the mad "performance" game which looks great on charts but doesn't mean tiddly-squat to the average computer user.

Monday, February 7, 2011


BlackBerry PlayBook
 RIM’s foray into the tablet world. They have announced it, they have shown it running Adobe’s Flash and they have revealed 3 different models however, they have yet to give their much anticipated device a concrete release date other than to say it will be out sometime in early 2011. RIM needs to get back into the game in a major way, BlackBerry 6 and the Torch don’t count, and the PlayBook very well could be the device to bring them back to relevance.




Verizon’s LTE phones
 none of which have been announced yet.  Big Red will be rolling out their 4G LTE service in over 30 U.S. cities by the end of the year yet that haven’t announced any mobile devices that will be supported by the new network. One them could be the gorgeous HTC Incredible HD, but other than that rumor, there isn’t much out there. We should know more about these devices by the end of January.




Mintpass’ tablet
 a dual screen, dual booting device that will be able to run both Android and Windows 7. The two screens can either fold up or fold out making it sort of a cross between a tablet and a laptop. Also of note, the screens can be used in unison or separately. Mintpass is hoping to get it out next year, they still need to find a manufacturer for it. Let’s hope it comes sooner rather than later, eh?





Apple’s iPhone 5
 which oddly enough isn’t the most anticipated iPhone of 2010. Much like the second-gen iPad, details are hard to come by although reports indicate it has a different form factor from the iPhone 4. In fact, it’s said to have a different design than any of the iPhones currently on the market. It also might employ Near Field Communication (NFC) to support mobile computing. Expect it to show up on a bar stool in Redwood City and on camera in Vietnam soon.




The PlayStation Phone
 a device that as of right now only exists in leaked photographs and rumored specs. Sony Ericsson is said to be working on a device,codename Zeus, that will apparently be part PSP and part Android Gingerbread powered smartphone. While the debate wages on as to whether or not the device is too late to market , it’s hard to deny that the device is one of the most anticipated releases of the upcoming year.

Monday, December 13, 2010

"it104hazell...

1.)Why are there been a dramatic increase in the number of computer related security incidents in recent years?
ans.=There been a dramatic increase in the number of computer related security incidents in recent years bacauseas we all know computers are very demand now all throughout the world.........!!!!
2.)What are some characteristics of common computer criminals including their objectives?
ans.=The characteristics and motivations, computer criminals have access to enormous amounts of hardware, software, and data; they have the potential to cripple much of effective business and government throughout the world. In a sense, then, the purpose of computer security is to prevent these criminals from doing damage.
For the purposes of studying computer security, we say computer crime is any crime involving a computer or aided by the use of one. Although this definition is admittedly pretty broad, it allows us to consider ways to protect ourselves, our businesses, and our communities against those who use computers maliciously.
The U.S. Federal Bureau of Investigation regularly reports uniform crime statistics. The data do not separate computer crime from crime of other sorts. Moreover, many companies do not report computer crime at all, perhaps because they fear damage to their reputation, they are ashamed to have allowed their systems to be compromised, or they have agreed not to prosecute if the criminal will "go away." These conditions make it difficult for us to estimate the economic losses we suffer as a result of computer crime; our dollar estimates are really only vague suspicions. Still, the estimates, ranging from $300 million to $500 billion per year, tell us that it is important for us to pay attention to computer crime and to try to prevent it or at least to moderate its effects.
One approach to prevention or moderation is to understand who commits these crimes and why. Many studies have attempted to determine the characteristics of computer criminals. By studying those who have already used computers to commit crimes, we may be able in future to spot likely criminals and prevent the crimes from occurring. In this section, we examine some of these characteristics.

Amateurs

Amateurs have committed most of the computer crimes reported to date. Most embezzlers are not career criminals but rather are normal people who observe a weakness in a security system that allows them to access cash or other valuables. In the same sense, most computer criminals are ordinary computer professionals or users doing their jobs, when they discover they have access to something valuable.
When no one objects, the amateur may start using the computer at work to write letters, maintain soccer league team standings, or do accounting. This apparently innocent time-stealing may expand until the employee is pursuing a business in accounting, stock portfolio management, or desktop publishing on the side, using the employer's computing facilities. Alternatively, amateurs may become disgruntled over some negative work situation (such as a reprimand or denial of promotion) and vow to "get even" with management by wreaking havoc on a computing installation.

Crackers

System crackers,[2] often high school or university students, attempt to access computing facilities for which they have not been authorized. Cracking a computer's defenses is seen as the ultimate victimless crime. The perception is that nobody is hurt or even endangered by a little stolen machine time. Crackers enjoy the simple challenge of trying to log in, just to see whether it can be done. Most crackers can do their harm without confronting anybody, not even making a sound. In the absence of explicit warnings not to trespass in a system, crackers infer that access is permitted. An underground network of hackers helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces joined together may produce a large effect. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. There is no common profile or motivation for these attackers.
[2] The security community distinguishes between a "hacker," someone who (nonmaliciously) programs, manages, or uses computing systems, and a "cracker," someone who attempts access to computing systems for malicious purposes. Crackers are the "evildoers." Now, hacker has come to be used outside security to mean both benign and malicious users.

Career Criminals

By contrast, the career computer criminal understands the targets of computer crime. Criminals seldom change fields from arson, murder, or auto theft to computing; more often, criminals begin as computer professionals who engage in computer crime, finding the prospects and payoff good. There is some evidence that organized crime and international groups are engaging in computer crime. Recently, electronic spies and information brokers have begun to recognize that trading in companies' or individuals' secrets can be lucrative.
As mentioned earlier, some companies are reticent to prosecute computer criminals. In fact, after having discovered a computer crime, the companies are often thankful if the criminal quietly resigns. In other cases, the company is (understandably) more concerned about protecting its assets and so it closes down an attacked system rather than gathering evidence that could lead to identification and conviction of the criminal. The criminal is then free to continue the same illegal pattern with another company.

3.)What action must taken in response to a security incident?

ans.=The actions must taken in responce toa security incidents are:
  • attempts (either failed or successful) to gain unauthorized access to a system or its data
  • unwanted disruption or denial of service
  • the unauthorized use of a system for the processing or storage of data
  • changes to system hardware, firmware, or software characteristics without the owner's knowledge, instruction, or consent

Computer security incident activity can be defined as network or host activity that potentially threatens the security of computer systems.

Monday, December 6, 2010

"FIREWALL"




Firewall

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified