|
|
|
|
A Look Into The Computer Virus
... will be executed when the file is loaded into
memory, allowing them to infect still other files, and so on. Viruses often have
damaging side effects, sometimes intentionally, sometimes not. (Microsoft
Encarta 1996)
Most viruses are created out of curiosity. Viruses have always been viewed as a
well written, creative product of software engineering. I admit there are many
out there who create them out of malice, but far more people are just meeting a
challenge in software design. The people who make anti-virus software have much
more to benefit from the creation of new virii. This is not a slam, just an
observation. A common type of virus would be a Trojan Hor ...
|
The Year 2000 Problem
... example, subtracting 06/30/98 from 06/30/00 in an amortization formula would yield negative 98 years, instead of two years. The negative answer would cause an incorrect calculation or even program failure. Typically, in scenarios of this nature, computers do one of two things: freeze up and/or shut down.
Date computation functions are used on millions of software applications, thus affecting millions of computers world-wide. It not only affects calculations for interest rates, inventories, or insurance policies, but every major aspect of our modern economic infrastructure. Government agencies, businesses, and financial institutions use software applications that ...
|
Internet Censorship
... that are meant
for other types of communication will not necessarily apply in this medium.
There are no physical locations where communications take place, making it
difficult to determine where violations of the law should be prosecuted. There
is anonymity on the Internet and so ages and identities are not known this makes
it hard to determine if illegal activities are taking place in regards to people
under the legal age. As well, it is difficult to completely delete speech once
it has been posted, Meaning that distributing materials that are obscene are
banned becomes easy
The American Library Association (ALA) has a definition that states
censorship is “ ...
|
Organic Molecules Challenge
... few successes
to date lead them to believe they were on the right track.
"We have a long way to go before carbon-based electronics replace silicon-based
electronics, but we can see now that we hope to revolutionize computer design
and performance," said Robert R. Birge, a professor of chemistry, Carnegie-
Mellon University, Pittsburgh. "Now it's only a matter of time, hard work, and
some luck before molecular electronics start having a noticeable impact."
Molecular electronics is so named because it uses molecules to act as the
"wires" and "switches" of computer chips. Wires, may someday be replaced by
polymers that conduct electricity, such as polyacetylene ...
|
Internet Censorship And The Communications Decency Act
... is or
how it works, laws like these wouldn't work, and there are many
alternatives to government enforced laws to protect children that would be
much less invasive.
The bills for laws aimed at regulating the Internet for the sake of
child safety are, in my opinion, extremely vague and broadsided. They
give absolutely no definition of what should be considered "obscene" or
"harmful to minors." Definitions annexed on to them are extremely
broadsided and could not only ban pornography but also things like
information on AIDS and other sexually transmitted diseases, birth control,
breast cancer, certain forms of artwork, and many other things that should
never b ...
|
Viruses
... then used again, when the hacker calls up the number and gets on he's presented with a logon prompt, this is where the hacking really begins, the hacker tries to bypass this anyway he knows how to and tries to gain access to the system. Why do they do it, well lets go to a book and see "Avid young computer hackers in their preteens and teens are frequently involved in computer crimes that take the form of trespassing, invasion of privacy, or vandalism. Quite often they are mearly out for a fun and games evening, and they get entangled in the illegal use of their machines without realizing the full import of what they are doing", I have a hard time believing that ...
|
Computer Crime: The Crime Of The Future
... man. He is 31 and pending trial for computer
fraud. When he was a teenager, he used his knowledge of computers to break into
the North American Defense Command computer. Had he not been stopped, he could
have caused some real national defense problems for the United States (Sussman
66).
Other "small time" hackers affect people just as much by stealing or
giving away copyrighted software, which causes the prices of software to
increase, thus increasing the price the public must pay for the programs.
Companies reason that if they have a program that can be copied onto a
disc then they will lose a certain amount of their profit. People will copy it
and give t ...
|
Computer Crimes
... who say they’re doing the world a favor by pointing out security loopholes, have a slew of ways to break the law (White 67:c11). Computer crime becomes a larger and more prevalent issue as there is more value to criminally gain and the stakes raise in the hacker’s ego game. Only seventy five computer crime prosecutions were reported in the United States in 1986, according to the National Center for Computer Crime Data in Santa Cruz, Calif. By 1989, that number jumped to 500 prosecutions. that year cost businesses and banks - and, ultimately, consumers - about $500 million. "As the use of computers has increased, so has their criminal misuse" (Bowers 54:g13) ...
|
The Year 2000 Bug
... banking systems. For example you have a credit card that you just got and it expires 05/02, the bank will think 05/02 means 05/1902, It is way overdue to be terminated and bam! There goes your credit card. This bug also affects other things in the city. For example, if a train is running on a track and the power cuts out, then the gates wont go down and people will be in a lot of trouble. (Also, what happens if the power goes out in a hospital? (Also see “WHAT IS Y2K” later on)
Food is one essential thing that is crucial to survival and many people think that we may need lots of canned and dry goods. As in any crisis situation, some believe that the worst will hap ...
|
F117 Nighthawk Stealth Fighter
... 4˛ and the area of one wing is 1,140 ft. squared The speed of the Nighthawk is in the high subsonic range because the cruise speed is from Mach .8 to Mach .9 and the maximum speed is Mach 1 at 36,000 ft. The range of the Nighthawk is unlimited with air refueling from another plane. The engines of the Nighthawk are two
12,500lb. General Electric F404-F1D2 non-afterburning turbofan engines with 10,600 lbs. of thrust. The Nighthawk’s armament is a non-fixed internal weapons carriage and the primary weapons on the Nighthawk are the paveway series GBU-10 and GBU-27 laser guided bombs. There is usually one person to fly the Nighthawk and the cost to build each Ni ...
|
Browse:
« prev
56
57
58
59
60
more »
|
|
|