Monday, April 19, 2010

host

host computer (host)
1. A computer that is attached to a network and provides services other than simply acting as a store-and-forward processor or communication switch. Host computers range in size from small microcomputers to large time-sharing or batch mainframes. Many networks have a hierarchical structure, with a communication subnetwork providing packet-switching services for host computers to support time-sharing, remote job entry, etc. A host computer at one level of a hierarchy may function as a packet or message switch at another.
networking
2. A computer used to develop software for execution on another computer, known as the target computer.

3. A computer used to emulate another computer, known as the target computer. See also emulation.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

microsoft

Microsoft Corporation (NASDAQ: MSFT, HKEX: 4338) is a multinational computer technology corporation that develops, manufactures, licenses, and supports a wide range of software products for computing devices. Headquartered in Redmond, Washington, USA, its most profitable products are the Microsoft Windows operating system and the Microsoft Office suite of productivity software. As of the third quarter of 2009, Microsoft was ranked as the third largest company in the world, following PetroChina and ExxonMobil.
SIXTH SCENCE TECHNOLOGY
The company was founded on April 4, 1975, to develop and sell BASIC interpreters for the Altair 8800. Microsoft rose to dominate the home computer operating system market with MS-DOS in the mid-1980s, followed by the Windows line of operating systems. Many of its products have achieved near-ubiquity in the desktop computer market. One commentator notes that Microsoft's original mission was "a computer on every desk and in every home, running Microsoft software." Microsoft possesses footholds in other markets, with assets such as the MSNBC cable television network and the MSN Internet portal. The company also markets both computer hardware products such as the Microsoft mouse and the Microsoft Natural keyboard, as well as home entertainment products such as the Xbox, Xbox 360, Zune and MSN TV. The company's initial public stock offering (IPO) was in 1986; the ensuing rise of the company's stock price has made four billionaires and an estimated 12,000 millionaires from Microsoft employees.

Throughout its history the company has been the target of criticism, including monopolistic business practices and anti-competitive strategies including refusal to deal and tying. The U.S. Department of Justice and the European Commission, among others, have ruled against Microsoft for antitrust violations. (See also United States v. Microsoft, European Union Microsoft competition case.)
computer science tutorial
seminar topic
newidea
social networking
computer science engineering
power of computer
magic of computer
computerinformation

animation

Animation is the rapid display of a sequence of images of 2-D or 3-D artwork or model positions in order to create an illusion of movement. It is an optical illusion of motion due to the phenomenon of persistence of vision, and can be created and demonstrated in a number of ways. The most common method of presenting animation is as a motion picture or video program, although several other forms of presenting animation also exist.
2D animation figures are created and/or edited on the computer using 2D bitmap graphics or created and edited using 2D vector graphics. This includes automated computerized versions of traditional animation techniques such as of tweening, morphing, onion skinning and interpolated rotoscoping.
3D animation are digitally modeled and manipulated by an animator. In order to manipulate a mesh, it is given a digital skeletal structure that can be used to control the mesh. This process is called rigging. Various other techniques can be applied, such as mathematical functions (ex. gravity, particle simulations), simulated fur or hair, effects such as fire and water and the use of Motion capture to name but a few, these techniques fall under the category of 3d dynamics. Many 3D animations are very believable and are commonly used as Visual effects for recent movies.
creat animation
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

open source program

The Open Source Definition (Annotated)

Version 1.9

The indented, italicized sections below appear as annotations to the Open Source Definition (OSD) and are not a part of the OSD. A plain version of the OSD without annotations can be found here.
Introduction

Open source doesn't just mean access to the source code. The distribution terms of open-source software must comply with the following criteria:
1. Free Redistribution

The license shall not restrict any party from selling or giving away the software as a component of an aggregate software distribution containing programs from several different sources. The license shall not require a royalty or other fee for such sale.

Rationale: By constraining the license to require free redistribution, we eliminate the temptation to throw away many long-term gains in order to make a few short-term sales dollars. If we didn't do this, there would be lots of pressure for cooperators to defect.
2. Source Code

The program must include source code, and must allow distribution in source code as well as compiled form. Where some form of a product is not distributed with source code, there must be a well-publicized means of obtaining the source code for no more than a reasonable reproduction cost preferably, downloading via the Internet without charge. The source code must be the preferred form in which a programmer would modify the program. Deliberately obfuscated source code is not allowed. Intermediate forms such as the output of a preprocessor or translator are not allowed.

Rationale: We require access to un-obfuscated source code because you can't evolve programs without modifying them. Since our purpose is to make evolution easy, we require that modification be made easy.
3. Derived Works

The license must allow modifications and derived works, and must allow them to be distributed under the same terms as the license of the original software.

Rationale: The mere ability to read source isn't enough to support independent peer review and rapid evolutionary selection. For rapid evolution to happen, people need to be able to experiment with and redistribute modifications.
4. Integrity of The Author's Source Code

The license may restrict source-code from being distributed in modified form only if the license allows the distribution of "patch files" with the source code for the purpose of modifying the program at build time. The license must explicitly permit distribution of software built from modified source code. The license may require derived works to carry a different name or version number from the original software.

Rationale: Encouraging lots of improvement is a good thing, but users have a right to know who is responsible for the software they are using. Authors and maintainers have reciprocal right to know what they're being asked to support and protect their reputations.

Accordingly, an open-source license must guarantee that source be readily available, but may require that it be distributed as pristine base sources plus patches. In this way, "unofficial" changes can be made available but readily distinguished from the base source.
5. No Discrimination Against Persons or Groups

The license must not discriminate against any person or group of persons.

Rationale: In order to get the maximum benefit from the process, the maximum diversity of persons and groups should be equally eligible to contribute to open sources. Therefore we forbid any open-source license from locking anybody out of the process.

Some countries, including the United States, have export restrictions for certain types of software. An OSD-conformant license may warn licensees of applicable restrictions and remind them that they are obliged to obey the law; however, it may not incorporate such restrictions itself.
6. No Discrimination Against Fields of Endeavor

The license must not restrict anyone from making use of the program in a specific field of endeavor. For example, it may not restrict the program from being used in a business, or from being used for genetic research.

Rationale: The major intention of this clause is to prohibit license traps that prevent open source from being used commercially. We want commercial users to join our community, not feel excluded from it.
7. Distribution of License

The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.

Rationale: This clause is intended to forbid closing up software by indirect means such as requiring a non-disclosure agreement.
8. License Must Not Be Specific to a Product

The rights attached to the program must not depend on the program's being part of a particular software distribution. If the program is extracted from that distribution and used or distributed within the terms of the program's license, all parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.

Rationale: This clause forecloses yet another class of license traps.
9. License Must Not Restrict Other Software

The license must not place restrictions on other software that is distributed along with the licensed software. For example, the license must not insist that all other programs distributed on the same medium must be open-source software.

Rationale: Distributors of open-source software have the right to make their own choices about their own software.

Yes, the GPL is conformant with this requirement. Software linked with GPLed libraries only inherits the GPL if it forms a single work, not any software with which they are merely distributed.
10. License Must Be Technology-Neutral

No provision of the license may be predicated on any individual technology or style of interface.

Rationale: This provision is aimed specifically at licenses which require an explicit gesture of assent in order to establish a contract between licensor and licensee. Provisions mandating so-called "click-wrap" may conflict with important methods of software distribution such as FTP download, CD-ROM anthologies, and web mirroring; such provisions may also hinder code re-use. Conformant licenses must allow for the possibility that (a) redistribution of the software will take place over non-Web channels that do not support click-wrapping of the download, and that (b) the covered code (or re-used portions of covered code) may run in a non-GUI environment that cannot support popup dialogues.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

backtrck 4

BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tool collection to-date.
backtrack 4 tutorial
Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community. Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available.

Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.
<a href=". [common among security specialists] A cracker, someone bent on breaking into the system you are protecting. Oppose the less comon white hat for an ally or friendly security specialist; the term gray hat is in occasional use for people with cracker skills operating within the law, e.g. in doing security evaluations. All three terms derive from the dress code of formulaic Westerns, in which bad guys wore black hats and good guys white ones. firewall can prevent cracking? 2. [spamfighters] ‘Black hat’, ‘white hat’, and ‘gray hat’ are also used to denote the spam-friendliness of ISPs: a black hat ISP harbors spammers and doesn't terminate them; a white hat ISP terminates upon the first LART; and gray hat ISPs terminate only reluctantly and/or slowly. This has led to the concept of a hat check: someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness. cracking e mail more on computer science">more on computer science
linux interview question
computer science engineering
power of computer
magic of computer
computerinformation

cracking

. [common among security specialists] A cracker, someone bent on breaking into the system you are protecting. Oppose the less comon white hat for an ally or friendly security specialist; the term gray hat is in occasional use for people with cracker skills operating within the law, e.g. in doing security evaluations. All three terms derive from the dress code of formulaic Westerns, in which bad guys wore black hats and good guys white ones.
firewall can prevent cracking?
2. [spamfighters] ‘Black hat’, ‘white hat’, and ‘gray hat’ are also used to denote the spam-friendliness of ISPs: a black hat ISP harbors spammers and doesn't terminate them; a white hat ISP terminates upon the first LART; and gray hat ISPs terminate only reluctantly and/or slowly. This has led to the concept of a hat check: someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness.
cracking e mail
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

social engineering

DEFINITION - In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. A social engineer runs what used to be called a "con game". For example, a person using social engineering to break into a computer network would try to gain the confidence of someone who is authorized to access the network in order to get them to reveal information that compromises the network's security. They might call the authorized employee with some kind of urgent problem; social engineers often rely on the natural helpfulness of people as well as on their weaknesses. Appeal to vanity, appeal to authority, and old-fashioned eavesdropping are typical social engineering techniques.

Another aspect of social engineering relies on people's inability to keep up with a culture that relies heavily on information technology. Social engineers rely on the fact that people are not aware of the value of the information they possess and are careless about protecting it. Frequently, social engineers will search dumpsters for valuable information, memorize access codes by looking over someone's shoulder (shoulder surfing), or take advantage of people's natural inclination to choose passwords that are meaningful to them but can be easily guessed. Security experts propose that as our culture becomes more dependent on information, social engineering will remain the greatest threat to any security system. Prevention includes educating people about the value of information, training them to protect it, and increasing people's awareness of how social engineers operate.
The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network. Typical targets include telephone companies and answering services, big-name corporations and financial institutions, military and government agencies, and hospitals. The Internet boom had its share of industrial engineering attacks in start-ups as well, but attacks generally focus on larger entities.
hardware component
Finding good, real-life examples of social engineering attacks is difficult. Target organizations either do not want to admit that they have been victimized (after all, to admit a fundamental security breach is not only embarrassing, it may damaging to the organization’s reputation) and/or the attack was not well documented so that nobody is really sure whether there was a social engineering attack or not.

As for why organizations are targeted through social engineering – well, it’s often an easier way to gain illicit access than are many forms of technical hacking. Even for technical people, it’s often much simpler to just pick up the phone and ask someone for his password. And most often, that’s just what a hacker will do.
firewall concepts
Social engineering attacks take place on two levels: the physical and the psychological. First, we'll focus on the physical setting for these attacks: the workplace, the phone, your trash, and even on-line. In the workplace, the hacker can simply walk in the door, like in the movies, and pretend to be a maintenance worker or consultant who has access to the organization. Then the intruder struts through the office until he or she finds a few passwords lying around and emerges from the building with ample information to exploit the network from home later that night. Another technique to gain authentication information is to just stand there and watch an oblivious employee type in his password.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation


script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-26998893-1']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);
})();



wide area network

WAN - Wide Area Network
As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.

A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.

A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.
LAN, WAN and Home Networking
Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.
wireless communication
internet history
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

computer science 3

computer shotcuts
operating system concepts

The early foundations of what would become computer science predate the invention of the modern digital computer. Machines for calculating fixed numerical tasks, such as the abacus, have existed since antiquity. Wilhelm Schickard built the first mechanical calculator in 1623. Charles Babbage designed a difference engine in Victorian times helped by Ada Lovelace. Around 1900, punch-card machines were introduced. However, all of these machines were constrained to perform a single task, or at best some subset of all possible tasks.

During the 1940s, as newer and more powerful computing machines were developed, the term computer came to refer to the machines rather than their human predecessors. As it became clear that computers could be used for more than just mathematical calculations, the field of computer science broadened to study computation in general. Computer science began to be established as a distinct academic discipline in the 1950s and early 1960s. The first computer science degree program in the United States was formed at Purdue University in 1962. Since practical computers became available, many applications of computing have become distinct areas of study in their own right.

Although many initially believed it was impossible that computers themselves could actually be a scientific field of study, in the late fifties it gradually became accepted among the greater academic population. It is the now well-known IBM brand that formed part of the computer science revolution during this time. IBM (short for International Business Machines) released the IBM 704 and later the IBM 709 computers, which were widely used during the exploration period of such devices. "Still, working with the IBM [computer] was frustrating...if you had misplaced as much as one letter in one instruction, the program would crash, and you would have to start the whole process over again". During the late 1950s, the computer science discipline was very much in its developmental stages, and such issues were commonplace.

Time has seen significant improvements in the usability and effectiveness of computer science technology. Modern society has seen a significant shift from computers being used solely by experts or professionals to a more widespread user base.

As a discipline, computer science spans a range of topics from theoretical studies of algorithms and the limits of computation to the practical issues of implementing computing systems in hardware and software. The Computer Sciences Accreditation Board (CSAB) – which is made up of representatives of the Association for Computing Machinery (ACM), the Institute of Electrical and Electronics Engineers Computer Society (IEEE), and the Association for Information Systems (AIS) – identifies four areas that it considers crucial to the discipline of computer science: theory of computation, algorithms and data structures, programming methodology and languages, and computer elements and architecture. In addition to these four areas, CSAB also identifies fields such as software engineering, artificial intelligence, computer networking and communication, database systems, parallel computation, distributed computation, computer-human interaction, computer graphics, operating systems, and numerical and symbolic computation as being important areas of computer science.[


computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

information technology

computer technology
linux & unix tutorial
information technology in india
sixth scence
hardware
computer science engineering
power of computer
magic of computer
computerinformation

internet

computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

firewall

firewall diagram

Firewalls have helped protect computers in large companies for years. Now, they're a critical component of home networks, as well. See more computer networking pictures.

If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have probably heard the term firewall used. For example, you often hear people in companies say things like, "I can't use that site because they won't let it through the firewall."

If you have a fast Internet connection into your home (either a DSL connection or a cable modem), you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.
More PC Security

* How to Avoid Spyware
* 10 Worst Computer Viruses
* ScienceChannel.com: Hacker Quiz

Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. As you read through this article, you will learn more about firewalls, how they work and what kinds of threats they can protect you from
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

wireless communocation

Networking allows two or more computers to interface with each other, whether in an office, a library or other type of establishment, or at home. Running cables throughout an office or a house can be tedious and time-consuming, however, making wireless networking - a network of interfaced computers that doesn't require any hardwired connection between the computers - the ideal choice for many businesses and homes.
WIRELESS ITERNET COMMUNICATION
Wireless networking has many uses. Wireless networking at an office or place of business makes it easy to share files, printers, and Internet access between all of the computers. Wireless networking at home or in a home office can enable you to print a file from your laptop without having to go to the printer and hook up to it. Wireless networking also means that you can take your laptop to a place that offers WiFi, known as a "hotspot," and instantly connect to the Internet - a valuable tool for businesspeople, entrepreneurs, and students.

For wireless networking to be possible, all computers connected to the network must have a wireless card. Wireless networking is virtually the same thing as wireless Internet access - except instead of connecting to the Internet, you are connecting to another computer - so if you can already access the Internet wirelessly, wireless networking will be just as easy. Many of the newer laptops on the market come fully equipped for wireless networking, and you can buy a wireless card to upgrade your computer if it doesn't already have wireless networking capabilities.

There are several different kinds of wireless cards available. The first cards on the market were 802.11b, but the standard was eventually upgraded to 802.11g. The latter type of card, being the newest, also has the fastest data transfer, making it the obvious choice for anyone who is serious about wireless networking.

Wireless networking and wireless Internet access may seem dangerous to some people. If the channel is left open, anyone can log on to the network; once on the network, that person could hack into one of the other computers, easily locating personal files containing sensitive information. However, what many people don't realize is that wireless networking and wireless Internet access comes with a feature that protects against such an event: the WEP key. The WEP key is essentially a password that is required before a computer can sign on to the wireless network, which prevents any unauthorized use. If you are unsure of how to set up this feature, you can call the provider of your wireless service or the manufacturer of your wireless modem or router.
WEB SERVER APPLICATION
computer science
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

super computer


A supercomputer is a computer which performs at a rate of speed which is far above that of other computers. Given the constantly changing world of computing, it should come as no surprise to learn that most supercomputers bear their superlative titles for a few years, at best. Computer programmers are fond of saying that today's supercomputer will become tomorrow's computer; the computer you are reading this article on is probably more powerful than most historic supercomputers, for example.
OTHER COMPUTERS
The term “supercomputer” was coined in 1929 by the New York World, referring to tabulators manufactured by IBM. To modern computer users, these tabulators would probably appear awkward, slow, and cumbersome to use, but at the time, they represented the cutting edge of technology. This continues to be true of supercomputers today, which harness immense processing power so that they are incredibly fast, sophisticated, and powerful.

The primary use for supercomputers is in scientific computing, which requires high-powered computers to perform complex calculations. Scientific organizations like NASA boast supercomputers the size of rooms for the purpose of performing calculations, rendering complex formulas, and performing other tasks which require a formidable amount of computer power. Some supercomputers have also been designed for very specific functions like cracking codes and playing chess; Deep Blue is a famous chess-playing supercomputer.

In many cases, a supercomputer is custom-assembled, utilizing elements from a range of computer manufacturers and tailored for its intended use. Most supercomputers run on a Linux or Unix operating system, as these operating systems are extremely flexible, stable, and efficient. Supercomputers typically have multiple processors and a variety of other technological tricks to ensure that they run smoothly.

One of the biggest concerns with running a supercomputer is cooling. As one might imagine, supercomputers get extremely hot as they run, requiring complex cooling systems to ensure that no part of the computer fails. Many of these cooling systems take advantage of liquid gases, which can get extremely cold. Another issue is the speed at which information can be transferred or written to a storage device, as the speed of data transfer will limit the supercomputer's performance.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

mainfraim computer

Mainframes are very large computers that are built to be able to perform complex and critical applications. Mainframes are usually very large in both physical size and computational ability. They can be some of the largest machines on the planet. However, given the continued drive toward greater computational muscle in a smaller physical package, many mainframes are not too much larger than desktop computers these days.

Mainframes are designed to keep running with as little interruption as possible. They contain large numbers of self-maintenance features, including built-in security features and backup power supplies. Since mainframes are usually the most important computers in a company’s computational arsenal, they are routinely protected by multiple layers of security and power backup, both internal and external.
SEE ON QUANTUM COMPUTER
Among the self-protection measures commonly found in mainframes are an enhanced heat-protection mechanism. Since these computers run all day every day for years at a time, they naturally build up a large amount of heat that needs to be vented. The fans found in mainframes are some of the most effective in the business.

Because mainframes are at the top of the network system food chain, they routinely have the best and most up-to-date of everything, including processors, hard drives, video cards, network cards, and peripheral connections. With a mainframe, which is designed to be super-fast, super-sleek, and super-powerful, read and write speeds have to be lightning-quick. Many mainframes have dual processors as a result.

One of the most important functions of a mainframe is to be able to host applications and work with multiple users simultaneously. Not all computers can handle this, so mainframes are very important in a company’s electronic design, especially its network design. Very often, mainframes are at the heart of computer networks.

In today’s on-demand, Web-driven world, mainframes are playing an even more central role in providing — and controlling — access to and from networks. The number of users that can access a mainframe at one time is seemingly limitless. Mainframes in this environment are also designed to host Web-based applications.

Mainframes typically can run more than one operating system at a time as well. This comes in handy when a company is running a Web-based system whose users include practitioners of Mac OS, Linux, and Windows XP. Mainframes allow a company to avoid having to exclude users because of OS issues.

Larger mainframes are not always user-friendly, unless the user is the system administrator. These mainframes are designed to stay running, not to be available for users’ whims. However, the lack of approachability is more than made up for by the mainframe's increased ability to keep running in situations that would likely disable other systems.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

quantam computer

The massive amount of processing power generated by computer manufacturers has not yet been able to quench our thirst for speed and computing capacity. In 1947, American computer engineer Howard Aiken said that just six electronic digital computers would satisfy the computing needs of the United States. Others have made similar errant predictions about the amount of computing power that would support our growing technological needs. Of course, Aiken didn't count on the large amounts of data generated by scientific research, the proliferation of personal computers or the emergence of the Internet, which have only fueled our need for more, more and more computing power.
UNIX TUTORIAL
Will we ever have the amount of computing power we need or want? If, as Moore's Law states, the number of transistors on a microprocessor continues to double every 18 months, the year 2020 or 2030 will find the circuits on a microprocessor measured on an atomic scale. And the logical next step will be to create quantum computers, which will harness the power of atoms and molecules to perform memory and processing tasks. Quantum computers have the potential to perform certain calculations significantly faster than any silicon-based computer.
Scientists have already built basic quantum computers that can perform certain calculations; but a practical quantum computer is still years away. In this article, you'll learn what a quantum computer is and just what it'll be used for in the next era of computing.
computer science
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

bluetooth

Bluetooth is a wireless technology for creating personal networks operating in the 2.4 GHz unlicensed band, with a range of 10 meters. Networks are usually formed ad-hoc from portable devices such as cellular phones, handhelds and laptops. Unlike the other popular wireless technology, Wi-Fi, Bluetooth offers higher level service profiles, e.g. FTP-like file servers, file pushing, voice transport, serial line emulation, and more.

The Bluetooth stack in FreeBSD is implemented using the Netgraph framework (see netgraph). A broad variety of Bluetooth USB dongles is supported by the ng_ubt driver. The Broadcom BCM2033 chip based Bluetooth devices are supported via the ubtbcmfw and ng_ubt drivers. The 3Com Bluetooth PC Card 3CRWB60-A is supported by the ng_bt3c driver. Serial and UART based Bluetooth devices are supported via sio, ng_h4 and hcseriald. This section describes the use of the USB Bluetooth dongle.
computer science
seminar topic
newidea2.com
computer science engineering
power of computer
magic of computer
computerinformation

data base management system

*

A database consists of a number of tables. Each table comprises of rows(records) and columns(attributes). Each record contains values for the corresponding attributes. The values of the attributes for a record are interrelated. For example, different cars have different values for the same specifications (length, color, engine capacity, etc.).
*

In the database oriented approach, we store the common data in one table and access it from the required tables. Thus the redundancy of data decreases.
*

The database oriented approach supports multiple views of the same data. For example, a clerk may only be able to see his details, whereas the manager can view the details of all the clerks working under him.
*

Multiple views of the same database may exist for different users. This is defined in the view level of abstraction.
*

The logical level of abstraction defines the type of data that is stored in the database and the relationship between them.
*

The design of the database is known as the database schema.
*

The instance of the database is the data contained by it at that particular moment.
*

The Database Administrator has the total control of the database and is responsible for the setting up and maintaining the database.

Languages :
*

The DDL (Data Definition Language) is used to define the schema of the database and relations between entities.
*

The DML (Data Manipulation Language) enables us to access and operate upon the data in the database.
*

The DCL (Data Control Language) is used to control the access to the database.
*

The Procedural DML requires the user to state the information required and how to get it whereas the Non-Procedural DML does not require the user to specify how to get the information.
*

The query processor breaks down the DML statements into statements that can be comprehended by the DBMS.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

cyber crime

An Overview of other cyber related offences.

Cyber Crime may be defined in a general way as an unlawful act wherein the computer is either a tool or a target or both.

Cyber Crime can be categorized as:-
COMPUTER SECURITY
Unauthorized access

Email bombing

Data diddling

Salami attack

Internet time theft Logic bomb

Virus / worm attack

Trojan attack

Distributed denial of service attack

Denial of Service attack

Email spoofing

Cyber pornography

Intellectual Property Crime Cyber Stalking

Unauthorized access

Unauthorized access to computer systems or networks means any person who secures access or attempts to secure access to a protected system.

Email bombing

Email bombing refers to sending a large amount of emails to the victim resulting in the victim's email account (in case of an individual) or mail server (in case of a company or an email service provider) crashing.

Data diddling

This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed.

Salami attack

This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money (say Rs.5 a month) from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

Internet time theft

This connotes the usage by an unauthorized person of the Internet hours paid for by another person.

Logic bomb

This is event dependent program. This implies that this program is created to do something only when a certain event (known as a trigger event) occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).

Virus / worm attack

Virus is a program that attach itselves to a computer or a file and then circulate itselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.

Trojan attack

A Trojan, the program is aptly called an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.

Denial of service attack

This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource.

Distributed denial of Service attack

This is a denial of service attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks.

Cyber pornography

This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc.)

Email spoofing

A spoofed email is one that appears to originate from one source but actually has been sent from another source.

Intellectual Property Crime

This includes software piracy, copyright. infringement, trademarks violations etc.

Cyber Stalking

The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.
more on computer science
seminar topic
newidea2.com
computer science engineering
power of computer
magic of computer
computerinformation

cyber laws

The IT Amendment Bill 2008 has been passed by the Lok Sabha and the Rajya Sabha in the last week of December, 2008. The said Bill aims to make sweeping changes in the existing Indian cyberlaw, namely the Information Technology Act, 2000.

The Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. The said legislation has provided for the legality of the electronic format as well as electronic contracts. This legislation has touched varied aspects pertaining to electronic authentication, digital signatures, cybercrimes and liability of network service providers.

From 17th October, 2000 , when the IT Act, 2000 came into implementation till date, the said legislation has seen some very interesting cases and challenges, being brought within its ambit. As time passed by, the inadequacies of the said legislation came to the forefront. There were various practical difficulties in the implementation of the said legislation. The inadequacy of the IT Act, 2000 to address some of the emerging phenomena, challenges and cybercrimes, led to voices clamouring for change in the Indian cyberlaw.

Consequently, the Government of India tabled the Information Technology Amendment Bill, 2006 before both the houses of Parliament in December, 2006, which referred the said amendment bill to the Parliamentary Standing Committee on Information Technology. The Parliamentary Standing Committee examined the proposed amendments in a comprehensive manner and thereafter gave its report and recommendations thereon.

The Parliamentary Standing Committee on Information Technology headed by Shri Nikhil Kumar, MP did an excellent job in terms of producing its exhaustive recommendations. These recommendations were noteworthy for their fore vision and clarity of thought process. Way back in 2007, the Standing Committee had recommended that the entire menace of cyber terrorism needs to be addressed with a strong hand.

After examining the said recommendations, the Central Government brought the Information Technology Amendment Bill, 2008 in Parliament, which got passed by both the houses of Parliament.

Given the magnitude of the amendments, it is indeed strange and amazing that this Bill was passed in an unprecedented hurry, without any discussion in both the houses of the Parliament in the last week of December, 2008.

The IT Amendment Act 2008 brings about various sweeping changes in the existing Cyberlaw. While the lawmakers have to be complemented for their appreciable work removing various deficiencies in the Indian Cyberlaw and making it technologically neutral, yet it appears that there has been a major mismatch between the expectation of the nation and the resultant effect of the amended legislation. The most bizarre and startling aspect of the new amendments is that these amendments seek to make the Indian cyberlaw a cyber crime friendly legislation; - a legislation that goes extremely soft on cyber criminals, with a soft heart; a legislation that chooses to encourage cyber criminals by lessening the quantum of punishment accorded to them under the existing law; a legislation that chooses to give far more freedom to cyber criminals than the existing legislation envisages; a legislation which actually paves the way for cyber criminals to wipe out the electronic trails and electronic evidence by granting them bail as a matter of right; a legislation which makes a majority of cybercrimes stipulated under the IT Act as bailable offences; a legislation that is likely to pave way for India to become the potential cyber crime capital of the world.
more on computer science
seminar topic
www.newidea2.com
computer science engineering
power of computer
magic of computer
computerinformation

port

Port is the seafaring term for the left side of the boat or ship, from the point of view of a person aboard the ship, facing the front, or bow, of the ship. This term is also used for spacecrafts and airplanes. It is not synonymous with the right hand side, as the port side of a ship does not change depending on which way a person is facing. The opposite of 'port' is 'starboard.'
HOST TYPE
The original English nautical term for the left side of a ship was 'larboard.' This came from the Middle English term for 'the loading side.' As 'larboard' rhymes with 'starboard,' it was easily confused, especially during high winds or in loud environments, which could cause significant problems when attempting to follow shouted commands. In the 1500s, 'larboard' became known as 'port,' since it was the side of the ship where dockworkers normally load cargo from the port.
computer science tutorial
information technology
newidea

An alternate theory for the etymology of 'port' is that the English word came either from the Latin word porta, which means 'door' or 'gate' or portus, meaning 'harbor.' This could have again referred to the side of the ship where the dockworkers loaded cargo or to the gate or door opened to load the cargo.

Whalers continued to use the term 'larboard' up until the 1850s, long after English-speaking merchant mariners adopted the term 'port.' Captain Robert FitzRoy of Charles Darwin's ship, the HMS Beagle, instructed his crew to substitute the term 'larboard' with 'port' in the late 1820s. This may have prompted England's Royal Navy to adopt the term 'port' in 1844.

Seagoing vessels and airplanes all have a red light on the port side, a green light on the starboard side, and a white light on the aft, or rear. This can help provide a mnemonic device for remembering which side of the ship is the port side. The port side of a ship has a red light, and port wine is generally red. 'Port' and 'left' both have four letters, and the port side of the ship is on the left from the point of view of someone facing forward.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

cloud computing

Cloud computing is another definition for the grid computing technology used in the mid to late 1990's. Surfacing in late 2007, cloud computing is used to allow services used in everyday practice to be moved onto the Internet rather than stored on a local computer.

Email has been available in both methods for quite some time, and is a very small example of cloud computing technology. With the use of services like Google's Gmail® and Yahoo Mail® on the rise, people no longer need to use Outlook or other desktop applications for their email. Viewing email in a browser makes it available anywhere there is an internet connection.

In 2007, other services including word processing, spreadsheets, and presentations were moved into the cloud computing arena. Google provided a word processing, spreadsheet and presentation applications in its cloud computing environment and integrated them with Gmail® and Google Calendar®, providing a whole office environment on the web (or in the cloud). Microsoft and other companies are also experimenting with moving programs to the cloud to make them more affordable and more accessible to computer and Internet users. The software as a service initiative (the Microsoft term for cloud computing) is a very hot item for many at Microsoft.

Cloud computing at this stage is very popular, aside from the big players like Microsoft and Google, companies have sprung up just to provide cloud based services as replacements or enhancements to applications on your PC today. A few of these companies are Zoho.com, an online office suite, Evernote, a site devoted to online note taking, and RemembertheMilk.com, online task management.

Computing technologies and new programming or development techniques change quite frequently, the goal in cloud computing seems to be to make the technology that the user sees very friendly and keep the experience simple as possible. Internet based development has skyrocketed recently with the boom in blogging and other social networking services aimed at finding new ways to help individuals and business communicate with customers and each other in the cloud computing arena.

Cloud computing is here to stay, at least for now. There are some concerns about storing personal data in the cloud and security of this information, which are quite valid. The biggest is identity theft. The companies providing cloud based services are very committed to security, however it remains the user's prerogative as to whether or not they wish to put their data in the cloud. Before discounting cloud computing, take a look at the services available and give a few of them a try. Before long, the computing environment as it exists today might just be completely cloud based.
learn linux
seminar topic
newidea2.com
what about linux
computer science engineering
power of computer
magic of computer
computerinformation

grid computing

Grid computing is the act of sharing tasks over multiple computers. Tasks can range from data storage to complex calculations and can be spread over large geographical distances. In some cases, computers within a grid are used normally and only act as part of the grid when they are not in use. These grids scavenge unused cycles on any computer that they can access, to complete given projects. SETI@home is perhaps one of the best-known grid computing projects, and a number of other organizations rely on volunteers offering to add their computers to a grid.
APPLICATION
These computers join together to create a virtual supercomputer. Networked computers can work on the same problems, traditionally reserved for supercomputers, and yet this network of computers are more powerful than the super computers built in the seventies and eighties. Modern supercomputers are built on the principles of grid computing, incorporating many smaller computers into a larger whole.

The idea of grid computing originated with Ian Foster, Carl Kesselman and Steve Tuecke. They got together to develop a toolkit to handle computation management, data movement, storage management and other infrastructure that could handle large grids without restricting themselves to specific hardware and requirements. The technique is also exceptionally flexible.

Grid computing techniques can be used to create very different types of grids, adding flexibility as well as power by using the resources of multiple machines. An equipment grid will use a grid to control a piece of equipment, such as a telescope, as well as analyze the data that equipment collects. A data grid, however, will primarily manage large amounts of information, allowing users to share access.

Grid computing is similar to cluster computing, but there are a number of distinct differences. In a grid, there is no centralized management; computers in the grid are independently controlled, and can perform tasks unrelated to the grid at the operator's discretion. The computers in a grid are not required to have the same operating system or hardware. Grids are also usually loosely connected, often in a decentralized network, rather than contained in a single location, as computers in a cluster often are.
more on computer science
see on open source
computer science engineering
power of computer
magic of computer
computerinformation

internet

he Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANET. The original aim was to create a network that would allow users of a research computer at one university to be able to "talk to" research computers at other universities. A side benefit of ARPANet's design was that, because messages could be routed or rerouted in more than one direction, the network could continue to function even if parts of it were destroyed in the event of a military attack or other disaster.


Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. Physically, the Internet uses a portion of the total resources of the currently existing public telecommunication networks. Technically, what distinguishes the Internet is its use of a set of protocols called TCP/IP (for Transmission Control Protocol/Internet Protocol). Two recent adaptations of Internet technology, the intranet and the extranet, also make use of the TCP/IP protocol.

For many Internet users, electronic mail (e-mail) has practically replaced the Postal Service for short written transactions. Electronic mail is the most widely used application on the Net. You can also carry on live "conversations" with other computer users, using Internet Relay Chat (IRC). More recently, Internet telephony hardware and software allows real-time voice conversations.

The most widely used part of the Internet is the World Wide Web (often abbreviated "WWW" or called "the Web"). Its outstanding feature is hypertext, a method of instant cross-referencing. In most Web sites, certain words or phrases appear in text of a different color than the rest; often this text is also underlined. When you select one of these words or phrases, you will be transferred to the site or page that is relevant to this word or phrase. Sometimes there are buttons, images, or portions of images that are "clickable." If you move the pointer over a spot on a Web site and the pointer changes into a hand, this indicates that you can click and be transferred to another site.

Do you know firewal?
what is virus?
Using the Web, you have access to millions of pages of information. Web browsing is done with a Web browser, the most popular of which are Microsoft Internet Explorer and Netscape Navigator. The appearance of a particular Web site may vary slightly depending on the browser you use. Also, later versions of a particular browser are able to render more "bells and whistles" such as animation, virtual reality, sound, and music files, than earlier versions.
Some computer shortcuts....
Save your computer with anti virus....
firewall
computer science tutorial
seminar topic
newidea
computer science engineering

antivirus

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
ANTI VIRUS WORKING CONCEPT
A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware for which no signature exists yet. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. In one case, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot.Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.

In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

computer security

Introduction

Your home computer is a popular target for intruders. Why? Because intruders want what you’ve stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services.

But it’s not just money-related information they’re after. Intruders also want your computer’s resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders can’t be found, they can’t be stopped, and they can’t be prosecuted.

Why are intruders paying attention to home computers? Home computers are typically not very secure and are easy to break into. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target.

No matter how a home computer is connected to the Internet, intruders’ attacks are often successful. Many home computer owners don’t realize that they need to pay attention to computer security. In the same way that you are responsible for having insurance when you drive a car, you need to also be responsible for your home computer’s security. This document explains how some parts of the Internet work and then describes tasks you can do to improve the security of your home computer system. The goal is to keep intruders and their programs off your computer.

How do intruders break into your computer? In some cases, they send you email with a virus. Reading that email activates the virus, creating an opening that intruders use to enter or access your computer. In other cases, they take advantage of a flaw or weakness in one of your computer’s programs – a vulnerability – to gain access.

Once they’re on your computer, they often install new programs that let them continue to use your computer – even after you plug the holes they used to get onto your computer in the first place. These backdoors are usually cleverly disguised so that they blend in with the other programs running on your computer.

The next section discusses concepts you need to know, especially trust. The main part of this document explains the specific issues that need your attention. There are examples of how to do some of these tasks to secure a Microsoft Windows 2000-based computer. We also provide checklists you can use to record information about the steps you have taken to secure your computer. Finally, a glossary defines many of the technical terms used in this document. Unless otherwise stated in the glossary, the definitions come from the Webopedia Online Dictionary for Computer and Internet Terms

Whether your computer runs Microsoft® Windows®, Apple’s Mac OS, LINUX, or something else, the issues are the same and will remain so as new versions of your system are released. The key is to understand the security-related problems that you need to think about and solve.

Thinking About Securing Your Home Computer

Before diving into the tasks you need to do to secure your home computer, let’s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area.

So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We’ll use this “computer-is-like-a-house-and-the-things-in-it” analogy throughout, departing only a few times to make a point.)

For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don’t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home.

Let’s now apply similar thinking to your home computer. Email, instant messaging, and most web traffic go across the Internet in the clear; that is, anyone who can capture that information can read it. These are things you ought to know. You should always select and use strong passwords and exercise due care when reading all email, especially the unsolicited variety. These are things you ought to do. Finally, you can add a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer, and we’ll call these things you ought to install.

The rest of this document describes the things you ought to know, do, and install to improve the security of your home computer.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

spyware

spyware is Internet jargon for Advertising Supported software (Adware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.
Why is it called "Spyware" ?
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

trojan attack

A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer
of viruses but instead introduces viruses onto your computer.

The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Trojan horses are broken down in classification based on how they breach systems
and the damage they cause. The seven main types of Trojan horses are:
* Remote Access Trojans
* Data Sending Trojans
* Destructive Trojans
* Proxy Trojans
* FTP Trojans
* security software disabler Trojans
* denial-of-service attack (DoS) Trojans
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

hacking of computer

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation

keylogging

many people use the internet to check their e-mails, bank accounts, shop, and to send personal and private information to others. Most Web sites are usually safe, but criminals have found a way to steal a user's information right off his keyboard. Keylogging is a process of recording a person's key strokes, usually without the person's knowledge, and sending the information to an intended target. Doing this, a person can learn everything that is typed on a computer to use as they will. It is also possible to track a person's computer use using this technology.

Before anyone can detect what is being typed on a certain computer, the person has to gain access to the computer keyboard. This can be done in two ways: with keylogging software and with hardware. Keylogging hardware usually records what a user types on his keyboard and stores it in a mini hard disk until it is physically retrieved. These devices are commonly disguised as keyboard plugs and therefore can be difficult to detect. In addition, since it is hardware, anti-virus programs cannot usually detect it.

Keylogging software, on the other hand, does not need a physical access point. This type of keylogger can be downloaded onto a computer without the user's knowledge. Once installed on the computer, it can then record the data typed on the keyboard and occasionally send that data to a target person. That target person can then have access to anything typed on the computer. Though this type of keylogger can be difficult to detect by a user, some anti-virus software may be able to identify it.

One of the most common uses for keylogging is the theft of personal information. Should a criminal use the software or hardware to capture personal information, he can use that information for his own use. For instance, he can go on a shopping spree using the victim's credit card information. This is why it is important for users to do all they can to protect themselves from such intruders. Knowing and understanding the programs running in the computer background and having the appropriate kind of updated anti-malware software are just two methods a person can use to help protect his personal information.

Some may argue there are some good aspects to keylogging. Parents can use the technology to monitor children's activities. It can also be used by companies to monitor an employee's computer use. It may even help save important documents that are lost due to a power outage. These activities, however, may bring up privacy rights issues, so it is important to use these programs in such a way as to not break local laws.
computer science tutorial
seminar topic
newidea
computer science engineering
power of computer
magic of computer
computerinformation