Security On The Web Essay

This essay has a total of 2689 words and 13 pages.

Security On The Web


Security on the Web, By Sina



How do you secure something that is changing faster than you can fix it? The Internet has
had security problems since it's earliest days as a pure research project. Today, after
several years and orders of magnitude of growth, it still has security problems. The
Internet is being used for a purpose for which it had never intended to be used for. It is
somewhat ironic that the early Internet was design as a prototype for a high-availability
command and control network that could resist outages resulting from an enemy attack, yet
it cannot resist college undergraduates. The problem is that the attackers are on, and
make up apart of, the network they are attacking. Designing a system that is capable of
resisting attack from within, while still growing and evolving at a rapid pace, is
probably impossible. Deep infrastructure changes are needed, and once you have achieved a
certain amount of size, the sheer inertia of the installed base may make it impossible to
apply fixes.


The challenge for the security industry is growing. With the electronic commerce spreading
over the Internet, there are new issues being developed everyday such as non-repudiation
that will need to be solved. Financial institutions will have both technical concerns,
such as the security of a credit card number or banking information, and legal concerns
for holding individuals responsible for their actions such as their purchases or sales
over the Internet. Issuance and management of encryption keys for millions of users will
pose a new type of challenge.


While some technologies have been developed, only an industry-wide effort and cooperation
can minimize risks and ensure privacy for users, data confidentiality for the financial
institutions, and non-repudiation for electronic commerce.


With the continuing growth in linking individuals and businesses over the Internet, some
social issues are starting to surface. The society may take time in adapting to the new
concept of transacting business over the Internet. Consumers may take time to trust the
network and accept it as a substitute for transacting business in person. Another class of
concerns relates to restricting access over the Internet. Preventing distribution of
pornography and other objectionable material over the Internet has already been in the
news. We can expect new social hurdles over time and hope the great benefits of the
Internet will continue to override these hurdles through new technologies and
legislations.


The World Wide Web is the single largest, most ubiquitous source of information in the
world, and it sprang up spontaneously. People use interactive Web pages to obtain stock
quotes, receive tax information from the Internal Revenue Service, check the local
weather, consult a pregnancy planner to determine ovulation dates, conduct election polls,
register for a conference, search for old friends, and the list goes on. It is only
natural that the Web's functionality, popularity, and ubiquity have made it the seemingly
ideal platform for conducting electronic commerce. People can now go online to buy CDs,
clothing, concert tickets, and stocks. Several companies, such as Digicash, Cybercash,
CarParts.com, and First Virtual, have sprung up to provide mechanisms for conducting
business on the Web. The savings in cost and the convenience of shopping via the Web are
immeasurable. Where as most successful computer systems resulted from careful, methodical
planning, followed by hard work, the Web took on a life of its own from the very
beginning. The introduction of a common protocol and a friendly graphical user interface
was all that was needed to ignite the Internet explosion. The Web's virtues are extolled
without end, but its rapid growth and universal adoption have not been without cost. In
particular, security was added as an afterthought.


New capabilities were added to satisfy the growing demand for features without carefully
considering the impact on security. As a general-purpose, scripts were introduced on both
the client and the server sides of the Web. It did not take long for the Web to move from
the scientific community to the commercial world. For then the dangers of accidental and
malicious abuse grew. At this point, the security threats became much more serious. The
incentive for malicious attackers to exploit vulnerabilities in the underlying
technologies is at an all-time high. This is indeed frightening when we consider what
attackers of computer systems have accomplished when their only incentive was fun and
personal enjoyment while boosting their egos. When business and profit are at stake, we
cannot assume anything less than the most dedicated and resourceful attackers typing their
utmost will and determination to steal, cheat, and perform mischievous attacks against
their pray (users of the Web).


When people use their computers to surf the Web, they have many expectations. They expect
to find all sorts of interesting information, they expect to have opportunities to shop
and they expect to be bombarded with all sorts of ads. Even people who do not use the Web
are in jeopardy of being intimidated by the Web. So when it comes down to the significant
importance of Web security it affects us all.


There are simple and advanced methods for ensuring browser security and protecting user
privacy. The more simple techniques are user certification schemes, which rely on digital
IDs. Netscape Communicator and Internet Explorer allow users to obtain and use personal
certificates. Currently, a certification company called Verisign offers digital Ids that
consist of a certificate of a user's identity. The Digital IDs are divided into different
types of classes of digital Ids, each represents a different level of assurance in the
identity, and each comes at an increasingly higher cost. The assurance is determined by
the effort that goes into identifying the person requesting the certificate.


Class 1 Digital IDs intended for casual Web browsing providing users with an unambiguous
name and e-mail address within Verisign's domain. A Class 1 ID provides assurance to the
server that the client is using an identity issued by Verisign but with little guarantee
about the actual person behind the ID.


Class 2 Digital IDs require third party confirmation of name, address, and other personal
information related to the user, and they are available only to residents of the United
States and Canada. The information provided to Verisign is checked against a consumer
database maintained by Equifax. To protect against insiders at Verisign issuing bogus
Digital IDs, a hardware device is used to generate the certificates.


Class 3 Digital IDs are not available. The purpose is to bind an individual to an
organization. Thus, a user in possession of such an ID, theoretically, could prove that he
or she belongs to the organization that employs him or her.


The idea behind Digital IDs is that they are entered into the browser and then are
automatically sent when users connect to sites requiring personal certificates.
Unfortunately, the only practical effect is to make impersonating users on the network
only a little bit more difficult.


Many Web sites require their users to register a name and a password. When users connect
to these sites, their browser pops up an authentication window that asks for these two
items. Usually, the browser then sends the name and password to the server allowing
retrieval of the remaining pages at the site. The authentication information can be
protected from eavesdropping and replay by using the SSL protocol.


As the number of sites requiring simple authentication grows, so does the number of
passwords that each user must maintain. In fact, users are often required to have several
different passwords for systems in their workplace, for personal accounts, for special
accounts relating to payroll and vacation, and so on. It is not uncommon for users to have
more than six sites they visit that require passwords.


Continues for 7 more pages >>




  • Biography
    biography BIOGRPAHY OF BILL GATE William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates is chairman and chief executive officer of Microsoft Corporation, the leading provider, worldwide, of software for the personal computer. and employs more than 20,000 people in 48 countries. Born on October 28, 1955, Gates and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Their late mother, Mary Gates, was a schooltea
  • Dr Grace Murrary Hopper
    Dr Grace Murrary Hopper Dr. Grace Murray Hopper was born on December 9, 1906. As a child Grace Hopper enjoyed learning about machines, technology and other countries cultures. Following her mother’s love for mathematics and her father’s love for literature, Grace had high expectations for herself. Family life was large influence as she grew up, from the close relationship she had with her grandfather, a surveyor in New York City, she learned about real life at a young age. Her father, Walter Fle
  • A Change in Direction at Continental Airlines
    A Change in Direction at Continental Airlines What words come to mind when you think of Continental Airlines? Successful company, preferred airline, good service, on-time airline, top carrier, financially solvent, happy employees. These are all true; however, this was not always the case. Just six short years ago, probably not one of those descriptions would even be said in the same breath as Continental Airlines. In fact, in 1994, Continental was facing its third bankruptcy; that bankruptcy wou
  • ADP Security Evaluation
    ADP Security Evaluation Valuation of a Security Automatic Data Processing, Inc. ADP by: Katie S. McCarthy April 7, 1999 Spring Hill College Management of Financial Resources Dr. Ralph Sandler ADP – Automatic Data Processing, Inc. (NYSE:AUD) ADP is one of the largest independent computing services firms in the world with more than .5 billion in annual revenues and more than 425,000 clients. Founded in 1949, ADP provides computerized transaction processing, data communications, software, and inf
  • Advanced Micro Devices
    Advanced Micro Devices Table of Contents Table of Contents 1 Corporate Overview 2 Company History 2 Products 3 Financial Information 4 Market Conditions and Competition 5 Strategies & Goals 6 Foreign Operations 6 International Production Facilities 6 Fujitsu Alliance 7 Foreign Currency Translations 8 Hedging 8 Problematic Issues & Their Solutions 9 Lawsuits 9 Taiwan Earthquake 9 Outlook 10 Appendix A – Balance Sheets 11 Appendix B – Income Statements 12 Appendix C – Foreign Subsidiaries 13 Corpo
  • Analysis of BoozAllen and Hamilton
    Analysis of BoozAllen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1). T
  • Analysis on Booz Allen and Hamilton
    Analysis on Booz Allen and Hamilton Introduction Booz-Allen & Hamilton is one of the world\'s largest management consulting firms. Traditionally, the firm had decentralized regional offices serving clients independent of other offices. This made cooperation between offices difficult, which was hurting company\'s overall performance. To overcome this problem they came up with a Vision 2000 plan under which the company was divided into three regions which were further sub-divided (see exhibit 1).
  • Computer fraud
    computer fraud As much as billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately billion, and about million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporati
  • Critique of The Limited INC
    Critique of The Limited INC Critique of The Limited INC. Overall, we think that our classmates, Melissa and Jay, did a good job in their paper. Here are just few comments and suggestion that we think our classmates have missed. History: The management of the Limited relies heavily on the shoulders of CEO Leslie Wexner. The analyst has criticized him that he is frequently creating new businesses that evidently fails. The underperforming stores are as follow: *sum* 1995 Limited Inc. own 84% of Int
  • Ecommerce
    Ecommerce E-Commerce E- Commerce is another name for Electric- Commerce. Electronic-commerce offers what many people believe to be an effective property of the Web. That property is the ability to adjust sites to the different needs, wants, desires and, even personalities of each individual customer. This ability is known to many experts as "cognitive computing," a blend of behavioral sciences and computer science. Increasing competition worldwide, increasing demands made by customers, and the r
  • Gates world
    Gates world Gates World Congrats to the man of the millennium Mr. Bill Gates. Bill developed the wonderful software that makes computing so much fun! As his company, Microsoft, surges for domination in the computing industry, I picture Bill installing little buttons under his desk for possible world take-over. Forget the Y2K bug, that’s nothing! Through Windows I see Bill using Microsoft much like a chess move for world-wide Gates time! But don’t worry, I’m sure Bill has some pretty exciting pla
  • GenesisYour vision for the Future
    GenesisYour vision for the Future Introduction: “GENESIS” – Your Vision for the Future “GENESIS” Corporation is a company that deals with production of computer software and business applications that are essential for successful conduct of business today. We strive to provide affordable, innovative software solutions to users worldwide by applying creativity, experience and teamwork. The result of our efforts is production of high quality business solutions that make our customers’ live easier
  • HewlettPackard Strategy
    HewlettPackard Strategy Strategy Paper Hewlett Packard, Inc. (NYSE: HWP) TABLE OF CONTENTS SECTION 1 2 BACKGROUND 2 SECTION 2 2 MISSION, GOALS, AND STRATEGIES 2 Company Mission 2 Company Goals 2 Company Strategies 2 Management By Wandering Around. 2 Management By Objective. 2 Open-Door-Policy 2 Open Communication 2 SECTION 3 2 STAKEHOLDERS 2 Stockholders: 2 Employees: 2 Competition: 2 Major suppliers: 2 SECTION 4 2 EXTERNAL ENVIRONMENT 2 Industry Environment 2 Differentiation versus Commodity 2
  • History of Intel Corp
    History of Intel Corp I. History of Intel Corporation [Back to Top] Robert Noyce and Gordon Moore, who had left Fairchild Semiconductor, founded Intel Corporation in 1968. The current chairman of Intel, Andy Grove, had also come from Fairchild to become Intel\'s 4th employee. Their first commercial product was the 3101 Schottky bipolar 64-bit static random access memory (SRAM) chip, and it was moderately successful. The success of Intel didn\'t come until the early 1970\'s. Intel was a company f
  • IBM company
    IBM company I. Current Situation (1991-1993) 1. History of IBM: IBM is a multinational corporation that started its activities in 1911. But its origins can be traced back to 1890, during the height of the Industrial Revolution. It was first known as the Computing-Recording Company, then in 1924, it took the name of International Business Machines. Nowadays, this multinational company is known as the « Big Blue ». 2. Mission statement IBM main activity is to find solutions to its wide range of cl
  • MIS Development
    MIS Development MIS Development The term Management Information Systems (MIS) has come to refer to a wide range of applications of computers to data processing and analysis problems in the private and public sectors. The pace of developments in computing in general, and MIS in particular, is breathtaking. Traditional concepts of how computers can and should be integrated into businesses are being challenged by worldwide telecommunications and transmission of sound, graphics, and video alongside
  • None Provided2
    None Provided2 Running head: The Edge of Excellence The Edge of Excellence Kathleen P. Munn Community College of Philadelphia Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing profession
  • What Computer Skills Do Employers Expect From Rece
    What Computer Skills Do Employers Expect From Recent College Graduates What Computer Skills Do Employers Expect From Recent College Graduates? By: Philip Davis, Instructional Technology Librarian Cornell University Ithaca, N.Y. Table of Contents Cornell University 2 Cornell Library Conducts Study 2 Research Methodology 3 A Review of the Results 3 Rankings, Groupings, and Correlations 4 Ranking Computer Skills: 4 Grouping Computer Skills: 4 Other Computer Skills 4 Comments From Employers 5 Variab
  • A certification
    a certification REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO SPECIFIC REQUI
  • A Certification Requirements
    A Certification Requirements REQUIREMENT #2 A + CERTIFICATION THE A+ CERTIFICATION PROGRAM IS A TESTING PROCEDURE PROVIDED BY COMPTIA - A CORPORATION THAT DEVELOPS VENDOR-NEUTURAL CERTIFICATIONS. THIS CERTIFIES THE COMPENTENCY OF ENTRY-LEVEL (6 MONTHS EXPERIENCE) COMPTER SERVICE TECHNICIANS. CERTIFICATION PROVIDES THE CREDIBILITY, RECOGNITION OF ACHIEVEMENT, AND QUALITY ASSUANCE OF THE INDIVIDUAL TO THE HIREING ORGINIAZITION. THE CERTICATION IS OPEN TO ANYONE WHO WISHES TO TAKE IT. THERE IS NO S
  • Advancements in Peripherals1
    Advancements in Peripherals1 Recent Developments in Computer Peripherals Including an in-depth look at Multimedia Input Devices A Report by Mr Matthew James Smith HNC BIT Year One Contents Title Page Number Introduction Two Section One - Development in Peripherals Three Section Two - Multimedia Input Devices Five Section Three - An in-depth look Digital Cameras Six The History of the Digital Camera Six How Digital Cameras Work Seven Conclusion Nine Appendix / References Ten Glossary Eleven Intro
  • Alan Turing
    Alan Turing Alan Turing was born in London on 23 June 1912. He was the son of Julius Mathius Turing and Ethel Sara Stoney, the youngest of three children, he was born to a distinguished family. His family background includes diplomats and engineers, three of which succeeded to the Royal Society. Alan turing was educated at Sherbourne school, from 1923 to 1931. After which he studied mathematics at Kings College, Cambridge, graduating in 1935 with a B.A. He was elected a fellow of the college on
  • Apple vs The World
    Apple vs The World Apple vs. The World In past years, Apple was on a downward spiral, but now the Mac is back on the right track. The interim CEO Steve Jobs has brought them from expected quarterly loses to now, first quarter net income of some 150 millions dollars. The question still remains, is Apple back to stay? With the Windows driven world of today, can Apple assert them self to claim market share? Apples stunning new hardware, user-friendly operating system, and drive for incredible new
  • Artificial Intelligence
    Artificial Intelligence ABSTRACT Current neural network technology is the most progressive of the artificial intelligence systems today. Applications of neural networks have made the transition from laboratory curiosities to large, successful commercial applications. To enhance the security of automated financial transactions, current technologies in both speech recognition and handwriting recognition are likely ready for mass integration into financial institutions. RESEARCH PROJECT TABLE OF CO
  • Artificial Intelligence1
    Artificial Intelligence1 Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? Medical facilities, police departments, and manufacturing plants have all been changed by AI but
  • Building a computer
    Building a computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
  • Case about Yahoo
    Case about Yahoo 1. Success as a Web Search Engine a. Why was Yahoo! such an early success on the Web? Yahoo was an early success due to a combination of factors such as timing, hard work, and a good understanding of Web surfer’s tastes and needs.. In early 1995, Net mania was just flowering. It was a great time to be a young entrepreneur with an Internet idea. Dave Faldo and Jerry Yang saw a consumer need for classifying and differentiating web sights. Resting the urge to automate this process,
  • Censoring the Internet
    Censoring the Internet Censoring the Internet The internet offers a huge wealth of information both good and bad, unfortunately the vary nature of the internet makes policing this new domain practically impossible. The internet began as a small university network in the United States and has blossomed into a vast telecommunications network spanning the globe. Today the internet is ruled by no governing body and it is an open society for ideas to be developed and shared in. Unfortunately every so
  • Charles Babbage
    Charles Babbage Charles Babbage is often called the "father of computing" because of his invention of the Analytical Engine. However, many people do not know the details of this very important man’s life. Charles Babbage was born on December 26, 1792, just about that same time that the industrial revolution was beginning. He was born in Teignmouth, Devon shire. Although not much is really known about his childhood, it is known that he had many brothers and sisters, but many of them died before a
  • Clientserver
    Clientserver Client/server is the combination of three major technologies: Relational database management systems (RDBMSs), networks, and client interfaces. Clients execute specific local tasks with local resources. Servers provide shared resources and fulfill broad tasks. Communication enables definition and completion of full work processes. Client/Server software Infrastructure With competing paradigms-SQL databases, TP monitors, groupware, and distributed objects-the middleware that connects
  • Computer Crimes
    Computer Crimes Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are
  • Computer programer
    computer programer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencies
  • Computer Programmer
    Computer Programmer Computer programmers held about 568,000 jobs in 1996. Programmers are employed in almost every industry but the largest amount is in the computer and data processing industry that includes companies that write and sell software. Allot of programmers can also be found working for companies that provide engineering and management services, manufacturers of computer and office equipment, financial institutions, insurance carriers, educational institutions, and government agencie
  • Computer underground
    computer underground The Computer Underground. The beginning of the electronic communication revolution that started with the public use of telephones to the emergence of home computers has been accompanied by corresponding social problems involving the activities of so-called "computer hackers," or better referred to as the computer underground (CU). The CU is composed of computer aficionados who stay on the fringes of legality. The CU is composed of relatively intelligent people, in contrast t
  • Computerization of a Company
    Computerization of a Company The word ubiquitous means ever present or occurring everywhere. This term could be used to describe the use of the computer in the business. The business worlds benefit alone is enough to make a head spin. Every time a person goes to the grocery store, the bank, the local ATM, or even the neighborhood gym the benefit by the use of computers in modern society is unforeseen by most civilians. Many fields in business depend on the convenience, speed, accuracy, and reli
  • Computers2
    Computers2 Computers This paper is about the computer. Today computers are used by hundreds of millions of people. There have been many advances in the computer. The computer used to weigh 30 tons and filled warehouse size rooms, but today can be as light as 3 pounds and fit in a persons pocket. There were basically three times the computer was mentioned. One as a mechanical computing device, in about 500 BC The other as a concept in 1833, and the third as the modern day computer in 1946. The fi
  • Computing now
    computing now GUIDE TO (mostly) HARMLESS HACKING Beginners’ Series #2, Section 3. Hacking from Windows 3.x, 95 and NT ____________________________________________________________ This lesson will tell you how, armed with even the lamest of on-line services such as America Online and the Windows 95 operating system, you can do some fairly serious Internet hacking -- today! In this lesson we will learn how to: · Use secret Windows 95 DOS commands to track down and port surf computers used by famou
  • Computing Power Unleashed
    Computing Power Unleashed This article mainly deals with the microprocessor chip, which is the computer\'s brain. This computer chip is responsible for the majority of the computers functions, it\'s commonly referred to as the Central Processing Unit (CPU). It receives and executes your instructions and determines if your computer understands software written for a Personal Computer (PC) or a Macintosh (MAC). The CPU chip size is small, about half the size of a business card, and just as small a
  • Computing professional
    Computing professional A Formal Comprised Interview of ‘Devin Blank’ “Computing Professional” Compiled by Damon Blank 10-01-00 Intro to Programming ITSE 1402 A Formal Interview of ‘Devin Blank’ The computer industry has taken a remarkable turn over the past 10 years. The foundation of multi-million dollar companies rest on the hands of those skilled to handle the demands of today’s business networks. Email, fax and file services, print sharing and remote file access, are among the many vital fun
  • DESIGNING A NETWORK
    DESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
  • Dna Computing The Future or the End
    Dna Computing The Future or the End DNA Computing, The Future or the End? The future of computers is in the hands of the next century. The evolution of the Computer Age has become a part of everyday life, and as time proceeds, people are depending more and more on computer technology. From controlling a small wrist watch to the largest super-computers that can calculated the center of the universe, computers are essential for everyone in modern societies. Even most societies outside of the civil
  • Electronic Commerce
    Electronic Commerce Table of Contents Introduction…………………………………………………………………2 History of E-commerce……………………………………………………..4 Economic Impact……………………………………………………………5 Advantages of E-commerce…………………………………………………5 Disadvantages of E-commerce……………………………………………...7 The Future of E-commerce………………………………………………….9 Summary…………………………………………………………………...11 References………………………………………………………………….12 Electronic Commerce Electronic commerce, or e-commerce has developed very rapidly in the last few years and has left some
  • Hacking
    hacking Recently, the word \'\'hacker\'\' has fallen into disrepute, coming to signify in the popular media the perpetrators of various forms of computer-aided crime. But most of the people who call themselves hackers, who have proudly borne that title since the 1950\'s, are not criminals--in fact many are among the intellectual and entrepreneurial elite of their generations. The word \'\'hacker\'\' and the culture it connotes is too rich to sacrifice on the altar of the evening news. Bob Bickfo
  • History of Computer Industry
    History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
  • History of computers1
    history of computers1 Early Computational Devices Somewhere around 3000BC the first mechanical counting device created was the abacus. The abacus is still used today and, amazingly to me, with great speed and accuracy. In 1642 another mechanical device was created called the Pascaline (after Blaise Pascal, a famous French mathematician). The Pascaline used gears and wheels ("counting-wheels") to perform the calculations. The interesting thing to note is that the counting-wheel design was used in
  • How Can Artificial Intelligence Help Us
    How Can Artificial Intelligence Help Us Recently, the media has spent an increasing amount of broadcast time on new technology. The focus of high-tech media has been aimed at the flurry of advances concerning artificial intelligence (AI). What is artificial intelligence and what is the media talking about? Are these technologies beneficial to our society or mere novelties among business and marketing professionals? AI has changed medical facilities, police departments, and manufacturing plants,
  • How To Computerize Your Accounts
    How To Computerize Your Accounts Mark Demayo OUTLINE THESIS: I will explain the steps that need to be taken to computerize business accounts. The steps are planning and informed selecting of hardware, software, and training. I. Making the decision to computerize II. Choosing the correct tools A. Software B. Hardware C. New and old technology III. Installation and training In the normal course of a day our lives are affected by the technology of computers in ways we can only begin to imagine. “Th
  • How to design a network
    how to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
  • How Will We Use Tomorrows PCs
    How Will We Use Tomorrows PCs How Will We Use Tomorrow\'s P.C.s? Tomorrow\'s PCs are going to be different in many ways; they will be more powerful, they will include more facilities for multimedia, and looking further ahead, they may have features such as three dimensional displays, or wrap around virtual reality. These changes will shape the way which we use our PCs, but even without such advances, there are changes that can and will take place in the operating systems that enable us to make b
  • Interactive class
    Interactive class How to Go From Class-Room to Web-Room as Painlessly as Possible By Rik Hall, University of New Brunswick, Fredericton, New Brunswick 1.0 ABSTRACT Getting your course onto the World Wide Web (WWW) is best done using a systematic approach. There are a number of steps that need to be taken prior to starting any of the actual web work. Meetings should be held with various groups within your institution. Once the actual coursework is begun, there are some essential components and so