Monday, November 2, 2009

Fingerprints





FingerPrints

Biometrics is used as a form of identity access management and access control. Fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin.These are sometimes known as "epidermal ridges" which are caused by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. These epidermal ridges serve to amplify vibrations triggered when fingertips brush across an uneven surface, better transmitting the signals to sensory nerves involved in fine texture perception. The ridges assist in gripping rough surfaces, as well as smooth wet surfaces.when you use fingerprint mouses or scanners it allows you to get personal and more of a secure access to your computer or other appliances.Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. In the past few years, however, scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. You can pick up a personal USB fingerprint scanner for less than $100, and just like that, your computer's guarded by high-tech biometrics. Instead of, or in addition to, a password, you need your distinctive print to gain access.

Thursday, October 29, 2009


Jonathan James
Jonathan Joseph James (December 12, 1983 - May 18, 2008), a.k.a. c0mrade, was an American hacker who was the first juvenile incarcerated for cybercrime in the United States.[1] The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008. Although details regarding his death were never released, it is notably speculated, including by fellow hacker Adrian Lamo, that James committed suicide by gunshot.

James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."

James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."

Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.

Although the specific details aren't clear, it has been said that on his Gateway Pentium 266[6] he used the popular nmap port scan to scan hosts for, among other things, then-largely unknown flaws in several of Sun Microsystems' remote procedure call services in order to gain unauthorized access to the computer systems. Once on a system, he would search for information on it, and try to branch out. He would usually set up a sniffer to get further access to the network.


website:http://www.itsecurity.com/features/top-10-famous-hackers-042407/

Wednesday, October 28, 2009

Chip Art

ca. 1994 "Nikki"
eng. Larry Johnson's former Chow dog
MIPS Technologies, Inc.
R4000 Microprocessor


ca. 1995-97 "Dilbert"
MIPS Technologies, Inc.
R10000 Microprocessor


ca. 1994 "Waldo"
MIPS Technologies, Inc.
MIPS R4400 Microprocessor


ca. 1993 "Guitar Playing Kermit"
Analog Devices
2175 Digital Signal Processor


"Leopard"

"ALIEN"
CHIP ART

Chip art, also known as silicon art, chip graffiti or silicon doodling, refers to microscopic artwork built into integrated circuits, also called chips or ICs. Since ICs are printed by photolithography, not constructed a component at a time, there is no additional cost to include features in otherwise unused space on the chip. Designers have used this freedom to put all sorts of artwork on the chips themselves, from designers' simple initials to rather complex drawings. Given the small size of chips, these figures cannot be seen without a microscope. Chip graffiti is sometimes called the hardware version of software easter eggs.

Prior to 1984, these doodles also served a practical purpose. If a competitor produced a similar chip, and examination showed it contained the same doodles, then this was strong evidence that the design was copied (a copyright violation) and not independently derived. A 1984 revision of the US copyright law (the Semiconductor Chip Protection Act of 1984) made all chip masks automatically copyrighted, with exclusive rights to the creator, and similar rules apply in most other countries that manufacture ICs. Since an exact copy is now automatically a copyright violation, the doodles serve no useful purpose.

Thursday, October 22, 2009

Page 162#10 1.A,B,C,D


Page 162

1.A. Criminal Hackers- Criminal hackers installed special slave or zombie programs on poorly-secured computer systems. These slave programs were then ordered to attack the main victims using coded communications from the criminal hacker controlling them. The slave programs made the computers they were on send out thousands of messages to the victims’ computers, swamping their communications. No one else could get much of a response from the computers under attack.


B.Viruses-In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.
C.Cookies- A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.

D.Spyware-Spyware is any technology that aids in gathering information about a person or organization without their knowledge.



My Opinion

I believe Hacking is the worst beacuse when someone hacks into your personal information they can steal your software, database and anyother personal information that you try to keep private. It is evasion of privacy. Hacking" can be looked at as a collection of skills—like a locksmith's ability to pick locks.A hacker is usually a person who writes software programs in a special computer language. But the word hacker is also used to describe a person who tries to steal information from computer systems.

Main article: History of Madagascar




Antananarivo (1)
Analamanga
Bongolava
Itasy
Vakinankaratra
Antsiranana (2)
Diana
Sava Fianarantsoa (3)
Amoron'i Mania
Atsimo-Atsinanana
Haute-Matsiatra
Ihorombe
Vatovavy-Fitovinany

Mahajanga (4)
Betsiboka
Boeny
Melaky

Sofia Toamasina (5)
Alaotra Mangoro
Analanjirofo
Atsinanana

Toliara (6)
Androy
Anosy
Atsimo-Andrefana
Menabe

Main article: History of Madagascar

As part of East Gondwana, the territory of Madagascar split from Africa approximately 160 million years ago; the island of Madagascar was created when it separated from the Indian subcontinent 80 to 100 million years ago.[5] Most archaeologists estimate that the human settlement of Madagascar happened between 200 and 500 A.D.,[6] when seafarers from southeast Asia (probably from Borneo or the southern Celebes) arrived in outrigger sailing canoes.[7] Bantu settlers probably crossed the Mozambique Channel to Madagascar at about the same time or shortly afterwards. However, Malagasy tradition and ethnographic evidence suggests that they may have been preceded by the Mikea hunter gatherers.[8] The Anteimoro who established a kingdom in Southern Madagascar in the Middle Ages trace their origin to migrants from Somalia.[9]

The written history of Madagascar begins in the 7th century,[10] when Muslims established trading posts along the northwest coast. During the Middle Ages, the island's kings began to extend their power through trade with their Indian Ocean neighbours, notably Arab, Persian and Somali traders who connected Madagascar with East Africa, the Middle East and India.[11]

Large chiefdoms began to dominate considerable areas of the island. Among these were the Sakalava chiefdoms of the Menabe, centred in what is now the town of Morondava, and of Boina, centred in what is now the provincial capital of Mahajanga (Majunga). The influence of the Sakalava extended across what are now the provinces of Antsiranana, Mahajanga and Toliara. Madagascar served as an important transoceanic trading port for the east African coast that gave Africa a trade route to the Silk Road, and served simultaneously as a port for incoming ships.

The wealth created in Madagascar through trade created a state system ruled by powerful regional monarchs known as the Maroserana. These monarchs adopted the cultural traditions of subjects in their territories and expanded their kingdoms. They took on divine status, and new nobility and artisan classes were created.[12] Madagascar functioned in the East African Middle Ages as a contact port for the other Swahili seaport city-states such as Sofala, Kilwa, Mombasa and Zanzibar.

European contact began in the year 1500, when the Portuguese sea captain Diogo Dias sighted the island after his ship separated from a fleet going to India.[13] The Portuguese continued trading with the islanders and named the island São Lourenço (St. Lawrence). In 1666, François Caron, the Director General of the newly formed French East India Company, sailed to Madagascar.[14] The Company failed to establish a colony on Madagascar but established ports on the nearby islands of Bourbon and Ile-de-France (today's Réunion and Mauritius). In the late 17th century, the French established trading posts along the east coast.

The most famous pirate utopia is that of Captain Misson and his pirate crew, who allegedly founded the free colony of Libertatia in northern Madagascar in the late 17th century. From about 1774 to 1824, Madagascar was a favourite haunt for pirates, including Americans, one of whom brought Malagasy rice to South Carolina. Many European sailors were shipwrecked on the coasts of the island, among them Robert Drury, whose journal is one of the few written depictions of life in southern Madagascar during the 18th century.[15] Sailors sometimes called Madagascar "Island of the Moon".[16]

Bill Gates


William Henry "Bill" Gates III (born October 28, 1955)[2] is an American business magnate, philanthropist, and chairman[3] of Microsoft, the software company he founded with Paul Allen. He is ranked consistently one of the world's wealthiest people[4] and the wealthiest overall as of 2009.[1] During his career at Microsoft, Gates held the positions of CEO and chief software architect, and remains the largest individual shareholder with more than 8 percent of the common stock.[5] He has also authored or co-authored several books.

Gates is one of the best-known entrepreneurs of the personal computer revolution. Although he is admired by many, a number of industry insiders criticize his business tactics, which they consider anti-competitive, an opinion which has in some cases been upheld by the courts (see Criticism of Microsoft).[6][7] In the later stages of his career, Gates has pursued a number of philanthropic endeavors, donating large amounts of money to various charitable organizations and scientific research programs through the Bill & Melinda Gates Foundation, established in 2000.

Bill Gates stepped down as chief executive officer of Microsoft in January, 2000. He remained as chairman and created the position of chief software architect. In June, 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work and full-time work at the Bill & Melinda Gates Foundation. He gradually transferred his duties to Ray Ozzie, chief software architect and Craig Mundie, chief research and strategy officer. Gates' last full-time day at Microsoft was June 27, 2008. He remains at Microsoft as non-executive chairman.

Wednesday, October 21, 2009

PAGE 219 #7

PAGE 219 #7


1.A. Mines not but my sister is.
B. White pages, People finder, and my life.
C. White pages listed her name but no address, none of them had all the info.

2. My feelings on my sisters info being on the Internet isn't that bad, there wasn't a lot of info on there to really do any damage. I'm sure other people that have more info on there can get harassed. I'm happy that my info isn't posted online.

3.A. plummers, restaurants, locksmith, florist.
B. super pages seems to go more in depth.
C. i looked up my house number, and found a list of all next door neighbors.

4. Metro Taxi, Transportation, west palm beach