Skip to main content

Home/ Groups/ Chemistry I hour 7
Timothy Stokes

McAfee report details rapid increase in Smartphone malware (Includes interview) - 0 views

  • The amount of smartphone malware increased rapidly last year, according to a McAfee threat report for the last quarter of 2010. In the 20 page report (PDF) McAfee say that during 2010 they saw an increases in "targeted attacks, increases in sophistication and increases in the number of threats on the new class of devices that seem to appear with regularity."
  •  
    Ranking: 2.5
Timothy Stokes

App developers and school systems work to leverage tablet computing - Mass High Tech Bu... - 0 views

  •  
    Ranking: 1
Timothy Stokes

15 Best Mobile Anti-Viruses [Android and iPhone Included] - AhnLab V3 Mobile 2.0, andro... - 0 views

  •  
    Ranking: 2.5
Timothy Stokes

Smartphone Security: How to Keep Your Handset Safe | PCWorld Business Center - 0 views

  •  
    Rating: 3
Timothy Stokes

HowStuffWorks "How Cell-phone Viruses Work" - 0 views

  • Turn off Bluetooth discoverable mode. Set your phone to "hidden" so other phones can't detect it and send it the virus. You can do this on the Bluetooth options screen.
  • Check security updates to learn about filenames you should keep an eye out for. It's not fool-proof -- the Commwarrior program generates random names for the infected files it sends out, so users can't be warned not to open specific filenames -- but many viruses can be easily identified by the filenames they carry. Security sites with detailed virus information include: F-Secure, McAfee and  Symantec.Some of these sites will send you e-mail updates with new virus information as it gets posted.
  • nstall some type of security software on your phone. Numerous companies are developing security software for cell phones, some for free download, some for user purchase and some intended for cell-phone service providers. The software may simply detect and then remove the virus once it's received and installed, or it may protect your phone from getting certain viruses in the first place. Symbian has developed an anti-virus version of its operating system that only allows the phone's Bluetooth connection to accept secure files.
  •  
    Rating: 3.5
Timothy Stokes

HowStuffWorks "How Cell-phone Viruses Work" - 0 views

  • Cabir.A First reported: June 2004Attacks: Symbian Series 60 phonesSpreads via: BluetoothHarm: none
  • A virus might access and/or delete all of the contact information and calendar entries in your phone. It might send an infected MMS message to every number in your phone book -- and MMS messages typically cost money to send, so you're actually paying to send a virus to all of your friends, family members and business associates. On the worst-case-scenario end, it might delete or lock up certain phone applications or crash your phone completely so it's useless. Some reported viruses and their vital statistics are listed below.
  • Skulls.AFirst reported: November 2004Attacks: various Symbian phonesSpreads via: Internet downloadHarm: disables all phone functions except sending/receiving calls
  • ...3 more annotations...
  • Commwarrior.AFirst reported: January 2005Attacks: Symbian Series 60 phonesSpreads via: Bluetooth and MMSHarm: sends out expensive MMS messages to everyone in phonebook (in course of MMS replication)
  • Locknut.BFirst reported: March 2005Attacks: Symbian Series 60 phonesSpreads via: Internet download (disguised as patch for Symbian Series 60 phones)Harm: crashes system ROM; disables all phone functions; inserts other (inactive) malware into phone
  • Fontal.AFirst reported: April 2005Attacks: Symbian Series 60 phonesSpreads via: Internet downloadHarm: locks up phone in startup mode; disables phone entirely
  •  
    Rating: 4
Timothy Stokes

HowStuffWorks "How Cell-phone Viruses Work" - 0 views

  • Only smartphones with a Bluetooth connection and data capabilities can receive a cell-phone virus.
  • Internet downloads - The virus spreads the same way a traditional computer virus does. The user downloads an infected file to the phone by way of a PC or the phone's own Internet connection. This may include file-sharing downloads, applications available from add-on sites (such as ringtones or games) and false security patches posted on the Symbian Web site.
  • Bluetooth wireless connection - The virus spreads between phones by way of their Bluetooth connection. The user receives a virus via Bluetooth when the phone is in discoverable mode, meaning it can be seen by other Bluetooth-enabled phones. In this case, the virus spreads like an airborne illness.
  • ...2 more annotations...
  • Multimedia Messaging Service - The virus is an attachment to an MMS text message. As with computer viruses that arrive as e-mail attachments, the user must choose to open the attachment and then install it in order for the virus to infect the phone. Typically, a virus that spreads via MMS gets into the phone's contact list and sends itself to every phone number stored there.
  • The Commwarrior virus arrived on the scene in January 2005 and is the first cell-phone virus to effectively spread through an entire company via Bluetooth (see ComputerWorld.com: Phone virus spreads through Scandinavian company). It replicates by way of both Bluetooth and MMS. Once you receive and install the virus, it immediately starts looking for other Bluetooth phones in the vicinity to infect. At the same time, the virus sends infected MMS messages to every phone number in your address list. Commwarrior is probably one of the more effective viruses to date because it uses two methods to replicate itself.
  •  
    Ranking: 4 Cell phone virus information
Nick Cunningham

Lasers - The History of Lasers - 0 views

  •  
    a brief history of lasers
Timothy Stokes

First SMS Trojan detected for smartphones running Android - 0 views

  • Kaspersky Lab, a leading developer of secure content management solutions, announces that the first malicious program classified as a Trojan-SMS has been detected for smartphones running on Google’s Android operating system. Named Trojan-SMS.AndroidOS.FakePlayer.a, it has already infected a number of mobile devices.
  • program penetrates smartphones running Android in the guise of a harmless media player application. Users are prompted to install a file of just over 13 KB with the standard Android extension .APK. Once installed on the phone, the Trojan uses the system to begin sending SMSs to premium rate numbers without the owner’s knowledge or consent, resulting in money passing from a user’s account to that of the cybercriminals.
  • The new malicious
  •  
    Rating: 5
Danika thibault

Hair Dye and the Risk of Certain Subtypes of Non-Hodgkin Lymphoma: Abstract and Introdu... - 1 views

  •  
    who began using hair dye before 1980.
  •  
    wwwwwwwwooooooooooooooooooooooooooooooowwwwwwwwwwwwwwww..................
  •  
    i know, interesting. right?
Timothy Stokes

Viruses, Spyware, and Malware: What's the Difference? | PCMag.com - 0 views

  • A flu virus spreads by infecting your body's cells and turning them into virus-replication factories. In a similar fashion a computer virus injects its code into an innocent program; when the program runs the virus code runs too, spreading the virus to other programs or computers. USC researcher Fred Cohen coined the term "computer virus" back in 1984. These days, though, viruses are just one among many types of malicious programs you may encounter. Your antivirus software should handle all of them.
  • A virus runs when the user launches an infected program or boots from an infected disk. Viruses keep a low profile, so as to spread widely without being detected. Most of the time, the virus code simply infects new programs or disks. Eventually, often at a predefined date and time, the virus payload kicks in. Early virus payloads were often mindlessly destructive; these days they're more likely to steal information or implement a DDoS (Distributed Denial of Service) attack against a major web site.
  • Worms are similar to viruses, but they don't require the user to launch an infected program. Simply put, the worm copies itself to another computer and then launches that copy. In 1988 the Morris worm, intended as a simple proof of concept, caused serious damage to the budding Internet. While it wasn't meant to be malicious, its over-enthusiastic self-replication sucked up a huge amount of bandwidth.
  • ...8 more annotations...
  • Just as Greek forces fooled the people of Troy by concealing warriors inside the Trojan Horse, Trojan programs conceal malicious code within a seemingly useful application. The game, utility, or other application typically performs its stated task, but sooner or later it does something harmful. This type of threat spreads when users or Web sites inadvertently share it with others.
  • Spyware, not surprisingly, refers to software that spies on your computer and steals your passwords or other personal information.
  • Adware pops up unwanted advertisements, possibly targeted to your interests by using information stolen by a spyware component.
  • Rootkit technology hooks into the operating system to hide a malicious program's components. When a security program queries Windows to get a list of files, the rootkit removes its own files from the list. Rootkits can also hide entries in the Registry.
  • A bot infestation doesn't actively harm your computer, but it makes your system complicit in harming others. It quietly hides itself until the owner, or "bot herder", broadcasts a command. Then, along with hundreds or thousands of others, it does whatever it's told. Bots are often used to send spam, so the spammer's own systems aren't implicated.
  • Some malicious programs exist specifically to aid in distribution of other malware. These dropper programs tend to be tiny and unobtrusive themselves, but they can funnel a steady stream of other malware onto your computer. A dropper may receive instructions from its remote owner, as a bot does, to determine which malware it will distribute. The owner gets paid by other malware writers for this distribution service.
  • As the name suggests, ransomware holds your computer or your data for ransom. In the most common form a ransomware threat will encrypt your documents and demand payment before it will decrypt them. This type of malware is relatively uncommon simply because the perpetrator must stay visible enough to receive that payment.
  • Not all antivirus programs are what they seem. Some are actually fakes, rogue programs that don't protect your security and do harm your bank balance. At best these programs offer no real protection; at worst they include actively harmful elements. They work hard to scare you into paying for registration, so they're often called scareware.
  •  
    Ranking: 4.5
Nick Cunningham

List of applications for lasers - Wikipedia, the free encyclopedia - 0 views

  •  
    all uses for lasers
Nick Cunningham

Laser Facts - 0 views

  •  
    how lasers are used on a a daily bases
Tate Montgomery-smith

Symphony of Science - 0 views

  •  
    Hey - I'm John Boswell, the musician and producer behind the Symphony of Science. The goal of the project is to bring scientific knowledge and philosophy to the public, in a novel way, through the medium of music. Science and music are two passions of mine that I aim to combine, in a way that is intended to bring a meaningful message to listeners, while simultaneously providing an enjoyable musical experience. Inspiration from The Gregory Brothers and DJ Steve Porter, coupled with my experience with remixing, composition, and auto-tune, led to experiments with remixing scientists, culminating in Carl Sagan's "A Glorious Dawn" in Fall of 2009. This first video's highly positive reception provided motivation to elaborate on the theme of remixing scientists, which spawned the Symphony of Science project. Although the methods of remixing and tuning spoken word, combined with original electronic music and similarly themed footage, are unorthodox in the context of other science-themed music, the results have often been inspiring, humbling, and of course humorous.
Alexandria Veilleux

12 high school students suffering with Tourette's-like illness | Fox News - 0 views

  •  
    A group of high school girls have yet to be diagnosed after coming down with a mysterious illness two months ago, 13WHAM News reported. An estimated 12 students at LeRoy High School in Leroy, N.Y., started suffering in November from shaking, tics and vocal outbursts similar to those of Tourette's syndrome. "The investigation has not revealed environmental or infectious causes as the origin of the students' illness," said Jeffrey Hammond, spokesman for the New York State Department of Health. The school district hosted a public meeting Wednesday to update hundreds of concerned parents about the health investigation, but were unable to give any information because of federal privacy laws. The district's website posted the following comment: "The safety and well-being of all students and school staff is our top priority. The District continues to work with medical specialists, the State and County Health Departments, and the County and State Office of Mental Health during this ongoing investigation." Residents have expressed frustration with the lack of information given up to this point.
Danika thibault

Hair Color Chemistry - How Haircoloring Works - 0 views

  •  
    Hair is mainly keratin, the same protein found in skin and fingernails. The natural color of hair depends on the ratio and quantities of two other proteins, eumelanin and phaeomelanin. Eumelanin is responsible for brown to black hair shades while phaeomelanin is responsible for golden blond, ginger, and red colors. The absence of either type of melanin produces white/gray hair.
  •  
    understandable
Alexandria Veilleux

The Facts About Tourette Syndrome - 0 views

  •  
    Both multiple motor and one or more vocal tics present at some time, although not necessarily simultaneously; *The occurrence of tics many times a day (usually in bouts) nearly every day or intermittently throughout the span of more than one year; * Periodic changes in the number, frequency, type and location of the tics, and in the waxing and waning of their severity. Symptoms can sometimes disappear for weeks or months at a time; *Onset before the age of 18.
Alexandria Veilleux

Tourette's Disorder-Topic Overview - 0 views

  •  
    Tourette's disorder is a brain condition that starts in childhood. Children with Tourette's make sounds or movements-such as coughing or twitching-that they can't control. These are called tics. Tics usually start at about age 2. They may be at their worst by age 12. Tics tend to decrease during teenage years. They can continue into adulthood but occur less often and are less severe than in childhood.
1 - 20 of 82 Next › Last »
Showing 20 items per page