Understanding Computers and the Internet | Harvard Video Course - 0 views
-
This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the Internet can be watched by others, and how your computer can become infected with a worm just by turning it on. In this course we demystify computers and the Internet, along with their jargon, so that students understand not only what they can do with each but also how it all works and why. Students leave this course armed with a new vocabulary and equipped for further exploration of computers and the Internet. Topics include hardware, software, the Internet, multimedia, security, website development, programming, and dotcoms. This course is designed both for those with little, if any, computer experience and for those who use a computer every day.
(H) Security experts say Google cyber-attack was routine (BBC) - 0 views
-
hackers got very limited information
-
phishing
-
Once an e-mail account is compromised, attackers can piggyback on it to get access to confidential files and systems throughout an organisation.
Debate over possible responses to cyber attacks (MSNBC) - 0 views
-
the U.S. military's secret offensive cyber capability
-
counterstrike on an attacker's computer network
Instant Fix Slow Computer Solutions - 1 views
I bought a brand new PC with good specifications just last month. But only three weeks of use, I noticed that my PC froze and slowed down a bit. For the next three days, it continued to slow down. ...
The Number One Computer Tech Support Service - 1 views
Computer Tech Support Service offers the most outstanding computer support service. They have friendly computer support technicians who are very skilled in giving accurate and fast solutions to...
Camera Drones Becoming More Popular - 0 views
Trusted PC Tech Support - 1 views
Computers are the most essential commodity for me, especially for my business. That is why whenever I experiences computer trouble, I would really look for a PC tech support specialist to fix my co...
(J) What Is a Cyberattack? (WiseGeek) - 1 views
-
without the knowledge or consent of the owner of the equipment
-
main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
US Gov. 2.3 gegapixel camera - 0 views
-
it also means that people can be illuminated without being aware of it.
-
The ability to provide real-time surveillance of large areas may be getting closer, as the Army launches a quest for a 2.3 gigapixel camera that could be packaged aboard a drone or a manned aircraft.
-
In terms of specifics, the Army is looking for 2.3 gigapixels running at two frames per second. By my reckoning, this suggests continuous coverage of area of around sixty-two square miles at 0.3m resolution with a single sensor
- ...1 more annotation...
Web run out of Numbers - 0 views
-
broadband
Hidden Pay Pal Charges - 1 views
Spacecraft Plan to Tackle Asteroids - 0 views
BBC NEWS | Technology | Web tool oversees Afghan election - 0 views
-
Their reports feature alongside those of full-time Afghan journalists to ensure the election and reporting of it is as "free
-
The Alive in Afghanistan project plots the SMS reports on an online map.
-
The text messages are collected via a free-platform known as FrontlineSMS, developed by UK programmer Ken Banks.
- ...8 more annotations...
« First
‹ Previous
41 - 60 of 195
Next ›
Last »
Showing 20▼ items per page