Skip to main content

Home/ IB ITGS/ Group items tagged computer

Rss Feed Group items tagged

Jeff Ratliff

Understanding Computers and the Internet | Harvard Video Course - 0 views

  •  
    This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why tech support has you constantly rebooting your computer, how everything you do on the Internet can be watched by others, and how your computer can become infected with a worm just by turning it on. In this course we demystify computers and the Internet, along with their jargon, so that students understand not only what they can do with each but also how it all works and why. Students leave this course armed with a new vocabulary and equipped for further exploration of computers and the Internet. Topics include hardware, software, the Internet, multimedia, security, website development, programming, and dotcoms. This course is designed both for those with little, if any, computer experience and for those who use a computer every day.
shalani mujer

The Number One Computer Tech Support Service - 1 views

Computer Tech Support Service offers the most outstanding computer support service. They have friendly computer support technicians who are very skilled in giving accurate and fast solutions to...

computer support service

started by shalani mujer on 12 Oct 11 no follow-up yet
Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
shalani mujer

Online PC Support No Once Can Match - 1 views

When I avail of ComputerTechSupportOnline online computer tech support services, I am always assured that my computer is good hands. Whenever I have problems with my PC, I know that they can fix ...

online computer tech support

started by shalani mujer on 12 Oct 11 no follow-up yet
shalani mujer

Computer Support Specialists Today Are Ready To Serve You - 1 views

Our zoo is highly operated by computers. The cages of the animals are powered by computers which opens and closes once operated from our server. Since the zoo has a sophisticated computer system, w...

computer support specialists

started by shalani mujer on 12 Oct 11 no follow-up yet
Aliyah Rush

Instant Fix Slow Computer Solutions - 1 views

I bought a brand new PC with good specifications just last month. But only three weeks of use, I noticed that my PC froze and slowed down a bit. For the next three days, it continued to slow down. ...

fix slow computer

started by Aliyah Rush on 07 Jun 11 no follow-up yet
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
shalani mujer

Reliable and Fast Online Computer Tech Support - 1 views

I love watching movies and I usually get them online. There was this one time that my computer automatically shut down while downloading a movie. Good thing I was able to sign up with an online ...

online computer tech support

started by shalani mujer on 10 Nov 11 no follow-up yet
shalani mujer

PC Technical Support's Great Contribution - 1 views

Our Daycare Center has computers that are specially made for children's use. Each unit has child-friendly and educational games that will surely be enjoyed by the children. It is a good thing that ...

pc technical support

started by shalani mujer on 12 Oct 11 no follow-up yet
shalani mujer

Trusted PC Tech Support - 1 views

Computers are the most essential commodity for me, especially for my business. That is why whenever I experiences computer trouble, I would really look for a PC tech support specialist to fix my co...

PC tech support

started by shalani mujer on 12 Oct 11 no follow-up yet
anonymous

FDIC: End to Identity Theft/Account Hijacking - 0 views

  •  
    This article presents the study of technology used to commit account hijacking and the methods available to prevent it. It gives a clean example of a phishing as a fraud email from Citibank. "The fifth method of acquiring the information necessary to hijack accounts is by inserting malicious software (such as a keystroke logger26), often referred to as "spyware," on a consumer's personal computer at home or on a computer used by many consumers in a public facility like an Internet café"
Eunice Vincent

Nations May Reuse More Electronics Than Thought - 0 views

  • "At least 85 percent of discarded computers imported to Peru are reused, as opposed to going directly to recycling. [... Thus,] the image of the trade in e-waste as mainly being about dumping unusable junk is, at least for Peru, inaccurate."
    • Eunice Vincent
       
      Social: Globalization
  • "highly dynamic flow [that] reuses and recycles almost every part and material found in a computer,"
    • Eunice Vincent
       
      IT SYSTEMS: basics
  • that it is possible to stop the environmentally damaging practices without diluting or eliminating informal dismantling and collection. This informal reuse and recycling sector is valuable for generating employment in the country and in making computing technology more accessible to low-income families and small businesses, the paper contends.
    • Eunice Vincent
       
      AREAS OF IMPACT: business, science&the environment
ajay tambay

Forecasting Malicious Internet Attacks - 0 views

  • cyberspace is dominated by it
    • ajay tambay
       
      IT Systems - Internet
  • Today, computer scientists outline a new way of predicting the next attack so that you can block it in advance.
    • ajay tambay
       
      Social - Security
  • Last year, computer scientists began exploring a potentially more effective approach: predicting the sites most likely to attack and blocking them in advance. The technique, called highly predictive blacklisting, uses data from past attacks to create a network-type graph out of the pattern of links between victims .
    • ajay tambay
       
      Impact - Business, education
Jeewon Yoon

New Nanolaser Key To Future Optical Computers And Technologies - 0 views

  • tiniest laser
    • Jeewon Yoon
       
      Areas of Impact Art
  • Nanophotonics may usher in a host of radical advances, including powerful "hyperlenses" resulting in sensors and microscopes 10 times more powerful than today's and able to see objects as small as DNA; computers and consumer electronics that use light instead of electronic signals to process information; and more efficient solar collectors.
    • Jeewon Yoon
       
      Social Globalization
  • new device, called a "spaser," is the first of its kind to emit visible light, it represents a critical component for possible future technologies based on "nanophotonic" circuitry,
    • Jeewon Yoon
       
      IT systems Integrated systems
iman mustafa

Spam offers to let people use their PC to attack Obama site - 0 views

  • The e-mail message says: "If You dont like Obama come here, you can help to ddos his site with your installs."
  • It's not clear whether the software does turn the computer into a DoS attacking zombie, or what it does, if anything. But it would be crazy to expose your computer like that, regardless of your political leanings.
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
iman mustafa

BBC NEWS | Technology | Smart sensors power interaction - 0 views

  •  
    A range of novel ideas in human-computer interaction has been demonstrated a conference this week in Cambridge.
1 - 20 of 59 Next › Last »
Showing 20 items per page