|
Papers on Technology
Hacking
Number of words: 999 | Number of pages: 4.... First, the hacker runs the prefix scanner, usually at night, to get a list of dial-ups, phone numbers that contain carriers. Once he has dials-ups, he has places to explore. Next he uses his terminal to dial-up the carriers. When he connects to the network, he will need to gain entrance to it. The hacker uses his password cracker to find a suitable user name and password. The password cracker does not always work, so the hacker is forced to use a technique called "brute force" . This is where the hacker randomly tries different user names and passwords to gain access to the network. Once inside the network, the hacker "go .....
Get This Essay
|
|
New Weapons And Technology In World War I
Number of words: 1966 | Number of pages: 8.... In 1915, Wolseley developed a thirty-cwt. lorry chassis with armored sides and a revolving turret with a Vickers-maxim machine gun. The first design of a tank known as “Little Willie” designed by Lieutenant W.G. Wilson and William Tritton. It consisted of an armored box encircled by caterpillar tracks. The first vehicle to be designed and completed as a tank was not very effective. It was too short to cross a German trench that was more than four-foot wide. An improved version of Wilson’s tank was developed in 1916. The Mark I had an armor plate varying from 12mm to 6mm in thickness. It had four Vickers water-coole .....
Get This Essay
|
|
The History Of Electronic Musical Instruments
Number of words: 2148 | Number of pages: 8.... and synthesizers was what was called the “Digital Era”. Employing computers to do operations similar to that of electronic devices required conversion of an electronic signal, called an analogue signal, to a series of 1’s and 0’s that computers use to calculate information, hence the term digital.
Seeming that the computers allowed musicians to arrange synthesized sounds and samples (various snippets of a recording) in a way never before fathomable, it was only a natural reaction for it to expand itself manually.
Soon amateurs and musicians alike, were making types and genres of music never heard before by anyone i .....
Get This Essay
|
|
A Hacker
Number of words: 266 | Number of pages: 1.... of disheveled
apperance,Often with sunken, glowing eyes.Seen sitting at computer consoles,
their arms tense and waitingTo fire their fingers which are already posed to
strike at the buttons and keys on which their attention seems to dice.They work
until they nearly drop,twenty or thirty hours at a time if possible.They sleep
on cots near the computer,but only a few hours-then back to the console, or
printouts.Their crumpled clothes, their unwashed, unsheven faces, and uncombed
hair, testify that they are oblivious to their bodies and to the word in which
they move. They exist, at least when so gaged, only through and for the
compu .....
Get This Essay
|
|
Computer Pornography
Number of words: 2098 | Number of pages: 8.... on the Infobahn. The CDA criminalizes indecent
speech on the Internet(Wallace: 1). The CDA describes indecent speech as
anything "depicting or describing sexual or excretory acts or organs in
patently offensive fashion under contemporary community standards."
First take the word "indecent". This word is used because of its vague
definition. Not only does this word ban sexually explicit materials, it also
bans sexually explicit words too. If this were applied to the real world some
of the greatest novels would be taken off the shelf. For example there is the
great lesbian novel The Well of Loneliness by Radcliffe Hall. In .....
Get This Essay
|
|
Questions Of Ethics In Computer Systems And Their Future
Number of words: 2876 | Number of pages: 11.... to this is if you
did this through another medium such as the phone system nothing would ever come
it. The bigger question here is how much government do people want in there
lives? The Internet was brought into the picture for the public as the next
great technology of this century. It is without a doubt as big if not bigger
than any other public means of communication that has come before it. With that
in mind I think the government is trying to extract it's pound of flesh for what
they believe is missed revenue dollars that could be made in the form of tax
regulations.
"There are probably insiders touting stocks on the Int .....
Get This Essay
|
|
Censorship On The Internet
Number of words: 881 | Number of pages: 4.... countries, such as Germany, have considered taking measures
against the U.S. and other companies or individuals that have created or
distributed offensive material on the Internet. If the United States government
really wanted to censor the net, there is only one solution - shut down all
network links of other countries. But of course that would mean no Internet
access for the whole country and that is disgust by the whole nation.
Secondly, everyone has their personal judgment values. The decision of some
people cannot represent the whole population of those using the net. Many people
debate that pornography on the net should be .....
Get This Essay
|
|
Telecommunications
Number of words: 3010 | Number of pages: 11.... Telephone). It can also take the form of a microwave or a
communications-satellite linkage, or some combination of any of these various
systems.
Hardware and Software
Each telecommunications device uses hardware, which connects a device to the
transmission line; and software, which makes it possible for a device to
transmit information through the line.
Hardware
Hardware usually consists of a transmitter and a cable interface, or, if the
telephone is used as a transmission line, a modulator/demodulator, or modem. A
transmitter prepares information for transmission by converting it from a form
that the device uses (such as a .....
Get This Essay
|
|
The Y2K Problem
Number of words: 4210 | Number of pages: 16.... reality for many
information technology managers and their corporations.
What, specifically, _is_ this "millennia virus" to begin with? There has
been much talk about it, and most people know it has something to do with
the date formats and how they are processed by the computer. How it is
affecting that processing is what the key to implementing a solution is.
There are several forms the "bug" will metamorphose into. For example:
Field / Date Processing
Time based calculations
Hardware failure
Will all be affected by the problem.
"OLD will seem YOUNG, a FEW moments will seem like an ENTIRE century,
FU .....
Get This Essay
|
|
An Overview Of Hacking
Number of words: 1281 | Number of pages: 5.... can make an easy living off of the Internet, maybe even stealing from you. How? It's all in a day's work for them. One Russian hacker spent a few years bleeding money from the Citibank corporation here in the states from his cozy little house in Russia. His labor was rewarded with $10.4 million dollars in several bank accounts around the world. Unfortunately for him, his labor was also rewarded with arrest. (Caryl, par. 2) However, even though he committed the crime many years ago, he is still in Russia, awaiting extradition. Because of the slow response of the bureaucracy, Russia has bred many hackers. (Caryl, par. 7) R .....
Get This Essay
|
|
|