Technology

Wed
11
Jan
Dennis Faas's picture

Keylogger

Keystroke logging (often called keylogging ) is a diagnostic used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems. Such systems are also highly useful for law ... enforcement and espionage -- for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. Keystroke logging can be achieved by both hardware and software means. Commercially available systems include devices which are attached to the keyboard cable (and thus are instantly installable, but visible if the ... (view more)

Tue
10
Jan
Dennis Faas's picture

Rootkit

A rootkit is a set of software tools frequently used by a third party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain ... access to a system without the user's knowledge. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. A computer with a rootkit on it is called a rooted computer. Functions of a rootkit A rootkit typically hides logins, processes, files, and logs and may include software to intercept ... (view more)

Fri
06
Jan
Dennis Faas's picture

Print Head

A computer printer is a computer peripheral device that produces a hard copy (permanent human-readable text and/or graphics, usually on paper) from data stored in a computer connected to it. The world's first computer printer was a 19th-century ... mechanically driven apparatus invented by Charles Babbage for his Difference Engine. Methods of image creation The medium for most printers is paper, so they are usually classified according to the method of image creation: Toner-based printers Laser printers refer to the method used to adhere toner to the media. The advent of cost-effective, precision ... (view more)

Wed
04
Jan
Dennis Faas's picture

Trojan Horse Computing

In the context of computer software, a Trojan horse is a malicious program that is disguised as legitimate software. The term is derived from the classical myth of the Trojan horse. In the siege of Troy, the Greeks left a large wooden horse outside ... the city. The Trojans were convinced that it was a gift, and moved the horse to a place within the city walls. It turned out that the horse was hollow, containing Greek soldiers who opened the city gates of Troy at night, making it possible for the Greek army to pillage the city. Trojan horse programs work in a similar way: they may look useful or ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Fri
23
Dec
Dennis Faas's picture

Adsense

AdSense is an advertising program run by Google. Website owners can enroll in this program to enable text and image advertisements on their sites. These ads are administered by Google and generate revenue on a per-click basis. Google utilizes its ... search technology to serve ads based on website content, the user's geographical location, and other factors. Those wanting to advertise with Google's targeted ad system may sign up through AdWords. AdSense has become a popular method of placing advertising on a website because the ads are less intrusive than most banners, and the content of the ads ... (view more)

Thu
22
Dec
Dennis Faas's picture

Partition Computing

In computer engineering, hard disk drive partitioning is the creation of logical divisions upon a hard disk that allows one to apply operating system-specific logical formatting. Disk partitioning is a simple technique which can be viewed as a ... precursor of logical volume management. The purpose of partitioning is to allow a user to have multiple file systems on a single hard disk. Active partition The Bootable Flag determines the active partition. Only one partition can normally be active at a time. The active marker is used during boot: after the BIOS loads the MBR into memory and executes ... (view more)

Wed
21
Dec
Dennis Faas's picture

Mp3

MP3 is a popular digital audio encoding and lossy compression format invented and standardized in 1991 by a team of engineers working in the framework of the ISO/IEC MPEG audio committee under the chairmanship of Professor Hans Musmann (University ... of Hannover - Germany). MP3 was designed to greatly reduce the amount of data required to represent audio, yet still sound like a faithful reproduction of the original uncompressed audio to most listeners. In popular usage, MP3 also refers to files of sound or music recordings stored in the MP3 format on computers. MP3: Overview In the simplest ... (view more)

Sat
17
Dec
Dennis Faas's picture

Gmail Goes Mobile!

Gmail (Google's free email) is now available on your mobile phone! A dream come true - at least for me! I never want to go too long without checking my Gmail (yes, I have a slight addiction). To get Gmail on your mobile phone, just go to m.gmail.com ... on your phone to access your inbox. Even cooler is the fact that it can handle attachments like pictures and .pdf files. I downloaded an attached picture today, but haven't had a chance to test .pdfs yet. Gmail going mobile is just one of the many new features added to the Gmail service lately. Web clips (RSS feeds that scroll at the top of your ... (view more)

Thu
15
Dec
Dennis Faas's picture

Murphys Law

Murphy's law (also known as Finagle's law or Sod's law) is a popular adage in Western culture, which broadly states that things will go wrong in any given situation. It is most commonly formulated as "Anything that can go wrong will go wrong." In ... American culture the law was named after Major Edward A. Murphy, Jr., a development engineer working for a brief time on rocket sled experiments done by the United States Air Force in 1949. Murphy's Law: Variations Murphy's law has taken on many different formulations. In 1952, the proverb was phrased "Anything That Can Possibly Go Wrong, Does" in ... (view more)

Pages

Subscribe to RSS - Technology