program

Wed
29
Jul
Dennis Faas's picture

US Spy Program Operated in Secret, Beyond Wiretaps

A massive data mining system aimed at identifying terrorists may have continued to operate under an executive order signed by President Bush in October 2001, despite an order to shut it down by Congress. In 2001 the Defense Department was briefed on ... the Total Information Awareness (TIA) program developed by Admiral John Poindexter. TIA was concocted to created a massive database program that would be accessible to the CIA, the FBI, and numerous other police agencies around the U.S. President Continued Program In the summer of 2002, JetBlue, Inc. turned over the names and addresses of 1.5 ... (view more)

Wed
24
Jun
Dennis Faas's picture

Non-Literate Computing: Assistance in Reading and Writing

Infopackets Reader 'feckinbricks' writes: " Dear Dennis I am trying to find a program for a friend who cannot read or write in order to assist him in being able to use his computer -- and maybe even have the program teach him some skills in the ... process. He loves his computer but can not use it to the capacity that he would like to. Any help or suggestions would be greatly appreciated. Thank you! " My response: Great question. There are two things that are universal when using a computer for literate and non-literate users: and that is it requires (and provides) both input and output in order ... (view more)

Tue
19
May
Dennis Faas's picture

Botnet

Botnet is a jargon term for a collection of software robots, or "bots," that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing ... software. Zombie Computers and Botnets While the term "botnet" can be used to refer to any group of bots, the word is generally used to refer to a collection of compromised computers (called Zombie computers) running software, usually installed via worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. How it ... (view more)

Thu
14
May
Dennis Faas's picture

Device Driver

In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. How it Works A driver typically communicates with the device through the computer bus or ... communications subsystem to which the hardware is connected. When a calling program invokes a routine in the driver, the driver issues commands to the device. Once the device sends data back to the driver, the driver may invoke routines in the original calling program. Drivers are hardware-dependent and operating-system-specific. They usually provide the ... (view more)

Thu
07
May
Dennis Faas's picture

Executable File

In computing, an executable file causes a computer to perform indicated tasks according to encoded instructions, as opposed to a file that only contains data. Files that contain instructions for an interpreter or virtual machine may be considered ... executables, but are more specifically called scripts or bytecode. Executables are also called "binaries" in contrast to the program's source code. Binary Files A binary file is a computer file which may contain any type of data, encoded in binary form for computer storage and processing purposes. For example, a computer document file that contains ... (view more)

Mon
04
May
Dennis Faas's picture

Malware

Malware (a portmanteau of "malicious software") is any software program developed for the purpose of causing harm to a computer system, similar to a virus or Trojan horse. Malware can be classified based on how it is executed, how it spreads, and/or ... what it does. The classification is not perfect, however, in the sense that the groups often overlap and the difference is not always obvious, giving rise to frequent flame wars. Overuse of the term 'Virus' Because viruses were historically the first to appear, the term "virus" is often applied, especially in the popular media, to all sorts of ... (view more)

Mon
27
Apr
Dennis Faas's picture

Virtual Machines and x86 Virtualization

In computer science, a virtual machine (VM) is a software implementation of a machine (computer) that executes programs like a real machine. System Virtual Machine vs Process Virtual Machine A virtual machine was originally defined by Popek and ... Goldberg as "an efficient, isolated duplicate of a real machine". Current use includes virtual machines which have no direct correspondence to any real hardware. Virtual machines are separated into two major categories, based on their use and degree of correspondence to any real machine: a System Virtual Machine and a Process Virtual Machine. A system ... (view more)

Wed
03
Dec
Dennis Faas's picture

Apple Finally Recommends Antivirus Protection

It seems as if the pot has finally called the kettle black. After routinely needling Microsoft and PC users for having to run antivirus programs, Apple has finally recommended that owners of its hardware use similar software to protect their ... computers. Traditionally, Apple hardware and the Mac operating system have been free from viral or spyware attacks for one very simple reason: too few people actually use those systems. From a spyware goon's perspective: if only about 5 per cent of computer owners are Apply users, then why design a spyware program or hack for such a small segment of the ... (view more)

Sat
15
Nov
Dennis Faas's picture

Movie Shrink and Burn 3 Review

Update 2013/01/21: We are absolutely delighted to announce that Ashampoo has agreed to reinstate a generous 35% discount for Ashampoo Movie Shrink and Burn 3 for all Infopackets Readers. This fabulous program not only shrinks and converts video ... files to another format, it also allows you to make your own custom DVDs. Makes a great gift and also great for archiving video permanently. Be sure to snap up this fine offer! But hurry - the 35% discount is a time-limited offer and expires Feb 11, 2013! Full 30 day money back guarantee is offered. The full review of Ashampoo Movie Shrink and Burn 3 ... (view more)

Tue
30
Sep
Dennis Faas's picture

Microsoft and State of Washington Spook Scareware Fiends

Tired of those messages kindly informing you that "YOUR REGISTRY IS DAMAGED" or "YOUR SYSTEM IS CORRUPTED"? That kind of practice is commonly referred to as "scareware" in the tech industry, and those companies that employ it are regarded as the ... least reliable software firms. Thankfully, industry powerhouse Microsoft and the State of Washington continue their full-on campaign determined to root out and destroy scareware firms. According to a statement issued Monday, the Washington State Attorney General's office announced another lawsuit in a joint campaign with Microsoft that has lasted for ... (view more)

Pages

Subscribe to RSS - program