|
|
DVD Duplication Software
DVD duplication is a wonderful thing. If you want an extra copy of a movie you own or you have a DVD that skips, DVD duplication will come in handy. You will be able to make backup copies of DVDs, games, VHS tapes and more. DVD duplication is easy...
Microsoft Great Plains Implementation: Placement/Recruiting Agency example – overview for consultant
Microsoft Great Plains does wonderful ERP job for horizontal markets and clientele. However in our opinion placement software market is underserved and needs custom modules to be developed. In the case of Microsoft Great Plains we see numerous...
PhotoELF in Zoom
The fairy tale of the shoemaker and the elves tells us the story of a poor shoemaker and his wife, who didn’t have enough money to buy materials for their shoes. That was until the elves came into their lives and helped them make the fanciest and...
Text is for E-mail
Text is for E-mail and HTML coding is for Web Pages. I can't begin to tell you the number of E-mails I get formatted for HTML. These are basically not readable in a text mode and get quickly deleted. While some mail readers will display HTML coding,...
Watch out for spyware programs that slow down your computer system
Spyware is a program that once loaded on your computer unknowingly collects information from your PC and sends it to another party. The most dangerous types of Spyware programs copies personal information that you would not share with anyone such...
|
|
|
|
|
|
|
|
Hacking in Cyberspace
Did know you that your normal, everyday e-mail could be viewed and read by practically anyone on the Internet? It's like someone reading your personal mail without asking. Recently security on the Internet has received a lot of attention in the Press. The exploits of various "hackers" and the heroic efforts of the people who track and capture them have grown to soap operatic proportions.
This is not without reason. As more and more companies and services come online, the risk and the potential damage of security breaches increases. As the number of appealing targets grows, so does the number of hackers. The number of poorly administered servers on the Internet is staggering. Blatant security holes, bugs from old software that system administrators have failed to update, and compromised file systems are scattered all over the world.
One weak server on the Internet is a danger to all servers; if a hacker can attack and take over one system, he or she can use it as a base to launch attacks on other systems. The most important thing for hacker is hiding their trail. The more systems hackers can conquer, the harder it becomes to trace them. It is very important that everyone on the Internet spend some time shoring up their systems.
It is a simple fact of life that robbery, decryption, and embezzlement exists in our societies. It is only natural that this human trait will carry over to cyberspace. The Internet is a dangerous place. Just as it isn't always perfectly safe to go to the ATM machine alone at night, it isn't always perfectly safe to send a credit card number electronically. How safe the transaction actually is depends on the amount of time and effort we (both the customer and the vendor) spend protecting ourselves.
We have lot of naive Internet users who think all thy have to do is get connected to the Internet, get an e-mail address, and all is wonderful Â… The people who are selling the Internet are basically selling vacation land with beachfront property, and lot of people are buying it. They think it's a great investment. But when they show up, it's got alligators, it's underwater, and there's yellow fever. Any user of the Internet can be a victim of crime.
A lot of people are breaking into lot of systems. They are looking for information. An obvious symptom of intrusion is a change in login time showing your computer use when you were nowhere near your computer. Or, you might notice that a broad array of your files have been tampered with. Perhaps the system's memory space has been changed or somebody is sending e-mails on your behalf by using e-mail address.
Crackers, as they have come to known, are the people who are exploiting the security laxity on the Internet. They are high-tech criminals who enter systems through networks to do damage. Crackers may be thought as the malicious cousins of computer hackers. Although they're not
angels, hackers do not get a thrill out of breaking into someone else's computer and gobbling up information like crackers; they simply are people who are crazy about learning computer systems from top to bottom. Crackers, on the other hand, have gone from snooping for the thrill of it to exploiting the privacy of others for monetary gain. Their crimes include financial theft, software or hardware theft, and sabotage. As more people connected to the Internet, crackers are creating some real problems.
Old-fashioned scam artists have also been targeting the personal computer users. Be wary of online requests for personal information such as credit card members. As use of the Internet has expanded, people are finding the Internet being used for more traditional offences such as fraud. An example? Send me a cheque and I'll send you a product. You send the cheque and the product never arrives.
Law enforcement authorities believe system break-ins often go unreported because companies and individuals fear embarrassment or believe reporting an incident could give crackers information to help them break in again. A large number of victims never report they've had a problem. If they recognize it, they don't want to admit it. And can you imagine going up to your nearest police station saying, "Inspector, inspector, somebody hacked into my computer!".
A lot of people committing crime are taking advantage of the Internet. The nature of the network enables them to go to an area where none of this is against the law. Some of this occurs in one thousandth of a second. A typical investigation takes one and a half years. But in one-thousandth of a second, a cracker may have gone through four countries and stolen top-secret information. Annual computer crimes are difficult to estimate – one billion to five billion per year? Nobody has a clue. One problem with tracking crime on the Internet is that there's no central clearing house for reporting crimes.
The forgery and counterfeiting of business documents, cheques, entertainment and transportation tickets, stocks and bonds, coupons, licenses, birth certificates, passports, academic transcripts, job applications, and even monetary currency, can now be accomplished with nearly total perfection.
Governments are stealing business secrets through professional espionage agents and even malicious teenage crackers. They are using moles or informants in addition to the traditional methods of extracting information from unsuspecting business employees. A wide variety of safeguards are needed to combat these new crimes.
About the Author
Dr. Adnan Ahmed Qureshi holds a Ph.D. in IT with specialization in the induction of information technology in developing countries. He is the former Editor of Datalog, Computech, ISAsia and columnist for The News International. At present he is working as Senior Industry Analyst and IT Consultant.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|