Thursday, December 8, 2011
Sandbox (Computer Security)
Sandbox is a set of rules that is used when developing a Java applet. It limits access to memory and operating system resources. Without this limit, developers could create applets that can use unlimited memory and system resources. By doing this, the applet could have complete control of the computer and this could be used maliciously.
Radio Frequency Identification (RFID)
RFID is a technology that transmits the identity of a person or object wirelessly using radio waves. RFID technology consists of a tag (used on the object) and a reader that processes the information being sent out by the tag. RFID can be read through a human body, clothing, etc. An example of RFID is EZ Pass. In the future, it is likely that RFID will replace UPC (Universal Product Code). This would mean no more waiting online at the supermarket- the reader will be able to know every item you have just by the radio waves being sent out by the RFID tags.
Internet Anonymity
Many people like the internet because you can do things anonymously. You can pursue any type of thing you want on the web without having to conceal your identity, for the most part. However, sometimes our identities are threatened. Here's how to ensure your internet anonymity:
1. Stick to the basics. Never give out your personal information to anyone on the internet.
2. Use a public proxy. These allow you to access the web without using your IP address, so you cannot be tracked.
3. Use an internet connection that isn't yours such as a library or cafe. When using connections such as these, you are using the web under their IP address, as are many others. Therefore, your identity is mixed in with all the others' and you cannot be tracked (unless sometimes trying to track you very hard).
CAPTCHA
A CAPTCHA is a program that creates tests that only humans can pass as to determine which users are human and which are not. Usually it consists of viewing a distorted image of letters and/or numbers, and you must type them in as shown. Current computer programs have no way of bypassing CAPTCHAs. They are used to prevent spam, hackers, and bots.
Internet Parental Control Software
Parents want to ensure the safety of their children when they use the internet. There is software that exists solely for this purpose. Programs such as Spyagent, K9 Web Protection, and Net Nanny can monitor and filter web content and usage. They can be set to keep logs on usage, block certain websites, and more. Some of the programs are even "undetectable", meaning the user cannot even tell they are installed on the computer.
Cloud Computing
"Cloud computing" is a fairly new technology that synchronizes all your personal data to be accessible on any and all of your mobile devices. The cloud refers to your bubble of personal information, including photos, documents, music, and more. The devices automatically synchronize with each other, so if, for example, you took a picture on your smart phone, without needing to do anything, you could access the picture from your computer through the cloud. In the future, cloud computing will make it possible to connect and interact with other people's clouds.
Internet Monitoring & Tracking
Whenever you use the internet, info is transmitted and received. It is possible for others to monitor what content you access on the internet and in e-mails.
Who might do this? This is often done by employers to ensure their employees are staying on task and using the work-provided internet connection appropriately. Parents might monitor internet access to be sure their children aren't doing illicit things online. Cyber criminals also monitor usage.
How is it done? Sometimes software is installed directly on to the computer that will be monitored. Examples are Spectre Pro and eBlaster. Occasionally, one's ISP (Internet Service Provider) might intercept information if they are suspicious of criminal activity online. Finally, sometimes information is intercepted by a 3rd party, such as hackers who usually do not have good intentions.
Who might do this? This is often done by employers to ensure their employees are staying on task and using the work-provided internet connection appropriately. Parents might monitor internet access to be sure their children aren't doing illicit things online. Cyber criminals also monitor usage.
How is it done? Sometimes software is installed directly on to the computer that will be monitored. Examples are Spectre Pro and eBlaster. Occasionally, one's ISP (Internet Service Provider) might intercept information if they are suspicious of criminal activity online. Finally, sometimes information is intercepted by a 3rd party, such as hackers who usually do not have good intentions.
Subscribe to:
Comments (Atom)