III. Breakthroughs in Technology
Innovation of technology is inevitable, from the twentieth century which is the birth of technology until the twenty first century which spur development of new products. This article aids our understanding of how technology changes the world. It also emphasizes the rapid growth of technology that almost dominating people. Yes, the most notable new technology came from computing, considering the Internet, which has been used world wide and the countless of products of new technology brought by the technology innovators. The breakthrough in technology has a great impact in the world and it doesn't ends here because technology innovators continues exploring for new technology. These effects is everywhere. As we know innovation is defined as the process of taking new ideas to a point of inventing something new or a new way of doing things. With this idea breakthroughs in technology continues.
REFERENCE:
http://www.innovatorsoftechnology.com/
Friday, June 20, 2008
II. Testing Time For Trojan
A research paper of Ian Whalley, IBM TJ Watson Research Center. This paper is all about a malicious computer virus that attacks on the computer, the Trojan. A Trojan virus is a program which the user thinks or believes will do one thing, and which does that thing, but which also does something additional which the user would not approve of. This was entitled testing time for Trojan because this paper discussed more about on how to detect malicious treats. It attempts to give ideas on how to detect and provide some tips on how to avoid this malicious treats. Giving a certain scenario which illustrates how Trojan works in hijacking a property. This work was done to advise user not to trust any link that were given, whether it’s purpose is to offer suggestion that might help but what you do not know that it brings malicious treats and give access to illegitimate users. An answer to this problem is the main purpose of this paper to help the Trojan problem increasing. As the author concluded “the continuing interest in anti-Trojan testing seems doomed to continue, regardless of whether or not the average user is actually at any sort of risk from Trojans”, with this we can say that without paying attention to Trojan horses, user is prone whatever treat it brings however it can be avoided when test was being done, believing that they are Trojan because we will not lose anything if we assume that it is a Trojan.
REFERENCE:
References
1.Sarah Gordon and David M Chess, Where there’s smoke there’s mirrors: The truth about Trojan horses on the Internet, Proceedings of the Eighth International Virus Bulletin Conference, pp 183-204, October 1998,
.
2.Sarah Gordon and David M Chess, Attitude Adjustment: Trojans and Malware on the Internet, Proceedings of the EICAR Conference, February/March 1999.
A research paper of Ian Whalley, IBM TJ Watson Research Center. This paper is all about a malicious computer virus that attacks on the computer, the Trojan. A Trojan virus is a program which the user thinks or believes will do one thing, and which does that thing, but which also does something additional which the user would not approve of. This was entitled testing time for Trojan because this paper discussed more about on how to detect malicious treats. It attempts to give ideas on how to detect and provide some tips on how to avoid this malicious treats. Giving a certain scenario which illustrates how Trojan works in hijacking a property. This work was done to advise user not to trust any link that were given, whether it’s purpose is to offer suggestion that might help but what you do not know that it brings malicious treats and give access to illegitimate users. An answer to this problem is the main purpose of this paper to help the Trojan problem increasing. As the author concluded “the continuing interest in anti-Trojan testing seems doomed to continue, regardless of whether or not the average user is actually at any sort of risk from Trojans”, with this we can say that without paying attention to Trojan horses, user is prone whatever treat it brings however it can be avoided when test was being done, believing that they are Trojan because we will not lose anything if we assume that it is a Trojan.
REFERENCE:
References
1.Sarah Gordon and David M Chess, Where there’s smoke there’s mirrors: The truth about Trojan horses on the Internet, Proceedings of the Eighth International Virus Bulletin Conference, pp 183-204, October 1998,
2.Sarah Gordon and David M Chess, Attitude Adjustment: Trojans and Malware on the Internet, Proceedings of the EICAR Conference, February/March 1999.
I. An Undetectable Computer Virus
This article is taken from David M. Chess and Steve R. White IBM Thomas J. Watson Research Center. It talks about undetectable computer viruses. A certain virus should have its corresponding anti- virus but why is it that a lot of computer viruses are undetected. Numerous of computer viruses are prevalent in the world of technology some are being detected by some anti- virus software and some are not. These viruses have different names but there is only one thing they do, ruin files, the software and even the hardware of your computer which leads to total damage. That is not only, as stated in this article, no perfect algorithm that can destroy all the viruses that attacks in the computer. And it is true because even you have healed the infected files and viruses are being deleted still the viruses are coming back and infect your files. They also duplicate files, replace existing programs with copies of themselves, these are common results that are encountered or happened with the files. That is how powerful a virus. This article was made to give us an idea how harmful is the virus; we do not know when to attack and where it will attack. We can say that a virus is created in maximal form and detected in minimal way. However this article doesn’t discourage the anti-virus software producer that it is impossible to find an exact algorithm to eliminate the computer viruses that are undetectable.
REFERENCE:www.research.ibm.com/antivirus/SciPapers/VB2000DC.htm
This article is taken from David M. Chess and Steve R. White IBM Thomas J. Watson Research Center. It talks about undetectable computer viruses. A certain virus should have its corresponding anti- virus but why is it that a lot of computer viruses are undetected. Numerous of computer viruses are prevalent in the world of technology some are being detected by some anti- virus software and some are not. These viruses have different names but there is only one thing they do, ruin files, the software and even the hardware of your computer which leads to total damage. That is not only, as stated in this article, no perfect algorithm that can destroy all the viruses that attacks in the computer. And it is true because even you have healed the infected files and viruses are being deleted still the viruses are coming back and infect your files. They also duplicate files, replace existing programs with copies of themselves, these are common results that are encountered or happened with the files. That is how powerful a virus. This article was made to give us an idea how harmful is the virus; we do not know when to attack and where it will attack. We can say that a virus is created in maximal form and detected in minimal way. However this article doesn’t discourage the anti-virus software producer that it is impossible to find an exact algorithm to eliminate the computer viruses that are undetectable.
REFERENCE:www.research.ibm.com/antivirus/SciPapers/VB2000DC.htm
Subscribe to:
Posts (Atom)