My Blog List

Monday 9 January 2012

From what IVe been reading the worm is a complicated one, the fact that it can open a door then get in and close it to prevent furhter access so i seems ike nothings been tampered is pretty damn smart, it leaves no trace. I dont think someone would do all this for an elaborate hoax  the hoax is prolly just covering what it will do.any like these they are usually random blabber  but these if u read them actually make sense and are a rather intereseting read, they all have the same premise,lets talk on skype so we can chat face to face and I need you to store some money for meshould make sure their systems are patched and running the latest security software. People should patch their systems to close the hole in Windows that Conficker exploits and should update their antivirus software. The major antivirus vendors all have free Conficker removal tools.

                                                                   case study2
Faur was also accused of hacking computers belonging to the US navy and the Department of Energy between November 2005 and September 2006, according to an official statement. He was also previously indicted by the US Attorneys Office for allegedly being the leader of a hackers group called the WhiteHat Team The group of hackers was famous for breaking into various computer systems precisely despite their reputation of being among the most secure in the world. It seems they weren t after all. if the IBM in the Czech Republic where the company established the intentions were not destructive as his actions only aimed at proving that several.& no longer Hackers around the world are known for breaking in some of the most secure computer networks.

                                                                   case study3
a.)i think  no because that is a accident  we dont no what is happen  just a compilicated & i know sequence of keystrokes represents one holistic idea, one complete task, but the operator is left without the kind of feedback which would confirm that the task has been completed. For example, there was a fairly complicated dialogue necessary to remove a widget from the acid bath. However, upon completion of this dialogue, the robot operator was led into a new, unrelated dialogue, without being informed that the widget removal dialogue had been completedrobot operator console This allowed me to investigate the robot's behavior without actually risking serious harm.

No comments:

Post a Comment