User:Dabear
From Wikipedia, the free encyclopedia
[edit] Dabear
Bjørn Inge Berg aka dabear is a 17 year old from Trondheim studying at malvik vgs.
[edit] latest english report, Computing future
Misuse of technology Unfortunately there is someone who abuses the computer technology they have available. They lure people into giving them their credit card numbers or they get access to databases they should even know about. These are often referred to as «hackers», but a better term would actually be «a cracker» where the only difference between those two is their goal, while hackers try to make the world a better place by providing information to the public, a cracker would be interested in doing harm and making money on his theft.s It's this misuse of technology that frighten people, and with good reason; viruses and Trojans taking your code to access your bank online and sending that information to a server located somewhere across the globe. Off course some viruses are more dangerous than others. Some years ago, the systems to the computer manufacture IBM had been infected with a virus which led to a massive cleanup costing millions of dollar.
Security issues Misuse of an automated information system is sometimes illegal, unethical, and always reflects poor judgment or lack of care in following a companies security rules and regulations. Misuse may, unintentionally, create security vulnerabilities or cause damage to important information. A pattern of inability or unwillingness to follow rules for the operation of computer systems raises serious concerns about an individual's reliability.
Many companies permit some, minimal personal use of office equipment when such personal use involves a minimal expense to the organization, is performed on your personal non-work time, does not interfere with the company’s guide lines, and does not violate standards of ethical conduct. A big percentage of a company’s employees follow these guide lines set by their employer, but what they don’t know, is that they can be a security risk to the company regardless if they follow the rules set or not; there are some key issues a user of a computer should know of: There are two big problems with e-mail. One is increased risk of accidental security compromise. The other is sending inappropriate materials by e-mail, which has caused many people to be fired from their jobs.
Security risks with E-Mail As a result of the Internet and e-mail, there has been a sharp increase in security incidents involving the accidental sending of classified and other sensitive information. One common problem occurs when individuals download a seemingly unclassified file from a classified system, and then fail to carefully review this file before sending it as an attachment to an e-mail message. Too often, the seemingly unclassified file actually has some classified material or classification markings that are not readily apparent when the file is viewed on line. Sending such material by e-mail is a security violation even if the recipient has an appropriate security clearance, as e-mail can easily be monitored by unauthorized persons.
More important, even if the downloaded file really is unclassified, the electronic version of that file may have recoverable traces of classified information. This happens because data is stored in «blocks». If a file does not take up an entire block, the reminder of that block may have recoverable traces of data from other files. A system administrator must follow an approved technical procedure for removing these traces before the file is treated as unclassified.
Sending e-mail is like sending a postcard through the mail. Just as the mailman and others have an opportunity to read a postcard, network eavesdroppers can read your e-mail as it passes through the Internet from computer to computer. E-mail is generally insecure!
Security risks with passwords
Passwords are used to authenticate an individual’s right to have access to certain information of some kind of systems, like your mail. Your password is for your use only. Lending it to someone else is a security violation and may result in disciplinary action against both parties. It’s important to say that you should never in any way show your password to anyone. Memorize it and preferably don’t write it down, as then the security provided with password may be lost. If you leave a computer you’re logged into unattended for any reason, log off or lock the screen. Otherwise, someone else could use your computer to access information they are not authorized to have. You may be held responsible if someone else uses your password in connection with a system transaction.
Change your password regularly. Use a password with at least seven characters and preferably more, a password should consist of a mix of upper and lower case letters, numbers, and special characters such as semicolons and hyphens. A mix of various types of characters makes it more difficult for a cracker to use automated tools, often referred to as «rainbow/dictionary table attacks» to discover your password. Such attacks is surprisingly effective, using a pre-made list of common and random passwords can often lead to the revealing of multiple passwords in computer systems in both schools, research facilities and others. If a user name and password to a person with extra privileges (such as administrators) are found, the security of a hole system may be compromised.
The future is the Internet? What will emerge from using the Internet as a research tool? The answer, we don't know, but it will clearly only be limited by our imaginations.
Humans have built a creative machine. We could say it consists of three parts: some hundred million computers, a communication system connecting those computers, and human using those computers to communicate.
This is called «the Internet». The Internet has already changed the way we accomplish tasks, most importantly by enhancing collaboration between people. Today’s Internet technology provides convenient connections between computer labs and databases. In addition, it also represents an investment that's driven by the demands of hundreds of millions of consumers around the world.
As such, the investment in Internet software and infrastructure takes more and more of the budgets of companies around the world. As the Internet grows -and the technology behind them gets more and more advanced and complicated in the future, so has the budgets and the anticipations of users have to do too.
We are in the beginning of a new era. Super computers have always existed, but the Internet is starting to provide an alternative: grid computing or the combination of the power of millions of Internet-connected machines. Technologies such as SETI@home are increasing in popularity. SETI@home is an experiment that uses computers connected to the Internet to search for extraterrestrial intelligence. Maybe not the best way of spending bandwidth, but SETI@home does also include other projects that may change how we think of the world, including a search for the highest prime number, but also research within physics, medicine and other subjects.
But the possibilities aren't restricted to what was mentioned earlier.
Questions can now be investigated simply by observing what occurs on the Internet through services like SETI@home and others.
Even online games are starting to attract interest. Some Massively Multiplayer Online Role-Playing Game) often shortened to MMORPG, such as Counter Strike, World of Warcraft, EverQuest and others, features three-dimensional action involving both cooperation and combat, simulating real life situations. The worrying is that we start to see people getting addicted to such games. In fact, magazines all over the world did in 2005 report of people getting so addicted to these games that they ditched school and stopped eating, just to getting sure their characters got more points, and therefore increasing their «level».
This is only the present. Technology, hardware and software are going to improve, and in the future we will for certain see many new and grate discoveries being made because of the great influence modern computers have made on the world, but no-one can guarantee these experiences will be all positive. People are already getting addicted to not just games, but computers in general; many of them often are going to sit all the day on their computers, instead of going out and being social.
Conclusion How can we prepare for such a future? That’s perhaps the most important question. In the social, human layers of the Internet, we need to devise and experiment with large-scale architectures for collaboration. We need linguists and artificial-intelligence researchers to extend the capabilities of search engines and social networks to produce services that can bridge barriers created by technical jargon between people and , bringing research groups with problems and solutions together — even when those groups have not noticed the possibility of collaboration through the Internet. In the end, computers, networks and people add up to something significantly greater than they selves alone. But technology will eventually grow beyond human creativity - To become what? We can't know until we get there. But one thing is for sure though, computers are here to stay.
[edit] License
This report is under the wikipedias license or public domain, from your choosing.