It's All About Me
Saturday, July 24, 2010
ETHICS
Sunday, July 4, 2010
comment on foundation day
Saturday, June 26, 2010
my favorite assignment
viruses, by definition, can "infect" any executable code. Accordingly, they are found on floppy and hard disk boot sectors, executable programs, macro languages and executable electronic mail attachments.
viruses can be found using a virus scanner or a virus wall. Some software products are also available to remove them with a minimum of harm to the "infected" files.
Some viruses are self-modifying, in order to make detection more difficult. Such viruses are called polymorphic (many shapes).
3. trojan- A program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.
4. spyware- Software that sends information about your Web surfing habits to its Web site. Often quickly installed in your computer in combination with a free download you selected from the Web, spyware transmits information in the background as you move around the Web. Also known as "parasite software," "scumware," "junkware" and "thiefware," spyware is occasionally installed just by visiting a Web site
THE TEN COMMANDMENTS FOR COMPUTER ETHICS |
1. | Thou shalt not use a computer to harm other people. |
2. | Thou shalt not interfere with other people's computer work. |
3. | Thou shalt not snoop around in other people's files. |
4. | Thou shalt not use a computer to steal. |
5. | Thou shalt not use a computer to bear false witness. |
6. | Thou shalt not use or copy software for which you have not paid. |
7. | Thou shalt not use other people's computer resources without authorization. |
8. | Thou shalt not appropriate other people's intellectual output. |
9. | Thou shalt think about the social consequences of the program you write. |
10. | Thou shalt use a computer in ways that show consideration and respect. |