Wednesday 8 May 2013

358. Q. & A.s SCI. & TECH. – 22


Q. &  A.s  ‑‑‑  SCI.  &  TECH. – 22


601Q. What is spyware?
Spyware is Internet jargon for Advertising Supported software (Adware). It is a way for shareware authors to make money from a product, other than by selling it to the users.
There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales.
This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

602Q. Why is it called "Spyware" ?
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....
603Q. Are all Adware products "Spyware"?
No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system. These products are not indexed in our database.
604Q. Is Spyware illegal?
Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background.
605Q. What’s the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics – and this is why many people feel uncomfortable with the idea.



606Q. What are  the function of Tracers?
Tracers is one of the nation's leading providers of identification and credential verification data. Tracers collects and maintains databases of public and non-public background information for law enforcement, government agencies, law firms, private investigators, insurance companies and other qualified businesses. Our products are designed to assist customers in managing risk through fraud detection and prevention, risk evaluation, identity verification, pre-screening and due diligence, including:
  • Phone Numbers
  • Addresses
  • Real Property
  • Motor Vehicles
  • E-mail Addresses
  • Criminal and Civil Records
  • Relatives and Associates
  • Governmental Watch Lists
  • Driving Records
  • Bankruptcies
  • Corporate Records
  • FEIN
  • UCC Filings
  • Warrants and Arrest Records
Call now and let us show you how our online database, batch processing and XML solutions deliver the information you need when you need it.

607Q. WHAT ARE MICROCOMPUTERS?

Circuit computer processors....A microcomputer is a computer with a microprocessor as its central processing unit. Another general characteristic of these computers is that they occupy physically small and fuel systems.... A microcomputer also known as micro is a computer having a microprocessor as its central processing unit CPU. General characteristic of microcomputers 1 they occupy physically small

608Q. MAX PC Secure
Get One Stop Security for Total Peace of Mind.

Over the past few years, cyber attacks have annoyed everyone. New Government policies have been enacted to control Data Security, Privacy, Spam, Adwares, Viruses and other vulnerabilities. This product addresses issues starting from Integrity of Data to intrusion of Privacy , Internet Bandwidth misuse, catastrophic disruption to infrastructure, loss of revenue and more.
Max PC Secure is a one stop security and a complete integrated solution to achieve Peace of Mind from spyware, junk sites, cookies, hackers by preventing them from generating reports about activities running on your computer in your absence.

609Q. System Requirements:

The following minimum system requirements are needed to run Max PC Secure:
• Pentium Class Processor
• 128 MB of RAM available
• 15 MB of free hard disk space
• Internet Connectivity for Registration and Live Updates

The Blocking functionality is designed to work with IE 6.0 only and will block web sites, keywords, cookies, active X, pop-ups, animations and rest of the functionality for IE 6.0 only and no other browsers. Max PC Privacy can delete history of AOL, Opera and Netscape Navigator browsers along with the IE 6.0.

610Q. Spyware Detector Antispyware News:
*Spyware is becoming more and more insidious everyday. A recent corporate spyware/adware audit of more than 12,200 systems, representing more than 4,900 companies discovered an average of 22 pieces of spyware per corporate desktop computer, including malicious spyware and adware infections. On average eight percent of the corporate PCs in all networks audited had system monitors and six percent had Trojan horse programs, the two most nefarious and potentially malicious forms of spyware.
611Q. What is called Malware?
Malware: Malware is a generic term for any malicious software designed to disrupt the working of a network. Virus, worms and Trojans fall under the category of Malware. Malware utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware seek to exploit existing vulnerabilities on systems making their entry quiet and easy.
612Q. What are called Trojans?
Trojans: Redirects victims machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored. Clickers are used: 1. To raise the hit-count of a specific site for advertising purposes. 2. To organize a DoS attack on a specified server or site. 3. To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans).

613Q. What are called spy tools?
Spy tools: are programs which steal information from users PC such as banking information, login details and keyboard strokes etc.
614Q. What is called Keylogger?
Keylogger: is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data is typically sent to a remote attacker. The keylogger is usually hidden from the user and may use cloaking (Rootkit) technology to hide from other software in order to evade easy detection by anti-Spyware applications.

615Q. How to Stop Spywares from Invading your Privacy and Reducing PC Performance?
Growing spyware attacks and constantly changing spyware technology are placing personal information, privacy, and even your identity at risk.

We at Max Secure Software provide you the most robust solution against Spywares. We have developed the world class Anti Spyware, Max Secure Spyware Detector which is a complete solution for individuals, professionals and home users. The software is specially designed to scan, detect, delete and recover spywares with an option of quick and full scan.

616Q. How software is blocked?
Enhanced Detection
We have a dedicated database team which uses state-of-the-art spyware research methods and identifies new spyware threats before they are widely distributed. Max Secure Spyware Detector ensures that you have the most powerful and up-to-date protection against new emerging spyware threats.
Advanced Blocking
Max Secure Spyware Detector has advanced blocking features which block ActiveX, Browser Header Objects, Tracking Cookies, you can also block the bad websites or the websites you feel are not worth browsing. This feature blocks the new spyware installations, ensuring that you have peace of mind you desire.
Active Monitoring
Max Secure Spyware Detector also protects your privacy and provides you security by actively protecting you against the Malicious processes, Homepage hijackers and Tracking Cookies. Thus giving you the peace of mind while you are browsing.
Complete Removal
Max Secure Spyware Detector detects and deletes the toughest spyware programs in just one scan. Also it provides advanced and comprehensive cleaning technology for the special spywares which are the nastiest next-generation spyware threats.
Instant Support
As a customer of Max Secure Spyware Detector, you are assured that you are always backed up with our technical support force. Our technical expert and friendly support team is always there to answer any questions you have, absolutely FREE!
Spyware Detector scans your entire system using a constantly updated database of thousands of known spyware threats. You can schedule regular scans or perform one manually to find and remove spyware, adwares, malwares, pests, and spybots from your PC. If any files or traces of spyware match the threat definitions database, Spyware Detector immediately quarantines them.

617Q. Eliminating Spyware & Adware that invade your privacy and security.
This software is also powered by some advanced features that are similar to our corporate edition like, Block Active X, Block Cookies, Block BHOs, Registry back up, Live Monitoring for IE home page hijacking, system and win ini file change monitor, monitor registry changes, tracking cookies monitoring and Process monitoring. The software has a complete database of the most commonly and largely found spywares, which are detected and can be deleted immediately. Our live update module will enable our users to update their spyware database frequently.

618Q. The first decline in the theatrical 3-D craze started in August and September 1953. The factors causing this decline were:
  • Two prints had to be projected simultaneously.
  • The prints had to remain exactly alike after repair, or synchronization would be lost.
  • It sometimes required two projectionists to keep sync working properly.
  • When either prints or shutters became out of sync, the picture became virtually unwatchable and accounted for headaches and eyestrain.
  • The necessary silver projection screen was very directional and caused sideline seating to be unusable with both 3-D and regular films, due to the angular darkening of these screens. Later films that opened in wider-seated venues often premiered flat for that reason (such at Kiss Me Kate at the Radio City Music Hall).

619Q.  What are the differences between Transistor and Memristor?
 Transistor
Memristor
1]  3-terminal switching device with an input electrode (e.g. source), an output electrode (e.g. drain), and a control electrode (e.g. gate)
1]  2-terminal device with one of the electrodes acting either as a control electrode or a source electrode depending on the voltage magnitude.
2] Requires a power source to retain a data state
2]  Does not require a power source to retain a data state
3]  Stores data by electron charge
3]  Stores data by resistance state
4]  Scalable by reducing the lateral length and width dimensions between the input and output electrodes
4]  Scalable by reducing the thickness of the memristor materials
5]  Capable of performing analog or digital electronic functions depending on applied bias voltages
5]  Capable of performing analog or digital electronic functions depending on particular material used for memristor
6]  Fabrication requires optical lithography
6]  Fabrication by optical lithography but alternative (potentially cheaper) mass production techniques such as nanoimprint lithography and self assembly have also been implemented


620Q. What is non-volatile memory?
As evident from the patent data, non-volatile memory is the dominant area being pursued for memristor technology. Of course most of the companies listed (with the exception of Hewlett Packard) do not refer to their memory in terms of the memristor and rather use a variety of acronyms (i.e. RRAM or ReRAM, CBRAM, PRAM, etc.) to distinguish their particular memory design. While these acronyms do represent real distinctions in terms of the materials used or the mechanism of resistance switching employed, the materials are still all memristors because they all share the same characteristic voltage-induced resistance switching behavior covered by the mathematical memristor model of Chua.

621Q. Transistor means what?
Flash memory currently dominates the semiconductor memory market. However, each memory cell of flash requires at least one transistor meaning that flash design is highly susceptible to an end to Moore’s law. On the other hand, memristor memory design is often based on a crossbar architecture which does not require transistors in the memory cells. Although transistors are still necessary for the read/write circuitry, the total number of transistors for a million memory cells can be on the order of thousands instead of millions and the potential for addressing trillions of memory cells exists using only millions (instead of trillions) of transistors.
Another fundamental limitation to conventional memory architectures is Von Neumann’s bottleneck which makes it more difficult to locate information as memory density increases.
Memristors offer a way to overcome this hurdle since they can integrate memory and processing functions in a common circuit architecture providing a de-segregation between processing circuitry and data storage circuitry .

622Q. What is Neuromorphic Electronics  ?
Neuromorphic Electronics 
Neuromorphics has been defined in terms of electronic analog circuits that mimic neuro-biological architectures. Since the early papers of Leon Chua it was noted that the equations of the memristor were closely related to the Hodgkin-Huxley model describing the behavior of neural cells. Since memristors integrate aspects of both memory storage and signal processing in a similar manner to neural synapses they may be ideal to create a synthetic electronic system similar to the human brain capable of handling applications such as pattern recognition and adaptive control of robotics better than what is achievable with modern computer architectures. While so far few patents have been issued involving memristors applied to this area, several research groups are beginning to pursue this approach and several publications from HPLabs (Greg Snider) and other researchers (M Di Ventra, Y.V. Pershin) are exploring the possibilites in this area. Some other potential applications of memristors related to this area are discussed in my other knol

623Q. What is Binary Oxide?
 Binary Oxide 
The discovery of the resistive switching properties of binary oxide compounds actually predates the original memristor paper of Chua and can be dated back to 1967 when the article "New conduction and reversible memory phenomena in thin insulating films" was published in the Proceedings of the Royal Society.
The phenomena was originally observed in silicon oxide formed with nanometer scale thickness and including gold ions. Silicon oxides have been a key insulating material used in the fabricating of electronics devices over the past 40 years.
However, there is now a search for new thin oxide films having improved insulating properties to assist in the further scaling of transistor designs. This search may be very beneficial to this class of memristor material since research in new binary oxide compounds may benefit both the conventional semiconductor industry and the upcoming memristor industry.
Furthermore, the manufacturing resources used in semiconductor processes may require less modification in comparison with other memristor materials and provide a smooth transition as semiconductor electronics is converted to memristor electronics over the next few decades.
While Samsung has some patents covering variations of binary oxide memristors there is still significant freedom to operate based on early published patents which are now expired such as US Patent 4,839,700 which teaches a variety of binary oxides such as WO3, Ir2O3, MoO3, ZrO2, and RhO2 adjusted to have memristive properties. A variety of other memristor variations based on TiO, CuO, NiO, ZrO, and HfO materials have been under experimental investigation for the past several years. Hewlett-Packard has been focusing on a TiO variation of the memristor but does not yet have any patents covering their materials or the manufacture. 

624Q. What is HyperPhysics?
http://upload.wikimedia.org/wikipedia/commons/d/d4/Button_hide.png
HyperPhysics is an educational resource about physics topics. The information architecture of the website is based on trees that organize topics from general to specific. HyperPhysics is hosted by Georgia State University, which estimates that HyperPhysics has over 3 million users per year.
The site is under continuous development by recently retired Georgia State faculty member Rod Nave. Topics covered include;
625Q. What are the methods of Password Hacking?
1) Hashing :-
2) Guessing :-
3) Default Passwords :-
4) Brute Force
5) Phishing :-








No comments:

Post a Comment

647. PRESENTATION SKILLS MBA I - II

PRESENTATION  SKILLS MBA   I - II There are many types of presentations.                    1.       written,        story, manual...