Q. & A.s ‑‑‑ SCI.
& TECH. – 22
601Q. What is spyware?
Spyware is Internet jargon
for Advertising Supported software (Adware). It is a way for shareware
authors to make money from a product, other than by selling it to the users.
There are several large media
companies that offer them to place banner ads in their products in exchange for
a portion of the revenue from banner sales.
This way, you don't have to pay for
the software and the developers are still getting paid. If you find the banners
annoying, there is usually an option to remove them, by paying the regular
licensing fee.
602Q. Why is it called "Spyware"
?
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....
While this may be a great concept, the downside is that the advertising companies also install additional tracking software on your system, which is continuously "calling home", using your Internet connection and reports statistical data to the "mothership". While according to the privacy policies of the companies, there will be no sensitive or identifying data collected from your system and you shall remain anonymous, it still remains the fact, that you have a "live" server sitting on your PC that is sending information about you and your surfing habits to a remote location.....
603Q. Are all Adware products
"Spyware"?
No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system. These products are not indexed in our database.
No, but the majority are. There are also products that do display advertising but do not install any tracking mechanism on your system. These products are not indexed in our database.
604Q. Is Spyware illegal?
Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background.
Even though the name may indicate so, Spyware is not an illegal type of software in any way. However there are certain issues that a privacy oriented user may object to and therefore prefer not to use the product. This usually involves the tracking and sending of data and statistics via a server installed on the user's PC and the use of your Internet connection in the background.
605Q. What’s the hype about?
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics – and this is why many people feel uncomfortable with the idea.
While legitimate adware companies will disclose the nature of data that is collected and transmitted in their privacy statement (linked from our database), there is almost no way for the user to actually control what data is being sent. The fact is that the technology is in theory capable of sending much more than just banner statistics – and this is why many people feel uncomfortable with the idea.
606Q. What are the function of Tracers?
Tracers
is one of the nation's leading providers of identification and credential verification
data. Tracers collects and maintains databases of public and non-public
background information for law enforcement, government agencies, law firms,
private investigators, insurance companies and other qualified businesses. Our
products are designed to assist customers in managing risk through fraud
detection and prevention, risk evaluation, identity verification, pre-screening
and due diligence, including:
|
|
Call
now and let us show you how our online database, batch processing and XML
solutions deliver the information you need when you need it.
607Q. WHAT ARE MICROCOMPUTERS?
Circuit
computer processors....A microcomputer is a computer with a microprocessor as
its central processing unit. Another general characteristic of these
computers is that they occupy physically small and fuel systems.... A
microcomputer also known as micro is a computer having a microprocessor as its
central processing unit CPU. General characteristic of microcomputers 1
they occupy physically small
608Q. MAX PC Secure
Get One Stop Security for Total
Peace of Mind.
Over the past few years, cyber attacks have annoyed everyone. New Government policies have been enacted to control Data Security, Privacy, Spam, Adwares, Viruses and other vulnerabilities. This product addresses issues starting from Integrity of Data to intrusion of Privacy , Internet Bandwidth misuse, catastrophic disruption to infrastructure, loss of revenue and more.
Over the past few years, cyber attacks have annoyed everyone. New Government policies have been enacted to control Data Security, Privacy, Spam, Adwares, Viruses and other vulnerabilities. This product addresses issues starting from Integrity of Data to intrusion of Privacy , Internet Bandwidth misuse, catastrophic disruption to infrastructure, loss of revenue and more.
Max PC Secure is
a one stop security and a complete integrated solution to achieve Peace of Mind
from spyware, junk sites, cookies, hackers by preventing them from generating
reports about activities running on your computer in your absence.
609Q. System Requirements:
The following minimum system
requirements are needed to run Max PC Secure:
• Pentium Class Processor
• 128 MB of RAM available
• 15 MB of free hard disk space
• Internet Connectivity for Registration and Live Updates
The Blocking functionality is designed to work with IE 6.0 only and will block web sites, keywords, cookies, active X, pop-ups, animations and rest of the functionality for IE 6.0 only and no other browsers. Max PC Privacy can delete history of AOL, Opera and Netscape Navigator browsers along with the IE 6.0.
• Pentium Class Processor
• 128 MB of RAM available
• 15 MB of free hard disk space
• Internet Connectivity for Registration and Live Updates
The Blocking functionality is designed to work with IE 6.0 only and will block web sites, keywords, cookies, active X, pop-ups, animations and rest of the functionality for IE 6.0 only and no other browsers. Max PC Privacy can delete history of AOL, Opera and Netscape Navigator browsers along with the IE 6.0.
610Q. Spyware Detector Antispyware News:
*Spyware is becoming more
and more insidious everyday. A recent corporate spyware/adware audit of more
than 12,200 systems, representing more than 4,900 companies discovered an
average of 22 pieces of spyware per corporate desktop computer, including malicious
spyware and adware infections. On average eight percent of the corporate PCs in
all networks audited had system monitors and six percent had Trojan horse
programs, the two most nefarious and potentially malicious forms of spyware.
611Q. What is called Malware?
Malware: Malware is a
generic term for any malicious software designed to disrupt the working of a
network. Virus, worms and Trojans fall under the category of Malware. Malware
utilize popular communication tools to spread, including worms sent through
email and instant messages, Trojan horses dropped from web sites, and
virus-infected files downloaded from peer-to-peer connections. Malware seek to
exploit existing vulnerabilities on systems making their entry quiet and easy.
612Q. What are called Trojans?
Trojans: Redirects victims
machines to specified websites or other Internet resources. Clickers either
send the necessary commands to the browser or replace system files where
standard Internet urls are stored. Clickers are used: 1. To raise the hit-count
of a specific site for advertising purposes. 2. To organize a DoS attack on a
specified server or site. 3. To lead the victim to an infected resource where
the machine will be attacked by other malware (viruses or Trojans).
613Q. What are called spy tools?
Spy tools: are programs
which steal information from users PC such as banking information, login
details and keyboard strokes etc.
614Q. What is called Keylogger?
Keylogger: is a program that
captures and logs keystrokes on the computer without the user's knowledge and
consent. The logged data is typically sent to a remote attacker. The keylogger
is usually hidden from the user and may use cloaking (Rootkit) technology to
hide from other software in order to evade easy detection by anti-Spyware
applications.
615Q. How to Stop Spywares from Invading your Privacy and Reducing
PC Performance?
Growing spyware attacks and constantly changing spyware technology are placing personal information, privacy, and even your identity at risk.
We at Max Secure Software provide you the most robust solution against Spywares. We have developed the world class Anti Spyware, Max Secure Spyware Detector which is a complete solution for individuals, professionals and home users. The software is specially designed to scan, detect, delete and recover spywares with an option of quick and full scan.
616Q. How software is blocked?
Enhanced Detection
We have a dedicated database team which uses state-of-the-art spyware research methods and identifies new spyware threats before they are widely distributed. Max Secure Spyware Detector ensures that you have the most powerful and up-to-date protection against new emerging spyware threats.
Growing spyware attacks and constantly changing spyware technology are placing personal information, privacy, and even your identity at risk.
We at Max Secure Software provide you the most robust solution against Spywares. We have developed the world class Anti Spyware, Max Secure Spyware Detector which is a complete solution for individuals, professionals and home users. The software is specially designed to scan, detect, delete and recover spywares with an option of quick and full scan.
616Q. How software is blocked?
Enhanced Detection
We have a dedicated database team which uses state-of-the-art spyware research methods and identifies new spyware threats before they are widely distributed. Max Secure Spyware Detector ensures that you have the most powerful and up-to-date protection against new emerging spyware threats.
Advanced Blocking
Max Secure Spyware Detector has advanced blocking features which block ActiveX, Browser Header Objects, Tracking Cookies, you can also block the bad websites or the websites you feel are not worth browsing. This feature blocks the new spyware installations, ensuring that you have peace of mind you desire.
Max Secure Spyware Detector has advanced blocking features which block ActiveX, Browser Header Objects, Tracking Cookies, you can also block the bad websites or the websites you feel are not worth browsing. This feature blocks the new spyware installations, ensuring that you have peace of mind you desire.
Active Monitoring
Max Secure Spyware Detector also protects your privacy and provides you security by actively protecting you against the Malicious processes, Homepage hijackers and Tracking Cookies. Thus giving you the peace of mind while you are browsing.
Max Secure Spyware Detector also protects your privacy and provides you security by actively protecting you against the Malicious processes, Homepage hijackers and Tracking Cookies. Thus giving you the peace of mind while you are browsing.
Complete Removal
Max Secure Spyware Detector detects and deletes the toughest spyware programs in just one scan. Also it provides advanced and comprehensive cleaning technology for the special spywares which are the nastiest next-generation spyware threats.
Max Secure Spyware Detector detects and deletes the toughest spyware programs in just one scan. Also it provides advanced and comprehensive cleaning technology for the special spywares which are the nastiest next-generation spyware threats.
Instant Support
As a customer of Max Secure Spyware Detector, you are assured that you are always backed up with our technical support force. Our technical expert and friendly support team is always there to answer any questions you have, absolutely FREE!
As a customer of Max Secure Spyware Detector, you are assured that you are always backed up with our technical support force. Our technical expert and friendly support team is always there to answer any questions you have, absolutely FREE!
Spyware Detector
scans your entire system using a constantly updated database of thousands of
known spyware threats. You can schedule regular scans or
perform one manually to find and remove spyware, adwares,
malwares, pests, and spybots from your PC. If any files or traces of spyware
match the threat definitions database, Spyware Detector
immediately quarantines them.
617Q. Eliminating Spyware & Adware that
invade your privacy and security.
This software is also powered by some advanced features
that are similar to our corporate edition like, Block Active X, Block Cookies,
Block BHOs, Registry back up, Live Monitoring for IE home page hijacking,
system and win ini file change monitor, monitor registry changes, tracking
cookies monitoring and Process monitoring. The software has a complete database
of the most commonly and largely found spywares, which are detected and can be
deleted immediately. Our live update module will enable our users to update
their spyware database frequently.
618Q. The first decline in the theatrical 3-D craze started in
August and September 1953. The factors causing
this decline were:
- Two
prints had to be projected simultaneously.
- The
prints had to remain exactly alike after repair, or synchronization would
be lost.
- It
sometimes required two projectionists to keep sync working properly.
- When
either prints or shutters became out of sync, the picture became virtually
unwatchable and accounted for headaches and eyestrain.
- The
necessary silver projection screen was very directional and caused
sideline seating to be unusable with both 3-D and regular films, due to
the angular darkening of these screens. Later films that opened in
wider-seated venues often premiered flat for that reason (such at Kiss
Me Kate at the Radio City Music Hall).
619Q. What are the differences between Transistor and Memristor?
Transistor
|
Memristor
|
1] 3-terminal switching device with an input
electrode (e.g. source), an output electrode (e.g. drain), and a control
electrode (e.g. gate)
|
1] 2-terminal device with one of the electrodes
acting either as a control electrode or a source electrode depending on the
voltage magnitude.
|
2]
Requires a power source to retain a data state
|
2] Does not require a power source to retain a
data state
|
3] Stores data by electron charge
|
3] Stores data by resistance state
|
4] Scalable by reducing the lateral length and
width dimensions between the input and output electrodes
|
4] Scalable by reducing the thickness of the
memristor materials
|
5] Capable of performing analog or digital
electronic functions depending on applied bias voltages
|
5] Capable of performing analog or digital
electronic functions depending on particular material used for memristor
|
6] Fabrication requires optical lithography
|
6] Fabrication by optical lithography but
alternative (potentially cheaper) mass production techniques such as
nanoimprint lithography and self assembly have also been implemented
|
620Q. What is non-volatile memory?
As
evident from the patent data, non-volatile memory is the dominant
area being pursued for memristor technology. Of course most of the companies
listed (with the exception of Hewlett Packard) do not refer to their memory in
terms of the memristor and rather use a variety of acronyms (i.e. RRAM or ReRAM, CBRAM, PRAM, etc.) to distinguish their
particular memory design. While these acronyms do represent real distinctions
in terms of the materials used or the mechanism of resistance switching
employed, the materials are still all memristors because they all share the
same characteristic voltage-induced resistance switching behavior covered by
the mathematical memristor model of Chua.
621Q. Transistor means
what?
Flash
memory currently dominates the semiconductor memory market. However, each memory
cell of flash requires at least one transistor meaning that flash design is
highly susceptible to an end to Moore’s law. On the other hand, memristor
memory design is often based on a crossbar architecture which does not require
transistors in the memory cells. Although
transistors are still necessary for the read/write circuitry, the total
number of transistors for a million memory cells can be on the order of
thousands instead of millions and the potential for addressing trillions of
memory cells exists using only millions (instead of trillions) of transistors.
Another
fundamental limitation to conventional memory architectures is Von Neumann’s bottleneck
which makes it more difficult to locate information as memory density
increases.
Memristors
offer a way to overcome this hurdle since they can integrate memory and
processing functions in a common circuit architecture providing a de-segregation
between processing circuitry and data storage circuitry .
622Q. What is Neuromorphic
Electronics ?
Neuromorphic Electronics
Neuromorphics has been defined in terms of
electronic analog circuits that mimic neuro-biological architectures. Since the
early papers of Leon Chua it was noted that the equations of the memristor were
closely related to the Hodgkin-Huxley model
describing the behavior of neural cells. Since memristors integrate
aspects of both memory storage and signal processing in a similar manner to
neural synapses they may be ideal to create a synthetic electronic system
similar to the human brain capable of handling applications such as pattern recognition
and adaptive control of robotics better than what is achievable with
modern computer architectures. While so far few patents have been
issued involving memristors applied to this area, several
research groups are beginning to pursue this approach and several publications
from HPLabs (Greg Snider) and other researchers (M Di Ventra, Y.V. Pershin)
are exploring the possibilites in this area. Some other potential applications
of memristors related to this area are discussed in my other knol.
623Q. What is Binary
Oxide?
The
discovery of the resistive switching properties of binary oxide compounds
actually predates the original memristor paper of Chua and can be dated back to
1967 when the article "New conduction and reversible memory
phenomena in thin insulating films" was published in the
Proceedings of the Royal Society.
The
phenomena was originally observed in silicon oxide formed with
nanometer scale thickness and including gold ions. Silicon oxides have
been a key insulating material used in the fabricating of
electronics devices over the past 40 years.
However,
there is now a search for new thin oxide films
having improved insulating properties to assist in the further scaling of
transistor designs. This search may be very beneficial to this class of
memristor material since research in new binary oxide compounds may benefit
both the conventional semiconductor industry and the upcoming memristor
industry.
Furthermore,
the manufacturing resources used in semiconductor processes may require less modification in
comparison with other memristor materials and provide a smooth transition as
semiconductor electronics is converted to memristor electronics over the
next few decades.
While
Samsung has some patents covering variations of binary
oxide memristors there is still significant freedom to operate based on
early published patents which are now expired such as US Patent 4,839,700
which teaches a variety of binary oxides such as WO3, Ir2O3, MoO3, ZrO2, and
RhO2 adjusted to have memristive properties. A variety of other memristor variations based
on TiO, CuO, NiO, ZrO, and HfO materials have been under experimental
investigation for the past several years. Hewlett-Packard has been
focusing on a TiO variation of the memristor but does not yet have any
patents covering their materials or the manufacture.
624Q. What is
HyperPhysics?
HyperPhysics is
an educational resource about physics
topics. The information architecture of the website is based on trees
that organize topics from general to specific. HyperPhysics is hosted by
Georgia State University, which estimates that HyperPhysics
has over 3 million users per year.
The site is under continuous development by recently retired
Georgia State faculty member Rod Nave. Topics covered include;
- Electricity
and magnetism
- Light
and vision
- Sound
and hearing
- relativity
- Astrophysics
- Quantum physics
- Nuclear physics
- Condensed matter
- Heat
and thermodynamics
- Mechanics
625Q. What are the methods of Password Hacking?
1) Hashing :-
2) Guessing :-
3) Default Passwords :-
4) Brute Force
5) Phishing :-
No comments:
Post a Comment