BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Khamis, 25 Mac 2010

salami attack

Abstract
This research will describe an aspect of crime known as salami fraud, the salami technique, or simply, a salami attack. Though most often associated with electronic banking and electronic data interchange fraud, the concept can be applied to other scenarios with little relation to computing. In general, salami attacks take place when small, almost immaterial, amounts of assets are systematically acquired from a large number of sources. In such miniscule denominations, they frequently exist just below the threshold of perception (and detection, for that matter). The result is an ongoing accumulation of assets in such a manner that the victims, whose assets are vanishing, fail to even notice.

hardware

Overview
The Hardware Monitor applet is a small program for the Gnome panel. You can use it to monitor various hardware aspects. It's smoother and more flexible than the default offering in GNOME.
Take a look at the screenshots page for an idea of how it looks like. The features section below has more information.
News
Version 1.4.2 fixes compilation on latest GNOME (patch by Make Auty) and is updated to lm-sensors 3.x API (reported by Francisco Pina Martins). There are also a couple of translation updates.
Version 1.4.1 contains a couple of bug fixes (patches from Simon Wenner and Christof Krüger) and lots of translation updates.
Version 1.4 adds a vertical version of the bar viewer by patch from Emmanuel Rodriguez. Fixes wrong counting of CPU time with new libgtop. Translation updates.
Version 1.3 takes advantage of new API in gtkmm 2.6 to get rid of the dependency on libgnomemm and libgnomeuimm. Included are also some bug fixes and lots of translation updates. Use version 1.2.1 if you do not have gtkmm 2.6 yet.
Version 1.2.1 is a bug fix release. Lots of translations updated too.
Features
The applet supports various viewers which you can switch between easily (all are animated smoothly):
A graphical view where each monitor is represented by a (time, measurement) colored curve
A bar-plot view with a horisontal or vertical bar per monitor
A column view with a column (time, measurement) diagram for each monitor
A textual view which simply lists the monitors and the currently measured values
A flame view which produces spiffy flames, the sizes of which are determined by the values of the monitored device
And the applet supports monitoring the following hardware characteristics:
CPU usage (all CPUs, or one at the time) - low-priority background processes such as SETI@home are automatically ignored
Memory usage - cache and buffers are automatically ignored
Swap usage
Load average
Disk usage (or disk space free)
Network throughput (Ethernet, wireless, modem, serial link), either incoming or outgoing or both
Temperatures from internal sensors (e.g. system board and CPU temperatures)
Fan speeds from internal sensors
To avoid eating CPU time when it is scarce, the applet lowers its priority.

software

The complete computer made up of the CPU, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating system. Computer systems fall into two broad divisions: clients and servers. Client machines fall into three categories from low to high end: laptop, desktop and workstation. Servers range from small to large: low-end servers, midrange servers and mainframes.A computer system is sized for the total user workload based on (1) number of users sharing the system simultaneously, (2) type of work performed (interactive processing, batch processing, CAD, engineering, scientific), and (3) amount of storage. Following are the components of a computer system and their significance.PlatformThe hardware platform and operating system determine which programs can run on the computer. Every application is written to run under a specific CPU and operating system environment. The most widely used platform means more software is available for it. See platform.Input/OutputA server's input/output (I/O) capacity determines the number of simultaneous users that it can support at terminals or PCs. See channel.Number of CPUs and CoresThe more CPUs, the more processing that can take place at the same time. High-end servers often contain multiple processors. The CPU chip itself may include more than one processor. See SMT and dual core.Clock SpeedThe megahertz or gigahertz rate of the CPU determines internal processing speed. See MHz.Disk and MemoryA computer system's disk capacity determines the amount of information immediately available to all users. Its memory capacity determines how many applications can be efficiently run at the same time.Fault ToleranceThe use of redundant processors, peripherals and power supplies provide continued operation in the event of component failure. See fault tolerant.

Isnin, 22 Mac 2010

hardware


Hardware Monitor is an application to read out all accessible hardware sensors in Macintosh computers. Currently more than 100 different Macintosh hardware sensors and more than 200 hard drive temperature sensors are supported. The program can visualize the history graphs of the readings, display measured values in a large variety of fashions, or announce readings by speech output. It can also store and export readings. Depending on what sensors are built into your Macintosh system, the following data can be accessed:
Temperarature readings at different locations
Battery data of portable computers
Voltage sensors
Current (amperage) sensors
Fan speed sensors
Sensors for pulse-width controlled fans
Power and load sensors
Ambient light sensors
User-defined artificial sensors to monitor the operating system
Hardware Monitor is electronically distributed software. You can download the product and test it before you decide to purchase an unrestricted usage license.

computer system

A computer is a programmable machine that receives input, stores and manipulates data, and provides output in a useful format.
Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into small pocket devices, and can be powered by a small battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.
The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a netbook to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.

virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.