Friday, January 13, 2012

Programming Language Research

a.   Define the language-What is it? who uses it? what is used for?
C# is an advanced shoot off of C++,  Java and several other Object Oriented Languages. It is and a tool for a general use by programmers that is capable of creating application for anything from games to operating systems.
b.    Who developed the language?
Microsoft developed the first version of C# in 2000 because Sun Microsystems wouldn’t allow Microsoft to make changes to Java.
c.   Is the language typically used on micro, mini, or mainframe computers?
I suspect C# is typically used on mainframe computer, mini and micro computers. It was designed for Microsoft’s .NET Framework which is vaguely described as a software framework, or a platform for designing and running web applications. Because of this C# is compatible on many different computers fro optimal user.
d.   Share an online tutorial for us to better understand how to write code in this programming language.
e.   Show us what the language looks like.
public class GenericList<T>
{
    void Add(T input) { }
}

class TestGenericList
{
    private class ExampleClass { }
    static void Main()
    {
        // Declare a list of type int.
        GenericList<int> list1 = new GenericList<int>();

        // Declare a list of type string.
        GenericList<string> list2 = new GenericList<string>();

        // Declare a list of type ExampleClass.
        GenericList<ExampleClass> list3 = new GenericList<ExampleClass>();
    }

Friday, September 16, 2011

unethical computer use




excerpt from "Ghost in the Wires" by Kevin Mitnik:




"We’re told that our medical records are confidential, shared only when we give specific permission. But the truth is that any federal agent, cop, or prosecutor who can convince a judge he has legitimate reason can walk into your pharmacy and have them print out all of your prescriptions and the date of every refill.Scary.


We’re also told that the records kept on us by government agencies — Internal Revenue Service, Social Security Administration, the DMV of any particular state, and so on — are safe from prying eyes. Maybe they’re a little safer now than they used to be — though I doubt it — but in my day, getting any information I wanted was a pushover.


I compromised the Social Security Administration, for example, through an elaborate social engineering attack. It began with my usual research—the various departments of the agency, where they were located, who the supervisors and managers were for each, standard internal lingo, and so on. Claims were processed by special groups called “Mods,” which I think stood for “modules,” each one perhaps covering a series of Social Security numbers. I social engineered the phone number for a Mod and eventually reached a staff member who told me her name was Ann. I told her I was Tom Harmon, in the agency’s Office of the Inspector General.


I said, “We’re going to be needing assistance on a continuing basis,” explaining that while our office was working on a number of fraud investigations, we didn’t have access to MCS — short for “Modernized Claims System,” the amusingly clumsy name for their centralized computer system.


From the time of that initial conversation, we became telephone buddies. I was able to call Ann and have her look up whatever I wanted — Social Security numbers, dates and places of birth, mother’s maiden names, disability benefits, wages, and so on. Whenever I phoned, she would drop whatever she was doing to look up anything I asked for.


Ann seemed to love my calls. She clearly enjoyed playing deputy to a man from the Inspector General’s Office who was doing these important investigations of people committing fraud. I suppose it broke the routine of a mundane, plodding workday. She would even suggest things to search: “Would knowing the parents’ names help?” And then she’d go through a series of steps to dig up the information.


On one occasion, I slipped, asking, “What’s the weather like there today?”


But I supposedly worked in the same city she did. She said, “You don’t know what the weather is!?”


I covered quickly. “I’m in LA today on a case.” She must have figured, Oh, of course — he has to travel for his work.


We were phone buddies for about three years, both enjoying the banter and the sense of accomplishment."






My Thoughts:


The actions Kevin Mitnik did alone in this hacking scheme is totally off the charts for inappropriate in terms of the ten computer commandments. He broke rules 2,3,5,7,and 10 all at once. And during his 20 year career of hack broke every rule on that list many, many times. And for his actions he eventually spent 5 years in jail.

The Memristor

It's not often that a fundamental tech breakthrough has the potential to change how we compute. Nearly 37 years after it was first described in a series of mathematical equations, researchers at HP Labs proved that the fourth fundamental element of electronic circuitry is for real. The "memristor," or memory transistor, now joins the three other widely known elements: the capacitor, the resistor and the inductor.


The discovery will make it possible to develop computer systems that remember what's stored in memory when they are turned off. That means computers that don't need to be booted up and systems that are far more energy efficient than the current crop. Researchers also hope the memristor can help develop a new kind of computer memory that can supplement or ultimately replace dynamic random access memory, or DRAM — the type of memory used in personal computers.


Outlook: Memristors are still primarily confined to the lab, so don't expect commercial products based on this kind of circuitry for at least five years.






My Thoughts:


This invention could change the world. If this product made it to the market, the field of computer science would accelerate computer growth even faster. The main up side of this resistor is that it can store memory when off, so it could mean that a computer session could be suspended in these resistors memory and the computer turned off, then in a second leap back into full power when the power button is pressed and resume just like it was sleeping. The two would become indistinguishable. No more waiting 3 minutes for your computer to turn off and load every file all over again. Just instantly resume.