Thursday, October 12, 2006

Hacker!

A hacker is a person who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context (see the Hacker definition controversy). Common definitions include:

1. In computer programming, a hacker is a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This negative form of the noun "hack" is even used among users of the positive sense of "hacker".

2. In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it more often is used, especially in the mass media, to refer to those who seek access despite them.

3. In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker, or reality hacker.

4. In hacker culture, a hacker is a person who has attained a certain social status and is recognized among members of the culture for commitment to the culture's values and a certain amount of technical knowledge.

Categories of hacker:

The hacker community, the set of people who would describe themselves as hackers or described by others as hackers, falls into at least four partially overlapping categories. Sometimes alternate terms such as "cracker" are used in an attempt to more exactly distinguish which category of hacker is intended, or when attempting to put a contextual distance between the categories due to the Hacker definition controversy.

Hacker: Highly skilled programmer

The positive usage of hacker is one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly. This type of hacker is well-respected (although the term still carries some of the meaning of hack), and is capable of developing programs without adequate planning or where pre-planning is difficult or impossible to achieve. This zugzwang gives freedom and the ability to be creative against methodical careful progress. At their best, hackers can be very productive. The technical downside of hacker productivity is often in maintainability, documentation, and completion. Very talented hackers may become bored with a project once they have figured out all of the hard parts, and be unwilling to finish off the "details". This attitude can cause friction in environments where other programmers are expected to pick up the half finished work, decipher the structures and ideas, and bullet-proof the code. In other cases, where a hacker is willing to maintain their own code, a company may be unable to find anyone else who is capable or willing to dig through code to maintain the program if the original programmer moves on to a new job.

Additionally, there is sometimes a social downside associated with hacking. The stereotype of a hacker as having gained technical ability at a cost in social ability has historical basis in an uncomfortable amount of factual foundation in many individuals. While not universal, nor even restricted to hackers, the difficulty in relating to others and the often abrasive personalities of some hackers makes some of them difficult to work with or to organize into teams. On the other hand, it is not uncommon for hackers to thrive on social interaction.

Hacker: Computer and network security expert

In the networking sense, a hacker is one who specializes in work with the access control mechanisms for computer and network systems. This includes individuals who work toward maintaining and improving the integrity of such mechanisms. However, the most common usage of hacker in this respect refers to someone who exploits systems or gains unauthorized access by means of clever tactics and detailed knowledge, while taking advantage of any carelessness or ignorance on the part of system operators. This use of hacker as intruder (frequent in the media) generally has a strong negative connotation, and is disparaged and discouraged within the computer community, resulting in the modern Hacker definition controversy.

For such hackers specializing in intrusion, the highly derogatory term script kiddies is often used to indicate those who either claim to have far more skill than they actually have, or who exclusively use programs developed by others to achieve a successful security exploit.

Hacker: Hardware modifier

Another type of hacker is one who creates novel hardware modifications. At the most basic end of this spectrum are those who make frequent changes to the hardware in their computers using standard components, or make semi-cosmetic themed modifications to the appearance of the machine. This type of Hacker modifes his/her computer for performance needs and/or aesthetics. These changes often include adding memory, storage or LEDs and cold cathode tubes for light effects. These people often show off their talents in contests, and many enjoy LAN parties. At the more advanced end of the hardware hackers are those who modify hardware (not limited to computers) to expand capabilities; this group blurs into the culture of hobbyist inventors and professional electronics engineering. An example of such modification includes the addition of TCP/IP Internet capabilities to a number of vending machines and coffee makers during the late 1980s and early 1990s.

Hackers who have the ability to write circuit-level code, device drivers, firmware, low-level networking, (and even more impressively, using these techniques to make devices do things outside of their spec sheets), are typically in very high regard among hacker communities. This is primarily due to the enormous difficulty, complexity and specialized domain knowledge required for this type of work, as well as the electrical engineering expertise that plays a large role. Such hackers are rare, and almost always considered to be wizards or gurus of a very high degree.

Hacker stereotypes

There are theoretical types of hackers who are considered to possess an atypical level of skill beyond that of other meanings of the positive form of "hacker", which include the Guru and the Wizard.

In some portions of the computer community, a Wizard is one who can do anything a hacker can, but elegantly; while a Guru not only can do so elegantly, but instruct those who do not know how. In other sub-communities, a Guru is one with a very broad degree of expertise, while a Wizard is expert in a very narrow field. In practice, such exact distinction are usually more at home in a RPG world, and not often heard in actual conversation.

Within the mainstream media, hackers are often characterised as strange, mysterious, reclusive, and especially tricky. This may be seen as an extension of the human tendency to stigmatise what is ill-understood, which used often to be applied to natural philosophers who were often thought by superstitious neighbours to be wizards or mystics. One such example was Leonardo da Vinci, who was thought to be a necromancer due to his extensive (and extraordinary at that time) knowledge of human anatomy and his study of dead bodies.

About The Author

Ankit Talwar is the owner of http://www.Dead-Yahoo.com. He is a Web Designer.

Article source: www.articlecity.com

Monday, October 09, 2006

Guide to Buying a Webcam

Webcams are those handy little cameras that attach to your PC and send images to a web page that can be viewed by others. This enables you to share daily life events with friends and family in other parts of the country or the world, or to arrange a video-conference with colleagues and maintain long distance relationships of all kinds. Of course the number of ways to use this technology is limited only by your imagination.

Web Cameras

But before you buy a webcam, it pays to understand a little about how the technology of broadcasting images over the Internet works. Of course, if you\'re a full bottle on this already, you can skip this section and go straight to browsing the options on Myshopping.com.au where you can compare products and suppliers, their specifications and prices.

Webcams provide \'real time\' images of people; places and events that can be viewed \'live\' on a web page. The broadcasting end has a camera that captures the images, feeds them into a computer to an ISP and out to viewing pages across the Internet. There are two different types of broadcast: streaming images, where the images are a constant stream downloaded in video format; or Java, where the images are captured at fixed time intervals and refreshed on the web pages at a rate fixed by the broadcaster.

The Applications - What are you intending to broadcast, and to whom?

There is a wide range of uses of webcam technology. Some examples include personal \'Big Brother\' style diaries, sharing of family events, workplace security, video conferencing, virtual tourism, road traffic management, weather watching, event broadcast and a host of others.

Before you make a choice about any webcam equipment, it helps to decide exactly how you want to use the technology, in other words, what you are intending to broadcast. This decision will impact upon the type of camera you use, and how you use it.

A second consideration is, who will be viewing your content? What level of quality is expected? This will help determine the type of camera you use, the software involved and your Internet connection. Of course, your Internet connection may be a limitation on how much you can do.

The requirements for video conferencing are different from the requirements of workplace security, which are different again from the requirements of sharing a family event.

The physical components

There are a number of physical components required to make web cam technology work. At the top of the list is the camera itself. Then, depending on the type of camera you use and the way in which you want to deliver the content to the Internet, you may need to incorporate video capture hardware in your computer. Some software is required to help you process the data, and Internet connection is required and a web page into which the data is fed.

CAMERA CHOICES

Your choice of camera depends somewhat on what you are intending to show. If you need to reach a large public audience yo may want good quality camcorder or megapixel camera that captures high quality images. If it\'s just for seeing who\'s at your front door or keeping an eye on the kids in their playroom, then it may not need to present high quality images. If you are intending to use it outdoors, it will need to be weather proof and you may need to consider sun and UV protection. Available power supply and any robotic requirements for camera movement and focus are extra considerations.

Dedicated webcams

The most basic webcams connect to a PC using a simple USB connection. A wide range of cameras with accompanying software at a range of prices is available for this type of application. Simply search though Myshopping.com.au to compare prices and specifications. Dedicated webcams are simple to install and easy to use, but come with limitations that affect the quality of the images, such as low number of frames per second (refresh rates) and resolution (pixels per inch).

Camcorders and security cameras

Higher quality images and more camera control come from using camcorder and security cameras. To use these devices you will need to add a video capture card to your PC. Once you have that installed however, you can use a wide range of cameras from broadcast cameras to miniature spy cameras. You can include variable lens options, filters for daylight and low light situations, as well as robotic controls for panning and focus adjustments. You can search through Myshopping.com.au for camcorder selections.

Integrated cameras

An integrated camera combines the camera and the optical hardware with a video server, and as such requires no additional software. They can be used in network situations or as stand-alone devices for monitoring progress on a construction project for example.

Megapixel cameras

Network megapixel cameras combine network capability with high quality digital camera technology. These cameras offer excellent quality but this creates large files sizes, therefore they have limited application in constant streaming video. However for interval refreshed archive image collection, they are ideal, providing a constant record and high quality. You can search through Myshopping.com.au for digital camera selections.

SOFTWARE

If you are not using an integrated camera solution, you will need to install an encoding program like Webcaster or MediaCaster to transfer your images to a web page.

At the receiver end, when web surfers browse the internet and wish to view live video on the web for the first time, they will need to download dedicated applications that show the content such as an ActiveX control, Windows Media player, Flash player or the like.

INTERNET CONNECTION

Finally, you need an Internet connection. The hardware you will need may include a modem for dial-up connection, or modem/router for a broadband solution. Naturally the higher the quality you want, or the faster refresh rate you want, the more bandwidth you will need. ADSL (Broadband) is going to offer you the best solution, but keep in mind what your Internet connection when you are making choices of cameras and feeder software.

Webcam applications work well with wireless solutions. Make sure when you are purchasing a camera or network video solution that it is compatible with any wireless system you may be using in a LAN.

Key considerations

The specifications that are variable with webcam applications, and are affected by camera type, web interface and Internet connection, include the number of frames per second and the image resolution.

Frames-per-second is the number of times a still image flashes by in a second to give the appearance of moving pictures. In Australia, the standard television PAL format is at 25 frames per second. A webcam with up to 30 frames per second will show normal video images. But the more frames per second you demand, the more bandwidth, memory and processing power is required.

Resolution is measured the number of pixels per inch. High quality photographs require a high resolution. But the standard for web images is a low 72 dpi. Higher resolution images will not be of any better visual quality, just slower to upload and download.

Use Myshopping.com.au to compare different webcams, camcorders and digital cameras. You can compare the prices and specifications of the different products and brands, and a wide range of reputable vendors.

Andrew Gates
Andrew Gates is a writer for Australian comparison shopping site http://MyShopping.com.au. Smart shoppers can save time, money and effort here. This site serves your need for online shopping and shopping in Australia.

View all articles by Andrew Gates


article source: Articleworld.net

Wednesday, October 04, 2006

What is Cyberstalking?

Protection from Cyberstalking

Computers and the Internet are becoming indispensable parts of America's culture, and cyberstalking is a growing threat.

What is Cyberstalking? Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. Cyberstalking occurs when electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion. Internet CyberStalking is used to slander and endanger victims, taking on a public rather than private dimension.

Cyberstalking is the term used to describe stalking behavior undertaken by way of computer. Although no universal definition exists, cyberstalking occurs when an individual or group uses the Internet to stalk or harass another. Essentially cyberstalking is the act of stalking using the Internet, e-mail, or other electronic communication devices. Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking.

In order to address cyberstalking, it is critical to understand stalking in general. The fact that cyberstalking does not involve physical contact may create the misperception that it is less threatening or dangerous than physical stalking. In many cases, cyberstalking is simply another phase in an overall stalking pattern, or it is regular stalking behavior using new technological tools. Essentially, cyberstalking is an extension of the physical form of stalking.

The anonymity of online interaction reduces the chance of identification and makes cyberstalking more common than physical stalking. The ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to cyberstalking. Although cyberstalking might seem relatively harmless, it can cause victims psychological and emotional harm, and occasionally leads to actual stalking. More disturbingly, pornographers and pedophiles have begun to use cyberstalking as a way of locating new victims.

It is commonly assumed that cyberstalking is not as serious or harmful as real world stalking. It is true that cyberstalking bears little physical resemblance to traditional stalking methods such as following and loitering.

Cyberstalking is a relatively new phenomenon. The stream of data is sketchy, but some insights into cyberstalking trends are emerging. As with regular stalking, cyberstalking often begins when you attempt to break off a relationship. Anecdotal evidence from law enforcement agencies indicates that cyberstalking is a serious, and growing problem.

While cyberstalking has become a worldwide problem, most cases originate in the United States, making Americans the most vulnerable group of targets. It is estimated that there may potentially be tens or even hundreds of thousands of cyberstalking victims in the United States. A common area regarding cyberstalking is at the "edu" sites, which are educational institutes, such as colleges and universities. While, historically, cyberstalking has mostly been men stalking women, the reverse is happening more often as well.

In many instances, cyberstalking is simply another phase in an overall stalking pattern, or it is regular stalking behavior using new, high-technology tools. Keep a record of contact made (in relation to the cyberstalking event) with website administrators, victim support organizations and law enforcement personnel. Often, cyberstalking ventures offline and the cyberstalker may attempt to track down the victim physically. These things are important because online cyberstalking and bullying is increasing, and further, is grossly underreported.

By the use of new technology and equipment which cannot be policed by traditional methods, cyberstalking has replaced traditional methods of stalking and harassment. The investigation of cyberstalking and other computer crimes can be complex. The lack of adequate statutory authority also can limit law enforcement's response to cyberstalking incidents. Out-of-date and missing account, subscriber, and user information, as well as anonymizing tools, presented problems for law enforcement during cyberstalking investigations.

Copyright 2006 Francesca Black

About The Author

Francesca Black develops educational material for http://www.security-port.com and http://www.security-protection.net a top resource for locating security related RSS feeds.

Article source: Articlecity.com

Thursday, September 28, 2006

Investing Time and Effort in Photoshop Training

Novices often balk at the complexity of Adobe Photoshop. To the inexperienced user its greatest advantage – the mindboggling range of options – becomes its biggest drawback. However, for those who are willing to persevere through the Photoshop training necessary to become proficient in the basics – and a little training is required, believe me – the benefits of this vast array of options will soon become apparent.

You see, that’s the thing about Photoshop (and most image editing software, generally). What seems maddeningly complex from the outside becomes much simpler, almost intuitive, once the user has invested a little time and effort in training – the tutorials, tips and tricks and good old trial and error.

So, here is your situation: you’ve spent a little time getting a good hold on the basics of Photoshop. You can comfortably manipulate an image and produce a fairly good result. Not fantastic, but acceptable. The choice you now face is this: either sit back and rely on your current skill level - continuing to produce ‘acceptable’ results - or forge ahead with your training, mastering the finer points and advanced options of the software until you are capable of producing excellent work. Not just acceptable, but exceptional.

Whether you’re working in the creative industries or just editing images for your own enjoyment, if a job’s worth doing it’s worth doing right. The skills you’ll learn through advanced training in Photoshop will pay dividends far into the future, and right now you’re standing in the doorway to creative freedom.

About The Author

Frank Monty is the owner of Photoshop Talent. You can find more articles at http://www.photoshoptalent.com.

Article source: www.articlecity.com

Friday, September 22, 2006

What is HDTV?

By Kamal Kannan

"High Definition Television" is an international digital TV standard aired in 16:9 format (4:3 for normal TVs) and in Dolby Digital surround sound.Viewers get clear contoured shows with vibrant colors and a wider depth-of-field compared to normal systems.HDTV has up to five times the number of pixels on standard PALs used now. In America and Japan,films and series are aired via HDTV offered by Pay-TV stations.

What kind equipment is needed? The rule is digital data transfer.You won't be able to capture HDTV signals with the old antenna perched at the top of your roof.At first,HDTV signals were aired through satellite,but now it can also be done thourgh cable.It's yet to be determined whether HDTV can be recieved through a DVB-T (Digital Video Broadcasting).It might not work as transfer signals of HDTV are fairly complex for DVB-T to handle.

When was HDTV born? In the early Nineties,HDTV was suggested as TV standard in Europe under the project D2-MAC.However,the proposal failed as data transfer then was still analog.Equipment like recievers and display systems weren't ready as well.The first TV station in Europe to air a HDTV program in full was "HD1"(www.hd-1.tv ) in belguim.The station started on January 1,2004 under the name "Euro 1080" and broadcasted through the Astra satellite.

Can HDTV be recieved only through satellite? Analog equipment cannot be used.A HDTV display should support the 16:9 format and a resolution up to 1,280 x 720 pixels.To avoid purchasing wrong displays,look for the "HD ready" sticker which guarantees compatibility.Also,a HDTV reciever (approx 400 Euro) is required.If you're not "HDTV ready",you may still watch PAL shows which are broadcasted parallel to HDTV by TV stations.

720p or 1080i,which is better? On PAL,resolution are at 576 (vertical) x 720 (horizontal) rows.Currently,for HDTV,two general resolutions are used - the 720 x 1,280 and 1,080 x 1,920.There are ongoing debates as to which one is better of the two but no conclusion has been drawn yet.So the probable format is still up to market selection.On PAL,HDTV 1080i is broadcasted in half-pictures whereas 720p is in the full picture format.720p exudes a soothing image,but 1080i has a better and clearer resolution.

When to migrate? There's no doubt that HDTV would be replacing PAL.It's only a matter of time before that happens.Prices are now still steep with equipment costing up to thousands of dollars just for a standard display and reciever.However,manufacturers are introducing newer models by the month,therefore providing consumers with more competitive prices.If you only watch news or game shows on TV,then migrating to HDTV might not be feasible,but if you're a movie or sports fan,then HDTV is the way to go.

Why haven't many TV stations adopted HDTV? Not many own a HDTV setup.Besides that,many station are wary due to higher cost involved,especially for producing their own programs in HDTV.Also,production equipment like high-end video cameras etc would be a necessity.Face makeup needs to be near-prefect as every little wrinkle would be visible.It's estimated that each HDTV airing would incur an extra 25 percent cost.However,experts say that most of Europe will be airing their programmes in HDTV format by the year 2008.

Can HDTV films be recorded? The film industry is trying to equip all HDTV format files with HDCP copy protection.This way,HDTV programmes can only be watched and not recorded.However,this restraint has already been penetrated by a Korean-made minibox called "DVIHDCP".It changes the protected signal into VGA format hence allowing it to be copied.In truth,the minibox was not designed specifically to hijack the copy-protection plan,but was instead used to display HDTV through a beamer/projector.

Article Source: http://EzineArticles.com/?expert=Kamal_Kannan

Thursday, September 21, 2006

How to Download iPod Movies in 10 Easy Steps

By R Welch


The invention of the iPod makes it easier than ever to take along your favorite media. Whether you're interested in movies, TV shows, music videos, or sporting events you can now take all your programs with you. The iPod is one of the best portable media devices to come along in years.

One frequently asked question is how to download iPod movies to the device for viewing at a later time or on a later date. Your first objective should be to join a network that allows you to download movies to your iPod. There are many networks across the internet that sell iPod movie download subscriptions. Generally speaking, you will get the best value for your money if you can find a network that allows you unlimited iPod movie downloads for a one-time subscription price. Beware of the websites that ask for a sign up fee, then also hit you with a fee for every movie you download. If you love to download iPod movies, the download fees can add up quickly.

Once you have your network account set up, just follow these 10 easy steps to download movies to your iPod.

1. Browse your chosen iPod subscription network for the movie, video or sporting event you want to download.

2. Once you find the desired movie, you should be able to click the video's title, image thumbnail or download button.

3. Look for the 'Video iPod/Sony PSP' option in the drop-down menu. It should appear on the video's playback page. Please be aware that you can only download the movie if your iPod has video capabilities.

4. Choose 'Video iPod/Sony PSP' from the drop-down menu and then click download.

5. Save the movie or video on your computer in a location you will remember.

6. Now you can connect your iPod to your computer.

7. Open the Apple iTunes application. Select 'Add File to Library' from the 'File' menu in the iTunes application. Browse your computer for the video you previously downloaded and click 'Open.'

8. click 'Edit,' then click 'Preferences in the iTunes application. Next, click the 'iPod' tab, then click 'Videos,' and then 'Automatically update all videos.' Lastly, you should click 'OK.'

9. The iTunes application will copy the movie to your iPod automatically.

10. To play back your movie on your iPod, click 'Videos,' then click 'Movies'.

That was the down and dirty, quick lesson on how to download iPod movies. A good source of helpful information should be the user's manual that came with your iPod or customer support from the maufacturer. The best sources of helpful information are friends who already own an iPod and have some experience with the device. They can also help you learn how to download IPod movies for your enjoyment.

Find and download Movies, Music and your favorite TV series (even old-time favorites), get full episodes and seasons of the hottest shows around! Download iPod Movies and get a free Mp3 player with your subscription.

Things You Need To Know About Adaware Download

The only problem with free adaware download software is that it does not protect your computer. Although it will delete spyware which has effected it, it will not stop the infection from occurring in the first place. To do that, you need to buy the adaware professional version, which is quite cheap, but still not free like the other one. If you do a lot of web surfing, it might be a worthy investment, but for my needs, the free adaware download software does the job quite well. I just need to remember to run a quick scan every couple of days, and it will catch any spyware, web diverters, malware, and other common junk slowing down your computer.

I got an adaware download when I noticed that my computer was running much slower than it should. Before I downloaded adaware, I was getting a ridiculous amount of pop-up ads as well, and my web-browser would crash every few minutes. I couldn't understand what was going on. Was something wrong with my hard drive, I wondered? Was this a windows problem? Once I found out that a free adaware download was what I needed, my life quickly got much easier.

The adaware download went easily and smoothly. There were mirror sites all over the country, so it was no trouble to find an adaware download site close enough to provide a quick response. And installing the adaware download software was equally simple. Just click on it, and it runs itself! And not only was the adaware software free, but it was free with professional level service. Every week or so, there is a new adaware download update made to defend against the latest spyware.

Of course, along with an adaware download, you really need to an anti-virus program to fully protect your computer. An adaware download will go part of the way to protecting it from malware, but that stuff is merely annoying. Although spyware can slow down your computer, unless you are very unlucky it will seldom do anything to really mess it up. There are some versions which can be used to hack into your computer, but these are best caught by the anti-virus anyway. An anti-virus program can protect your computer from the really malicious bugs, in the same way that an anti-spyware program can protect it from the stuff which is merely annoying.

This article is written by
Paul I. Etkin. You can view the original article at www.articlecity.com

Video Games: They Way We Where

Video games have been around for more years than most people know. Most people today can remember the Pac-Man, Pac-Woman era. In reality video games have been in our daily lives for far longer than that. In fact one of the first video games on record goes back to 1947, where the first ever patent was filed in January of that year and that patent was issued in December 1948. Little did we know that this would come to be one of the hottest commodities to hit the American and International markets. One of the earliest video games was created by the same man who developed the atomic bomb.

In the 50’s and 60’s a video was being patented to run on computers. This became a reality, the problem was that little was known about computers and they were so expensive that few people had them, and this program was run on a platform called oscilloscopes, which was a piece of electronic equipment that could show two dimensional graphs. These were located at colleges and universities.

The 70’s brought about new developments in the video industry. In 1972 a patent was granted for the release of a home video console. In was large and bulky, but it satisfied the video game demands of the gaming public. Later, in the 70’s and early 80’s, along came the development and release of Atari. This lasted for only a few short years, when the video market took a big dive. The reason for this was that there were so many entities producing these video games (most of which were the same game) that the market became flooded. The industry had really gone stale, because how many versions of the same video game can there be. One just seemed to be an updated version of the other. The public became bored with this and needed something fresh and new.

In 1989 the market once again had a new video game gadget, Nintendo Game Boy. This was new and exciting and the games were different, challenging and, best of all, you could take it with you wherever you went. There were several competitors who put their video games on the market by this time, but even today Game Boy seems to be the best selling hand held video game and console.

The 1990’s came alive with new and improved versions of consoles for video games. Nintendo was overtaken by the newcomer, Sony’s Play Station. The public went wild and now anyone who had the Nintendo switched and had to have a Play Station, with more bells and whistles than had been seen before.

Up until now all video games had been developed for computer type consoles, hand held consoles and computers. 2003 saw a new direction come to life with the development of video games on cellular phones, this came from none other that Nokia.

The video game industry has evolved into a multi-million dollar industry today. Almost every person in the world has at one time or another in their life either played a video game, whether it be on the old oscilloscopes, coin operated consoles, hand held consoles, home computers or the cell phone. It is an industry that is growing by leaps and bounds on a daily bases.

This article is written by Taisha Grant. View the original article at www.articlecity.com