Thursday, October 12, 2006

Hacker!

A hacker is a person who creates and modifies computer software and computer hardware, including computer programming, administration, and security-related items. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context (see the Hacker definition controversy). Common definitions include:

1. In computer programming, a hacker is a programmer who hacks or reaches a goal by employing a series of modifications to exploit or extend existing code or resources. For some, "hacker" has a negative connotation and refers to a person who "hacks" or uses kludges to accomplish programming tasks that are ugly, inelegant, and inefficient. This negative form of the noun "hack" is even used among users of the positive sense of "hacker".

2. In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. While including those who endeavor to strengthen such mechanisms, it more often is used, especially in the mass media, to refer to those who seek access despite them.

3. In other technical fields, hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill, such as a hardware hacker, or reality hacker.

4. In hacker culture, a hacker is a person who has attained a certain social status and is recognized among members of the culture for commitment to the culture's values and a certain amount of technical knowledge.

Categories of hacker:

The hacker community, the set of people who would describe themselves as hackers or described by others as hackers, falls into at least four partially overlapping categories. Sometimes alternate terms such as "cracker" are used in an attempt to more exactly distinguish which category of hacker is intended, or when attempting to put a contextual distance between the categories due to the Hacker definition controversy.

Hacker: Highly skilled programmer

The positive usage of hacker is one who knows a (sometimes specified) set of programming interfaces well enough to program rapidly and expertly. This type of hacker is well-respected (although the term still carries some of the meaning of hack), and is capable of developing programs without adequate planning or where pre-planning is difficult or impossible to achieve. This zugzwang gives freedom and the ability to be creative against methodical careful progress. At their best, hackers can be very productive. The technical downside of hacker productivity is often in maintainability, documentation, and completion. Very talented hackers may become bored with a project once they have figured out all of the hard parts, and be unwilling to finish off the "details". This attitude can cause friction in environments where other programmers are expected to pick up the half finished work, decipher the structures and ideas, and bullet-proof the code. In other cases, where a hacker is willing to maintain their own code, a company may be unable to find anyone else who is capable or willing to dig through code to maintain the program if the original programmer moves on to a new job.

Additionally, there is sometimes a social downside associated with hacking. The stereotype of a hacker as having gained technical ability at a cost in social ability has historical basis in an uncomfortable amount of factual foundation in many individuals. While not universal, nor even restricted to hackers, the difficulty in relating to others and the often abrasive personalities of some hackers makes some of them difficult to work with or to organize into teams. On the other hand, it is not uncommon for hackers to thrive on social interaction.

Hacker: Computer and network security expert

In the networking sense, a hacker is one who specializes in work with the access control mechanisms for computer and network systems. This includes individuals who work toward maintaining and improving the integrity of such mechanisms. However, the most common usage of hacker in this respect refers to someone who exploits systems or gains unauthorized access by means of clever tactics and detailed knowledge, while taking advantage of any carelessness or ignorance on the part of system operators. This use of hacker as intruder (frequent in the media) generally has a strong negative connotation, and is disparaged and discouraged within the computer community, resulting in the modern Hacker definition controversy.

For such hackers specializing in intrusion, the highly derogatory term script kiddies is often used to indicate those who either claim to have far more skill than they actually have, or who exclusively use programs developed by others to achieve a successful security exploit.

Hacker: Hardware modifier

Another type of hacker is one who creates novel hardware modifications. At the most basic end of this spectrum are those who make frequent changes to the hardware in their computers using standard components, or make semi-cosmetic themed modifications to the appearance of the machine. This type of Hacker modifes his/her computer for performance needs and/or aesthetics. These changes often include adding memory, storage or LEDs and cold cathode tubes for light effects. These people often show off their talents in contests, and many enjoy LAN parties. At the more advanced end of the hardware hackers are those who modify hardware (not limited to computers) to expand capabilities; this group blurs into the culture of hobbyist inventors and professional electronics engineering. An example of such modification includes the addition of TCP/IP Internet capabilities to a number of vending machines and coffee makers during the late 1980s and early 1990s.

Hackers who have the ability to write circuit-level code, device drivers, firmware, low-level networking, (and even more impressively, using these techniques to make devices do things outside of their spec sheets), are typically in very high regard among hacker communities. This is primarily due to the enormous difficulty, complexity and specialized domain knowledge required for this type of work, as well as the electrical engineering expertise that plays a large role. Such hackers are rare, and almost always considered to be wizards or gurus of a very high degree.

Hacker stereotypes

There are theoretical types of hackers who are considered to possess an atypical level of skill beyond that of other meanings of the positive form of "hacker", which include the Guru and the Wizard.

In some portions of the computer community, a Wizard is one who can do anything a hacker can, but elegantly; while a Guru not only can do so elegantly, but instruct those who do not know how. In other sub-communities, a Guru is one with a very broad degree of expertise, while a Wizard is expert in a very narrow field. In practice, such exact distinction are usually more at home in a RPG world, and not often heard in actual conversation.

Within the mainstream media, hackers are often characterised as strange, mysterious, reclusive, and especially tricky. This may be seen as an extension of the human tendency to stigmatise what is ill-understood, which used often to be applied to natural philosophers who were often thought by superstitious neighbours to be wizards or mystics. One such example was Leonardo da Vinci, who was thought to be a necromancer due to his extensive (and extraordinary at that time) knowledge of human anatomy and his study of dead bodies.

About The Author

Ankit Talwar is the owner of http://www.Dead-Yahoo.com. He is a Web Designer.

Article source: www.articlecity.com

Monday, October 09, 2006

Guide to Buying a Webcam

Webcams are those handy little cameras that attach to your PC and send images to a web page that can be viewed by others. This enables you to share daily life events with friends and family in other parts of the country or the world, or to arrange a video-conference with colleagues and maintain long distance relationships of all kinds. Of course the number of ways to use this technology is limited only by your imagination.

Web Cameras

But before you buy a webcam, it pays to understand a little about how the technology of broadcasting images over the Internet works. Of course, if you\'re a full bottle on this already, you can skip this section and go straight to browsing the options on Myshopping.com.au where you can compare products and suppliers, their specifications and prices.

Webcams provide \'real time\' images of people; places and events that can be viewed \'live\' on a web page. The broadcasting end has a camera that captures the images, feeds them into a computer to an ISP and out to viewing pages across the Internet. There are two different types of broadcast: streaming images, where the images are a constant stream downloaded in video format; or Java, where the images are captured at fixed time intervals and refreshed on the web pages at a rate fixed by the broadcaster.

The Applications - What are you intending to broadcast, and to whom?

There is a wide range of uses of webcam technology. Some examples include personal \'Big Brother\' style diaries, sharing of family events, workplace security, video conferencing, virtual tourism, road traffic management, weather watching, event broadcast and a host of others.

Before you make a choice about any webcam equipment, it helps to decide exactly how you want to use the technology, in other words, what you are intending to broadcast. This decision will impact upon the type of camera you use, and how you use it.

A second consideration is, who will be viewing your content? What level of quality is expected? This will help determine the type of camera you use, the software involved and your Internet connection. Of course, your Internet connection may be a limitation on how much you can do.

The requirements for video conferencing are different from the requirements of workplace security, which are different again from the requirements of sharing a family event.

The physical components

There are a number of physical components required to make web cam technology work. At the top of the list is the camera itself. Then, depending on the type of camera you use and the way in which you want to deliver the content to the Internet, you may need to incorporate video capture hardware in your computer. Some software is required to help you process the data, and Internet connection is required and a web page into which the data is fed.

CAMERA CHOICES

Your choice of camera depends somewhat on what you are intending to show. If you need to reach a large public audience yo may want good quality camcorder or megapixel camera that captures high quality images. If it\'s just for seeing who\'s at your front door or keeping an eye on the kids in their playroom, then it may not need to present high quality images. If you are intending to use it outdoors, it will need to be weather proof and you may need to consider sun and UV protection. Available power supply and any robotic requirements for camera movement and focus are extra considerations.

Dedicated webcams

The most basic webcams connect to a PC using a simple USB connection. A wide range of cameras with accompanying software at a range of prices is available for this type of application. Simply search though Myshopping.com.au to compare prices and specifications. Dedicated webcams are simple to install and easy to use, but come with limitations that affect the quality of the images, such as low number of frames per second (refresh rates) and resolution (pixels per inch).

Camcorders and security cameras

Higher quality images and more camera control come from using camcorder and security cameras. To use these devices you will need to add a video capture card to your PC. Once you have that installed however, you can use a wide range of cameras from broadcast cameras to miniature spy cameras. You can include variable lens options, filters for daylight and low light situations, as well as robotic controls for panning and focus adjustments. You can search through Myshopping.com.au for camcorder selections.

Integrated cameras

An integrated camera combines the camera and the optical hardware with a video server, and as such requires no additional software. They can be used in network situations or as stand-alone devices for monitoring progress on a construction project for example.

Megapixel cameras

Network megapixel cameras combine network capability with high quality digital camera technology. These cameras offer excellent quality but this creates large files sizes, therefore they have limited application in constant streaming video. However for interval refreshed archive image collection, they are ideal, providing a constant record and high quality. You can search through Myshopping.com.au for digital camera selections.

SOFTWARE

If you are not using an integrated camera solution, you will need to install an encoding program like Webcaster or MediaCaster to transfer your images to a web page.

At the receiver end, when web surfers browse the internet and wish to view live video on the web for the first time, they will need to download dedicated applications that show the content such as an ActiveX control, Windows Media player, Flash player or the like.

INTERNET CONNECTION

Finally, you need an Internet connection. The hardware you will need may include a modem for dial-up connection, or modem/router for a broadband solution. Naturally the higher the quality you want, or the faster refresh rate you want, the more bandwidth you will need. ADSL (Broadband) is going to offer you the best solution, but keep in mind what your Internet connection when you are making choices of cameras and feeder software.

Webcam applications work well with wireless solutions. Make sure when you are purchasing a camera or network video solution that it is compatible with any wireless system you may be using in a LAN.

Key considerations

The specifications that are variable with webcam applications, and are affected by camera type, web interface and Internet connection, include the number of frames per second and the image resolution.

Frames-per-second is the number of times a still image flashes by in a second to give the appearance of moving pictures. In Australia, the standard television PAL format is at 25 frames per second. A webcam with up to 30 frames per second will show normal video images. But the more frames per second you demand, the more bandwidth, memory and processing power is required.

Resolution is measured the number of pixels per inch. High quality photographs require a high resolution. But the standard for web images is a low 72 dpi. Higher resolution images will not be of any better visual quality, just slower to upload and download.

Use Myshopping.com.au to compare different webcams, camcorders and digital cameras. You can compare the prices and specifications of the different products and brands, and a wide range of reputable vendors.

Andrew Gates
Andrew Gates is a writer for Australian comparison shopping site http://MyShopping.com.au. Smart shoppers can save time, money and effort here. This site serves your need for online shopping and shopping in Australia.

View all articles by Andrew Gates


article source: Articleworld.net

Wednesday, October 04, 2006

What is Cyberstalking?

Protection from Cyberstalking

Computers and the Internet are becoming indispensable parts of America's culture, and cyberstalking is a growing threat.

What is Cyberstalking? Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications. Cyberstalking occurs when electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion. Internet CyberStalking is used to slander and endanger victims, taking on a public rather than private dimension.

Cyberstalking is the term used to describe stalking behavior undertaken by way of computer. Although no universal definition exists, cyberstalking occurs when an individual or group uses the Internet to stalk or harass another. Essentially cyberstalking is the act of stalking using the Internet, e-mail, or other electronic communication devices. Everyone who receives e-mail or uses the Internet is susceptible to cyberstalking.

In order to address cyberstalking, it is critical to understand stalking in general. The fact that cyberstalking does not involve physical contact may create the misperception that it is less threatening or dangerous than physical stalking. In many cases, cyberstalking is simply another phase in an overall stalking pattern, or it is regular stalking behavior using new technological tools. Essentially, cyberstalking is an extension of the physical form of stalking.

The anonymity of online interaction reduces the chance of identification and makes cyberstalking more common than physical stalking. The ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to cyberstalking. Although cyberstalking might seem relatively harmless, it can cause victims psychological and emotional harm, and occasionally leads to actual stalking. More disturbingly, pornographers and pedophiles have begun to use cyberstalking as a way of locating new victims.

It is commonly assumed that cyberstalking is not as serious or harmful as real world stalking. It is true that cyberstalking bears little physical resemblance to traditional stalking methods such as following and loitering.

Cyberstalking is a relatively new phenomenon. The stream of data is sketchy, but some insights into cyberstalking trends are emerging. As with regular stalking, cyberstalking often begins when you attempt to break off a relationship. Anecdotal evidence from law enforcement agencies indicates that cyberstalking is a serious, and growing problem.

While cyberstalking has become a worldwide problem, most cases originate in the United States, making Americans the most vulnerable group of targets. It is estimated that there may potentially be tens or even hundreds of thousands of cyberstalking victims in the United States. A common area regarding cyberstalking is at the "edu" sites, which are educational institutes, such as colleges and universities. While, historically, cyberstalking has mostly been men stalking women, the reverse is happening more often as well.

In many instances, cyberstalking is simply another phase in an overall stalking pattern, or it is regular stalking behavior using new, high-technology tools. Keep a record of contact made (in relation to the cyberstalking event) with website administrators, victim support organizations and law enforcement personnel. Often, cyberstalking ventures offline and the cyberstalker may attempt to track down the victim physically. These things are important because online cyberstalking and bullying is increasing, and further, is grossly underreported.

By the use of new technology and equipment which cannot be policed by traditional methods, cyberstalking has replaced traditional methods of stalking and harassment. The investigation of cyberstalking and other computer crimes can be complex. The lack of adequate statutory authority also can limit law enforcement's response to cyberstalking incidents. Out-of-date and missing account, subscriber, and user information, as well as anonymizing tools, presented problems for law enforcement during cyberstalking investigations.

Copyright 2006 Francesca Black

About The Author

Francesca Black develops educational material for http://www.security-port.com and http://www.security-protection.net a top resource for locating security related RSS feeds.

Article source: Articlecity.com