Preventing Computer - Best Essay Writing Service Reviews Reviews | Get Coupon Or Discount 2016
Free Essays All Companies All Writing Services

Preventing computer

Viruses are self-replicating programs which, without the knowledge of the user, alter the way the computer functions and more often than not look for other computers to attack or infect. Given the advancements in technology and in internet and networking speeds, particularly DSL and cable modem connections. This article entitled, Hack Attack – preventing computer hackers and viruses (Kiplinger’s Personal Finance Magazine June, 2000) discusses the threats associated with high speed connections such as DSL and cable connections and provides methods by which to protect the computers connected this way.

The birth of DSL and cable connections has turned these hook-ups into the “virtual world’s equivalent of an unlocked door. ” Most of the computers attacked or affected this way, were owned by unsuspecting computer owners. This is made possible by the fact that the computer is constantly connected to the ports, which are like doorways for hackers, and are most vulnerable to these attacks as hackers can see thousands of ports simultaneously. The article continues to discuss how attacks by hackers, most especially the proliferation of viruses and other malicious software is made easier because of these constant high speed connections.

The best way to prevent attacks by viruses is to first determine how vulnerable the current system is by virtually, “hacking yourself. ” Once the vulnerabilities in the system have been identified the next step is by protecting the system through the use of fire-walls and anti-virus programs which are available from a host of sites online and also to keep them constantly upgraded as viruses are constantly evolving to bypass the current security measures that have been set in place. CPUS AND SPEED

The computing and processing speeds have increased exponentially over the past few years in accordance with Moore’s Law, which theorizes that computer speeds will just continue increasing as technology allows for more transistors per chip every few months. Over the years, Moore’s Law has been shown to be true and in the July 28, 2006 article of Barbara Grady for the Oakland Tribune entitled “Intel Says Get Set For Faster Computers”, a new breed of even faster processors has been developed. The Core 2 Duo line of microprocessors of Intel are said to be the fastest up to date and are 40% faster than previous models while using 40% less power.

With 65 nanometer processing technology, these new microprocessors have the capacity to hold 291 million transistors in a tiny piece of silicon, roughly the size of a fingernail. These new processors are capable of meeting the growing demands of the market for accessing and showing video on the internet as well as getting access from mobile devices. “This is huge — huge for Intel and huge for the industry,” according to Brookwood, analyst for Insight 64, “this (chip) enables all kinds of smaller devices, and cooler devices and data centers to operate with lower costs,” he said.

“It could enable handheld computers to do serious jobs. ” And for the gamers out there, this chip will greatly heighten every gaming experience, until the next 18 months of course, which Moore’s Law predicts will be the release date for the next faster processor. ETHICS AND RIGHTS ISSUES The ethics and the rights on the internet are uncertain. As this powerful information superhighway is capable of bypassing most if not all the boundaries and is beyond the regulating powers of most governments.

The article of Cindy Emmans in the Spring 2000 issue of Technos: Quarterly for Education and Technology entitled Internet Ethics presents the theory that developing and implementing acceptable policies is the best way of dealing with the issue of internet rights and ethics. The uncertainty of ethics and rights on the internet is brought about by the fact that because of the relative novelty of the internet, there arise certain issues concerning how to regulate the content without infringing upon the rights of people to information and of free speech.

The unadulterated content can turn opinions into hard facts while people with far-flung ideas can easily find an audience and photos, jokes, and drawings of any ilk can be published. The internet has no boundaries and no restrictions save the ability of people to gain access to it. Yet is this new tool something that everyone has a right to and the corresponding responsibilities that are attached with the exercise of such right are largely undetermined. The key, according to this article, lies in the understanding of the internet as both a right and a responsibility.

While everyone should be given a right to access all of the information that is available on the internet, there must be regulations set in place. A prime example is the explicit content contained on internet pornography sites which is just as accessible to children as it is for adults. The authorized government agencies should be allowed to place certain acceptable restrictions on this right to be able to preserve and protect it.

References: VIRUSES Kiplinger’s Personal Finance Magazine June, 2000, Hack Attack – preventing computer hackers and viruses Kimberly Lankford

http://findarticles. com/p/articles/mi_m1318/is_6_54/ai_62496557 CPUS AND SPEED July 28, 2006 article of Barbara Grady for the Oakland Tribune entitled “Intel Says Get Set For Faster Computers” http://findarticles. com/p/articles/mi_qn4176/is_20060728/ai_n16644178 ETHICS AND RIGHTS Cindy Emmans in the Spring 2000 issue of Technos: Quarterly for Education and Technology entitled Internet Ethics http://findarticles. com/p/articles/mi_m0HKV/is_1_9/ai_65014444

Sample Essay of