Work of William Fiscus III.

Thursday, March 15, 2012

Author Unknown posted on 2:47 PM in , ,


Evolution of Operating Systems
      Operating Systems have come a long way since the 1940s.  The first generation of computers was literally the size of a classroom, requiring little need for an operating system.  In 1955, the second-generation computers were introduced.  Computers at this time were still very expensive, averaging $200,000. The third-generation computers didn't come along until the mid-1960s. These were designed with faster CPUs. In 1976 the first supercomputer was produced. By the 1980s, computers started using multiple processors, which now required a new type of operating system. In 1990 the Internet became extremely popular, and the 2000s brought the ability of virtualization, the ability to run multiple operating systems on top of a single operating system.
      First-generation computers were literally run by programmers. The way the system was debugged was by literally stopping the machine, adjusting the register, and then restarting the system. Programs could only be edited by its creator due to the fact that the programming language was so unique. Needless to say, at this time the CPU was utilized poorly. By the second-generation, computers could now job schedule which slightly improved efficiency. There was still an imbalance between the CPU and I/O devices, causing extensive time lag. It was common for the CPU to be idle 94% of the time. Eventually I/O devices became faster, and blocking was used, allowing several logical records to group within one physical group. The third-generation brought multiprogramming, which allowed multiple programs to be loaded at once to share the attention of the CPU. Eventually using multiprogramming, operating systems were able to take multiple slices of programs, and feed them into the CPU when needed, greatly increasing efficiency. By the late 1970s virtual memory was now possible, making it so that programs didn't have to reside in the memory to run.
      The operating system pretty much had to step up its role in the computer system as soon as virtual memory became possible. Because of the increase of efficiency, to get the most out of the computer, operating systems now, not only had to control the subsystem manager and devices, but had to do it both user-friendly and efficiently. By the 90s, the Internet boom brought networking. Operating systems now had the ability to use remote desktop capabilities, or control other computers without physically being at the computer. Today, in 2012, we have the ability to use virtualization, which allows us to run multiple operating systems, such as Linux, on top of our main operating system, allowing a number of possibilities. Just the thought of that alone, is enough evidence to show how drastically operating systems have been improved in just 50 to 60 years.
Author Unknown posted on 1:54 PM in ,
LinkedIn is a hacker's dream tool 

        According to (Cowely, 2012), LinkedIn is literally a hacker's dream tool. LinkedIn is pretty much a social networking website for business professionals. (Cowely, 2012) tells how much help LinkedIn actually gives a hacker in terms of infiltrating even the wealthiest companies today. They do so by creating fake profiles to connect with employees of targeted companies. They learn certain details of the companies, such as the names of all employees, then send fake legitimately looking e-mails containing attachments the employees then open. Hackers also collect connections and then re-sell them to others for payments via pay pal.

      In my opinion that's genius. That would totally work. I, myself, personally never created a LinkedIn profile, and never really knew what the point of it was. I just knew it was pretty much equivalent to Facebook, only more professional based. I think it's very interesting that, despite all the caution signs newscasters put on the emphasis of sharing on Facebook, a flaw this big is even possibly existing; let alone in the professional world. I mean, aren't these companies supposed to be on the top of their game? It is understandable that fake employee profiles created on LinkedIn could possibly be accepted into the LinkedIn company networks due to the size of these companies, but I don't see how they could be so far out of the communication loop to actually break the number one rule of online safety, opening an unexpected, unrecognized attachment file via E-MAIL! I mean seriously though, that's like getting an e-mail asking for your full name, address, SSN, and CC info.

      (Cowely, 2012) does say hackers have the ability to easily mask e-mail addresses, and because they are able to connect via LinkedIn, they know which e-mail addresses to pretend to be, but if the e-mail address is convincing enough to the victim, you would think that the e-mail address would have to be one from the same department of the victim, which would mean there would have to be verbal communication at some point. If a strange attachment is never verbally mentioned, you would think it would at least be confirmed first. I guess what I'm getting at is companies are also at fault for this vulnerability in which LinkedIn creates. Although after reading (Cowely, 2012) LinkedIn seems completely flawed, the website in my opinion only put forth a potentially effective networking resource for professionals everywhere. These companies are the ones failing to take precautions to protect their businesses. Thus making LinkedIn a must have resource in a hacker's toolkit. 

 
Cowely, S. (2012, March 12). Linkedin is a hacker. CNN Money. Retrieved from http://money.cnn.com/2012/03/12/technology/linkedin-hackers/index.htm
Author Unknown posted on 11:11 AM in
Google yourself... you'll find a lot more than you may think... right off the bat I found an old newspaper article from my football days... 

William Fiscus III 2015. Powered by Blogger.

Popular Posts