首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage artists. They take everything from streamlined commercial products to bits of junk as their raw materials, leveraging the development and cost efficiencies of mass production as they modify established technology to serve their needs. Their work often juxtaposes unrelated modules in shotgun marriages, transforming off-the-shelf "lead" into technological "gold." In this special issue, we turn our attention to this positive connotation of the hacker from the perspective of pervasive computing.  相似文献   

3.
4.
5.
The economy's ongoing shift to user-centered innovation has some attractive qualities. Many users are finding it progressively easier to get precisely what they want by designing it for themselves. Innovation by users also provides a necessary complement to and source for novel products sold by producers. Users' innovations also seem to increase the welfare of society.  相似文献   

6.
7.
针对黑客网络攻击的防范措施研究   总被引:1,自引:0,他引:1  
首先阐述了目前计算机网络中存在的安全问题,接着分析了黑客网络攻击的一般过程,并在此基础上针对网络攻击的具体预防措施进行了讨论和分析.  相似文献   

8.
9.
10.
This article focuses on the works of a contemporary best-selling author. Dan Brown's books explore for the general public some important themes in security and privacy and their sensitivity to technological change.  相似文献   

11.
Have you ever tried to penetrate into information systems in the Far East from a remote connection in Hanover, Dubai or Newcastle? It has been done from locations all over Europe and the Middle East, and elsewhere. In 1998 approximately 80% of attacks on sites in the Far East were sourced from foreign locations. A large number of these attacks used domestic sites in an attempt to hide their traces.  相似文献   

12.
13.
《办公自动化》2020,(1):12-12
NVIDIA和苹果的关系一直很糟糕,十几年没有过合作,现在双方的最后一丝关系也破裂了。NVIDIA今天公布了CUDA并行计算开发平台的更新规划说明,其中特别提到,CUDA 10.2(包括工具包和驱动)将是最后一个支持苹果MacOS系统开发、运行CUDA程序的版本,未来CUDA将与苹果平台无关。十多年前,一批采用NVIDIA GPU显卡的苹果MacBook Pro笔记本出现瑕疵.双方为此向客户赔偿了一大笔钱,并且闹得非常不愉快,从此苹果无论笔记本还是台式机,一律只用AMD显卡。  相似文献   

14.
15.
Since its introduction, the Nintendo Wii remote has become one of the world's most sophisticated and common input devices. Combining its impressive capability with a low cost and high degree of accessibility make it an ideal platform for exploring a variety of interaction research concepts. The author describes the technology inside the Wii remote, existing interaction techniques, what's involved in creating custom applications, and several projects ranging from multiobject tracking to spatial augmented reality that challenge the way its developers meant it to be used.  相似文献   

16.
黑客利用计算机网络自身存在的缺陷对计算机进行攻击,使计算机用户深受其害。因而只有采取强有力的安全策略,才能保障计算机的安全。  相似文献   

17.
Compiler Hacking for Source Code Analysis   总被引:1,自引:0,他引:1  
Many activities related to software quality assessment and improvement, such as empirical model construction, data flow analysis, testing or reengineering, rely on static source code analysis as the first and fundamental step for gathering the necessary input information. In the past, two different strategies have been adopted to develop tool suites. There are tools encompassing or implementing the source parse step, where the parser is internal to the toolkit, and is developed and maintained with it. A different approach builds tools on the top of external already-available components such as compilers that output the program abstract syntax tree, or that make it available via an API.This paper discusses techniques, issues and challenges linked to compiler patching or wrapping for analysis purposes. In particular, different approaches for accessing the compiler parsing information are compared, and the techniques used to decouple the parsing front end from the analysis modules are discussed.Moreover, the paper presents an approach and a tool, XOgastan, developed exploiting the gcc/g++ ability to save a representation of the intermediate abstract syntax tree. XOgastan translates the gcc/g++ dumped abstract syntax tree format into a Graph eXchange Language representation, which makes it possible to take advantage of currently available XML tools for any subsequent analysis step. The tool is illustrated and its design discussed, showing its architecture and the main implementation choices made.  相似文献   

18.
19.
In this article, we analyze the complex rationales—both transparent to us and, at times, made visible—underneath the instructional spaces in which we work and teach. To do so, we first situate space analysis in the larger, national conversations about instructional spaces and then through the work of computers and writing scholars. We conclude with an analysis of instructional spaces at our institution. These are spaces specific to our locale, but spaces we think are quite common at most institutions of higher education. Perhaps more importantly, we situate this space analysis on issues these spaces pose—issues of restricted movement, impaired ability to collaborate, sensory disruption, limited leadership ability, and functional/material constraints. We attempt to return to the roots of hacking and to situate hacking as a particular tool for negotiating and, at times, disrupting the assumptions built under, within, and across instructional spaces.  相似文献   

20.
This study presents results of a survey of self-proclaimed computer hackers about their perceptions in regards to illegal hacking. Results show that hackers continue to engage in illegal hacking activities despite the perception of severe judicial punishment. A closer look shows that hackers perceive a high utility value from hacking, little informal sanctions, and a low likelihood of punishment. These perceptions coupled with a high level of moral disengagement partially explain the hacker's illegal behavior.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号