Tuesday, 22 January 2013

Copyright

Copyright

  • It is a legal concept, enacted by most governments, giving the creator of an original work exclusive right to it, usually for a limited time.
  • It is distinct from other forms of creator protection such as Patents, which give inventors exclusive rights over use of their inventions, and Trademarks, which are legally protected words or symbols or certain other distinguishing features that represent products or services.
  • It refers to laws that regulate the use of the work of a creator, such as an artist or author.




Source: http://en.wikipedia.org/wiki/Copyright
             http://legal-dictionary.thefreedictionary.com/copyright
             http://graphicdesign.about.com/od/legalglossary/g/copyright.html

Monday, 21 January 2013

IPR


Intellectual Property Rights


  • A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for intellectual property is to encourage innovation without the fear that a competitor will steal the idea and / or take the credit for it.

  • It refers to the general term for the assignment of property rights through patents, copyrights and trademarks. These property rights allow the holder to exercise a monopoly on the use of the item for a specified period.



Source: http://stats.oecd.org/glossary/detail.asp?ID=3236
              http://www.businessdictionary.com/definition/intellectual-property-rights.html


Wednesday, 16 January 2013

Plagiarism



Plagiarism

Plagiarism is a form of cheating, but it's a little complicated so a kid might do it without understanding that it's wrong. Plagiarism is defined in dictionaries as the "wrongful appropriation," "close imitation," or "purloining and publication" of another author's "language, thoughts, ideas, or expressions," and the representation of them as one's own original work, but the notion remains problematic with nebulous boundaries.

Five Unethical Uses of Computers

  • Pornography

·         Distribution and use of pornography has been greatly facilitated with the use of the computer. Not only is the use of adult pornography widespread with the use of computers, but so is child pornography. Child pornography is one of the most, if not the most, unethical uses of the computer today.

  • Cyber-bullying

·         Bullying online is another form of unethical computer use. It is widespread and getting increasing coverage in the media as it becomes a larger problem. Sitting in front of a computer screen takes away the need to bully and harass someone in person and thus makes even worse actions and harassment possible. Additionally, the use of social networking on the computer as a tool for cyber-bullying is growing.

  • Plagiarism

·         Plagiarism is another unethical use of the computer. By going online, it is becoming increasingly easy to find material for plagiarism. The computer also facilitates writing articles through plagiarism by the use of writing programs and simply copying and pasting the words onto a document and taking credit for the work.

  • Cheating

·         Cheating in relationships is made easier through social networking online or the use of emails. Everything is password protected, making users able to be unfaithful in their relationships and even engage in cyber sex without anyone catching on.
Identity Theft
·         Theft of someone's identity is facilitated by the computer, making it yet another unethical use. If criminals are knowledgeable enough at computer hacking, then it is easy for them to gain access to the personal and financial information of other people and proceed in stealing their identity and ruining their lives.








Source: http://www.ehow.com/info_7806377_five-unethical-uses-computers.html








Tuesday, 4 December 2012

Computer Ethics


Computer Ethics

Hacker

A Hacker is somebody who finds weaknesses in a computer or computer network and exploits them through a process called penetration or penetration testing (depending on the motive). Hackers may be motivated by a multitude of reasons such as profit, protest, challenge, or to aid security by pointing out vulnerabilities.



World Top 5 Female Hackers


1. Kristina Vladimirovna Svechinskaya





Kristina Svechinskaya, a New York University student is one of the most common names in the hacker’s world. She is Russian money mule maker who was arrested on November 2010 and accused of breaking into millions of dollars from several banks in Britain and America and for usage of multiple fake passports. Svechinskaya was dubbed "the world's sexiest computer hacker" for her raunchy, but casual appearance.

2. Ying Cracker


Ying is one of the most beautiful hacker and an educator from Shanghai, China. She teaches people the basics of how to start hacking; things like changing your IP address or wiping Office passwords.

3. Joanna Rutkowska




Joanna is a polish security specialist, she is popularly known for her research on low-level security and stealth malware and for her contributions to Windows vista. She became a known personality and rose to fame after the Black Hat Briefings conference in Las Vegas in August 2006 where Rutkowska demonstrated to the world two ways to hack Windows Vista Beta 2 kernel protection mechanism and also a technique dubbed Blue Pill, that used hardware virtualization to move a running OS into a virtual machine.

She is named ‘Five Hackers who Put a Mark on 2006’ by eWeek Magazine for her research on the topic. Rutkowska also gave an open advice to Vice President of Microsoft's Security Technology Unit to further tighten security on Windows Vista system. She is an elite hacker who an entrepruener who launced her own security services startup Invisible Things Lab in Warsaw, Poland.

3. Xiao Tian



Xiao Tian, just out of her teenage became famous after forming China Girl Security Team, a group of hackers especially for woman which is China's largest today; the group has over 2,200 members. Tian created the now-infamous hacking team because she felt that there was no other outlet for teenage girls like her in the male-dominated world of hacking. It’s time to Move over male Asian nerdy computer geeks, female Asian nerdy computer geeks are here to stay.




4. Raven Alder


Raven graduated from high school at the age of 14 and college at 18. She was the first woman to give a presentation at the DefCon hacker’s conference. Adler an half ISP engineer, half security geek, is a contributing author to several technical books, magazines and a frequent speaker at conferences She designs, tests and audits intrusion detection systems for large federal agencies. She has worked as a Senior Backbone Architect and Senior Security Consultant in IT security. Her interest in securing networks end-to-end has led her to examine and pioneer standards in the security of network infrastructure.



http://www.siliconindia.com/news/enterpriseit/worlds-top-5-female-hackers--nid-108542-cid-7.html