Wednesday, 23 January 2013

My Opinion ( IPR )

My Opinion ( IPR )

         In my opinion, everyone’s have their own freedom for everything but one thing to remember is that we need to know our limitations. Know what is right and what is wrong with our actions. Just do our responsibilities and consequences in our action.  
       The aim of protecting human rights is to respect and recognize the dignity of human beings. The freedom to live and the freedom of speech and opinion are among the basic rights practiced and respected by many nations for centuries.

Tuesday, 22 January 2013

Software Piracy

Software Piracy

  • Software piracy refers to the unauthorized duplication and use of computer software.
  • Software piracy is the unauthorized copying or distribution of copyrighted software.

Kinds of Piracy

  • End User Piracy
Using multiple copies of a single software package on several different systems or distributing registered or licensed copies of software to others. Another common form of end user piracy is when a cracked version of the software is used. Hacking into the software and disabling the copy protection or illegally generating key codes that unlocks the trial version making the software a registered version creates a cracked version.
  • Reseller Piracy
Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers; this includes preloading systems with software without providing original manuals and diskettes. Reseller piracy also occurs when resellers knowingly sell counterfeit versions of software to unsuspecting customers. Indications of reseller piracy are multiple users with the same serial number, lack of original documentation or an incomplete set, and non-matching documentation.
  • Trademark/Trade Name Infringement
Infringement occurs when an individual or dealer claims to be authorized either as a technician, support provider or reseller, or is improperly using a trademark or trade name.
  • BBS/Internet Piracy

BBS/ Internet Piracy occur when there is an electronic transfer of copyrighted software. If system operators and/or users upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license. Often hackers will distribute or sell the hacked software or cracked keys. The developer does not receive any money for the software the hacker distributed. This is an infringement on the developer's copyright.








            http://www.tucows.com/article/531

Trademark

Trademark

  • It is a recognizable sign, design or expression which identifies products or services of a particular source from those of others.


  • A trademark is a device, word or combination of words, or symbol that indicates the source or ownership of a product or service.


  • Distinctive design, graphics, logo, symbols, words, or any combination thereof that uniquely identifies a firm and/or its goods or services, guarantees the item's genuineness, and gives it owner the legal rights to prevent the trademark's unauthorized use


  • Any name, symbol, figure, letter, word, or mark adopted and used by a manufacturer or merchant in order to designate his or her goods and to distinguish them from those manufactured or sold by others. A trademark is a proprietary term that is usually registered with the Patent and Trademark Office to assure its exclusive use by its owner.






Source: http://en.wikipedia.org/wiki/Trademark#cite_note-1
             http://legal-dictionary.thefreedictionary.com/Trademarks
             http://www.businessdictionary.com/definition/trademark.html
             http://dictionary.reference.com/browse/trademark

Patent

Patent

  • It is a form of intellectual property. It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assignee for a limited period of time, in exchange for the public disclosure of the invention.


  • A form of protection that provides a person or legal entity with exclusive rights for making, using or selling a concept or invention and excludes others from doing the same for the duration of the patent.







Source: http://www.entrepreneur.com/encyclopedia/term/82342.html
             http://en.wikipedia.org/wiki/Patent

Copyright

Copyright

  • It is a legal concept, enacted by most governments, giving the creator of an original work exclusive right to it, usually for a limited time.
  • It is distinct from other forms of creator protection such as Patents, which give inventors exclusive rights over use of their inventions, and Trademarks, which are legally protected words or symbols or certain other distinguishing features that represent products or services.
  • It refers to laws that regulate the use of the work of a creator, such as an artist or author.




Source: http://en.wikipedia.org/wiki/Copyright
             http://legal-dictionary.thefreedictionary.com/copyright
             http://graphicdesign.about.com/od/legalglossary/g/copyright.html

Monday, 21 January 2013

IPR


Intellectual Property Rights


  • A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for intellectual property is to encourage innovation without the fear that a competitor will steal the idea and / or take the credit for it.

  • It refers to the general term for the assignment of property rights through patents, copyrights and trademarks. These property rights allow the holder to exercise a monopoly on the use of the item for a specified period.



Source: http://stats.oecd.org/glossary/detail.asp?ID=3236
              http://www.businessdictionary.com/definition/intellectual-property-rights.html


Wednesday, 16 January 2013

Plagiarism



Plagiarism

Plagiarism is a form of cheating, but it's a little complicated so a kid might do it without understanding that it's wrong. Plagiarism is defined in dictionaries as the "wrongful appropriation," "close imitation," or "purloining and publication" of another author's "language, thoughts, ideas, or expressions," and the representation of them as one's own original work, but the notion remains problematic with nebulous boundaries.

Five Unethical Uses of Computers

  • Pornography

·         Distribution and use of pornography has been greatly facilitated with the use of the computer. Not only is the use of adult pornography widespread with the use of computers, but so is child pornography. Child pornography is one of the most, if not the most, unethical uses of the computer today.

  • Cyber-bullying

·         Bullying online is another form of unethical computer use. It is widespread and getting increasing coverage in the media as it becomes a larger problem. Sitting in front of a computer screen takes away the need to bully and harass someone in person and thus makes even worse actions and harassment possible. Additionally, the use of social networking on the computer as a tool for cyber-bullying is growing.

  • Plagiarism

·         Plagiarism is another unethical use of the computer. By going online, it is becoming increasingly easy to find material for plagiarism. The computer also facilitates writing articles through plagiarism by the use of writing programs and simply copying and pasting the words onto a document and taking credit for the work.

  • Cheating

·         Cheating in relationships is made easier through social networking online or the use of emails. Everything is password protected, making users able to be unfaithful in their relationships and even engage in cyber sex without anyone catching on.
Identity Theft
·         Theft of someone's identity is facilitated by the computer, making it yet another unethical use. If criminals are knowledgeable enough at computer hacking, then it is easy for them to gain access to the personal and financial information of other people and proceed in stealing their identity and ruining their lives.








Source: http://www.ehow.com/info_7806377_five-unethical-uses-computers.html








Tuesday, 4 December 2012

Computer Ethics


Computer Ethics

Hacker

A Hacker is somebody who finds weaknesses in a computer or computer network and exploits them through a process called penetration or penetration testing (depending on the motive). Hackers may be motivated by a multitude of reasons such as profit, protest, challenge, or to aid security by pointing out vulnerabilities.



World Top 5 Female Hackers


1. Kristina Vladimirovna Svechinskaya





Kristina Svechinskaya, a New York University student is one of the most common names in the hacker’s world. She is Russian money mule maker who was arrested on November 2010 and accused of breaking into millions of dollars from several banks in Britain and America and for usage of multiple fake passports. Svechinskaya was dubbed "the world's sexiest computer hacker" for her raunchy, but casual appearance.

2. Ying Cracker


Ying is one of the most beautiful hacker and an educator from Shanghai, China. She teaches people the basics of how to start hacking; things like changing your IP address or wiping Office passwords.

3. Joanna Rutkowska




Joanna is a polish security specialist, she is popularly known for her research on low-level security and stealth malware and for her contributions to Windows vista. She became a known personality and rose to fame after the Black Hat Briefings conference in Las Vegas in August 2006 where Rutkowska demonstrated to the world two ways to hack Windows Vista Beta 2 kernel protection mechanism and also a technique dubbed Blue Pill, that used hardware virtualization to move a running OS into a virtual machine.

She is named ‘Five Hackers who Put a Mark on 2006’ by eWeek Magazine for her research on the topic. Rutkowska also gave an open advice to Vice President of Microsoft's Security Technology Unit to further tighten security on Windows Vista system. She is an elite hacker who an entrepruener who launced her own security services startup Invisible Things Lab in Warsaw, Poland.

3. Xiao Tian



Xiao Tian, just out of her teenage became famous after forming China Girl Security Team, a group of hackers especially for woman which is China's largest today; the group has over 2,200 members. Tian created the now-infamous hacking team because she felt that there was no other outlet for teenage girls like her in the male-dominated world of hacking. It’s time to Move over male Asian nerdy computer geeks, female Asian nerdy computer geeks are here to stay.




4. Raven Alder


Raven graduated from high school at the age of 14 and college at 18. She was the first woman to give a presentation at the DefCon hacker’s conference. Adler an half ISP engineer, half security geek, is a contributing author to several technical books, magazines and a frequent speaker at conferences She designs, tests and audits intrusion detection systems for large federal agencies. She has worked as a Senior Backbone Architect and Senior Security Consultant in IT security. Her interest in securing networks end-to-end has led her to examine and pioneer standards in the security of network infrastructure.



http://www.siliconindia.com/news/enterpriseit/worlds-top-5-female-hackers--nid-108542-cid-7.html