Wednesday, April 25, 2007
Stronger Laws for ID Theft
Wednesday, April 18, 2007
Bloggers, A Journalist Source
This article is about how journalist are using blogs as a source to the information they may need. Allowing it for a faster and more efficient process. "The Web basically cuts the middleman out of the picture, and allows the people who were there on the scene to get their story out to a global audience immediately...Of course, journalists can follow up on that, find these first-person witnesses or potential witnesses and interview them to draw more details out of them to further complete the story. So it allows the whole newsgathering process to move much more quickly."
The example used was that of a blogger who posted his girfriends story and experience in the Virginia Tech massacre. Reporters from various organizations got wind of this blog entry and immediate tried to contact the person to get first hand information and interview the blogger (ideally girlfriend).
Wednesday, April 11, 2007
Web 2.0
I think this "revolution" has significantly changed our way of life in many aspects. Web 2.0 offers those looking or not for something a tremendous array of information, networking, and services. And this change is obvious, "the difference between Web 2.0 model and the previous one is directly equivalent to the difference between a rainforest and a desert."
Wednesday, April 4, 2007
Hacking, It's Just not Right!
Computer hackers have definitely driven not only technology but people to be on their toes. Just as new technologies are being invented and introduced to the public, and measures are taken to secure technology, there is almost always some genious who will take it upon him/herself to find a way to break in- whether it is with malicious intent or just for the challenge.
The paranoia that people have due to personal experiences is not going away, especially here in the United States. The Los Angeles times reports in an article “U.S. is no. 1 source of hacking, firm says” (March 19, 2007), and that here in the U.S. we have “more than half of the world's "underground-economy servers" — typically corporate computers that have been commandeered to facilitate clandestine transactions involving stolen data.” Incredible! But I believe it. When someone can break into your computer records, take your information and very easly sell it, and then anyone can buy it and use it… well there goes your personal identity!
In reading the various definitions (wikipedia) for a hacker and the different types of hackers (“white hat”, “blue hat” or “black hat”) it makes me believe that no matter how many “white hats” or “blue hats” are out troubleshooting and trying to find gaps or exploits, there are just as many “black hat” hackers trying to work around it. And who knows, what’s to say that the “blue” and “white hats” are not “black hats” in their spare time!