Her computer, Karin Strauss says, contains her "digital attic"—a place where she stores that published math paper she wrote in high school, and computer science schoolwork from college. She'd like to preserve the stuff "as long as I live, at least," says Strauss, 37. But computers must be replaced every few years, and each time she must copy the information over, "which is a little bit of a headache." It would be much better, she says, if she could store it in DNA—the stuff our genes are made of. Strauss, who works at Microsoft Research in Redmond, Washington, is working to make that sci-fi fantasy a reality. She and other scientists are not focused in finding ways to stow high school projects or snapshots or other things an average person might accumulate, at least for now. Rather, they aim to help companies and institutions archive huge amount...
Popular posts from this blog
HACKING AND IT'S HISTORY
HACKING: This article is fully about hacking and it’s history- some bit about by hackerself: Hacker is a word that has two meanings: **Traditionally, a hacker is someone who likes to tinker with software or electronic systems. Hackers enjoy exploring and learning how computer systems operate. They love discovering new ways to work electronically . ** Recently, hacker has taken on a new meaning — someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers). Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge. They modify, delete, and steal critical information, often making other people miserable . ...
Ethical hacking
“ Hack it and Have it ” This article is about hacking ethically - The Ethical hacking process needs to be planned in advance. An ethical hack shows the risks an information technology environment is facing and actions can be taken to reduce certain risks or to accept them. And the ethical hacking has contain several parts such as-working of an ethical hacker,Ethical hacking process,Phases of ethical hacking,and Tools of ethical hacking. Firstly ,we’re look at the security lifecycle or working of an ethical hacker Every Ethical Hacker must follow few basic principles. If he does not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous. In Ethical hacking, Time and patience are important. Be careful when you’re performing your ethical hacking tests. 2.Process of ethical h...
Comments
Post a Comment