(Translated by https://www.hiragana.jp/)
ScienceDaily: Computers & Math -- Hacking News
The Wayback Machine - https://web.archive.org/web/20060905081929/http://www.sciencedaily.com:80/news/computers_math/hacking/

Computers & Math:
Hacking News

 RSS  newsfeed for this page:


Latest News

Health & Medicine

Mind & Brain

Plants & Animals

Earth & Climate

Space & Time

Matter & Energy

Computers & Math

Computer Science
Mathematics

Fossils & Ruins

Summaries | Headlines

Computer Engineers Create New System To Curb Phishing Fraud (September 3, 2006) -- Carnegie Mellon University Cylab researchers have developed a new anti-phishing tool to protect users from online transactions at fraudulent Web ... > full story

Stealth Attack Drains Cell Phone Batteries (August 30, 2006) -- Cell phones that can send or receive multimedia files could be targeted by an attack that stealthily drains their batteries, leaving cellular communications networks useless, according to computer ... > full story

First Quantum Cryptographic Data Network Demonstrated (August 29, 2006) -- A joint collaboration between Northwestern University and BBN Technologies of Cambridge, Mass., has led to the first demonstration of a truly quantum cryptographic data network. By integrating ... > full story

Cardiff Researchers Discover Online Banking Security Problem (August 10, 2006) -- Two researchers working within Cardiff University's School of Computer Science, Professor Antonia J Jones and Joseph R Rabaiotti, together with a third independent researcher Stuart P Goring, have ... > full story

Cornell Sleuths Crack Secret Codes Of Europe's Galileo Satellite (July 9, 2006) -- Members of Cornell's Global Positioning System (GPS) Laboratory have cracked the so-called pseudo random number (PRN) codes of Europe's first global navigation satellite, despite efforts to keep the ... > full story

New Ion Trap May Lead To Large Quantum Computers (July 6, 2006) -- NIST physicists have designed and built a novel electromagnetic trap for ions that could be easily mass produced to potentially make quantum computers large enough for practical use. The new trap may ... > full story

Protecting Sensitive Data: Researchers Develop Fail-Safe Techniques For Erasing Magnetic Storage Media (June 15, 2006) -- What if you absolutely, positively must delete all data from a computer drive -- beyond any hope of recovering it? That was the challenge facing scientists at the Georgia Tech Research Institute ... > full story

Finding Computer Files Hidden In Plain Sight (May 24, 2006) -- Criminals and terrorists are using innocent-looking digital images as a cover to send hidden data. Researchers at the Ames Laboratory's Midwest Forensics Resource Center have developed a method to ... > full story

New Software Protects Confidentiality Of Data While Enabling Access And Sharing (May 2, 2006) -- Penn State researchers have developed software that allows databases to "talk to each other" automatically without compromising the security of the data and metadata because the queries, data ... > full story

Hackers Beware - New Technique Uses Photons, Physics To Foil Codebreakers (February 23, 2006) -- For governments and corporations in the business of transmitting sensitive data such as banking records or personal information over fibre optic cables, a new system demonstrated by University of ... > full story

New Technologies Enhance Quantum Cryptography (February 2, 2006) -- A team of Los Alamos National Laboratory scientists, in collaboration with researchers from the National Institute of Standards and Technology in Boulder, Colo., and Albion College, in Albion, Mich., ... > full story

Toward A Quantum Computer, One Dot At A Time (January 20, 2006) -- Researchers at the University of Pittsburgh have developed a way to create semiconductor islands smaller than 10 nanometers in scale, known as quantum dots. The islands, made from germanium and ... > full story

< more recent summaries | earlier summaries >

 

Can't find it? Try searching ScienceDaily or the entire web with:

Google
 
Web ScienceDaily.com


 

 

Computer insecurity -- Many current computer systems have a very poor level of computer security. This computer insecurity article describes the current battlefield of computer security exploits and ... > full article

Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article

Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer ... > full article

Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article

Computing -- Originally, the word computing was synonymous with counting and calculating, and a science that deals with the original sense of computing mathematical ... > full article

Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article

Computer virus -- In computer security technology, a virus is a self-replicating/self-reproducing-automation program that spreads by inserting copies of itself into other executable code or documents. In order to ... > full article

Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article

Computer software -- Computer software (or simply software) is that part of a computer system that consists of encoded information (or computer instructions), as opposed to the physical computer equipment (hardware) ... > full article

Wi-Fi -- Wi-Fi (also WiFi, Wi-fi, Wifi, or wifi) is a brand licensed by the Wi-Fi Alliance to products which pass testing demonstrating that they implement a set of product compatibility standards for ... > full article

MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more

The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more

Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more

Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more

Multivariate Data Analysis (6th Edition)
Well-suited for the non-statistician, this applications-oriented introduction to multivariate analysis focuses on the fundamental concepts that affect the use of specific techniques rather than the ... > read more

Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more

Fear Less: Real Truth About Risk, Safety, and Security in a Time of Terrorism
In this age of uncertainty we are all looking for answers. Every day we cope with another report. Anthrax in New York, Florida and Washington, D.C. Arrests nationwide. Threats from Afghanistan. While ... > read more

Statistics for Business and Economics and Student CD-ROM, Fifth Edition
The strength of this book has been its unerring accuracy and statistical precision. The role of computers and statistical software has been thoroughly integrated throughout. This edition focuses on ... > read more

CISSP All-in-One Exam Guide, Third Edition (All-in-One)
The Third Edition of this proven All-in-One exam guide provides total coverage of the CISSP certification exam, which has again been voted one of the Top 10 IT certifications in 2005 by CertCities. ... > read more

Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more

 
Text: small | med | large
Also search ScienceDaily or the web with Google:
ScienceDaily.com
Web
 
 

In Other News ...

... more breaking news at NewsDaily -- updated every 15 minutes

Health & Medicine Mind & Brain Plants & Animals Space & Time Earth & Climate Matter & Energy Computers & Math Fossils & Ruins