(Translated by https://www.hiragana.jp/)
ScienceDaily: Hacking News
The Wayback Machine - https://web.archive.org/web/20071012035118/http://www.sciencedaily.com:80/news/computers_math/hacking/

Computers & Math:
Hacking News

Get our RSS newsfeed
for Hacking News


Latest News

Health & Medicine

Mind & Brain

Plants & Animals

Earth & Climate

Space & Time

Matter & Energy

Computers & Math

Computer Science
Mathematics

Fossils & Ruins

From the news wires ...


Science news stories ...

Summaries | Headlines

New Quantum Dot Transistor Counts Individual Photons (October 11, 2007) -- Researchers have designed and demonstrated a transistor containing quantum dots that can count individual photons. The semiconductor device could be integrated easily into electronics for ... > full story

Technology Would Help Detect Terrorists Before They Strike (October 9, 2007) -- Are you a terrorist? Airport screeners, customs agents, police officers and members of the military who silently pose that question to people every day, may soon have much more than intuition to ... > full story

Improved Security For Smart Tags And Other Electronic Payments (October 8, 2007) -- Scientists have devised an inexpensive and efficient way to improve security for radio-frequency identification (RFID) tags, the wireless devices that allow consumers to pay for their gas or access ... > full story

'Dead Time' Limits Quantum Cryptography Speeds (October 2, 2007) -- According to a new article, technological and security issues will stall maximum transmission rates at levels comparable to that of a single broadband connection, such as a cable modem, unless ... > full story

Two Giant Steps In Advancement Of Quantum Computing Achieved (September 27, 2007) -- Two major steps toward putting quantum computers into real practice -- sending a photon signal on demand from a qubit onto wires and transmitting the signal to a second, distant qubit -- have been ... > full story

Physicists Establish 'Spooky' Quantum Communication (September 7, 2007) -- Physicists have coaxed two separate atoms to communicate with a sort of quantum intuition that Albert Einstein called "spooky." In doing so, the researchers have made an advance toward super-fast ... > full story

Databases Must Balance Privacy With Utility, Says Professor (September 4, 2007) -- Agencies like the US Census Bureau produce a voluminous amount of data, much of which is of tremendous value to researchers. But the data also includes personal information that could be harmful were ... > full story

IT Security Threats Caused By Wireless 'Parasites' (August 27, 2007) -- College students do it. Coffee shop customers do it too. Your neighbor in Apartment 3C is probably doing it right now. Many computer users search for an available wireless network to tap ... > full story

Computing Breakthrough Could Elevate Security To Unprecedented Levels (August 17, 2007) -- By using pulses of light to dramatically accelerate the development of quantum computers, researchers have made strides in technology that could foil national and personal security ... > full story

Potential Flaws In Electronic Voting Systems, Review Finds (July 31, 2007) -- Flaws that leave electronic voting machines vulnerable to security attacks were discovered by University of California researchers as part of an unprecedented "Top-to-Bottom Review" of the systems ... > full story

Thousands Of Atoms Swap 'Spins' With Partners In Quantum Square Dance (July 26, 2007) -- Physicists have induced thousands of atoms trapped by laser beams to swap "spins" with partners simultaneously. The repeated exchanges, like a quantum version of swinging your partner in a square ... > full story

Two Qubits In Action, New Step Towards The Quantum Computer (June 17, 2007) -- Researchers have succeeded in carrying out calculations with two quantum bits, the building blocks of a possible future quantum computer. Quantum computers have superior qualities in comparison to ... > full story

< more recent summaries | earlier summaries >

 
 

New! Search Science Daily or the entire web with Google:

Google
 
Web ScienceDaily.com


 
 
 
 

Computer insecurity -- Many current computer systems have only limited security precautions in place. Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite ... > full article

Security engineering -- Security engineering is the field of engineering dealing with the security and integrity of real-world systems. It is similar to systems engineering in that its motivation is to make a system meet ... > full article

Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a ... > full article

Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article

Computer virus -- A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a ... > full article

Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article

Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article

Computing -- Originally, the word computing was synonymous with counting and calculating, and a science that deals with the original sense of computing mathematical ... > full article

Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article

Quantum computer --

A quantum computer is any device for computation that makes direct use of distinctively quantum mechanical phenomena, such as superposition and entanglement, to perform operations on data. In a ... > full article

Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more

Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more

MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more

The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more

Automation, Production Systems, and Computer-Integrated Manufacturing (2nd Edition)
NEW ORGANIZATION. The second edition consists of five parts, following two introductory chapters: I. Automation and control technologies: industrial computer control, control system components, ... > read more

Decoding the Universe: How the New Science of Information Is Explaining Everything in the Cosmos, from Our Brains to Black Holes
As Charles Seife reveals in this energetic new book, information theory, once the province of philosophers and linguists, has emerged as the crucial science of our time, shedding new light on the ... > read more

Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more

Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more

Multivariate Data Analysis (6th Edition)
Well-suited for the non-statistician, this applications-oriented introduction to multivariate analysis focuses on the fundamental concepts that affect the use of specific techniques rather than the ... > read more

LabVIEW for Data Acquisition
Preface I've been interested in gadgets and computers since grade school, particularly gadgets connected to computers. My first real gadget-to-computer project, at age 16, was an alarm for my car ... > read more

 
Text: small | med | large
 

In Other News ...

... more breaking news at NewsDaily -- updated every 15 minutes

Health & Medicine Mind & Brain Plants & Animals Space & Time Earth & Climate Matter & Energy Computers & Math Fossils & Ruins