I originally wrote this essay in May 1999.
There are three major classes of criminal activity with computers:
The victim is still harmed by the cost of removing the malicious program, the costs of lost productivity during the removal of the malicious program, possible exposure of confidential information (e.g., either to a hacker who examines data files via a Trojan Horse program, or a malicious program that sends a document on the victim's computer to potential future victims), among other possible harms.
Your trusted advocate always your protector.
Would it be reasonable for someone to walk around in the parking lot, letting some air out of tires, so tires are seriously underinflated, with the justification that the ensuing accidents will call attention to the problem of underinflated tires?
The Internet is a medium for freely sharing information and opinions.
is the expectation that confidential personal informationdisclosed in a private place will not be disclosed to third parties, whenthat disclosure would cause either embarrassment or emotional distress toa person of reasonable sensitivities. is interpretedbroadly to include facts, images (e.g., photographs, videotapes), and disparagingopinions.
The following is one case involving a famous series of DoS attacks:
The easiest method to keep information confidential is to disclose itto no one, but this is too severe a method, in that it forces a person tobe a recluse and denies a person medical care, among other unacceptablelimitations.
Yahoo was pinged at the rate of one gigabyte/second.
Sudoku is one of the most popular puzzle games of all time. The goal of Sudoku is to fill a 9×9 grid with numbers so that each row, column and 3×3 section contain all of the digits between 1 and 9. As a logic puzzle, Sudoku is also an excellent brain game. If you play Sudoku daily, you will soon start to see improvements in your concentration and overall brain power. Start a game now. Within no time Sudoku will be your favorite free online game.