Search Results

Results 1980-1990 of 1990 for Jack M. Germain

RFID Tags and the Question of Personal Privacy

Radio Frequency Identification, or RFID, is an old technology that has been quietly revolutionizing business and industry. Back in World War II, the British used RFID signals to confirm the identity of their own aircraft in flight. Today, RFID has permeated our society. It is used to track everything from pets to prisoners to products ...

Network Vulnerability and the Electrical Grid

The power blackout that struck the northern United States and Canada in August shocked industry executives into acknowledging the need to upgrade outdated circuitry and power-generating equipment ...

Identity Theft Countermeasures

The Federal Trade Commission (FTC) announced in September that 27.3 million Americans have fallen victim to identity theft in the past five years. About half of those thefts took place last year. According to the FTC report, the thefts resulted from several outlets that include credit cards, ATM machines and the Internet. These thefts caused billions of dollars in losses for businesses and consumers...

Computer Viruses and Organized Crime: The Inside Story

Internet security experts are divided on the source and purpose of computer viruses and worms like Blaster and SoBig. But some government agencies are investigating a possible connection between the increasing spread of infected computers and organized crime ...

Microsoft Passport and the Future of Authentication

Microsoft's .NET Passport, one of the largest online authentication services in operation, has more than 200 million active accounts and handles more than 4 billion authentications per month, Adam Sohn, product manager for the Platform Strategy Group at Microsoft, told TechNewsWorld. ...

TECHNOLOGY SPECIAL REPORT

The Insider’s Guide to Overclocking

Computer hobbyists for years have tweaked their computers' innards to squeeze out extra bits of performance. Known as overclocking, the practice has long been a holy grail to users who demand maximum performance from their systems ...

TECHNOLOGY SPECIAL REPORT

Beyond Biometrics: New Strategies for Security

Biometric security devices -- which authenticate a person's identity on the basis of physical characteristics, such as a fingerprint -- have been available in one form or another for 30 years. But biometrics technology for computer security and user authentication might never achieve widespread use, analysts told TechNewsWorld, because of the predominant perception that it is costly, inconvenient and intrusive...

Denial of Service – Exposed

Analysts credit advance warning about the Blaster worm, in addition to Microsoft's clever rewriting of standard Internet-connection protocols, as the weapons used in defeating a denial-of-service (DoS) attack against the software company's Windows help Web site on August 16th ...

TECHNOLOGY SPECIAL REPORT

Microsoft’s Advanced-Research Division Comes of Age

Last month Microsoft Research hosted a summit of some of the best minds in academia to discuss major computing problems and find areas for mutually beneficial collaboration. Held during the last week in July, the gathering brought together 340 academic researchers representing 115 institutions in 11 countries ...

TECHNOLOGY SPECIAL REPORT

Profile of the Superworm: SoBig.E Exposed

The SoBig.E worm, released two months ago on the Internet, continues to spread from unprotected computers. Some Internet security analysts fear that this latest variant of the SoBig family -- much like possible future variants of the new Microsoft Blaster or LovSan worm that began to proliferate early this week -- will cause long-term threats to Internet security...

E-Commerce Times Channels