TechnicalJones.com

Author

Leroy Jones, Jr. is the creator of Talking Technology with Leroy Jones, Jr.

TECH/HEALTH TERM - FIREWALL

| No Comments

http://www.technicaljones.com/TechTerm.pngFirewall


Definition: A computer connected both to the Internet and the local Hospital Information Network (HIN) that prevents the passing of Internet traffic, in the form of Internet Protocol (IP) packets, to the internal hospital network.  Provides an added layer of protection against "hackers."

There are two kinds of firewalls: external, which protect all hospital systems form the outside world, and internal, which protect only selected systems.

Firewall disadvantages: it restricts information transfer in both directions, and makes file transfer (ftp) and telnet (remote login) more difficult.

http://www.technicaljones.com/assets_c/2009/10/HEALTH%20TERM-thumb-117x117-thumb-117x117-thumb-117x117-thumb-117x117-thumb-117x117.jpg


Firewall_April 2010.gif



NEW SHOW - GOOGLE HACKERS

| No Comments

"TALKING TECHNOLOGY WITH
LEROY JONES, JR."

April 23, 2010

TOPIC:  "GOOGLE HACKERS"


SCleland Pic_April 2010.jpgScott Cleland
Creator, The Precursor« Blog
President, Precursor« LLC
Chairman, NetCompetition.org«

Scott Cleland is a precursor, a prescient analyst with a long track record of industry firsts. Cleland is President of Precursor LLC, which consults for Fortune 500 clients; authors the "widely-read" PrecursorBlog.com; publishes GoogleMonitor.com; and serves as Chairman of NetCompetition.org, a pro-competition e-forum supported by broadband interests.

Eight different Congressional subcommittees have sought Cleland's expert testimony on a wide range of complex emerging issues related to competition; and Institutional Investor twice ranked him as the top independent telecom analyst in the U.S.

Cleland has been profiled in Fortune, National Journal, Barrons, WSJ's Smart Money, Investors Business Daily, and Washington Business Journal.


More information on Talking Technology with Leroy Jones, Jr.:


GOOGLE SECURITY




HAPPY EARTH DAY!!!

| No Comments

TECH TERM - COMPUTER HACKING

| No Comments
TechTerm_Image 2008.png
Computer Hacking

Definition: Is the practice of modifying computer  hardware and software to accomplish a goal outside of the creator's original purpose. People who engage in computer  hacking activities are often called hackers.

Since the word "hack" has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

It is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an "art" form.

They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It's a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff.

These individuals use their skills to find flaws in the company's security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits.

For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives.

Hackers who are out to steal personal information, change a corporation's financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called "crackers."

This type of computer hacking can earn you a trip to a federal prison for up to 20 years.


ComputerHacker_April 2010.jpg








Reblog this post [with Zemanta]

GOOGLE SECURITY

| No Comments


Google Security_April 2010.jpg

Check this out:

Attack on Google said to hit password system

Gives you something else to think about.



Reblog this post [with Zemanta]
Previous Page  1   2   3   4   5   6   7   8   9   10   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25   26   27   28   29   30   31   32   33   34   35   36   37   38   39   40   41   42   43   44   45   46   47   48   49   50   51   52   53   54   55   56   57   58   59   60   61   62   63   64   65   66   67   68   69   70   71   72   73   74   75   76   77   78   79   80   81   82   83   84   85   86   87   88   89   90   91   92   93   94   95   96   97   98   99   100   101   102   103   104   105   106   107   108   109   110   111   112   113   114   115   116   117   118   119   120   121   122   123   124   125   126   127   128   129   130  131  132   133   134   135   136   137   138   139   140   141   142   143   144   145   146   147   148   149   150   151   152   153   154   155   156   157   158   159   160   161   162   163   164   165   166   167   168   169   170   171   172   173   174   175   176   177   178   179   180   181   182   183   184   185   186   187   188   189   190   191   192   193   194   195   196   197   198   199   200   201   202   203   204   205   206   207   208   209   210   211   212   213   214   215   216   217   218   219   220   221   222   223   224   225   226   227   228   229   230   231   232   233   234   235   236   237   238   239   240   241   242   243   244   245   246   247  Next Page