Vērtējums:
Publicēts: 20.06.2006.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Computer Hacking', 1.
  • Eseja 'Computer Hacking', 2.
  • Eseja 'Computer Hacking', 3.
Darba fragmentsAizvērt

Precis of 'Who's reading your E-mail" by Richard Behars The article exposes the vulnerability of computer data and of corporations with the popularity of the Internet. The Internet can allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected Major corporations and government security departments have acknowledged that hacker break-ins are out of control. Some companies are too fearful to join networks because of this. Software programs brought out to deal with the growing problem, such as firewalls, are no longer totally effective. …

Atlants