IST195 Lecture Notes

IST195 Lecture Notes - IST195LectureNotesWeek6 14:34

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
IST 195 Lecture Notes Week 6 14:34 Week 6 10/6/10  Computer Forensics 18-29 year olds account for almost 30% of identity theft complaints Higher edu is most commonly breached data because universities have all of your info  Since 2008 158 university data breach 2.3 million compromised records of student and faculty have been reported Avoid Idenity theft do not use debit  never disclose SSN don’t provide bank account or credit card ON POWER POINT Free Credit Report.com is not free AnnualCreditReport.com IS FREE! Download a free report Equifax Transunion Experian Hard Driving Research
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
74% of hard drives sold/ given away contain data than can be easily recovered and read 36% of those hard drives have been reformatted but still contain old data that can be  reovered 117 drives contained Data (6590 credit card numbers, medical records,  personal/corporate financial records, porn, personal emails) Computer Forensics Art and science of applying computer science to aid the legal process (continues on  Powerpoint) Disklabs Video Delete index not pages Kill Disk Use  DoD 5220.22-M To get rid of hard drive  Destroy- disintegrate, incinerate, pulverize, shred, or melt Overwrite entire hard drive with a single character, then do it again  
Background image of page 2
Week 7 Operating Systems 14:34 Techyness Alana Edmunds Operating Systems Four companies that revolutionized personal/company operating systems Bill gates- Microsoft Steve Jobs- Apple Lunus Torvalds- Linux  Ken Thomson Co invienting  Bill Clinton gave him award For co inventing the UNX operating system and the C programming language which  together have led to…. [on PowerPoint] C programming language is still around Now works at Google What Is an  Operating System?/ Manage hardware and software resources including Processor, memory allocation, disk space all input/output KERNEL is the central component of an OS Proves a way for software application s to work with the hardware without having to  know details (via an API) Ie saving a file in a program Different languages for different languages of different OS
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Week 7 Operating Systems 14:34 Mobile development Biggest area for development for the next 10 years IPhones, droids, windows 7 mobile, blackberry all use different   operating systems Rewrite each app for different phones.  Multitasking Needs to decide how much memory to allocate to each application running Three tasking strategies Single tasking: (dos mictooft 1 st  OS) user intervention reqired to change from task to  task Cooperative multi-tasking: processes voluntarily give up CPU control to other processes  from time to time (Mac OS – prior to X)
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2012 for the course IST 195 taught by Professor Staff during the Fall '08 term at Syracuse.

Page1 / 33

IST195 Lecture Notes - IST195LectureNotesWeek6 14:34

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online