For this assignment you will be creating a personal website. It will be hosted (located) in your allotted university
web space. You may NOT host it anywhere else. And if you have created a website before, that is great, but you will
not be able to use tha
This assignment is an exercise designed to give you practical experience with created video from OTHER THAN a
webcam, camcorder, phone, etc. You will be required to create a 5 minute video that you will then post to YouTube.
You are not allowed to use any
Editors: Matt Bishop, firstname.lastname@example.org
Deborah A. Frincke, email@example.com
Who Owns Your Computer?
Education, properly understood, is that which teaches discernment.
onys much-debated choice to use rootkit-like
12 IEEE Spectrum | January 2006 | NA
payersand theres a good deal in it
for the potential buyers of demandresponse services.
Robert Gisolfi, energy director of
Federated Department stores, is in charge
of electricity for the 100 Macys stores in
Digital Rights Management,
Spyware, and Security
discovered a rootkit on his computer, which he later
determined stemmed from a Sony-BMG compact disc. In
this article, the authors examine the copy-pr
Martin Luther King Day
Library Assignment due by 5 pm on 27 Jan.
28 1 Feb
History and Hardware, Interfaces
Library Worksheet due by 5 pm on 3 Feb.
12th class day. Last
Sam Houston State University
Department of Computer Science
CSTE 1330: Introduction to Computers
AB1 room 212A
Introduction to Computers fo
A cyber attack can come by injected script redirecting users to rogue AV sites, which try to get peopie
to instail a fake anti-virus programme calied Windows Stabiiity Centre. (Aii Photos via Author)
What if one day the control systems of a major dam sudd