<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.paulbui.net/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cmgillen</id>
	<title>WLCS - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.paulbui.net/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cmgillen"/>
	<link rel="alternate" type="text/html" href="https://www.paulbui.net/wl/Special:Contributions/Cmgillen"/>
	<updated>2026-04-05T18:29:00Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.8</generator>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Knowledge_base&amp;diff=4901</id>
		<title>Knowledge base</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Knowledge_base&amp;diff=4901"/>
		<updated>2010-03-25T17:04:49Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: New page: &amp;#039;&amp;#039;&amp;#039;Technical Definition&amp;#039;&amp;#039;&amp;#039; A collection of data representing related experiences, their results are related to their problems and solutions  &amp;#039;&amp;#039;&amp;#039;Laymans Definition&amp;#039;&amp;#039;&amp;#039; A database that helps ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Technical Definition&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
A collection of data representing related experiences, their results are related to their problems and solutions&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Laymans Definition&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
A database that helps you remember what you&amp;#039;ve learned or builds upon what you&amp;#039;ve already learned. Similar to an expert system.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;Examples&amp;#039;&amp;#039;&lt;br /&gt;
-Frequently Asked Questions&lt;br /&gt;
-Expert Systems&lt;br /&gt;
&lt;br /&gt;
http://www.jbpub.com/Catalog/9780763776473/Overview/&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3677</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3677"/>
		<updated>2009-09-16T16:01:44Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &amp;#039;&amp;#039;&amp;#039;Security&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;#039;&amp;#039;&amp;#039;Authentication&amp;#039;&amp;#039;&amp;#039; ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &amp;#039;&amp;#039;&amp;#039;Cryptography&amp;#039;&amp;#039;&amp;#039; ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Hacking (h4xx0ring)&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Related Articles&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
*[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
**A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Citations and References&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3674</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3674"/>
		<updated>2009-09-16T16:00:37Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Security ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hacking (h4xx0ring) ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Related Articles&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
*[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
**A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
== Citations and References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3673</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3673"/>
		<updated>2009-09-16T16:00:19Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Security ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hacking (h4xx0ring) ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Related Articles&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
*[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
 *A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
== Citations and References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3672</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3672"/>
		<updated>2009-09-16T15:59:59Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Security ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hacking (h4xx0ring) ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Related Articles&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
*A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
== Citations and References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3670</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3670"/>
		<updated>2009-09-16T15:58:00Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Security ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hacking (h4xx0ring) ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== &amp;#039;&amp;#039;&amp;#039;Related Articles&amp;#039;&amp;#039;&amp;#039; ==&lt;br /&gt;
[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
 A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
== Citations and References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3669</id>
		<title>Security</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Security&amp;diff=3669"/>
		<updated>2009-09-16T15:56:51Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Security ==&lt;br /&gt;
Definition:&lt;br /&gt;
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one&amp;#039;s place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don&amp;#039;t have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it&amp;#039;s [[integrity]] and to avoid [http://www.turnitin.com plagiarism].&lt;br /&gt;
&lt;br /&gt;
In Layman&amp;#039;s terms:&lt;br /&gt;
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that&amp;#039;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one&amp;#039;s identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer&amp;#039;s data base.&amp;lt;ref&amp;gt;[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Cryptography ===&lt;br /&gt;
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1&amp;#039;s complement of the [[binary]] data (i.e. flipping the bits).&lt;br /&gt;
&lt;br /&gt;
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.&amp;lt;ref&amp;gt;[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hacking (h4xx0ring) ==&lt;br /&gt;
:&amp;#039;&amp;#039;Main article: [[Hacking]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== Related Articles ==&lt;br /&gt;
[http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ New York Times Reforms Online Ad Sales After Malware Scam]&lt;br /&gt;
 A security breach forced The New York Times on Monday to suspend online ads that are served directly from an advertiser’s website.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
== Citations and References ==&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=People_and_machines&amp;diff=3613</id>
		<title>People and machines</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=People_and_machines&amp;diff=3613"/>
		<updated>2009-09-14T16:44:40Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Definition==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;People and machines&amp;#039;&amp;#039;&amp;#039; is a concept that includes all of the issues that relate to how people interact with machines.  The main issues include, User Interface Design, and usability. From a computer science perspective, the focus is on interaction, specifically on interaction between one or more humans and one or more computational machines.&amp;lt;ref&amp;gt;http://sigchi.org/cdg/cdg2.html#2_1&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Layman&amp;#039;s Definition==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;People and machines&amp;#039;&amp;#039;&amp;#039; is the interaction between people and machines.  It involves how products, like computers, are designed to help the user interact. In other words, it has to do with how people use technology.&lt;br /&gt;
&lt;br /&gt;
==Events==&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;mouse&amp;#039;&amp;#039;&amp;#039; is an important device used in every day computer interaction.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Operating Systems&amp;#039;&amp;#039;&amp;#039; are large examples of user interface design.  &amp;#039;&amp;#039;&amp;#039;Windows&amp;#039;&amp;#039;&amp;#039; was a major landmark in the interaction between people and machines.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;CAD&amp;#039;&amp;#039;&amp;#039; allows users to sketch and design objects. This system shows how we can use computers to design other technologies.&lt;br /&gt;
 &lt;br /&gt;
== User Interface Design ==&lt;br /&gt;
User Interface Design (UID) allows the user to interact with the machine, and makes communicating simpler. The relationship between people and machines involves the ways in which users interact with computers. A common example of how people interact with machines is a graphical user interface. GUIs allow for better interaction between the user and the machine by increasing usability.  The main purpose of the interface is to allow a person to input information, and receive an output. For instance, a user inputs information, clicks a button, and gets some sort of response, which is the output.  Most products are complex in design, and require a more basic interface to make it usable.&amp;lt;ref&amp;gt;http://www.usernomics.com/user-interface-design.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Usability ==&lt;br /&gt;
An important aspect of interaction between humans and machines is the usability of the machine. Usability involves how efficiently a machine can be accessed by a user. Usability addresses the relationship between tools and their users.&amp;lt;ref&amp;gt;http://www.usabilityfirst.com/intro/index.txl&amp;lt;/ref&amp;gt; Usability is one of the focuses of the field of Human-Computer Interaction. As the name suggests, usability has to do with bridging the gap between people and machines.&amp;lt;ref&amp;gt;http://www.usabilityfirst.com/intro/index.txl&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Human-Computer Interaction ==&lt;br /&gt;
Companies use [http://www.usernomics.com/user-interface-design.html   Human-Computer interaction (HCI)] to sell their products. The easier and more efficient the machine is to use, the more the customer would want to buy it. The emphasis placed on Human-Computer interaction is to design products to make using a computer more efficient.&lt;br /&gt;
&lt;br /&gt;
Human-Computer interaction is also a graduate program, offered at some universities.  The goal of the program is to &amp;quot;understand and create technology that harmonizes with and improves human capabilities, goals, and social environments through interdisciplinary research and education in design, computer science, and behavioral and social sciences.&amp;quot;&amp;lt;ref&amp;gt;http://www.hcii.cmu.edu/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[http://en.wikipedia.org/wiki/List_of_human-computer_interaction_topics List of Human-Computer Interaction Topics]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.timesonline.co.uk/tol/news/environment/article6824862.ece#cid=OTC-RSS&amp;amp;attr=2015164 Green racing car]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://www.usernomics.com/user-interface-design.html   Human-Computer interaction (HCI)]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
Daniel Veizaga &amp;lt;br&amp;gt;&lt;br /&gt;
Paul Vu&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=People_and_machines&amp;diff=3611</id>
		<title>People and machines</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=People_and_machines&amp;diff=3611"/>
		<updated>2009-09-14T16:44:01Z</updated>

		<summary type="html">&lt;p&gt;Cmgillen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Definition==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;People and machines&amp;#039;&amp;#039;&amp;#039; is a concept that includes all of the issues that relate to how people interact with machines.  The main issues include, User Interface Design, and usability. From a computer science perspective, the focus is on interaction, specifically on interaction between one or more humans and one or more computational machines.&amp;lt;ref&amp;gt;http://sigchi.org/cdg/cdg2.html#2_1&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Layman&amp;#039;s Definition==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;People and machines&amp;#039;&amp;#039;&amp;#039; is the interaction between people and machines.  It involves how products, like computers, are designed to help the user interact. In other words, it has to do with how people use technology.&lt;br /&gt;
&lt;br /&gt;
==Events==&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;mouse&amp;#039;&amp;#039;&amp;#039; is an important device used in every day computer interaction.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Operating Systems&amp;#039;&amp;#039;&amp;#039; are large examples of user interface design.  &amp;#039;&amp;#039;&amp;#039;Windows&amp;#039;&amp;#039;&amp;#039; was a major landmark in the interaction between people and machines.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;CAD&amp;#039;&amp;#039;&amp;#039; allows users to sketch and design objects. This system shows how we can use computers to design other technologies.&lt;br /&gt;
 &lt;br /&gt;
== User Interface Design ==&lt;br /&gt;
User Interface Design (UID) allows the user to interact with the machine, and makes communicating simpler. The relationship between people and machines involves the ways in which users interact with computers. A common example of how people interact with machines is a graphical user interface. GUIs allow for better interaction between the user and the machine by increasing usability.  The main purpose of the interface is to allow a person to input information, and receive an output. For instance, a user inputs information, clicks a button, and gets some sort of response, which is the output.  Most products are complex in design, and require a more basic interface to make it usable.&amp;lt;ref&amp;gt;http://www.usernomics.com/user-interface-design.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Usability ==&lt;br /&gt;
An important aspect of interaction between humans and machines is the usability of the machine. Usability involves how efficiently a machine can be accessed by a user. Usability addresses the relationship between tools and their users.&amp;lt;ref&amp;gt;http://www.usabilityfirst.com/intro/index.txl&amp;lt;/ref&amp;gt; Usability is one of the focuses of the field of Human-Computer Interaction. As the name suggests, usability has to do with bridging the gap between people and machines.&amp;lt;ref&amp;gt;http://www.usabilityfirst.com/intro/index.txl&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Human-Computer Interaction ==&lt;br /&gt;
Companies use [http://www.usernomics.com/user-interface-design.html   Human-Computer interaction (HCI)] to sell their products. The easier and more efficient the machine is to use, the more the customer would want to buy it. The emphasis placed on Human-Computer interaction is to design products to make using a computer more efficient.&lt;br /&gt;
&lt;br /&gt;
Human-Computer interaction is also a graduate program, offered at some universities.  The goal of the program is to &amp;quot;understand and create technology that harmonizes with and improves human capabilities, goals, and social environments through interdisciplinary research and education in design, computer science, and behavioral and social sciences.&amp;quot;&amp;lt;ref&amp;gt;http://www.hcii.cmu.edu/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See Also==&lt;br /&gt;
[http://en.wikipedia.org/wiki/List_of_human-computer_interaction_topics List of Human-Computer Interaction Topics]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://http://www.timesonline.co.uk/tol/news/environment/article6824862.ece#cid=OTC-RSS&amp;amp;attr=2015164 Green racing car]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
[http://www.usernomics.com/user-interface-design.html   Human-Computer interaction (HCI)]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Authors==&lt;br /&gt;
Daniel Veizaga &amp;lt;br&amp;gt;&lt;br /&gt;
Paul Vu&lt;/div&gt;</summary>
		<author><name>Cmgillen</name></author>
		
	</entry>
</feed>