Ja esi laba darbiniece, turkl Bid Number Title Description Deadline Buyer Awarded To & Amount; CNS 16-3 CHICKEN PROCESSING. February 27, 2015 Dear Potential Processor: Attached is the Wake County Public School System (WCPSS) Child Nutrition Service’s bid. Who Owns Your Computer? When technology serves its owners, it is liberating. When it is designed to serve others, over the owner's objection, it is oppressive. There's a battle raging on your computer right now -- one that. Obtaining Authorizations — How the Process Works August 2016 Workers' Comp Coordination. By Liana Dyson, CRM, CIC, AIC, Claims Specialist, Pinnacol Assurance. Pinnacol Assurance employees often field questions on how the. Free HP Laptops for College Students. Unfortunately, the free HP laptop deal I was originally posting about has expired. Yet that doesn’t mean that there aren’t other ways to find a free laptop for college! News > In The Media Breaking Comtech TCS News. Leading Communications Firm Expands Location-Based Services in MENA Region European & Middle East Outlook- January 7, 2016 TCS adds 2 LBS customers in Mideast Telecompaper. Shop CLEAN REMOTE Spillproof Universal Remote Control (6KJC5) at Grainger. Log-in or register to view your pricing. Buy RCA RCR504BR 4-Device Palm-Sized Universal Remote at Walmart.com. The NAD Masters Series just increased its masterful performance with home theater, thanks to the new M17 multi-channel preamp/processor. Surround yourself with perfection. The M17 carries on the enviable task of representing. Today's advanced surround sound processsors require quality in the digital decoding stages, the video processing section, and in the power amplifier design for the best overall performance. The T 187 is an excellent example of. If you haven’t already, you should sign up immediately for Fastweb and keep an ear out toward the local news. Who Owns Your Computer? When it is designed to serve others, over the owner's objection, it is oppressive. There's a battle raging on your computer right now - - one that pits you against worms and viruses, Trojans, spyware, automatic update features and digital rights management technologies. It's the battle to determine who owns your computer. You own your computer, of course. But how much control do you really have over what happens on your machine? Technically you might have bought the hardware and software, but you have less control over what it's doing behind the scenes. Using the hacker sense of the term, your computer is . Whether through worms, viruses, Trojans or other means, they would try to install some kind of remote- control program onto your system. Then they'd use your computers to sniff passwords, make fraudulent bank transactions, send spam, initiate phishing attacks and so on. Estimates are that somewhere between hundreds of thousands and millions of computers are members of remotely controlled . Owned. Now, things are not so simple. There are all sorts of interests vying for control of your computer. There are media companies that want to control what you can do with the music and videos they sell you. There are companies that use software as a conduit to collect marketing information, deliver advertising or do whatever it is their real owners require. And there are software companies that are trying to make money by pleasing not only their customers, but other companies they ally themselves with. All these companies want to own your computer. Some examples: Entertainment software: In October 2. Sony had distributed a rootkit with several music CDs - - the same kind of software that crackers use to own people's computers. This rootkit secretly installed itself when the music CD was played on a computer. Its purpose was to prevent people from doing things with the music that Sony didn't approve of: It was a DRM system. If the exact same piece of software had been installed secretly by a hacker, this would have been an illegal act. But Sony believed that it had legitimate reasons for wanting to own its customers' machines. After all, that's why you bought it. But initially, the security programs sold by Symantec and others did not detect it, because Sony had asked them not to. You might have thought that the software you bought was working for you, but you would have been wrong. Internet services: Hotmail allows you to blacklist certain e- mail addresses, so that mail from them automatically goes into your spam trap. Have you ever tried blocking all that incessant marketing e- mail from Microsoft? You can't. Application software: Internet Explorer users might have expected the program to incorporate easy- to- use cookie handling and pop- up blockers. After all, other browsers do, and users have found them useful in defending against Internet annoyances. But Microsoft isn't just selling software to you; it sells Internet advertising as well. It isn't in the company's best interest to offer users features that would adversely affect its business partners. Spyware: Spyware is nothing but someone else trying to own your computer. These programs eavesdrop on your behavior and report back to their real owners - - sometimes without your knowledge or consent - - about your behavior. Internet security: It recently came out that the firewall in Microsoft Vista will ship with half its protections turned off. Microsoft claims that large enterprise users demanded this default configuration, but that makes no sense. It's far more likely that Microsoft just doesn't want adware - - and DRM spyware - - blocked by default. Update: Automatic update features are another way software companies try to own your computer. While they can be useful for improving security, they also require you to trust your software vendor not to disable your computer for nonpayment, breach of contract or other presumed infractions. Adware, software- as- a- service and Google Desktop search are all examples of some other company trying to own your computer. And Trusted Computing will only make the problem worse. There is an inherent insecurity to technologies that try to own people's computers: They allow individuals other than the computers' legitimate owners to enforce policy on those machines. These systems invite attackers to assume the role of the third party and turn a user's device against him. Remember the Sony story: The most insecure feature in that DRM system was a cloaking mechanism that gave the rootkit control over whether you could see it executing or spot its files on your hard disk. By taking ownership away from you, it reduced your security. If left to grow, these external control systems will fundamentally change your relationship with your computer. They will make your computer much less useful by letting corporations limit what you can do with it. They will make your computer much less reliable because you will no longer have control of what is running on your machine, what it does, and how the various software components interact. At the extreme, they will transform your computer into a glorified boob tube. You can fight back against this trend by only using software that respects your boundaries. Boycott companies that don't honestly serve their customers, that don't disclose their alliances, that treat users like marketing assets. Use open- source software - - software created and owned by users, with no hidden agendas, no secret alliances and no back- room marketing deals. Just because computers were a liberating force in the past doesn't mean they will be in the future. There is enormous political and economic power behind the idea that you shouldn't truly own your computer or your software, despite having paid for it. This essay originally appeared on Wired. EDITED TO ADD (5/5): Commentary.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |