Miyerkules, Hulyo 30, 2014

Law & Order

1.    Cellphone – FACT
Everyone currently uses Cellphones today. In fact, cellphones are now a necessity to everyone. Before, cellphones function as a portable telephone then came in texting and now, we have this so called smartphones. Smartphones can do a lot more and are like portable or small computers. It is more advance and is more capable of doing different tasks. It can also now connect to the Internet.

2.    Desktop Computer – FACT
In the movie, the use these computers to hack into a system or to access files. All the actions or processes they did really exist.

3.    Credit Cards – FACT
A small plastic that a person is carried almost anywhere and can be used as a system of payment.

4.    Password Protected – FACT
To be able to protect our files, people add passwords to their files. Only people who knows the password can access the file.  Not all files can be password protected.

5.    Breaking in someone else’s password – FACT
This is basically also hacking. There are plenty of ways to invade in someone’s privacy. Nowadays, it is not that hard to hack into someone’s account. As we get comfortable with advances, we also find out ways on how to protect our privacy. Like installing different soft wares to protect our computers. There also anti-virus applications that can detect when there’s a bug in our e-mail or in websites we open. Since those bugs can interrogate our computers. Hackers can easily obtain data or information faster because almost all people have access to the Internet.

6.    Pulling out a data before it was changed/ edited – FALSE
            Once data is saved then closed, you can no longer undo all the changes you’ve made. Unless you’ve made a back up of the old file or you saved the new file with a different file name.

7.    Downloading porn from the internet- FACT
  It’s not just porn that you can download. You can also download different videos from the Internet using a converter. There are a lot of these freeware and it is also available online. By just looking it up on Google, you can see a lot of converters. And some videos have a direct download.

8.    Deleting still leaves a copy on the hard drive- FACT
            Emptying your recycle bin isn’t enough. The file still leaves a little on the hard drive. The actual bits are still there. Even when you format the hard drive, the files are still there for those who knows how to read them.

9.    Access to a computer and altering a file- FACT
In USA, they have this so called Computer Fraud and Abuse Act (CFAA). With this act you can go to jail once you’ve been proven that you’re accessing someone else’s computer without authorization and also accessing their files.

10.  Sending a worm, attached in an email and being able to access someone’s computer – FACT
RATs or Remote Access Trapdoor is a worm that once open can gain access to your computer. It can get all the files you have. Once it is attached to the computer it can execute whatever the hacker commands to do.

11. Survivor chat room- FALSE
This chat room doesn’t exist. In fact, if you Google this, you’ll find rape survivors stories.

12. Access nation or selling information – FALSE
The selling of information is different as what it was said on the episode. But there are so called Infopreneur. They can be a person or a bot, and they gather and sell data. They sell a different data on the Internet.

13. Spyware – FACT
This is a type of software that can gather information without the person knowing. They can be Trojans, adware etc. It doesn’t only look into the person’s computer but this can also collect personal information like user logins and bank or credit account information.


14.  Face Recognition Software – FACT
Apple and Facebook have this kind of software. In Apple’s iPhoto, your photos can be sorted by face or whoever’s in the photo. Facebook uses DeepFace and other big companies also has this kind of software like Google and Sony. Google uses Picasa and Sony uses Pictrue Motion Browser. This software is a computer application that can detect, identify or verify a person from a digital image.

15. National ID Cards – FACT
According to Margaret Rouse, a national identity card is a portable document. It is a plasticized card with digitally embedded information that someone is required and encouraged to carry as a means of confirming their identity.









0 (mga) komento:

Mag-post ng isang Komento

Pinapagana ng Blogger.