Abstracts - faqs.org

Abstracts

Engineering and manufacturing industries

Search abstracts:
Abstracts » Engineering and manufacturing industries

Poison Java: antidotes to malicious code are required above and beyond Java's own antigens if the programming language is to be immunized against security breaches

Article Abstract:

Java's strength is its platform independence, which allows Java applets to run in a Java-enabled web browser on any type of computer hardware or operating system, but its active content makes use of the system's resources and could potentially erase data or copy and transmit it to a third party. Malicious Java applets are able to modify the system, access private data, tie up the system's resources, or antagonize the user. Firewalls, data encryption and other traditional network security techniques cannot prevent malicious Java code. Different web browsers implement Java in different ways, so security flaws need to be identified for each specific browser. Two popular Java security solutions are digital signatures and sandboxes, which run code of unknown origin separately and limit what the code may do. Java 1.1 featured support for digital signatures, which encode binary files with a digital code, or signature, unique to a developer, distributor or certifier. A combination of techniques must be used to protect systems from potential malicious code in Java applets.

Author: Chen, Eva
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 1999
Software Publishers, Computer Language Software ex Military, Technology overview, Data security, Computer hackers, Java (Programming language), Data security issue, Hacker, Java (Computer program language), Java

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


A foundation of knowledge

Article Abstract:

The IBM Corp.'s Webfountain is dedicated to the purpose of blending the information, opinion, and falsehood that roils the Internet every second of every day. Its key ability to understand documents is to employ a more flexible approach to structuring data, than putting it in a database.

Author: Cass, Stephen
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 2004
Computers, Computers & Auxiliary Equip, Science & research, Research, Analysis, Computer industry, Microcomputer industry, International Business Machines Corp., IBM, System selection, Software/hardware leasing

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Anatomy of malice

Article Abstract:

Malicious software mostly falls into one of three classes: viruses, worms and Trojan horses. The structures, methods of operation and history of malicious software is discussed, and prevention countermeasures are described.

Author: Cass, Stephen
Publisher: Institute of Electrical and Electronics Engineers, Inc.
Publication Name: IEEE Spectrum
Subject: Engineering and manufacturing industries
ISSN: 0018-9235
Year: 2001
Management Informatn Computer Systems, Column, Management issue, MIS, Management information systems, Disk and file management software, Anti-virus software

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: United States, Computer software industry, Software industry, Safety and security measures, Prevention, Computer viruses, Virus
Similar abstracts:
  • Abstracts: Protecting the UPS from battery failure: UPS are installed to prevent power failure meaning business failure, so the last thing you need is the ups itself going down when it is pressed into action
  • Abstracts: An integrated inventory model for a single vendor and multiple buyers with ordering cost reduction. An inventory control model using fuzzy logic
  • Abstracts: Controller corrects vibrations on the fly. Changing ratios by wire beats a human. Charting a road to the future
  • Abstracts: Cycles optimization: The equivalent annuity and the NPV approaches. Revision of industrial supply conditions and game theory
  • Abstracts: Winging it. Let it entertain them; options for a rear-seat entertainment system to end the "Are we there yet?" chorus before it begins this summer
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.