Back to category: Technology

Limited version - please login or register to view the entire paper.

Impact of technology in the work place

SECTION A III
METHODOLOGY III
INDEX BASED (DIRECTORIES) III
HIGHLIGHTS OF ALTAVISTA. III
META SEARCH SITES III
SECTION B IV
FIREWALLS. IV
WHAT IS A FIREWALL? IV
WHAT IS ENCRYPTION? IV
HOW IT WORKS. IV
HOW IS IT OVERCOME? IV
FILTERING SOFTWARE V
WHAT IS FILTERING SOFTWARE? V
HOW IT WORKS V
KEYWORD BLOCKING V
SITE BLOCKING V
WEB RATING SYSTEMS V
SOME EXAMPLES OF FILTERING SOFTWARE: V
COMPUTE VIRUSES VI
WHAT IS A COMPUTER VIRUS? VI
DIFFERENT TYPES OF VIRUSES VI
HOW DO YOU RECOGNISE A HOAX? VII
WHAT IS DIGITAL SIGNATURE? VIII
HOW DIGITAL SIGNATURES ARE CREATED VIII
STEP 1 THE HASH VIII
STEP 2 ENCRYPTION VIII
STEP 3 CERTIFICATION IX
HOW IT WORKS IX
A DIGITAL SIGNATURE MIGHT LOOK LIKE THIS. X
CAN THEY BE INTERFERED WITH? X
SECTION C XI
TERMS OF REFERENCE XI
FINDINGS. XI
1) HOW INFECTION OCCURS XI
2) PARASITE V...

Posted by: William Katz

Limited version - please login or register to view the entire paper.