Blog

Cycles in CS

Who among us does not remember an instructive story about how Tom Sawyer's aunt Polly's job was painting the fence: "Sighing, he dipped the brush into the bucket, picked up a Board fence, repeated the operation did it again..." (mark TWAIN. The Adventures Of Tom Sawyer).

Let us construct the algorithm for painting the fence. Suppose that we have a paint brush and enough paint. Write, for example, the following sequence of actions:

The concept of algorithm

We all use different algorithms, instructions, rules, recipes, etc. Usually we do it without thinking. For example, opening the door with a key no one's wondering in what order to perform actions. However, to someone (say, younger brother) to teach to open the door, will have to clearly specify the actions themselves, and the order of their execution. For example:

What a computer can do?

People have always sought to facilitate their work. For this they invented a variety of devices, mechanisms and machines that enhance various physical capabilities. But very few mechanisms have helped a person to perform mental work. This can be tolerated for hundreds of years until most people were mainly engaged in physical labor. However, over the past few decades, everything changed. Now nearly half of all workers in developed countries are engaged exclusively in mental work.

How to protect personal data on the Internet Part 1

Tell why our personal information every day are under threat, and share tips on how to protect personal information online.

Many people think that their data criminals are not interested, but experience shows that fame does not affect the willingness of intruders to acquire other people's personal information and to benefit from them. We reviewed the most popular scenarios where your data is at risk and will tell you what to do to keep personal information confidential.

Email

Cyber safety specialist hacked the drones

Indian cyber security expert Rahul Sasi (Rahul Sasi) was told about his way secretly to obtain full control of drones based on ARM Linux, steal them from the owner and even infect other drones, collecting thus the "zombie army". The results of the research he presented on January 26 in his blog.

According to the security officer of the Indian company Citrix Rahula Sasi, the threat of mass hacking of drones by real hackers. He found the vulnerability in operating systems on ARM based Linux is used in popular brands Parrot quadcopters and DJI Phantom.

The third digital war Part 1

During the last decade has been announced lots of predictions regarding what's going to be like prospective warfare, and also exactly what weapons it will likely be run. At the center of this zero has been developed a few apps such as its transformation of infantry components to separate electronic systems by means of augmented reality engineering. The app immediately power down, even offering the name of the majority of promising armed forces tech unmanned aerial cars. No pilots no casualties.

The third digital war Part 3

Rumors about a hundred thousand Chinese army hackers also difficult to consider exaggerated. In recent years in China, hacking has become a cultural phenomenon on a national scale. Hackers have not censured by the government and society, and became national heroes. The state finances the hacking competition, and the winners are recruiting for domestic surveillance of dissident minded citizens, and then for international cyber espionage.

Pages