Locking up computers with encryption
Article Abstract:
The increased use of networks and personal computers has increased companies' exposure to unlawful and malicious entry into their computer system. Some entry does no permanent damage to systems, but others can destroy data. Destructive programs include: time bombs which are introduced to a system and destroy hard disk data at certain times; Trojan horse programs which appear to be operating normally but are actually destroying data; and worms and viruses which can replicate themselves. Most companies are protecting themselves with outdated password systems, but some are experimenting with new encryption systems. Abstract Computer Ltd has developed an encryption system featuring an transputer-based Dataloc Key which uses standard data encryption to code information on hard disk and verify logon identifications.
Publication Name: The Accountant's Magazine
Subject: Business
ISSN: 0001-4761
Year: 1989
User Contributions:
Comment about this article or add new information about this topic:
Suppliers fight back on Open Systems
Article Abstract:
The adoption of Open Systems, a computing standard that eliminates many of the compatibility problems of software since it makes such software transportable across machines, is costing suppliers of proprietary systems money. For one, the European Commission prefers that public sector procurement should comply with Open Systems specifications. Tight competition and low profits add to the suppliers' woes. All is not lost, however. These suppliers have sought to regain their market share by establishing strategic alliances. So far, such corporate agreements are working smoothly.
Publication Name: Public Finance and Accountancy
Subject: Business
ISSN: 0305-9014
Year: 1992
User Contributions:
Comment about this article or add new information about this topic:
Let's Put the Personal Back in Personal Computers
Article Abstract:
Many business people are dissatisfied with the personal computer they bought for the office. Increased productivity will only come through encouragement. Barriers to usage should be removed so people feel at ease to experiment. It should not be viewed as a mainframe extension, but as an independent problem solver.
Publication Name: Massachusetts CPA Review
Subject: Business
ISSN: 0025-4770
Year: 1983
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: Applying microcomputers to capital budgeting decisions. Raising risk capital on the third market
- Abstracts: Value creation by company-consumer interaction. Dynamics of repeat buying for packaged food products. Discriminant analysis of consumer interest in buying locally produced foods
- Abstracts: Selective solvent interaction in a fluorous reaction system
- Abstracts: OTP: maintaining a position of leadership. Leading the way in the Gulf. VTB: a new vector of leadership
- Abstracts: Cellular Mobile Communications and Its Impact on Metro Areas