technology

Anatomy of DDoS

Dissecting Large Scale Internet Attacks

Analog to Digital: The Quantification of Love

Love is a holistic experience that cannot be contained merely in the mind or the body. Without physical chemistry, there is no sexuality. Without common interests or attitudes, there is no friendship. However, even if both mind and body are perfectly matched, there is still no guarantee that the subjects will “fall in love,” and perhaps those who would never think of associating with each other based on appearance or behavior are missing out on the love of their lives.

Stuxnet: Digital Industrial Sabotage or Cyber-Weapon of Mass Destruction?

The story of Stuxnet reads like a cross between a work of cyberpunk fiction and an international spy novel. In 2009 the world community was intensely debating the immediacy of Iran’s nuclear weapon program readiness. Meanwhile, a clandestine software project, sponsored by a cyber superpower with vast resources, was engaged in coding the first known malware rootkit to monitor and subvert the programmable logic controllers of an industrial system, allegedly the Iranian Natanz uranium enrichment facility.

Debating Executive Control of the Internet: A Critical Ethical Analysis of the Kill Switch Bill

Since its mainstream popularity blossomed in the late 1990’s, the Internet has become tightly woven into the fabric of modern society. Linking together many formerly disconnected institutions and technics, the invention of this high-speed communication medium has also pushed freedom of speech issues to the forefront of the debate about protecting the highly pervasive technology and the critical infrastructure it serves from disruptive events. There is a protectable national security interest in ensuring that the Internet does not serve as a route for terrorists or hackers to commit digital attacks on the many vital services which are now inextricably connected to the network.

Not On My WaveLength: Risk Perception & The Sebastopol Wi-Fi Debate

Sebastopol is a bucolic little hamlet seated in the western portion of Sonoma County, California. Formerly known for its Gravenstein apples, most orchards have long been planted with vineyards, or converted into the corporate grounds of the tech publishing firm O’Reilly Media. But several years ago a heated battle served to overturn the relative serenity of this community. The conflict erupted over the town’s implementation of a contract for a public Wi-Fi network in its main plaza.

The Status of Women in Computer Science

Thesis Humanity has concurrently developed computer technology and progressed in the area of women’s rights during the course of this century. Although women are making progress and gaining equal treatment from society, there is a large gap between the numbers of men and women participating in the field of computer science. According to the 1996 CRA Taulbee Survey, only 16% of the Bachelors degrees in Computer Science were awarded to women.

How an Equation Changed Warfare

Outline Thesis: Einstein’s equation, E=mc2, and the subsequent development of nuclear weapons, has led to an irrevocable change in warfare. Introduction The Development of Nuclear Weapons The Power of Nuclear Weapons The Effects of Nuclear Weapons Changes in tactics The obsolescence of ground troops Civilians as targets The threat of nuclear retaliation Limitation on types of war Guerrilla wars, revolutionary wars, and invasions Surrogate wars Promoter or deterrent?