Signal Of Forex

Showing posts with label Computer and Internet. Show all posts
Showing posts with label Computer and Internet. Show all posts

Using the logical operators

Posted by Tricking Saturday, November 22, 2008 0 comments

Using the logical operators in Java 
by Joe Keny

The logical operators to introduce the concept of Boolean algebra to the Java language. They are a fundamental part of the language and can make conditional code cleaner and more concise. Programmers often use the logical operators in connection with the statements to evaluate, whether true or false .

Use the operator AND 

Use the AND operator (whose symbol is & &). In Java, & & evaluates to true if and only if its two operands (objects manipulated) to assess the true .

understand that their operands can be any expression that evaluates to a Boolean value. This includes any comparison operator (such as greater than>, less than <== or equal to), any method that returns a Boolean or boolean variable itself. "" Int a = 7; int b = 10; if (a> 4 & & b <20) (/ / This will be true, since both operands to the & & operator to assess the true) "" 

Use the OR and NOT 

Use the OR operator (whose symbol is | |). | | Evaluates to true if one or both of its operands evaluate to true. Operands can be any expression that evaluates to a boolean. "" Int a = 10; int b = 40; if (a == 7 | | b> a) (/ / This will be true. Despite the first operand evaluates to false, / / the second will be assessed a true .}""

Consider using the exclusive OR operator (or XOR, whose symbol is ^). evaluates to true if you are good, but not so much of their operand evaluates to true. In this case, the XOR operator is used as a Boolean logic. "Int a = 7; int b = 10; if (b> a ^ b == 10) (/ / This will evaluate to false because both operands are true }""

Reverse the result of a Boolean expression in Java using the logical NOT NO (whose symbol is!). If your operation is certainly not the expression will evaluate to false .

Use the NOT operator with parentheses and other expression since Boolean operator does not bind very closely (operator of your choice is very high). The exception is if it is paired with a single boolean variable. This example demonstrates the use of Boolean NOT "." Int a = 7; int b = 10; if (! (A == b)) (/ / This is to assess from a certain b == be false, and the operator does not invest }""

Bluetooth Makes it Easy

Posted by Tricking 0 comments

An Overview of After Market PDA Bluetooth Accessories 
 by: R James Cook  

Bluetooth Makes it Easy for All Your Devices and Accessories to Work Together 

Bluetooth is one of the latest marketing buzzwords for PDAs and cellular phones, along with PCs and especially laptops. It is a wireless technology designed to let products and accessories built by different manufacturers work together, without requiring special access codes or driver installation. Theoretically, any Bluetooth accessory should work with any Bluetooth-enabled device, and multiple accessories working with the same device shouldn't interfere with each other. 

For example, if you pick up a Bluetooth headset for your current PDA, and then in a year's time replace it with a new PDA, the headset should work with the new PDA without any difficulties. With some older PDA Bluetooth accessories and devices, this is not always the case, but generally the more recent the design of the accessory or device, the more likely it is to work with other Bluetooth products. 

PDAs, Cellular Phones, and Computers 

New PDAs today resemble cellular phones as much as classic PDAs like the Palm Pilot. Most of these devices are Bluetooth-enabled, and even have the capability to link with other Bluetooth-enabled PDAs and cellular phones to exchange data. For models that are not Bluetooth-enabled, there are frequently PDA Bluetooth accessories available that will add Bluetooth capabilities to the unit. Bluetooth adapters are also available for PCs and laptops, usually plugging into a USB port, allowing you to easily exchange data between your computer and your PDA. 

Just about any type of data can be transferred over a Bluetooth link, from electronic business cards and pictures to word processing documents and PowerPoint presentations. For transferring data from a PDA to a computer, special software is often needed and included with the Bluetooth adapter. However, PDAs running Windows Mobile can communicate natively with computers running Windows XP Service Pack 2 or Windows Vista. 

Having a Bluetooth PDA and a Bluetooth adapter for your computer can eliminate the need for a docking station or sync cable, removing one more piece of clutter from your desktop. You can even set the two devices up so they automatically synchronize their data when they're in range of each other. 

Other PDA Bluetooth Accessories 

Headphones and headsets are the most common PDA Bluetooth accessories right now. Wireless headphones are great if your PDA has music stored on it, because you don't have an unsightly wire running from your head to your pocket or purse. Headsets and earpieces allow hands-free operation of your cell phone or smart phone, which is not only convenient but is also quickly becoming a legal requirement world-wide for using your phone in your car. 

Printer manufacturers are quickly adding Bluetooth capabilities to their products, turning them into convenient PDA Bluetooth accessories. Previously, to print something stored on your PDA, you had to use the docking station or sync cable to download the information to your computer, then print it from the computer. With a Bluetooth-enabled printer, you can send your data directly to the printer without the intervening steps. If your computer is also Bluetooth-enabled, it can send data to the printer as well, eliminating the need to hook up the printer to the computer or network. 

There are many other PDA Bluetooth accessories available for your PDA, and with Bluetooth it doesn't matter who manufactures either the device or the accessory. A Motorola headset will work with an iPhone, and a Palm Tungsten can print spreadsheets on a HP LaserJet. Manufacturers are constantly coming up with new PDA Bluetooth accessories to meet the demands of consumers. Bluetooth technology is making it easier for everyone to communicate.

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders? 
 by: Tim Maliyil  
The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security. 

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage. 

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired. 

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally. 

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters? 

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access. 

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files. 

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests. 

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right. 

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns. 

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers. 

The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security. 

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage. 

Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired. 

Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally. 

Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters? 

Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access. 

What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files. 

Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests. 

Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right. 

The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns. 

Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.


ShoutMix chat widget