ActiveX Essays

  • Chapter 9 Project 9D Recording and Assigning a Macro

    760 Words  | 2 Pages

    taught throughout chapter 9 that was able to be mastered in order to complete project 9D. In this particular project we was responsible of recording/assigning a macro, being able to activate the macro in sequence , writing a set of commands, using ActiveX control buttons, and add or take away from the commands code (View Code feature). Those 3 skills was the major lesson of the entire chapter 9. This was a pretty lengthy chapter that’s full of new, interesting, and useful material. Starting off with

  • OLAP, Data Marts and Warehouses, Three-Tier Architecture and ASP

    1829 Words  | 4 Pages

    WEEK 4 INDIVIDUAL PAPER OLAP, DATA MARTS AND WAREHOUSES, THREE-TIER ARCHITECTURE AND ASP DBM405 OLAP, Data Marts and Warehouses, Three-Tier Architecture and ASP OLAP The term OLAP stands for ‘On-Line Analytical Processing’. OLAP is a technology used to process data a high performance level for analysis and shared in a multidimensional cube of information. The key thing that all OLAP products have in common is multidimensionality, but that is not the only requirement for an OLAP

  • Comparison Of Java, Javascript, Java Applets And Java Beans

    1827 Words  | 4 Pages

    Comparison of Java, JavaScript, Java Applets and Java Beans Introduction Starting back in the early 1990's with the introduction of Java to the computer scene there has been many updates and advances in how languages interact with web based programs. In this paper we are going to highlight several areas of several different Java flavors. The flavors we are addressing are Java, JavaScript, Java Applets and JavaBeans. We will discuss their history, features, usage and syntax and finally follow

  • Malware Essay

    654 Words  | 2 Pages

    application Root-kit To hide the actual malware from system information Spyware Spies on the user habits and data and sends it Phising ... ... middle of paper ... ...a malicious site where the malicious code like the activex control can be downloaded on to the users system. This infects the users computer. References: [1]Exploitation—Social Networks Malware, ISACA Journal,http://www.rkmingenieria.com/ifol/wp- content/uploads/2011/03/ISACA_JAN_2011_ChainExploitation.pdf

  • Spyware

    744 Words  | 2 Pages

    Spyware Spyware is becoming a reoccurring topic of conversation with most computer users nowadays. It has evolved into one of the most annoying and frustrating problems your computer can encounter. Although it is not a virus, it can still rob the computer of vital processing power. It is not there to actually harm the computer, but to hide behind the scenes and view the computer’s activity. In some cases, this is actually worse than a virus. Spyware is a category of computer programs that attaches

  • Computer Viruses and Malware

    863 Words  | 2 Pages

    INTRODUCTION Two of the common known attacks on computing systems are the deployment of computer viruses and malware. Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through

  • Thin Client vs Fat Client on Network Design

    1053 Words  | 3 Pages

    Thin Client vs. Fat Client & Network Design Considerations Introduction Network computing was created in an effort to allow users of a computer application to share data more easily than using stand alone computers. Clients on a client/server network store their application data on a central server. There are two categories of clients on a network. They were originally categorized by their hardware design, but today clients are categorized by the software application design and where the bulk of

  • Printer Case Study

    1108 Words  | 3 Pages

    viruses, e-mail spoofing, chat clients, overseas money transfer scam, Trojan Horse programs, Denial of Service Attack (DOS Attack), being an intermediary for another attack, modem hijacking, unprotected windows shares, mobile code (Java/JavaScript/ActiveX), cross-site scripting, hidden file extensions and packet sniffing. b) Internet security is a tree branch of computer security specifically related to the internet, often involving browser security but also network security on a more general level

  • Web Design

    1206 Words  | 3 Pages

    that companies have been working on making Web pages more interactive is enhancing methods that they already have created. For example, dynamic hypertext mark-up language (DHTML) was created for the use of dynamic sites, such as Java applets and ActiveX. These forms have been recognized as means of maintaining standard equality throughout the development proce... ... middle of paper ... ...r. Web design is a booming career field that pays well and is certain to attract young “hotshots” out of

  • An Overview of Web Development and Design

    1578 Words  | 4 Pages

    An Overview of Web Development and Design According to World Wide Web pioneer Timothy Berners-Lee, the World Wide Web's initial purpose was to provide "an interactive world of shared information through which people could communicate with each other and with machines" (1996: p 1). Originally developed at the European Center of Nuclear Energy (CERN) in Geneva, Switzerland, the Web emerged in 1989 as a way for Dr. Berners-Lee and some of his distant associates to work on particle physics projects

  • TrueCrypt and Spybot: A Forensic Exploration

    1247 Words  | 3 Pages

    Throughout this course many software packages have been discussed as far as their usefulness and application in a computer forensics environment. I have chosen to write about encryption, as well as anti-spyware software. Specifically I will discuss TrueCrypt and Spybot – Search and Destroy. TrueCrypt is a freely available disk encryption package. It is also open-source, which allows independent developers to legally change/modify and/or expand upon the software at their discretion, so long as

  • An Introduction Of Boundscheckers

    1268 Words  | 3 Pages

    BoundsChecker Introduction: BoundsChecker is a utility for checking applications for bugs like memory overwrites, reading not initialized memory, use of dangling pointers and much more.It is a memory checking and API call validation tool used for C++ software development with Microsoft Visual C++. BoundsChecker is an indispensable tool for Windows programming. It finds errors very efficiently (including tons in Microsoft's code!!). Its main focus is on finding memory leaks. Creation and Version History:

  • Poison Ivy and the “Nitro” Attacks

    1338 Words  | 3 Pages

    Poison Ivy and the “Nitro” Attacks Poison Ivy is the name given to a family of malicious remote administration Trojans first developed in 2005 and still being utilized for cyber attacks today. As a type of remote administration software, once a computer becomes infected the attacker has complete control of the computer. The most recently documented large-scale utilization of the software was during the “Nitro” attacks from July 2011 through September 2011 that targeted both chemical and defense

  • Enterprise Application Integration (EAI)

    1772 Words  | 4 Pages

    EAI – What is it? EAI – Enterprise Application Integration. Currently the toast of the consulting classes, replacement to ERP, the new universal IT panacea. As with everything else there is a glint of gold in this but you do have to dig hard to find it. There are a wide variety of so called EAI solutions. As with all IT, the only way that an EAI solution will work for you, is if your IT system currently works for you. EAI is not a magic bullet. It will not recreate your business process making

  • How Effective is Online Education?

    2438 Words  | 5 Pages

    Abstract: Recently, there has been a rush to create web-based instructional courses. The approach that is being taken to create web-based courses is to create websites that will function as the central distributors of information and materials. Based on the format and content of the course, the student is to go through lesson by lesson to complete courses. In this paper, I address some of the problems inherent in this approach, especially with respect to 18-22 year-old undergraduate education

  • Remote Control Software Used in a Local Area Network

    8706 Words  | 18 Pages

    Remote Control Software Used in a Local Area Network Introduction Remote control software can solve many of the problems that an administrator or user can encounter on a local area network. Using a remote-control program, one can access a PC remotely to exchange files between systems, run applications, take control of a client PC or server in order to troubleshoot a problem, and much more. Remote-control software is an application that you install on two PCs that permits one system (the guest)