Wednesday, December 18, 2013

Computer Graphics

Computer graphics are a blatant example of how much computer technology has improved. The difference between a LCD monitor and a CRT TV is huge. If you show a Ps1 game and a Ps4 game it is astronomical how different the games are. Caring this between the watch design of a watch created  being 20 years ago and the a watch being created today, the overall feel is pretty close. There is certainly differences but for the most part, a watch's basic functionality and design hasn't changed that compared to the basic functionality and design of a graphics card or integrated graphics card.

Here is a quick comparison between the IBM 8514a (yes, IBM made graphics cards!!!)
And the Nvidia Titan.
The sheer difference between size and power is clearly shown, there wasn't even fans on the one of the first graphics cards. The architecture and chip design has made major improvements as well as the general audience buying computers has improved. Allowing for the technology to improve at an amazing pace.

Sunday, December 1, 2013

Computer Security and Cryptogrophy


Computer security is an ever increasing field. With the recent boom of corporate hacking, nation state hacking, and organized criminal hacking and interception cryptography is a big deal.

So where do we start? How do we protect our data? What are viable means are there and how do we go about do we go about researching these topics?

There are a few key things to consider in building security.
1. What are you protecting?
2. Who are you protecting the information from?
3. How much do you care about protecting the information?
4. How much do you plan on investing in terms of time/money/personnel/ and future expenses?
5. Can you do anything once you've detected that information is no longer secure?

If you are trying to protect your information against people who are spying on you with binoculars and already are tapping your line between you and your internet service provider, I'd recommend trying to change locations then setting up some form of PGP(Pretty Good Privacy) encryption and remote login of that computer.

If you are worried about someone taking your hardrive, you probably want to encrypt your hard drive and have the encryption key written down somewhere far away or far on another device that no one knows about.

As far as standard communication, and files, I'd recommend using a PGP encrypted chat client and encrypting your hard drive as well as not downloading or installing any non libre software. As the likelihood that proprietary software is tracking you in some fashion is extremely high.