-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathB-2-PT.html
174 lines (97 loc) · 7.38 KB
/
B-2-PT.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
<!DOCTYPE html>
<html>
<head>
<!-- META TAGS -->
<meta charset="UTF-8" />
<title>Changes</title>
<!-- STYLESHEETS -->
<link rel="stylesheet" href="assets/css/flexboxgrid.min.css" type="text/css">
<link rel="stylesheet" href="assets/css/_font-awesome.min.css.scss" type="text/css">
<link rel="stylesheet" href="assets/css/style.css" type="text/css">
</head>
<body class="color-1">
<!------------#NAVBAR_SMALL------------>
<div class=" row center-xs nav-small text-left title z-top no-margin no-padding">
<input type="checkbox" id="nav-trigger" class="nav-controller" />
<header class="header-bar">
<label class="" for="nav-trigger" tabindex="-1">
<div class="button--icon-container">
<span class="icon icon--hamburger"></span>
</div>
</label>
</header>
<aside class="nav">
<label class="overlay" for="nav-trigger"></label>
<div class="nav__body">
<ul class=" nav__list col-xs-12 min-margin-top">
<label class="nav__item" for="nav-trigger">
<li class="li-pad"><a class="start-xs " href="A-1-PT.html"> O papel do Homem nas mudanças do planeta</a></li>
<li class="li-pad"><a class=" start-xs " href="A-2-PT.html"> Crianças da Guerra </a></li>
<li class="li-pad"><a class=" start-xs " href="B-1-PT.html"> A vida na fronteira da rede computacional </a></li>
<li class="li-pad"><a class=" start-xs " href="B-2-PT.html"> A paranoia dos computadores</a></li>
<li class="li-pad"><a class=" start-xs " href="B-3-PT.html">Video</a></li>
<li class="li-pad"><a class=" start-xs " href="C-1.html"> Ver a luz </a></li>
<li class="li-pad"><a class=" start-xs " href="C-2-PT.html">Documentar fotografando</a></li>
<li class="li-pad"><a class=" start-xs " href="C-3-PT.html">Filme </a></li>
<li class="li-pad"><a class=" start-xs " href="C-4-PT.html">Underground Comix</a></li>
<li class="li-pad"><a class=" start-xs" href="D-1-PT.html">Jarfalla: Cidade do Fututro </a></li>
<li class="li-pad">
<a class="" href="index.html">
<button type="button" class="btn-modal">EN </button>
</a>
</li>
</label>
</ul>
</div>
</aside>
</div>
<section class="section-resized no-padding-top ">
<div class="row start-xs">
<div class="col-xs-6 semi-title z-down no-padding no-margin">
<a href="index-PT.html">
<p class="text-dark">Changes</p>
</a>
</div>
<div class="col-xs-6 smalltext z-down end-xs ">
<p class="min-margin-top">p.38-39</p>
</div>
</div>
<div class="row center-xs ">
<a class="end-xs col-xs-1 p-height" href="B-3-PT.html"> <img class="icon-a " src="assets/images/seta.png" alt=" ">
</a>
<a class="start-xs col-xs-1 p-height-left" href="B-1-PT.html">
<img class="icon-a " src="assets/images/seta-esq.png" alt=" ">
</a>
</div>
<div class="row center-xs">
<p class="title text-dark col-xs-12 no-margin-bot"> A paranoia dos computadores</p>
<p class="text col-xs-12 col-sm-10 col-lg-8 no-margin-top text-right">
by Dirk Hanson
</p>
</div>
<div class="row center-xs text-left ">
<p class=" col-xs-12 col-sm-10 col-lg-8 no-margin-bot">
A report compiled for the business community by Stanford Research Institute’s Business Intelligence Program has this to say: “The reason (distributed processing) in computer networks will not be available to the general public at an earlier date is primarily one of security. At present, fraudulent input or access to a data base management system cannot be prevented”.
</p>
<p class="sm-indent no-margin-bot col-xs-12 col-sm-10 col-lg-8"> This is a vital piece of information that the industry does not want you to know. There’s this security problem. Large, flexible time-shared computer systems are swiss cheese.</p>
<p class=" col-xs-11 col-sm-10 col-lg-8 no-margin-bot semi-title text-dark">
Pergunte a um programador. O cyber-crime é uma indústria em crescimento. A segurança dos computadores é um mito.
</p>
<p class="sm-indent col-xs-12 col-sm-5 col-md-5 col-lg-5 sm-margin-tx">For every other new data encryption system, there’s a programmer out there somewhere who can crack it. A program that sneaks you into an operating system is called a Trojan Horse. At most computer centers, the Trojan Horse is already inside the gates. Some grim worst-case scenarios might just be floating through corporate corridors these days. Striking British civil servants recently turned off key government computer systems, and the result was chaos. Some of the information and assets probably will not be recoverable. The strikers simply pulled the plugs.
</p>
<img class="ill const col-xxs-12 col-xs-8 col-sm-5 col-md-5 col-lg-5 sm-margin-top no-margin-bot" src="assets/images/B-2.jpg" alt=" ">
<figcaption class="smalltext end-xs col-sm-5 col-lg-offset-3 col-md-offset-5 col-sm-offset-5 col-xs-10 no-margin-top shadow"> Photography that represents the writers view on the subject We´re all dummies in the hands of government agencies.</figcaption>
<p class="col-xs-12 col-sm-10 col-lg-8 sm-indent no-margin-bot">
Crude, but effective. But what about the likelihood of more sophisticated guerilla tactics, as computer know-how spreads throughout the populace? Quite a quandary for industry people: They want you as a customer, but can they trust you? They need to sell you computers and teach you the mechanics of programming, but they don’t want to let you too far into the distributed processing loop. As time goes by, you could become too smart for their own good.
</p>
<p class="col-xs-12 col-sm-10 col-lg-8 sm-indent no-margin-bot">Computer paranoia cuts both ways. The industry may be nervous about
widespread consumer participation in future networks, but it seems much less concerned about consumer privacy abuses in current systems. It’s common knowledge — at least it should be — that information which goes into such
systems, information about you, your habits and activities.
</p>
<p class="col-xs-12 col-sm-10 col-lg-8 sm-indent no-margin-bot">It’s a muddy affair. Who decides who gets access to what? There’s reason to be wary of controls and Limitations on access to digitized information, and equal reason to worry about what will happen if there are no such controls. The deciding in theory will be a sociopoHtical matter; the accessing in truth will be by those who know how. And the what being accessed will be almost everything.
</p>
</div>
</section>
</script>
</body>
</html>