May. 1st, 2008
CompSci for Today
May. 1st, 2008 03:58 pm10 FOR I = 1 to 100
20 PRINT "Hello World!"; I
30 NEXT
40 END
That was the first AppleBasic program that I have written in over a decade! If you want to play around with AppleBasic, you can go here for an emulator that was written in, of all things, Javascript! http://www.calormen.com/Applesoft/
Thanx
syreene for the link!
ttyl
20 PRINT "Hello World!"; I
30 NEXT
40 END
That was the first AppleBasic program that I have written in over a decade! If you want to play around with AppleBasic, you can go here for an emulator that was written in, of all things, Javascript! http://www.calormen.com/Applesoft/
Thanx
![[livejournal.com profile]](https://www.dreamwidth.org/img/external/lj-userinfo.gif)
ttyl
Anyone who has read Stephenson's Cryptonomicon knows about "van Eck" radiation, that is, the electromagnetic signals that a computer emits that can be picked up and decoded, allowing another person to see exactly what you are doing on your computer, without you having any way of knowing they are doing it.
Recently, The US National Security Agency declassified a wonderful history of this type of evesdropping from their internal, classified magazine, and made the PDF of it available on their web site:
http://www.nsa.gov/public/pdf/tempest.pdf
It is titled "TEMPEST: A Signal Problem", and it gives a history of how intelligence agencies have been using this effect, going back as far as World War II! Basically, as long as encyrption has been done electronically, it has been vulnerable to being read remotely.
But they tell the story better than I can, go, and read the article!
ttyl
Recently, The US National Security Agency declassified a wonderful history of this type of evesdropping from their internal, classified magazine, and made the PDF of it available on their web site:
http://www.nsa.gov/public/pdf/tempest.pdf
It is titled "TEMPEST: A Signal Problem", and it gives a history of how intelligence agencies have been using this effect, going back as far as World War II! Basically, as long as encyrption has been done electronically, it has been vulnerable to being read remotely.
But they tell the story better than I can, go, and read the article!
ttyl