Why Bill Gates Hates LuxorWritten by David D. Deprice
As addictive as it is exciting, Luxor ( http://www.deprice.com/luxor.htm )is an action-puzzle game that takes you on a thrilling adventure across lands of Ancient Egypt. The mysterious goddess, Isis, has enlisted you to battle Set and his evil minions. With 88 mind-blowing levels, challenge will not be an easy one. You must use your mystical winged scarab to shoot magical spheres and destroy approaching colored spheres by making matches of three or more. Stop them all before they can reach pyramids at ends of paths... or all of Egypt is doomed!
To aid in your quest, unleash awesome powers of Isis by catching various falling power-up talismans, such as explosive Fireballs, thundering Lightning Bolts or magical Multi-Color Spheres that make matches of any spheres. Eliminate an entire chain of spheres to destroy scarab minion pushing them and collect sparkling bonus gem hidden within. You can even earn an extra life by collecting 30 golden Ankh coins.
Computer Security - What Exactly Is It?Written by Ciontescu Molie
Although term 'computer security' is used a lot, content of a computer is actually vulnerable to only a few risks unless computer is connected to others on a network. As use of computer networks (especially Internet) has increased dramatically during past few years, term computer security is now used to describe issues referring to networked use of computers and their resources.
The major technical areas of computer security are confidentiality, integrity and authentication/availability. - Confidentiality, also known as secrecy or privacy, means that information you own cannot be accessed by unauthorized parties. Breaches of confidentiality range from embarrassing to disastrous. - Integrity means that your information is protected against unauthorized changes that are undetectable to authorized users. The integrity of databases and other resources are usually compromised through hacking. - Authentication means that an user is who he claims to be. - Availability means that resources are accessible by authorized parties. Examples of availability attacks are 'denial of service' attacks.
Other important things that computer security professionals are concerned about are access control and nonrepudiation. Access control refer not only to fact that users can only access resources and services they are entitled to, but also to fact that they can't be denied to access resources they legitimately expect. Nonrepudiation means that a person who sends a message cannot deny he sent it and vice versa.