jueves, 20 de octubre de 2022

Artificial Intelligence (AI)

 In the simplest terms, AI, which stands for artificial intelligence, refers to systems or machines that mimic human intelligence to perform tasks and can iteratively improve based on the information they collect. AI manifests itself in various ways.

AI has much more to do with process and the capacity for super-powerful thinking and data analysis than it does with any particular format or function. Although AI portrays images of high-functioning, human-like robots taking over the world, AI is not intended to replace humans. Its goal is to significantly enhance human capabilities and contributions. That makes it a very valuable business asset.

AI has become an umbrella term for applications that perform complex tasks that previously required human intervention, such as communicating with customers online or playing chess. The term is often used interchangeably with its subfields, which include machine learning and deep learning. There are differences, however. For example, machine learning focuses on building systems that learn or improve their performance based on the data they consume. It is important to note that while all machine learning is AI, not all AI is machine learning. To realize the full value of AI, many companies are making significant investments in data science teams. An interdisciplinary field that uses scientific and other methods to extract value from data, data science combines skills from fields such as statistics and computer science with business insights to analyze data collected from multiple sources.

Developers use artificial intelligence to more efficiently perform tasks that would otherwise be done manually, connect with customers, identify patterns, and resolve issues. To get started with AI, developers need to have a background in math and be comfortable with algorithms. When getting started with using AI to build an app, it's helpful to start small. By building a relatively simple project, like tic tac toe, for example, you'll learn the basics of artificial intelligence. Learning by doing is a great way to improve any skill, and artificial intelligence is no different. Once you've successfully completed one or more small-scale projects, there's no limit to where AI can take you.









Relationship of Emotions with Computers

 RELATIONSHIP OF EMOTIONS AND COMPUTERS


Deadlist Computer Viruses

 A computer virus is malicious code/program written to affect the operation of a computer. Like a biological virus, it is capable of reproducing and spreading from one system to another. It works by attaching itself to a legitimate program or document. Interestingly, the virus will remain passive on the host until it somehow executes the infected program, and then it will show its true colors. And by true colors, it can do serious damage to system software, corrupt files, steal passwords, permanently wipe data and even take over the entire system.


10. Sasser

Written by Sven Jaschan, a 17-year-old computer science student from Germany, this virus was so deadly that a $250,000 bounty was placed on the creator's head. Sasser was first discovered in 2004 as a Windows worm that slowed down and crashed the computer, only to restart after cutting the power connection. Sasser exploited a buffer overflow vulnerability in the Local Security Authority Subsystem Service (LSASS), which controls the security policy of local accounts, causing the computer to crash.



9. Flashback

We all know Macs as the epitome of privacy and security. The Trojan called Flashback proved otherwise, proving that even Macs are not immune. First discovered in 2011 by the antivirus company Intego, this Trojan horse tricked users into installing it by posing as an Adobe Flash installer.


8. Stuxnet
It was a multi-part worm that spread across Microsoft Windows PCs and traveled on USB drives. He looked for PLCs (specifically because of the presence of Siemens Step 7 software; software used by PLCs to automate and monitor electromechanical hardware).
7. CryptoLocker
CryptoLocker was a Trojan ransomware attack that infected more than 500,000 computers running on Windows. It encrypted the files and displayed a red ransom note asking for money in exchange for the encryption/unlock key. (And we think only the hijackers asked for ransom) The ransom demanded was usually $400 in prepaid cash or bitcoin.
6. Conficker
Also known as Downup/Downadup, it works by exploiting a network service issue present in Windows. Upon infection, the worm would change account lockout policies, block Windows updates, and log out user accounts, among many other routes. Eventually, the system would become a botnet slave and scam users out of money.
5. Code Red
This worm targeted systems with the Microsoft IIS web server installed and took advantage of a buffer overflow problem on the system. Code Red had a huge multiplicity, as it created hundreds and thousands of copies of itself, consuming a lot of system resources. Interestingly, it displayed the message - Hacked By Chinese on the affected web pages.
4. Zeus
Zeus, also known as Zbot, is a crimeware kit designed to steal users' online banking details and other important information to transfer money to secret bank accounts. It hit the web in 2007 and immediately picked up speed, being the reason for 44% of all banking malware attacks in the next 3 years.
3. WannaCry
It spreads using the EternalBlue exploit leaked by the National Security Agency (NSA). The exploit allows an attacker to transfer crafted packets to any device that accepts data from the public Internet on port 445. Once a system is infected, the worm multiplies and affects other unpatched devices, without the need for human interaction.
2. I LOVE YOU
The next time you receive a love letter, be careful because it could contain a virus. Jokes aside, the ILOVEYOU virus, also known as the love bug, is believed to be one of the most malicious and virulent computer viruses ever created on the face of the planet. He knocked on the user's door in the form of an email with the subject "I love you." The message contained an attachment 'LOVE-LETTER-TO-YOU.txt.vbs. Windows at the time could not display the actual extension of the file and users were stuck considering it to be a plain text file. Once opened, Visual Basic Script would activate and take over the local computer by overwriting the files itself and rendering the computer unbootable. It would also send itself to the user's entire mailing list, thus spreading much faster than any other email worm.
1. MyDoom
It worked similarly to the love bug; scraping email addresses from infected Windows computers and sending a new version of itself to those contacts. Every time the attachment was opened, the virus spread to more and more victims.

























Window´s Operating Systems

 Windows is a group of several families of proprietary graphics operating systems developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry, for example, Windows NT for consumers, Windows Server for servers, and Windows IoT for embedded systems.

Window´s 1.0

The first stand-alone version of Microsoft Windows, version 1.0, released on November 20, 1985, met with little popularity. The project was briefly called "Interface Manager" before the windowing system was implemented, contrary to popular belief that it was the original name for Windows, and Rowland Hanson, the head of marketing at Microsoft, convinced the company that the Windows name would be more attractive to customers. Windows 1.0 was not a complete operating system.

Window´s 2.X

Microsoft Windows version 2.0 (2.01 and 2.03 internally) came out on December 9, 1987 and proved slightly more popular than its predecessor. Much of the popularity of Windows 2.0 was due to its inclusion as a "runtime version" with Microsoft's new graphical applications, Excel and Word for Windows.

Window´s 3.0

Windows 3.0, released in May 1990, improved the capabilities of native applications. It also allowed users to better multitask with older MS-DOS-based software compared to Windows/386, thanks to the introduction of virtual memory. The Windows 3.0 user interface finally seemed like a serious competitor to the Macintosh computer user interface.

OS/2

During the mid to late 1980s, Microsoft and IBM had been cooperatively developing OS/2 as a successor to DOS. OS/2 would take full advantage of the Intel 80286 processor's previously mentioned protected mode and up to 16 MB of memory. OS/2 1.0, released in 1987, supported swapping and multitasking and allowed running DOS executables.

Window´s 95

After Windows 3.11, Microsoft began developing a new consumer-oriented version of the operating system codenamed Chicago. Chicago was designed to support 32-bit preemptive multitasking like OS/2 and Windows NT, though a 16-bit kernel would be retained for the sake of backwards compatibility. The Win32 API, first introduced with Windows NT, was adopted as the standard 32-bit programming interface while retaining compatibility with Win16 through a technique known as "thunking." A new object-oriented GUI was not originally planned as part of the release, although elements of the Cairo UI were borrowed and added as other aspects of the release (notably Plug and Play) slipped in.

Window´s 98

On June 25, 1998, Microsoft released Windows 98 (codenamed Memphis), three years after the release of Windows 95, two years after the release of Windows NT 4.0, and 21 months before the release of Windows 2000. It included new hardware drivers and the FAT32 file system that supports disk partitions larger than 2 GB (first introduced in Windows 95 OSR2). USB support in Windows 98 is marketed as a vast improvement over Windows 95.

Window´s 2000

Microsoft released Windows 2000 on February 17, 2000, as the successor to Windows NT 4.0, 17 months after the release of Windows 98. It has the version number Windows NT 5.0 and was Microsoft's business-oriented operating system upon release. official. on February 17, 2000, until 2001 when it was succeeded by Windows XP.

Window´s Server 2003

On April 25, 2003, Microsoft released Windows Server 2003, a significant update to Windows 2000 Server that encompasses many new security features, a new "Manage Your Server" wizard that simplifies configuring a machine for specific functions, and improved performance. . It is based on the Windows NT 5.2 kernel.

Winsow´s Server 2008

Windows Server 2008, released on February 27, 2008, was originally known as the Windows Server Codename "Longhorn". Windows Server 2008 built on the security and technology advances first introduced with Windows Vista and was significantly more modular than its predecessor, Windows Server 2003. Windows Server 2008 shipped in ten editions.







Window´s History

 The history of Windows dates back to 1981 when Microsoft started working on a program called "Interface Manager". It was announced in November 1983 as Windows, but Windows 1.0 was not released until November 1985.

From its initial release in 1985 through its continued active development in 2021 and beyond, Windows has been a major player in the consumer and enterprise PC ecosystem. Here is a brief overview of each version of Windows.

Up to and including all versions prior to Windows 2000, Microsoft used an internal version control system called the Source Library Manager (SLM). Shortly after the release of Windows 2000, Microsoft switched to a fork of Perforce called Source Depot. This system was used until 2017 once the system couldn't keep up with the size of Windows. Microsoft had started integrating Git into Team Foundation Server in 2013, but Windows continued to rely on Source Depot. Windows code was partitioned across 65 different repositories with a kind of virtualization layer to produce a unified view of all code.

In 2017, Microsoft announced that it would start using Git, an open source version control system created by Linus Torvalds and in May 2017 they reported that they completed the migration to the Git repository.




Artificial Intelligence (AI)

 In the simplest terms, AI, which stands for artificial intelligence, refers to systems or machines that mimic human intelligence to perform...