G$earch

Ed Roberts, creator of the Altair 8800, dies

Posted by Harshad

Ed Roberts, creator of the Altair 8800, dies


Ed Roberts, creator of the Altair 8800, dies

Posted: 02 Apr 2010 10:12 AM PDT

Dr. Ed Roberts,  co-founder of Micro Instrumentation and Telemetry Systems (MITS) and creator of the Altair 8800 died yesterday, April 1, 2010. He was 68.

If not the first home computer, Dr. Roberts’ Altair 8800 was definitely the first successful one. In memory of  his accomplishments, I’m republishing a few photos from our gallery of the Altair 8800. Erik Klein, vintage computer collector and Webmaster of Vintage-Computer.com, takes you inside the Altair 8800 as he restores one of these classic machines.

Erik has graciously allowed us to republish his photos and descriptions. You can find a much more detailed description of Erik’s Altair restoration in our gallery, “Inside the Altair 8800 vintage computer,” and on Erik’s Web site Vintage-Computer.com.

For more information on Rd. Ed Roberts and his contributions to the world of computing, try the following:

Next Page (More photos) »



10 jobs within cybercrime organizations

Posted: 02 Apr 2010 07:45 AM PDT

Just as doctors specialize in a particular field of medicine, cybercriminals often focus on a single area of technical crime, according to Steven R. Chabinsky, FBI Deputy Assistant Director, Cyber Division. During his keynote address at the GovSec/FOSE Conference in Washington, D.C. last March, Chabinsky outlined 10 specializations the FBI typically sees within the world of cyber crime.

They are:

  1. Coders or programmers: “who write the malware, exploits, and other tools necessary to commit the crime;”
  2. Distributors or vendors: “who trade and sell stolen data, and act as vouchers of the goods provided by the other specialties;”
  3. Techies: “who maintain the criminal infrastructure, including servers, bulletproof ISPs, and encryption; and who often have knowledge of common database languages and SQL servers of course;”
  4. Hackers: “who search for and exploit application, system, and network vulnerabilities to gain administrator or payroll access;”
  5. Fraudsters: “who create and deploy social engineering schemes, including phishing, spamming, and domain squatting;”
  6. Hosters: “who provide “safe” hosting of illicit content servers and sites, often through elaborate botnet and proxy networks;”
  7. Cashers: “who control drop accounts and provide those names and accounts to other criminals for a fee, and who also typically control full rings of our eighth category, money mules;”
  8. Money mules: who complete “money transfers or wire transfers between bank accounts;”
  9. Tellers: “who help with transferring and laundering illicit proceeds through digital currency services and between different world currencies;”
  10. Leaders: “They’re the “people-people.” They choose the targets; choose the people they want to work each role; decide who does what, when, and where; and take care of personnel and payment issues.” Many according to Chabinsky don’t have any technical skills.

For a more in-depth explanation of each specialization, you can read the complete text of Chabinsky’s keynote on the FBI Web site.



0 comments:

Post a Comment