Difference between revisions of "Computer"
(image) |
(computation technology - unstub) |
||
Line 1: | Line 1: | ||
{{concept | {{concept | ||
|wikipedia=https://en.wikipedia.org/wiki/Computer | |wikipedia=https://en.wikipedia.org/wiki/Computer | ||
− | |constitutes=technology | + | |constitutes=computation technology |
|image=Computer.jpg | |image=Computer.jpg | ||
}} | }} | ||
Line 8: | Line 8: | ||
==Operating system== | ==Operating system== | ||
{{FA|Operating system}} | {{FA|Operating system}} | ||
+ | A computer [[operating system]] controls and regulates its use. Open source operating systems such as [[Linux]], in contrast to proprietary ones such as Windows, allow users to see and modify how the computer behaves, rather than presenting it as a blackbox. | ||
− | ==Microsoft Windows== | + | ===Microsoft Windows=== |
In August 1999, [[Andrew D. Fernandes]] found a variable named "Microsoft_NSAKEY" in Windows NT 4 Service Pack 5, it was speculated that the NSA had a [[backdoor]] on Microsoft Windows by that date. Security specialist [[Bruce Schneier]] said that it is rather unlikely that "NSAKEY" is part of a backdoor.<ref>[https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI NSA Key in Microsoft Crypto API?] saved at [http://web.archive.org/web/20150326063749/https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI Archive.org] and [http://archive.is/https://www.schneier.com/crypto-gram/archives/1999/0915.html Archive.is]</ref> | In August 1999, [[Andrew D. Fernandes]] found a variable named "Microsoft_NSAKEY" in Windows NT 4 Service Pack 5, it was speculated that the NSA had a [[backdoor]] on Microsoft Windows by that date. Security specialist [[Bruce Schneier]] said that it is rather unlikely that "NSAKEY" is part of a backdoor.<ref>[https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI NSA Key in Microsoft Crypto API?] saved at [http://web.archive.org/web/20150326063749/https://www.schneier.com/crypto-gram/archives/1999/0915.html#NSAKeyinMicrosoftCryptoAPI Archive.org] and [http://archive.is/https://www.schneier.com/crypto-gram/archives/1999/0915.html Archive.is]</ref> | ||
− | Anyone uncomfortable with [[mass surveillance]] may wish to avoid [[Microsoft]] products like [[Windows]] and all such closed source vendors. | + | Anyone uncomfortable with [[mass surveillance]] may wish to avoid [[Microsoft]] products like [[Windows]] and all such [[closed source]] vendors. |
==Internet== | ==Internet== | ||
Line 21: | Line 22: | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
− |
Latest revision as of 17:40, 11 June 2021
Computer (computation technology) | |
---|---|
Interest of | • Nikolai Bezroukov • Microsoft • Bruce Schneier • The Register |
Computers became of major importance to the deep state when they were connected en masse to produce the internet, which - once technological advances lowered the barrier to entry - provided a mass communication channel to give people an alternative to the commercially-controlled media.
Operating system
- Full article: Operating system
- Full article: Operating system
A computer operating system controls and regulates its use. Open source operating systems such as Linux, in contrast to proprietary ones such as Windows, allow users to see and modify how the computer behaves, rather than presenting it as a blackbox.
Microsoft Windows
In August 1999, Andrew D. Fernandes found a variable named "Microsoft_NSAKEY" in Windows NT 4 Service Pack 5, it was speculated that the NSA had a backdoor on Microsoft Windows by that date. Security specialist Bruce Schneier said that it is rather unlikely that "NSAKEY" is part of a backdoor.[1]
Anyone uncomfortable with mass surveillance may wish to avoid Microsoft products like Windows and all such closed source vendors.
Internet
- Full article: Internet
- Full article: Internet
The internet wasn't subject to much censorship until about 2001,[2] a situation which changed drastically under the "war on terror" rhetoric.
Examples
Page name | Description |
---|---|
Hunter Biden/Laptop | Hunter Biden left a Mac Book in a repair shop in Delaware and forgot about... |
Smartphone | A tool of mass surveillance |