Home » Science » Computer Science

Computer Science

Dr. Chaos

Dr. Chaos is a Criminal Who was Incarcerated at the Supermax Prison ADX Florence for Causing 28 Power Failures and Hoarding a Large Amount of Cyanide. He was Released on September 2019.

From 1998 to 2001, a computer system administrator turned terrorist caused havoc in Wisconsin. One of his terrorist acts included an attack on the city’s power grid. He ignited buildings, disrupted transmission towers, disabled air traffic control software, and caused headaches for an Internet Service Provider with the help of people he recruited from the […]

Dr. Chaos is a Criminal Who was Incarcerated at the Supermax Prison ADX Florence for Causing 28 Power Failures and Hoarding a Large Amount of Cyanide. He was Released on September 2019. Read More »

President Carter Oversaw the Installation of the First Computers in the White House in 1978.

By the late 1970s, the federal government had been using computers for decades, and IBM’s mainframes had helped NASA astronauts reach the moon. However, there were few minicomputers or early personal computers in federal offices. But did you know which US President oversaw the installation of the first computers in the White House? President Jimmy

President Carter Oversaw the Installation of the First Computers in the White House in 1978. Read More »

Phyton Programming Language

The Python Programming Language Got Its Name from Monty Python and Not a Snake.

A programming language is any set of rules that converts strings, or in the case of visual programming languages, graphical program elements, to various types of machine code output. Programming languages are computer languages used to implement algorithms in computer programming. But did you know that the Python Programming Language did not come from the

The Python Programming Language Got Its Name from Monty Python and Not a Snake. Read More »

Alan Turing

Who is Alan Turing?

A cryptographer is a person who creates or deciphers the encryption code that protects data. Computer-encrypted data is protected by extremely long, complex encryption methods that are extremely difficult and time-consuming to crack. But do you know who Alan Turing is? Alan Turing is the cryptographer who cracked the Nazi Enigma code during WWII. He

Who is Alan Turing? Read More »

Malware Laptop

How Much Did a Malware-Infested Laptop Sell at an Art Auction?

Malware is short for malicious software. The term refers to any intrusive software created by Hackers to steal data and damage or destroy computers and computer mechanisms. But did you know that an old malware-infected computer was auctioned off at a high price? A Windows XP computer that was infected with six different types of

How Much Did a Malware-Infested Laptop Sell at an Art Auction? Read More »

Isaac Newton

Why Couldn’t the UK Royal Society Publish Isaac Newton’s Book?

The origins of the Royal Society date back to the 1660s when natural philosophers and physicians functioned in an invisible college learning and sharing knowledge. In more modern times, the society was also responsible for publishing the work of significant scientists. But did you know they were not able to publish Isaac Newton’s book?  While

Why Couldn’t the UK Royal Society Publish Isaac Newton’s Book? Read More »

A casino’s database was hacked through a smart fish tank thermometer

A Casino’s Database Was Hacked Through A Smart Fish Tank Thermometer A casino’s high-roller database was allegedly accessed via a security flaw in a fish tank. A cybersecurity executive has revealed that hackers used an Internet of Things (IoT) connected fish tank thermostat to gain access to a casino’s high-roller database. Darktrace CEO Nicole Eagan

A casino’s database was hacked through a smart fish tank thermometer Read More »