1. Java Security
As with most computer related languages, despite the greatest security measures, there are still holes that can be exposed. ... If a computer has sufficient hardware and software to record and to play sound, it would be possible for a hacker to not only listen in to a users conversation, but to also record and copy the conversation. ... Whereas if it occurred on a stand-alone computer used by an individual playing games then would bring little problems. 4. ... A mobile code that is unwelcome by all (apart from the creator) is a computer virus. These generally target personal computers and ...
- Word Count: 2871
- Approx Pages: 11
- Grade Level: High School