SlideShare une entreprise Scribd logo
1  sur  16
INFORMATION
TECHNOLOGIES
USED IN
“SWORDFISH”
By – Kevin Joseph
MBA (Energy Trading)
500026236
Plot :
 Swordfish is a 2001 American thriller film

starring John Travolta, Hugh Jackman, Halle
Berry.
 The film centers around Stanley Jobson, an

ex-con computer hacker who is targeted for
recruitment into a bank robbery conspiracy
because of his formidable hacking skills.
Multiscreen systems
 It is the use of multiple

physical display devices, such
as monitors, televisions, and
projectors, in order to
increase the area available for
computer programs running
on a single computer system.

 The system can be run by a

single CPU or multiple CPUs

 Multi-head may increase the

productivity by up to 40-50%.
Super Computers


A supercomputer is a computer which
increases processing capacityparticularly speed of calculation.

These systems work in two ways :
 In one approach is a large number of
computers distributed across a
network devote some or all of their
time to solving a common problem
each individual computer receives and
completes many small
tasks, reporting the results to a
central server which integrates the
task results into the overall solution.
 In another approach, a large number
of dedicated processors are placed in
close proximity to each other; this
saves considerable time moving data
around and makes it possible for the
processors to work together, for
example in mesh architectures.

Cray Titan – 17.59 PetaFLOPS
Supercomputers are used
for a wide range of
computationally
intensive tasks in various
fields.
 Quantum mechanics.
 Weather forecasting
 Climate research
 Oil and gas exploration
 Molecular modeling
 Aerodynamics
 Counter-cryptography.

NUDT Tianha – 33.86 PetaFLOPS
Radio dog collar
 Used for tracking
 Works on radio waves
of particular frequency
 Has to be in Line of
sight
 Can be used as a

communication means
also.
Servers
 A server is a system that

responds to requests across a
computer network to provide a
network service.

 Servers are computer

programs running to serve the
requests of other
programs, the clients.
Thus, the server performs
some task on behalf of clients.

 Servers can be run on a

dedicated computer, which is
also often referred to as "the
server", but many networked
computers are capable of
hosting servers.

Typical computing servers are
• Database server
• File server
• Mail server
• Print server
• Web server
• Gaming server, etc.
Internet
 It is a global system of

interconnected computer
networks that use the
standard Internet protocol
suite (TCP/IP) to serve several
billion users worldwide.

 It is a network of networks
 Consists of millions of

private, public, academic, bus
iness, and government
networks, of local to global
scope, that are linked by a
broad array of
electronic, wireless and
optical networking
technologies.
Ciphering technology
 Cryptography
 Encoding and
Decoding of
Information
 Military
 Banks
 Educational
sectors(Exams)
Computer worms
 A worm is designed to

tunnel into your system
and allow malicious users
to control your computer
remotely.

 Does not require an

action to spread

 Can make multiple copies

of itself. (E-mail)

 Slows down computers n

networks significantly.
Transatlantic Telecommunication Cable
 A transatlantic
telecommunications
cable is a submarine
communications
cable running under

the Atlantic Ocean.
 All modern cables

use fiber
optic technology.
 Most such cables

connect London, Englan
d to New York City, USA

 Built mainly for high-

speed requirements of
international financial
transactions.

 Financial trading firms

spend billions of dollars
annually to get an edge
on trading
THANK YOU

Contenu connexe

Tendances

Computer networking
Computer networkingComputer networking
Computer networkingJayVerma35
 
types of networks
types of networkstypes of networks
types of networksrdacs14
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingFaindra Jabbar
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networksPratik Gupta
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usageRahul Sharma
 
Computer network note
Computer network noteComputer network note
Computer network noteMdAnikKhan
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogiesMary May Porto
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types AnzaDar3
 
Communication
CommunicationCommunication
CommunicationUtchi
 
Types of network
Types of networkTypes of network
Types of network99111
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNalinSinha3
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionKosala Sandaruwan
 
Arpanet
ArpanetArpanet
Arpanetsmithz
 

Tendances (20)

Understanding Computer
Understanding ComputerUnderstanding Computer
Understanding Computer
 
Computer networking
Computer networkingComputer networking
Computer networking
 
types of networks
types of networkstypes of networks
types of networks
 
Lan and wan
Lan and wanLan and wan
Lan and wan
 
Computer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer NetworkingComputer Applications - The Basic Computer Networking
Computer Applications - The Basic Computer Networking
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
Introduction to computer networks & it’s usage
Introduction to computer networks & it’s usageIntroduction to computer networks & it’s usage
Introduction to computer networks & it’s usage
 
Computer network note
Computer network noteComputer network note
Computer network note
 
File & Printer Sharing
File & Printer SharingFile & Printer Sharing
File & Printer Sharing
 
File sharing technlogies
File sharing technlogiesFile sharing technlogies
File sharing technlogies
 
Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types                                  Itc lec 11 Network , Uses , Types
Itc lec 11 Network , Uses , Types
 
Network and it's Uses
Network and it's UsesNetwork and it's Uses
Network and it's Uses
 
Communication
CommunicationCommunication
Communication
 
What is a computer network
What is a computer networkWhat is a computer network
What is a computer network
 
Types of network
Types of networkTypes of network
Types of network
 
NETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW pptNETWORK,INTERNET & WWW ppt
NETWORK,INTERNET & WWW ppt
 
Designing A LAN WAN MAN Sollution
Designing A LAN WAN MAN SollutionDesigning A LAN WAN MAN Sollution
Designing A LAN WAN MAN Sollution
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Arpanet
ArpanetArpanet
Arpanet
 
PROFESSIONAL SLIDES
PROFESSIONAL SLIDESPROFESSIONAL SLIDES
PROFESSIONAL SLIDES
 

Similaire à Technologies Used in Swordfish Hacking Film

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationxRAJSEKHAR PEDINA
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentalsheidirobison
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdfexpressionnoveltiesk
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdfOpjsuniversity1
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system Sarvesh Meena
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdfaminnezarat
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfkhan593595
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfEYOHAICTMEDIA
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 

Similaire à Technologies Used in Swordfish Hacking Film (20)

Notes for banking railway opsc psc preparationx
Notes for  banking railway opsc psc preparationxNotes for  banking railway opsc psc preparationx
Notes for banking railway opsc psc preparationx
 
Modules1
Modules1Modules1
Modules1
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf1. What is IT infrastructure and what are its components2.What ar.pdf
1. What is IT infrastructure and what are its components2.What ar.pdf
 
Komputasi Awan
Komputasi AwanKomputasi Awan
Komputasi Awan
 
top LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdftop LLB university in Delhi NCR.pdf
top LLB university in Delhi NCR.pdf
 
Computer
ComputerComputer
Computer
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Distributed Computing system
Distributed Computing system Distributed Computing system
Distributed Computing system
 
COMPUTER NETWORK.pptx
COMPUTER NETWORK.pptxCOMPUTER NETWORK.pptx
COMPUTER NETWORK.pptx
 
Presentation-1.ppt
Presentation-1.pptPresentation-1.ppt
Presentation-1.ppt
 
2_Virtualization.pptx
2_Virtualization.pptx2_Virtualization.pptx
2_Virtualization.pptx
 
00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf00 - BigData-Chapter_01-PDC.pdf
00 - BigData-Chapter_01-PDC.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
CloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdfCloudComputing_UNIT1.pdf
CloudComputing_UNIT1.pdf
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdfConnecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
Connecting Hardware Peripherals Level 1 Ver 2 - Copy.pdf
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 

Plus de Kevin Philip Joseph

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in businessKevin Philip Joseph
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & charteringKevin Philip Joseph
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggoKevin Philip Joseph
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emiratesKevin Philip Joseph
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Kevin Philip Joseph
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systemsKevin Philip Joseph
 

Plus de Kevin Philip Joseph (10)

The role of information technologies & information system in business
The role of information technologies & information system in businessThe role of information technologies & information system in business
The role of information technologies & information system in business
 
Solar energy
Solar energySolar energy
Solar energy
 
Shipping terminologies
Shipping terminologiesShipping terminologies
Shipping terminologies
 
Ship terminologies – organizations & chartering
Ship terminologies – organizations & charteringShip terminologies – organizations & chartering
Ship terminologies – organizations & chartering
 
Opec to affect future
Opec to affect futureOpec to affect future
Opec to affect future
 
Maritime - Practitioners
Maritime - PractitionersMaritime - Practitioners
Maritime - Practitioners
 
Information systems used in barista briggo
Information systems used in barista   briggoInformation systems used in barista   briggo
Information systems used in barista briggo
 
Competing information systems used in emirates
Competing information systems used in emiratesCompeting information systems used in emirates
Competing information systems used in emirates
 
Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations Causes and consequences of managerial failure in rapidly changing organizations
Causes and consequences of managerial failure in rapidly changing organizations
 
Storage devices in computer systems
Storage devices in computer systemsStorage devices in computer systems
Storage devices in computer systems
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Technologies Used in Swordfish Hacking Film

  • 1. INFORMATION TECHNOLOGIES USED IN “SWORDFISH” By – Kevin Joseph MBA (Energy Trading) 500026236
  • 2. Plot :  Swordfish is a 2001 American thriller film starring John Travolta, Hugh Jackman, Halle Berry.  The film centers around Stanley Jobson, an ex-con computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills.
  • 3.
  • 4. Multiscreen systems  It is the use of multiple physical display devices, such as monitors, televisions, and projectors, in order to increase the area available for computer programs running on a single computer system.  The system can be run by a single CPU or multiple CPUs  Multi-head may increase the productivity by up to 40-50%.
  • 5. Super Computers  A supercomputer is a computer which increases processing capacityparticularly speed of calculation. These systems work in two ways :  In one approach is a large number of computers distributed across a network devote some or all of their time to solving a common problem each individual computer receives and completes many small tasks, reporting the results to a central server which integrates the task results into the overall solution.  In another approach, a large number of dedicated processors are placed in close proximity to each other; this saves considerable time moving data around and makes it possible for the processors to work together, for example in mesh architectures. Cray Titan – 17.59 PetaFLOPS
  • 6. Supercomputers are used for a wide range of computationally intensive tasks in various fields.  Quantum mechanics.  Weather forecasting  Climate research  Oil and gas exploration  Molecular modeling  Aerodynamics  Counter-cryptography. NUDT Tianha – 33.86 PetaFLOPS
  • 7. Radio dog collar  Used for tracking  Works on radio waves of particular frequency  Has to be in Line of sight  Can be used as a communication means also.
  • 8. Servers  A server is a system that responds to requests across a computer network to provide a network service.  Servers are computer programs running to serve the requests of other programs, the clients. Thus, the server performs some task on behalf of clients.  Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. Typical computing servers are • Database server • File server • Mail server • Print server • Web server • Gaming server, etc.
  • 9. Internet  It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.  It is a network of networks  Consists of millions of private, public, academic, bus iness, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
  • 10.
  • 11. Ciphering technology  Cryptography  Encoding and Decoding of Information  Military  Banks  Educational sectors(Exams)
  • 12. Computer worms  A worm is designed to tunnel into your system and allow malicious users to control your computer remotely.  Does not require an action to spread  Can make multiple copies of itself. (E-mail)  Slows down computers n networks significantly.
  • 13. Transatlantic Telecommunication Cable  A transatlantic telecommunications cable is a submarine communications cable running under the Atlantic Ocean.  All modern cables use fiber optic technology.
  • 14.  Most such cables connect London, Englan d to New York City, USA  Built mainly for high- speed requirements of international financial transactions.  Financial trading firms spend billions of dollars annually to get an edge on trading
  • 15.