A little dose of geekiness... Fermat's theorem
#1
A little dose of geekiness... Fermat's theorem
We were talking about Fermet's Little Theorem in my Computer Security class and my teacher mentioned Fermet's other theorem which he proved on the corner of a piece of paper that was subsequently burnt and took mathematicians years and over 300 pages to prove. Well the theorem is simple it says:
There exists no solution for A^n + B^n = C^n for any n > 2. n being a positive non zero integer.
Now reading this...
http://home.mindspring.com/~jbshand/ferm.html
Appears that there are solutions, it truly depends on the definition of an integer and the levels of significance.
Any thoughts???
There exists no solution for A^n + B^n = C^n for any n > 2. n being a positive non zero integer.
Now reading this...
http://home.mindspring.com/~jbshand/ferm.html
Appears that there are solutions, it truly depends on the definition of an integer and the levels of significance.
Any thoughts???
#3
Originally Posted by Nightshade
Oh I think I peed myself in excitement
#4
Senior Member
Join Date: Apr 2003
Location: NoVa / Richmond, VA
Posts: 2,322
Likes: 0
Received 0 Likes
on
0 Posts
Explain "computer security" class, what's it about? what does it have to do with? That sounds like what I want to get into but I'm not sure the name of what I want to do.
#5
Originally Posted by ADRteg
Explain "computer security" class, what's it about? what does it have to do with? That sounds like what I want to get into but I'm not sure the name of what I want to do.
#6
Senior Member
Join Date: Apr 2003
Location: NoVa / Richmond, VA
Posts: 2,322
Likes: 0
Received 0 Likes
on
0 Posts
Well I want to get into hacking, like say a company needs someone (hacker) to keep other hackers out of their system, is computer security the name of what I would specialize in?
#7
This is our course outline:
1) Security Threats and Vulnerabilities [1 week]. What is computer security and why it is important. Threats and vulnerabilities. Different types of computer security.
2) Encryption Basics [4 weeks]. What is encryption and how it protects both stored data and communications. Private key cryptography, public key cryptography, digital signatures, and Data Encryption Standard.
3) Program Security [1 week]. Basic types of malicious code, including viruses, worms, Trojan horses, trap doors, and spoofs.
4) Physical Security and Biometrics [1 week]. Physical security and different types of physical access devices and biometric devices.
5) Security of General Purpose Operating Systems [1 week]. System and data access controls: protecting memory and addressing, file protection mechanisms, and user authentication.
6) Trusted Systems [1.5 weeks]. Basics of trusted computer systems, including the design and evaluation criteria.
7) Database Security [1 week]. Confidentiality, integrity and availability of databases.
8) Network Security [1 weeks]. Network security issues such as message confidentiality and integrity violations, and denial of service. Types and examples of firewalls.
9) Administering Security [1 week]. Security management and administration. Setting and publicizing the security policy. Performing risk analysis. Disaster planning and recovery.
10) Legal and Ethical Issues [1.5 weeks]. Legal issues related to protecting program and data, the rights of employees and employers. Computer crime. Ethical issues in computer security.
1) Security Threats and Vulnerabilities [1 week]. What is computer security and why it is important. Threats and vulnerabilities. Different types of computer security.
2) Encryption Basics [4 weeks]. What is encryption and how it protects both stored data and communications. Private key cryptography, public key cryptography, digital signatures, and Data Encryption Standard.
3) Program Security [1 week]. Basic types of malicious code, including viruses, worms, Trojan horses, trap doors, and spoofs.
4) Physical Security and Biometrics [1 week]. Physical security and different types of physical access devices and biometric devices.
5) Security of General Purpose Operating Systems [1 week]. System and data access controls: protecting memory and addressing, file protection mechanisms, and user authentication.
6) Trusted Systems [1.5 weeks]. Basics of trusted computer systems, including the design and evaluation criteria.
7) Database Security [1 week]. Confidentiality, integrity and availability of databases.
8) Network Security [1 weeks]. Network security issues such as message confidentiality and integrity violations, and denial of service. Types and examples of firewalls.
9) Administering Security [1 week]. Security management and administration. Setting and publicizing the security policy. Performing risk analysis. Disaster planning and recovery.
10) Legal and Ethical Issues [1.5 weeks]. Legal issues related to protecting program and data, the rights of employees and employers. Computer crime. Ethical issues in computer security.
#8
Originally Posted by ADRteg
Well I want to get into hacking, like say a company needs someone (hacker) to keep other hackers out of their system, is computer security the name of what I would specialize in?
#10
Senior Member
Join Date: Apr 2003
Location: NoVa / Richmond, VA
Posts: 2,322
Likes: 0
Received 0 Likes
on
0 Posts
yeah I'm in the compsci program now, that course outline definately sounds interesting to me, but I've got a few years before I'd get into that. Check out this book, I bought it and it is a great book
http://www.amazon.com/exec/obidos/tg...books&n=507846
http://www.amazon.com/exec/obidos/tg...books&n=507846