46 Science Fair Projects for the Evil Genius

46 Science Fair Projects for the Evil Genius:

"ant to win first place in the next science fair? 46 Science Fair Projects
for the Evil Genius has everything you need to create amazing, sophisticated
projects that will wow the judges and keep everyone talking long after the
awards are handed out.Using inexpensive, easy-to-find parts and tools, and
following standard science fair requirements, these creative new projects test
46 theories from various disciplines, including physics, astronomy, energy,
environmental science, and economics. Each project begins with an intriguing
hypothesis that leaves plenty of room for you to add your own tweaks, making the
project entirely different and new-the only limit is your imagination! 46
Science Fair Projects for the Evil Genius."

Auerbach Publications ISBN-13- 9780071600279 English PDF 6 MB209 Pages

Hackers stole data on Pentagon's newest fighter jet

Hackers stole data on Pentagon's newest fighter jet:
This was the case of April 2009

WASHINGTON (CNN) -- Thousands of confidential files on the U.S. military's most technologically advanced fighter aircraft have been compromised by unknown computer hackers over the past two years, according to senior defense officials.

The Internet intruders were able to gain access to data related to the design and electronics systems of the Joint Strike Fighter through computers of Pentagon contractors in charge of designing and building the aircraft, according to the officials, who did not want to be identified because of the sensitivity of the issue.
In addition to files relating to the aircraft, hackers gained entry into the Air Force's air traffic control systems, according to the officials. Once they got in, the Internet hackers were able to see such information as the locations of U.S. military aircraft in flight.
The Joint Striker Fighter plane is the military's new F-35 Lightning II. It designed to become the aircraft used by all of the branches of service.
Most of the files broken into focused on the design and performance statistics of the fighter, as well as its electronic systems, officials said. The information could be used to make the plane easier to fight or defend against.
Additionally, the system used by the aircraft to conduct self-diagnostics during flight was compromised by the computer intrusions, according to the officials.
However, the officials insisted that none of the information accessed was highly sensitive data.
The plane uses stealth and other highly sensitive electronic equipment, but it does not appear that information on those systems was compromised, because it is stored on computers that are not connected to the Internet, according to the defense officials.