Computer Science, asked by vsanskar7047, 1 year ago

Advantages of pervasive computing

Answers

Answered by appu97
0
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.

The example is based on an exploit of the transmission control protocol (TCP), used for internet connections, so in the end, the target computer(s) is unaware that it has performed computation for the benefit of the other computer, or even done anything besides have a normal TCP/IP  session.
Similar questions