- May 27, 2022
- Posted by: Edwin Kanyutu
- Category: Uncategorized
In a computer, the monitor is a device output that screens data in text or image form. The monitor is comprised of the power supply, visual display and circuitry. Typically, the modern monitors display device has TFT-LCD (thin-film transistor liquid crystal display having LED backlighting. Formally monitors required the help of a cathode ray tube during display. The connections between a computer and its monitor are display ports, a digital visual interface, and many more proprietary connectors.
Originally, TV sets were mainly for basic entertainment and computers for processing information. However computer monitors took another job in the 21st century to entertain viewers and users combinable as much as the data processing was concerned. Not only did computers upgrade in resuming the TV roles on top of theirs but also TVs took up theirs and some computer roles.
The aspect ratio common between computer and TV monitors have upgraded to 16.9 and 16.10 from 4.3
The Monitor History
Old electronic computers fitted completely with light bulb panels whereby particular bulbs in each case indicate off/on inside the computer particular register. Computer operating engineers were able to control internal machine states and named it the monitor. During those times, printer lines were considered the output devices while monitors kept track of the operation programs. In the 1980s, (VDU) visual display units were another name used to describe computer monitors. This fell in the 1990s.
What are the monitor’s security vulnerabilities?
Be it bugs, hacks, or any other undesired visitation, security on the computer including the display matters for it would cause unfathomable tragedies.
Remember when we were young in primary schools, and some lazy students could not take seriously studying for upcoming exams, and were fully dependent on their visually scanning skills on other students’ exam papers for answers? No matter how much you would place hands around your answer sheets as walls they would still get a good glimpse. Now envisage them not having to crane their necks so much and visualizing your work on their papers. Not good right?
From time to time NSA swap cable and places bugged cables on particular computers to enable them to conduct secret supervision on computer monitors that have been placed as targets.
Phreaking is referred to the exploiting process of telephone networks. Van Eck phreaking is named after Wim Van Eck a computer researcher from Dutch. He published the paper first in 1985 proving that remote display of LCD or CRT detects electromagnetic emissions. Therefore monitor security is kept on point.