Malware is malicious
software such as viruses, worms, and Trojan horses .Viruses are pieces of code usually hidden in the operating system of a computer or in an
application program. When a user
executes a program containing a virus, the virus quickly copies itself to an
unprotected program. Can jump from one
computer to another when someone uses a disc, flash drive, or a computer
network with an infected machine. Most
viruses are operating system specific.
rhcp
Thursday, June 5, 2014
Examples of Cybercrime
Spamming is sending the same message indiscriminately to a large number of users on the internet. Peer to peer file sharing is the sharing of copyrighted files between peers. Phishing is a deliberate attempt to trick someone into receiving personal information. creating and releasing malicious computer viruses Theft of computer services. Cyberstalking is a form of harassment taking place on the internet.
Wireless Networking Precautions
Using a wireless internet network ( Wi-Fi) has many advantages for internet users. It allows you to be able to work in any room of your home and even outside your house and still be able to connect to the internet. Along with the advantages, Wi-Fi also comes with some security issues. If you can pick your Wi-Fi signal from outside your house, that means that others will be able to do the same. Wireless internet users need to take some extra precautions to protect their information from being taken or hacked into by others.
The best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA (encryptions on your computer) you can help prevent any intruders from accessing your computer and installing a virus or worm on it. This is very important for wireless internet users as any half-way decent hacker can use your Wi-Fi connection to get into your computer.
http://www.itlist.com/security-precautions-for-wireless-internet-users/
Cloud Computing
Cloud computing refers to a model of network computing where a program or application runs on a connected server or servers rather than on a local computing device such as a PC, tablet or smartphone. A user connects with a server to perform a task. The difference with cloud computing is that the computing process may run on one or many connected computers at the same time, utilizing the concept of virtualization.
Cloud computing refers to a computing hardware machine or group of computing hardware machines commonly referred as a server or servers connected through the Internet. Any individual user who has permission to access the server can use the server's processing power to run an application, store data, or perform any other computing task.
http://en.wikipedia.org/wiki/Cloud_computingInternet Filters and Parental Control Software
Internet filters and parental control software are terms describing software designed to restrict or control the content a reader is authorized to access, especially when utilized to restrict material delivered over the Internet. Content-control software determines what content will be available or what content will be blocked.
A government can attempt to apply them nationwide or they can, for example, be applied by an ISP to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual user to his or her computer. The motive is often to prevent access to content which the computer's owner(s) or other authorities may consider objectionable.
Radio Frequency Identification
Radio-frequency identification is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges via magnetic fields.
Others use a local power source such as a battery, or else have no battery but collect energy from the interrogating EM field, and then act as a passive transponder to emit microwaves or UHF radio waves. Battery powered tags may operate at hundreds of meters. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object.
http://en.wikipedia.org/wiki/Radio-frequency_identification
Digital Image Steganography
Steganography is the practice of concealing a message, image, or file within another message, image, or file. Generally the hidden messages will appear to be part of something else: images or articles. The hidden message may be recorded in invisible ink only to be revealed when a UV light is shown on the message. The goal of steganography is to keep the message cryptic so it does not attract attention to itself.
Steganography includes concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size.
http://en.wikipedia.org/wiki/Steganography
Computer Forensics
Computer forensics pertains to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media by identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. It is usually associated with the investigation of a major world wide computer crime, computer forensics are often used in civil proceedings. Computer forensics recovers data but with guidelines made to create a legal audit trial. Evidence from computer forensic investigations has been used in a number of high profile cases and is becoming very reliable within the U.S and European court systems.
The purpose of computer forensics techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial. Just opening a computer file changes the file -- the computer records the time and date it was accessed on the file itself. If detectives seize a computer and then start opening files, there's no way to tell for sure that they didn't change anything. Lawyers can contest the validity of the evidence when the case goes to court. Computers are getting more powerful, so the field of computer forensics must constantly evolve.
http://computer.howstuffworks.com/computer-forensic.htm
http://en.wikipedia.org/wiki/Computer_forensics
The Packet Analyzer
Packet analyzers are used to monitor, intercept, and decode data packets as they are transmitted across networks. Packet analyzers can be computer programs (software) or hardware. IT teams use packet analyzers to monitor and filter network traffic. Network analyzers are also valuable tools for testing protocols, diagnosing network problems, identifying configuration issues, and resolving network bottlenecks. Finally, information security teams rely on these tools to discover network misuse, vulnerabilities, malware, and attack attempts.
A packet analyzer has many names besides its previously mentioned one. Network analyzer, protocol analyzer, packet sniffer, Ethernet sniffer or wireless sniffer are all identities of the packet analyzer. A packet analyzer is a "computer program also a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. Data streams flow across the network, the sniffer captures each packet and, if needed, content according to the appropriate RFC or other specifications. Packet capture is the process of intercepting and logging traffic." ( Wikipedia,1).
http://en.wikipedia.org/wiki/Packet_analyzer
Thursday, May 22, 2014
HTML: A Fun Programming Language
Tim Berners –Lee invents the Web
using HTML as its publishing language in 1989.
Tim had the idea of allowing researchers from different sites in the
world to organize and pool together information. But far from simply making
available a large number of research documents as files that could be
downloaded to individual computers, he suggested that you could actually link
the text in the files themselves. This
means, while researching one subject, the researcher would be able to quickly
display another subject. Tim realized by
linking research together using a form of hypertext, these tasks could be
performed by using buttons on the screen.
His idea did not become popular until the 1990’s. HTML is the abbreviation for Hyper Text
Markup Language. It is the standard
markup language used to create web pages.
HTML is written in the form of HTML elements consisting of tags
enclosed in angle
brackets (like
<html>
). HTML tags most commonly come in pairs like <h1>
and </h1>
, although some tags represent empty
elements and so are unpaired, for example <img>
.
The first tag in a pair is the start tag, and the second tag is
the end tag (they are also called opening tags and closing
tags). The idea of a web browser is
to read HTML documents and produce them into visible or audio web pages. The browser does not show the HTML tags, but
uses the tags to interpret the content of the page. HTML is the basis for all types of
websites. It is the backbone and
stepping stone to any birth of a website.
HTML defines several data types for element content, such as
script data and stylesheet data, and many types for attribute values, including
IDs, names, URIs, numbers, units of length, languages, media descriptors,
colors, character encodings, dates and times, and so on. All of these data types are specializations of
character data. HTML documents can be
delivered by the same means as any other computer file.
The World Wide Web is composed primarily of HTML
documents transmitted from web servers to web browsers using the Hypertext
Transfer Protocol
(HTTP). However, HTTP is used to serve images, sound, and other content, in
addition to HTML. To allow the web browser to know how to handle each document
it receives, other information is transmitted along with the document. HTML
allows images
and objects to
be embedded and can be used to create interactive forms.
It provides a means to generate structured
documents by
representing essential interpretation for text such as headings, paragraphs,
lists, links, quotes and other items. It can insert scripts written in languages such as JavaScript which affect the behavior of
HTML web pages. Web browsers can also
refer to Cascading
Style Sheets
(CSS) to describe the look and layout of text and other material. The W3C,
maintainer of both the HTML and the CSS standards, boosts the use of CSS over
obvious arrangement HTML. Without the use of an HTML, access to the internet we
now know would not exist. If it was not
for people like Berners, the web would not exist in the fashion it does
today.
Wednesday, May 21, 2014
Subscribe to:
Posts (Atom)