Monday, April 25, 2011

MAC vs PC

In the search for the best computer only to big giants exist: PCs and Macs. Pcs usually run the Microsoft windows OS currently windows 7 and Mac from apple who manufacturer their own computers and have their own OS currently called Tiger. Almost everyone is familiar with today's PC. It is a computer that comes from the companies like Dell, Gateway, Compaq, etc. and comes with a version of Microsoft Windows. PC's are the most popular type of computer sold, they are the most compatible type of computer currently available for both hardware and software.

In the past few years, the quality and speed of Mac computers has increased dramatically. Since the release of Mac OS X and their fresh line of iMac and G3/G4/G5 series Macs, Apple has made lots of headway in making the experience of using a computer much more intuitive and stress-free. In today's world, Macs are generally easier to use and cause a lot less problems than your average PC computer. Apple has also made a large push for increasing the amount of software available, so now a majority of popular software titles are available for both the PC and Mac.


wireless networking precaution

Wi-fi is a great tool to use. I don't know how we survived without it. All major businesses, homes and newer devices have wi-fi. The issue that rises with this great tool is its security. If you do not possess the proper tools to protect it your personnel information is automatically at risk.

The best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA you can help prevent any intruders from accessing your computer and installing a virus or worm on it. This is very important for wireless internet users as any half-way decent hacker can use your Wi-Fi connection to get into your computer.


http://www.itlist.com/security-precautions-for-wireless-internet-users/

http://techgenie.com/latest/how-to-take-precautions-in-wireless-networks/

Strong Password

Nowadays, we are able to do several things via the internet. We can do our banking, shop, our emails and all of these things are password protected. Some passwords are safer than others and it is very important to have one that is not too obvious or easy to figure. the strength of a password depends on the different types of characters that you use, the overall length of the password, and whether the password can be found in a dictionary.


 It should be at least 14 characters long. It is also recommended to have both lower and uppercase letters, numbers and other signs.If you cannot figure out your own password, there are different tablets that can help you to determine whether the password that you choose is strong enough or not. Your password needs to be totally unique and different for each and every one of your online accounts. This is to make sure that in the event that one account is hacked into, your other accounts will not be affected.


http://www.makeuseof.com/tag/how-to-create-strong-password-that-you-can-remember-easily/

http://www.microsoft.com/security/online-privacy/passwords-create.aspx

Internet Parental Control Software

From what I've read so far, I came to find that internet parental control software fall into the umbrella of internet filters. Just like regular filters, they block certain websites that should not be viewed by children. There are a variety of software that provide this service. There are softwares that can be downloaded onto computers in order to monitor and control a users computer and internet activity.  Parental Control Software can set restrictions, block, monitor and record all or just certain internet and computer activity, based on the settings you give it.

Here are tow ways by which parental control software work. First they can block access to specific types of sites by URL restriction such as gambling and porn websites. When your child tries to go to one of these websites an HTTP 404 Page Not Found error message will pop up. You can also block certain computer programs like games and file downloading from the internet like music downloading, Youtube or certain pictures. It is also possible to filter content by specific words or phrases like sex or drugs which can guarantee ensure searches made on those words are blocked.  Parents can also set up a filter that blocks access to certain traffic on the Internet, such as email, newsgroups, instant messaging, and peer to peer hosting.

Saturday, April 23, 2011

Internet filters


Internet filters are software tools that can help monitor web content viewed on a particular computer or network. In the case of family safety settings, Internet filters can also help parents manage who kids can communicate with or how long kids can use the computer. Furthermore, they can block specific websites and raise the internet security levels. i believe it to be a great tool to provide some degree of control over what children are expose to these days. Nonetheless, many kids are computer savvy and know how to change the basic filter settings. 





Internet filters are also greatly used in the workforce. During "down time" in the office, employees tend to surf the web for contents which are not work related. Nowadays with the blowout of social media such as facebook and tweeter, there is always a good excuse not to do work and search for different distraction on the web. In come internet filters and firewalls blocking all these websites which do not "promote" good work performance. 







   
http://www.wavecrest.net/products/cyblock/sa/index.html?dt=1

Digital Image Steganography


 Steganography comes from the Greek words meaning to cover tightly and writing. In today terminology it refers to the act of hiding codes or messages into different mediums. On the other hand digital image steganography refers to concealing a message in a digital format most likely using a picture. I first found out about digital steganography while watching one my shows Law and Order SVU. One of the suspects was apprehended and had child pornography encrypted into random images. Its a very interesting way of passing along messages that are very important and shouldn't be seen by many but it an also be used for several illegal acts such as child pornography.

Digital steganography makes use of the fact that in a number of file formats, data is reduplicated or some data is of little importance, and the hidden message does not cause noticeable changes to the file. It is used in graphics files, HTML, sound files, video, and text files. Digital steganography is related to hidden digital watermarking. There is special software to enable the practice of digital steganography, and it may enable hiding a message within a digital watermark, although other methods may be more common. Some digital steganography software is better than others at effectively concealing messages.

Tuesday, April 19, 2011

Computer Forensic


Computer forensic is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail. 
Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. It has been used in a number of high profile cases and is becoming widely accepted as reliable within US and European court systems. A good example of computer forensics usage would be for the illegal download of media.Computer forensics evidence has been used as evidence in criminal law since the mid 1980s. In court it is subject to the usual requirements for digital evidence, requiring information to be authentic, reliably obtained and admissible. In addition various countries have specific guidelines and practices for the recovery of computer forensic evidence.