Custom Search

Sunday, May 31, 2009

Computer Security Ethics and Privacy

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can’t access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions. A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cypercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI’s top priorities. There are several distinct categories for people that cause cybercrimes, and they are refereed as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It’s basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills. A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It’s just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning. The term cyperextortionist is someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company’s network. They will request a paid amount to not proceed sort of like black mailing in a since. An unethical employee is an employee that illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge. A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice. Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks. Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a place that can do this. The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks. Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user’s consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It’s similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is preparation. A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. However the difference is that a virus needs o attach itself to an executable file and become a part of it. A computer worm doesn’t need to do that I seems copies to itself and to other networks and eats up a lot of bandwidth. A Trojan Horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms they don’t replicate itself. Computer viruses, worms, and Trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer. Although these are the common three there are many more variations and it would be almost impossible to list them. You know when a computer is infected by a virus, worm, or Trojan horse if one or more of these acts happen:

Screen shots of weird messages or pictures appear.
You have less available memory then you expected
Music or sounds plays randomly.
Files get corrupted
Programs are files don’t work properly
Unknown files or programs randomly appear
System properties fluctuate

Computer viruses, worms, and Trojan horses deliver their payload or instructions through four common ways. One, when an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files. Second, is when an individual runs an infected program. Third, is when an individual bots a computer with an infected drive, so that’s why it’s important to not leave media files in your computer when you shut it down. Fourth is when it connects an unprotected computer to a network. Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. There are literally thousands of computer malicious logic programs and new one comes out by the numbers so that’s why it’s important to keep up to date with new ones that come out each day. Many websites keep track of this. There is no known method for completely protecting a computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs. Whenever you start a computer you should have no removable media in he drives. This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a bot sector on the drives and even if it’s unsuccessful any given various on the bot sector can infect the computer’s hard disk. If you must start the computer for a particular reason, such as the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.

Wednesday, May 27, 2009

Computer- the Human Innovation

Computer is a machine that manipulates records according to a list of instructions. The first procedure that resemble recent computers date to the mid-20th century (around 1940 - 1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, overwhelming as much command as several hundred modern personal computers. Modern computers are based on tiny integrated circuits and are millions to billions of times more competent while occupying a fraction of the space. Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery. Personal computers, in various forms, are icons of the Information Age and are what most populace think of as "a computer"; however, the most common form of computer in use today is the entrenched computer. Embedded computers are small, simple devices that are used to manage other devices — for example, they may be found in machines ranging from fighter jet to industrial robots, digital cameras, and children's toys.

The capacity to store and implement lists of instructions called programs makes computers extremely multitalented and distinguishes them from calculators. The cathedral–Turing hypothesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same responsibilities that any other computer can perform. Therefore, computers with capability and complexity ranging from that of a personal digital assistant to a supercomputer are all able to perform the same computational tasks given enough time and storeroom capacity.

It is difficult to identify any one device as the earliest computer, partly because the term "computer" has been subject to varying interpretations over time. Originally, the term "computer" referred to a person who performed mathematical calculations (a human computer), often with the aid of a mechanical calculating tool.

Friday, May 22, 2009

What is the Relation With Data Communications and Networks?

Data communications and networks make use of an approach that is totally focused on the Internet and was designed to tackle the issues of communicating system design. In order to get to the data communications and networks, a certain integrated approach is taken. The way that this is done is by an emphasis that will begin right at the top level of the obligations and will work downwards from there; while explaining just how the requirements are completed by the lower layers of the broadcasting chain. Data communications and networks are very important when it comes to services like VoIP, as they make up some of the service.
When one talks about data communications they are referring to equipment that was specially designed to give and gather information that is capable of communicating with other similar equipment and systems. Data communications are the tools that are used to make certain adjustments within the network. A simple example of data communications would be connecting two computers together when they are 100 feet away from one another. A cable can be used to plug into each computer and they will then be connected, creating data communications. There are different factors that have to be taken into consideration when trying to determine how data communication will work. For example, some factors in this case might include security, distance, signaling, topology and protocol.

In another equally simple case, a data communication could be the connection of your computer to the internet through a modem. If you have done this, you have established a steady connection between your computer and the World Wide Web. Every time you click on a link from a website you are requesting certain information from that website and it is given to you in the form of data, whether it is in color, letters or graphics. Data communications and networks are needed in an Internet connection. It makes the connection, and therefore it has to be present at all times.

A network is made up of two or more computers that are joined in order for them to share certain resources such as CD-ROM's, printers or fax machines. They can allow the exchange of files and they may also allow different forms of electronic communications. These computers can be joined by infrared light beams, cables, satellites, telephone lines or radio waves. There are two major types of networks; these are Local Area network (LAN) and Wide Area Network (WAN). Networks are important when it comes to computers and the communications with other computer networks. You need to know and understand networks in order to be able to use them to their optimum capability.

The Internet is the main example that can be used when one talks about data communications and networks. There are numerous modern connection options and services that can be used and these include ADSL, Voice over Internet Protocol and mobile radio. When it comes to current systems and the importance of them, the aspects that are more traditional such as circuit switching still exist and are available.

Wednesday, May 20, 2009

An Express Regalo From LBC

Thinking of ways on how to easily and conveniently send your gift box to the philippines? Well this kind of problem can be easily solved by visiting online gift shops or by going straight to a courier office and have it delivered to your family or loved ones. But there is a question of, which one is the best. Though there are a lot of online gift shops and courier services that can provide you with the service you need, choosing the one that could offer reliability and trustworthiness could be the difficult one.
One thing to know if a website or a courier company is reliable enough to trust our packages to be delivered is by looking at its company profile or background. One example is with Express Regalo and LBC.

LBC and Express Regalo

Express Regalo is an online gift shop that provides easier and convenient way for Filipinos to buy and then send their gift box to the philippines. What made the online gift shop reliable is its operator. Express Regalo is owned and operated by eLBC Direct, Inc., an LBC company that is dedicated to providing Filipinos overseas access to products and services apart from the traditional products offered by LBC. And as all the Filipinos know, LBC is one of the countries most reliable and dependable courier company that first offered the 24 hour delivery service for Filipinos.

Since post World War II, LBC has been operating as a brokerage and air cargo agent that eventually grew to operate as an air cargo forwarding service provider that first introduced the 24 hour delivery service, a service that proved its use for emergency and quick delivery of documents and packages.

Through their success in the field, fueled by numerous expansions in and out of the country, LBC have decided to expand their service through the Internet. One of their most prominent expansion was Express Regalo, an online gift shop that offers the widest variety of gift items from toys to electronics and food items, along with the most reliable delivery service coming from LBC itself.

Aside from Express Regalo, LBC also provides an easier way to send a gift or balikbayan box to the philippines through its pick-up system. This is a system that offers convenience by doing all the job of picking up the package from the sender's address and sends it directly to its recipient. A service that truly provides convenience while offering trustworthy and reliable delivery services built from over 50 years of service.

Tuesday, May 19, 2009

The Basics of Plasma Televisions

Are you thinking about buying a plasma television for your home? As you may already know, Plasma televisions are becoming increasingly popular as of late, as the prices of Plasma Televisions are becoming more and more affordable each passing year. Plasma televisions can provide excellent viewing experience, and are perfect for those who want to enjoy a high quality home theater.

As with most technology purchases, there are advantages and drawbacks associated with this type of television as well. If you are new to Plasma TV, making a purchasing decision can be a little difficult. So before you rush out to buy your new Plasma television set, it's important to at least understand the basics of plasma television first.

Image Quality

One of the primary reasons that plasma televisions are so popular is their high quality image displays. Plasma television displays are bright and crystal clear, have a very wide color gamut, and also available in fairly large sizes. The large size is actually very interesting because it is something that a typical television sets couldn't be made without affecting the quality of the screen. These types of televisions (Plasma TVs) offer very high resolution images with sharp details and true to life color.

Convenient

Plasma television sets can easily blend into the design of just about any room. These television sets are very thin in design when compared with other television, and can allow you to better utilize the square footage of your home. So instead of taking up a significant amount of floor space, plasma televisions can be hung directly on the wall or placed on a compact stand.

Longevity

Plasma televisions are not the most durable or long lasting television sets available. These types of television sets are difficult, if not impossible to repair. They generally last about seven years with normal usage. However, they are fragile and subject to irreparable damage when being moved from one location to another.

Pricing

Plasma televisions are priced at the mid range of television technology. They are less expensive than LCD television sets, but cost significantly more than analog sets.

Is a Plasma Television Right for You?

If you want to enjoy an affordable, high quality television viewing experience, a plasma television set can be a good choice for you. However, if you're looking for a set that will last for a decade or more, and can stand up to the rigors of frequently moves, you may want to choose a different types of television set.

Buying a Plasma Television

When you are in a store comparing with different plasma TV sets, remember that the employees there can be very helpful to you, especially since plasma TV is such a large ticket item for them. Therefore it is more likely that they are going to be more than willing to let you do or ask things that you normally wouldn't be able to. And in terms of testing out the product, make sure you like it before you make your final purchase decision.

Wednesday, May 13, 2009

Types of Electronic Whiteboards

Overview of An Electronic Whiteboard

Electronic whiteboards are becoming the new standard in classrooms and meeting rooms, in the 21st century. They take presenting, teaching and learning to new levels of interactivity.

What is an Electronic Whiteboard?

An electronic whiteboard allows material to be presented or displayed from a computer. Images, slides, text and even video can be displayed on an electronic whiteboard. Electronic whiteboard technology then allows for the teacher or presenter to interact with that image. For example, notes can be written on the electronic whiteboard adding information to the image presented. Electronic whiteboard technology can then capture that information and store it. Electronic whiteboards provide many useful applications in both business and classroom settings.

Thermal Electronic Whiteboard

Thermal electronic whiteboards allow the user to write, and print in black and white only. Each thermal electronic whiteboard comes with a printer attached and the images captured on this electronic whiteboard are then printed on thermal paper. This provides ease of use, but presentations on thermal electronic whiteboards often lack flair as they can only be seen in black and white. The PLUS BF-041S Electronic Whiteboard is a good example of a thermal electronic whiteboard. It is a freestanding electronic whiteboard unit with the ability to be mounted and contains a printer.

Color Electronic Whiteboard

Color electronic whiteboards can add pizzazz to presentations by introducing color. These electronic whiteboards can also be called copy boards. Using this technology, images are captured on the electronic whiteboard in color. These images can then be stored and either printed or distributed electronically. The PLUS M11s Electronic Whiteboard is a good choice for a color electronic whiteboard. It can be connected directly to a PC and images can be stored there or printed and distributed. Images stored on the computer from the electronic whiteboard can be further edited.

Portable Electronic Whiteboards

A portable electronic whiteboard is an alternative solution to a standard electronic whiteboard. Using a system such as eBeam, it is possible to turn any whiteboard into an electronic whiteboard. Simply attach the eBeam receiver to the whiteboard and connect the receiver with a USB cable to your computer. This system is quick and easy to set up on any whiteboard and it is easy to transport. The Quarter IdeaShare Q8000 Portable Whiteboard Capture System includes a receiver, mounting systems, electronic pens, dry-erasure markers, software and USB cable. These come with a carry bag for ease in portability. Portable electronic whiteboard systems are an economical alternative to standard electronic whiteboard systems.

Electronic whiteboards are setting the standard in presenting in both business and classroom settings. New schools being built include electronic whiteboards in each

Saturday, May 9, 2009

Who Did Actually Invent the Computer

There are a lot of people who don't agree when the first computer was built; in fact many say that the first actual conception of the idea of a computer was by J. H. Smith in 1782. He however never built the computer. His concept was called a difference engine.

Difference engines were put on the backburner until 1822, when Charles Babbage picked up the concept. He created a machine that used a decimal number system, and was powered by the cranking of a handle. Babbage was financed in his research by the British government, but they later would cut that support off.

This did not stop Babbage though, he went on to design a more analytical machine, but later on he made it more improved and put out a difference engine #2, all this happened between 1834 and 1869. Babbage made leaps and bounds in his designs.

Still other people will argue that Babbage's machine was the first electronic computer. While an earlier concept was made called the Antikythera machine, which was a mechanic device that was used to calculate the position of astrological signs.

This "earliest computer" was discovered on a shipwreck in the Mediterranean Sea, and it dates back to 250 BC. It's not known who designed this early device but it has been guessed to be designed by Archimedes, because it is similar to some of his other mechanical devices.

However, there are still other people who will argue that the abacus was truly the first computer. These were invented in China somewhere between 2600 BC and 300 BC. These abacus were used by clerks and merchants in China, they are felt to be the first computer by many people.

Alan Turing who was from Cambridge UK, he was drafted to the Bletchley park secret base where the work was being done on the WW3 enigma codes that the Germans were using. It was kept top secret until recently the name of this computer was Colossus; it was smashed into pieces at the end of the war.

The first known "modern computer" was invented during WWII, done by a German engineer named Konrad Zuse in 1941. This computer was named the Z3. It was an analog computer that was designed to stimulate the guidance system for rockets.

With some research it was found that Babbage did not build a complete machine. Thus it would be Zuse who invented the first electronic computer.

Thus to truly answer who invented the computer it's not really simple. Really you have to say who all contributed to the make up of the computer. So many different people in history helped with these inventions, by their failures and successes.

So over all the first electronic computer was invented by John Vincent Ansoff. It was named the ABC, which stood for Anatasoff Berry Computer.

A lot of people would feel that IBM was the first in designing the PC, but really prior to them was the MITS Altair 8800, Apple II, TRS80, the Atari 800, and of course the Commodore 64. Still others say Altair was not first, but instead it was the Simon by Berkley Enterprises.

So as you can see who invented the first computer is really up for grabs, and will be forever. But let's thank all these people who came up with an incredible machine that is hard to live our lives without.

Mehmet has over 10 years experience in repairing computer. Get everything you can from him. Download a free trial of the top registry cleaner today! Visit: http://www.registryheal.com/

Wednesday, May 6, 2009

Electronics Recycling

Society's technological advancements have grown significantly over the years. Electronics devices such as telephones, cell phones, radios, CD and DVD players, televisions, and computers are products that are used in every household. These items are just a few of the many electronic devices that can cause serious environmental damage due to their toxic components. Electronics that are in need of disposal are referred to as e-waste, or electronic waste. Because of the advancement of electronic products, there has been a growing concern about the hazards of electronic waste. Some of these concerns include: improper disposal of toxic materials, health and safety concerns for people disposing of these items, as well as dangers to the soil and water supply. For instance, electronics are made using a considerable amount of toxic substances such as lead, cadmium, aluminum, zinc, copper, and plastics which can all leak poisonous material in the ground and water. These environmental concerns have resulted in the establishment of electronic recycling facilities and industries who take old electronics such as computers for the purpose of recycling and safe disposal.

Electronics containing materials such as metals, plastic, are valuable to the recycling companies. Disposing of electronics through a recycling company will result in fewer electronic devices going into landfills and lower carbon emissions.

Recovering Raw Materials: Recycling electronics involves recovering raw materials from the electronic equipment. Materials such as steel, copper, wires, aluminum, brass, plastics, glass,etc., are extracted and sold to smelters so they can create raw materials. Depending on the type of metal being extracted, they can be processed and used in products required by such businesses as the steel, construction and cement industry. Plastics and wood can be used as fuel to provide heat to industrial furnaces which converts to steam. Metals such as copper are sold to metal refineries.

Plastics: Plastics from such items as computers, computer mice, and keyboards, are sent through shredding processes and machine sorted. They are then sent to other recyclers for further processing.

Larger Electronics: Items such as televisions and computer monitors are dismantled by hand. The leaded glass cathode ray tubes are removed and disposed of safely. Plastics, copper, and circuit boards are removed, separated, and processed.

Hazardous Items: Toxic items are removed from electronic devices and disposed of safely. Toxic substance can include leaded glass, rechargeable batteries, non-rechargeable batteries (i.e.alkaline, lead acid, cell batteries) mercury in lamps and switches, parts containing polychlorinated biphenyls, as well as ink and toner cartridges. The remaining non toxic materials are processed and the recyclable materials are recovered. The materials are shredded and separated according to type. For instance, they can be divided into such materials as steel, copper, aluminum, and plastic.

Refurbished Electronics: There are now many companies that acquire used computers, repair and update them, and resell them at a much lower price. This is a great way to keep electronics out of landfills and make technology more affordable.

Donate Your Computer: If you are getting rid of your old computer because of a recent upgrade, consider donating it to charity. Many schools and non profit organisations are in need of computers. There are companies and businesses that will take your computer, refurbish it, and donate it to a needy cause. Make sure your computer is wiped clean of all information before donating it. Donating your computer helps the community and the environment.

We are fast becoming a technology dependent society. When it comes to protecting and conserving our environment, we have to adapt and change our technological practices to ensure a sustainable future. Recycling electronics is a great way help the planet.

Sunday, May 3, 2009

How Small Will Computers Go?(

India's huge population is shaping the use of the new technology of Bluetooth - and in turn is being shaped by the ever smaller computers.

The next generation laptop, which Japan is developing, is a blue tooth (wireless protocol) laptop that will be the size of a fountain pen. It will fit snugly into your pocket or purse. At first glance it could easily be mistaken for a fountain pen, that appears to have a camera attached to the top of it.

This pen-type instrument will project both the monitor, as well as the keyboard onto any flat surface. The day of having to haul heavy computer bags with you will be gone. All you require is a wall to project the virtual screen on and a flat table top to project the virtual keyboard onto and bingo. You will be able to connect to the Internet and complete all your usual tasks, with little more than a pen size machine.

The first laptop computer, invented in 1943, known as Colossus, was a million miles away from the first 30 ton electronic computer. By the 1980's personal computers (PCs) had become a common item, followed closely with the lap top, which became readily available in 1982. The first 1982 version of the laptop, was about the size of a portable sewing machine and ready to modernize the world of commerce. By 1995 the introduction of Windows 95, standardized the operating systems on all computers and changed the computer world for ever.

Laptops were originally designed to be only used by a 'small niche market', such as the military, or sales people. How wrong was that? There are more laptops used in businesses today, than desk top computers. A laptop is almost compulsory equipment for every student.

Friday, May 1, 2009

Audi Electronics

Audi electronics are quite exceptional to Audi cars. Audi's unmatched single operating system gives you complete control over your car's information and entertainment features. Some of features of Audi electronics are wise headlights that know when to light the way and the new navigation system that puts the world in the palm of your hand. Audi electronics offers an intrinsic and accurate system plan which makes your drive according to plan.

Audi electronics keep you on the right track. The lane departure warning system in Audi warns you when you are over 65km/h and accidently drift away from the road. Even when the system is activated and the driver has not noticed the warning and the car still moves away from the road, Audi senses that the lane is crossed and vibrates the steering wheel in order to attract the driver's attention.

Audi's another excellent feature is the safety that it provides when you are overtaking. The optional lane change feature helps the driver while changing lanes at a speed of 60km/h or more. Audi side monitors the area from the side to behind the vehicle and warns the driver through a signal in the exterior mirror when the monitor detects another car in the adjacent lane.

Audi electronics are dynamic and comfortable. Audi offers excellent driving dynamics with great comfort like that in a luxury saloon. The air suspension is an electronically controlled air suspension system that can be adapted and adjusted according to the individual needs.

You can always stay in touch with Audi electronics. The phone feature in Audi A8 and A6 offers dual features of GSM phone for use in the D and E networks with the added user friendly hands off unit. These phones are made with high digital technology and eliminate external noise while talking.

Audi electronics include the easy navigation system. It offers a quick and safe journey to your destination. The user friendly, safe, high performance navigation system is the key to secure monitoring. These navigation systems are built with MMI and are controlled by the operator control system in the console. You can also set your destination by using the Voice control system.

The cruise control element in Audi electronics enhances the driving pleasure. It controls the speed and maintains a distance to the vehicle in the front. The adaptive cruise control system allows you drive safely and easily. You can adjust the speed between 19 and 124 mph without getting a time lag as in previous systems.

Acoustic parking system in Audi electronics allows easy parking. The system senses with its eight ultrasonic sensors and gives you assistance while parking the car. When you back your car to get a place for parking, the sensors sense as soon as your car gets near another car and sends you a tone signal. This will help you park the car easily and without any help from others, plus you can be rest assured that no damage will be caused by you to other people's property.

Audi electronics are therefore very high standardized systems allowing the user to be more comfortable and feel at ease while driving.