BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Tuesday, March 16, 2010

What is antivirus software?

Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software programs, such as viruses and worms. You can help protect your computer against viruses by using antivirus software, such as Avira, AVG,Norton, Avast and many more.
Computer viruses are software programs that are deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet.

To help prevent the most current viruses, you must update your antivirus software regularly. You can set up most types of antivirus software to update automatically.

Sunday, March 14, 2010

What is SPYWARE ?????

Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first.

Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information.

That does not mean all software that provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but you "pay" for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

Other kinds of spyware make changes to your computer that can be annoying and can cause your computer slow down or crash.

These programs can change your Web browser's home page or search page, or add additional components to your browser you don't need or want. These programs also make it very difficult for you to change your settings back to the way you originally had them.

The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer.

There are a number of ways spyware or other unwanted software can get on your computer. A common trick is to covertly install the software during the installation of other software you want such as a music or video file sharing program.

Whenever you install something on your computer, make sure you carefully read all disclosures, including the license agreement and privacy statement. Sometimes the inclusion of unwanted software in a given software installation is documented, but it might appear at the end of a license agreement or privacy statement.

What is a computer virus???

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to computers, or even erase everything on your hard disk.
Computer viruses are often spread by attachments in e-mail massages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards or audio and video files.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs that you might download.
To help avoid computer viruses, it’s essential that you keep your computer current with he latest updates and antivirus tools, stay informed about recent threat, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

Thursday, March 4, 2010

On 'The Social Network & Email

Below are some informations that are related on the social network and email. Hope u enjoy it.

1.73 billion:
internet users worldwide(september 2009).

Number of internet users:
738,257,230(in Asia)
252,908,000(in North America)
179,031,479 (in Latin America/Caribbean)
20,970,490 (in Oceania/Australia)
67,371,700 (in Africa)
418,029,796 (in Europe)

90 trilion:
the number of email sent on internet in 2009

247 billion:
average number of emails per day

200 billion:
average number of SPAM emails per day

1.4 billion:
the number of email users worldwide

81%:
the percentage of emails that were SPAM

234 million:
the number of website as of December 2009

126 million:
the number of blogs on the internet (as tracked by BlogPUlse)

84%:
percent of social network sites with more women than men

27.3 million:
number of tweets on twitter on twitter per day (November 2009)

4.25 million:
people following @aplusk (Ashton Kutcher,Twitter's most followed user).

Facebook server 260 billion page views per month. That's more than 6 million page views per minute, or a staggering 37.4 trillion page views in a years
Page views per month
facebook=260 billion
myspace=24 billion
twitter=4.4 billion
linkedln=1.9 billion

Facebook needs as many as 30,000 servers,and they're still growing
350 million people on facebook

2.5 billion photos uploaded each month to facebook

30 billion at the current rate the number of photos uploaded to facebook per year

1 billion the total number of videos YouTube servers in one day.

148,000 new zombie computer*created per day *used in botnets for sendind spam,etc.

2.6 million amount of malicious code threats at the start of 2009(viruses,trojans,etc.)

by..
-l=ul)z!l_ a.k.a mpotatoes-

1.4.1.4 : Display cooperation in conducting study.

Cooperation in conducting study can be display through delegation of works among team members. Delegation is the ability to assign tasks to others with the authority, responsibility and accountability to finish the tasks. It is not enough to just give out orders but as a team leader you also need to give specific instructions on what to do. Tell your team members that they are responsible for the task given to them and explain to them what would happen to the project if they failed to finish the task.

1.4.1.3 : Present results in a clear, concise manner.

A good presentation should contain three well-defined sections, they are:

  1. Introduction
    • is at the beginning of the research
    • includes the objectives of the research
    • provides a clear statement on why the study was undertaken
    • includes the limitations/assumptions and analytical techniques
  2. Content

§ consists of facts or arguments related to subject matter

§ can be presented in an argument format or just as an overview

  1. Conclusion

§ is a review of content (not repetition of content)

§ relates to the statement of objectives in the introduction

§ should not introduce new issues

§ should contain judgment or decision that has been reached

1.4.1.2 : Describe the impact of ICT on society

The computer has change the society. People interacts directly with computer in education, finance, government, health care, science, publishing, tourism, and industry.

Computers help them to do their work faster and more efficient.

Home & Education

Today, computers are used in schools, colleges and universities to promote better education. Students use software packages to complete their assignments. Educators use the computer-based training and web-based training as replacements for lecture presentation.

Computers for Higher Education

Open Distance Learning or online learning can be implemented as computers can act as the main medium of delivering from one location to the other locations. This type of learning consists of online forum, discussion, quizzes, test questions and many more. The example of the Open Distance Learning institution is the Open University of Malaysia.

Business

People use finance or accounting software to balance check books, pay bills, track personal income and expenses, manage investments and evaluate their financial plans. Accounting software helps companies to record and report their financial transactions.

Computers in Banking

IMany financial institutions offer online banking. People can access their financial records from anywhere in the world. One example is the Maybank2u. Most of the packages offer a variety of online services which requires access to the web. For example we can track our investment online, compare insurance rates and do online banking.

Industry

By using the CAM system, computers record actual labour, material, machine and computer time used to manufacture a particular product. Computers process this data and automatically update inventory, production, payroll and accounting records on the company’s network. Examples of companies using this system are Proton and Perodua.

Graphics & Multimedia

Computers are crucial in the process of making works available to the public. These works include magazines, books, newspapers, music and film production. Special software applications are used to assist graphic designers to develop graphics, texts, photographs and composing songs.

Communication

Government provides society with direction by making and administering policies. Most government offices or agencies have websites in order to provide citizens with the latest information. Examples of software applications used for communication include e-mail, web browsers, newsgroups, instant messaging and video conferencing. We can access government websites to:

  • check information on taxes (www.hasil.org.my)
  • pay parking tickets and check summons (www.jpj.gov.my)
  • register online for IPTA/IPTS application (www.moe.gov.my)

Computers in Tourism

Today, people will go online to get all related information about traveling. They can visit websites to get information on destinations, prices, hotels, flights, rentals, purchase ticket online, all payments can be made by using credit card.

Computers in the Healthcare

In the medical field, computers are very important in running the operations. Medical staffs use computers for various purposes, namely:

  • maintaining patient records
  • monitoring patients’ vital sign
  • assisting doctors, nurses and technicians with medical tests by using computer and computerised devices .
  • using medical software to help with researching and diagnosing health conditions.

Furthermore, computers and the internet are important sources for people to get all information on medical, nutrition, fitness and other tips from several available websites. The latest development in the medical field is telemedicine which help professional to conduct live conference in separate locations.

Science

In the scientific world, computers are used in all fields from biology to astronomy to meteorology and others. Things that can be done by computers, namely:

  • collecting, analyzing and modelling data
  • serving as medium of communication with colleagues around the world
  • contributing to new inventions or breakthrough in surgery, medicine and treatment
  • imitating functions of the central nervous system, retina of the eye and others by tiny computers
  • allowing a deaf person to listen through cochlear implant

1.4.1.1 : Locating Information From Various Sources

information that we want in books, journals, articles or other resource materials found in the library and the Internet. A list of all the books, journals and electronic materials are available from the library. We can use the online databases to find the most useful materials.
Anyway, any materials need to be evaluated in four aspects. They are relevance, reliability/credibility, perspective & update.

1.3.3.2 : Applying the Correct Security Procedures

Data Protection:
We need to protect the data as it may somehow get lost or corrupted due to some viruses or mishap like fire, flood, lightning, machine failures and even human errors. Ways to protect the information:
• make backup files
• detect the virus and clean the computer
• warn others on virus attacks
Detecting Illegal Access To Systems:
The computer system detects any illegal access to the system. Tcpwrappers and tripwire are often used to detect any illegal access. User's access will be reviewed periodically (internal audits) by computer operations. It is to ensure detection of violations of security and unauthorised modifications to software and data .
Tcpwrappers:
Control access at the application level, rather than at the socket level like iptables and ipchains. The system will run tcpwrappers to log access to ftp, tftp, rch, rlogin, rexec and telnet.
Tripwire:
Detect and report on any changes in the thousands of strategic system files. The system will run tripwire to determine if system files have changed.
Preventing Illegal Access To Systems:
Computer systems would not allow any unauthorised users to simply access the system. Ways:
· Run anlpassword to make password cracking difficult.
· Run tcpwrappers to check if the name for an ip address can be provided by DNC
· Use a callback system to prevent unauthorised use of stolen passwords.
Preventing Illegal Root Acces:
To prevent we should have Sudo (Superuser do) so that people can perform on some machine without getting access to the entire root if that is not required. With Sudo we did not have to give out the root password.
Sudo is a program in Unix, Linux and similar operating systems such as Mac OS X that allows users to run programs in the form of another user. Sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file.
Patch:
Patch supplies small updates to software, provided that the source code is available. It is a UNIX utility. It applies a script generated by the different program to a set of files that allows changes from one file to be directly applied to another file. Resources are not enough to patch all security holes that we hear about through the bugtraq list.

1.3.2.1 : Threats to Computer Security

Malicious Code:
Also known as a rogue program. It will cause undesired effects in the programmer’s part. The effect is caused by an agent, with the intention to cause damage. The agent for malicious code is the writer of the code who causes its distribution. Various kinds of malicious code include virus, Trojan horse, logic door, trapdoor and backdoor, worm and many others.
Hacking:
Unauthorised access to the computer system. Hackers are persons who learn about the computer system in detail. They write program referred to as hacks. Hackers may use a modem or cable to hack the targeted computers.
Natural Disaster:
Threatened by natural or environmental disaster. Eg: Flood, Fire, Earthquakes, storms and tornados, Excessive Heat and Inadequate Power Supply
Theft:
Two types of computer theft:
1. Computer is used to steal money, goods, information and resources.
2. Stealing of computer, especially notebook and PDAs.


-mpotatoes-

1.3.1.1: Defination of Computer Security

Protecting our computer systems & the information they contain against unwanted access, damage, destruction or modification. Types of computer security are:
1. hardware security
2. software security/data security
3. network security
Computers need to be protect from any intruders such as hackers, crackers and script kiddie.

1.2.4.2 : Computer Crimes

Fraud:
Having an intention to take advantage over or causing loss to other people. It includes e-mail hoaxes, programme fraud, investment schemes, sales promotions & claims of expertise. We need to be aware of other computer frauds such as health frauds, scams and hacking. We will also most likely get false information.
Copyright Infringement:
A violation of the rights secured by a copyright. It involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. Currently, the most perfect copy of the original copy can be downloaded.
Theft:
The unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg:
  • transfer of payments to the wrong accounts
  • tap into data transmission lines on database at no cost
  • divert goods to the wrong destination

Attacks:
Any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data. It can be in the forms of:

  • physical attack that disrupt the computer facility or its transmission lines.
  • an electronic attack that uses the power of electromagnetic energy to overload computer circuitry.
  • a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user.


1.2.4.1 Explain the need for Cyber Law.

Cyber Law is needed as many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet.


1.2.3.2 Describe the process of filtering to control access to controversial contents.

Internet filtering is a process that prevents or blocks access to certain materials on the Internet. It is a process of controlling the access by means of filtering software. It is used to prevent user from accessing inappropriate material and to keep employees productive.

The preferred method of choice to limit access is to filter content either by:

· keyword blocking

· site blocking

· web rating systems

These methods require software to be installed at a client of server level.

1.2.3.1 List effects of controversial contents on society:

Pornography can:

  • lead to criminal acts such as exploitation of women and children
  • lead to sexual addiction or perversion
  • develop low moral value towards other men, women or children
  • erode good religious, cultural and social beliefs and behaviour

Slander can:

  • develop into a society that disregards honesty and truth
  • develop bad habit of spreading untruths and rumours
  • lead to unnecessary argument
  • cause people to have negative attitudes towards another person

1.2.2. State authentication & verification methods/ technologies.

Methods of Authentication

Two commonly used methods are biometric device and callback system.

  • Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition & Signature Verification.
  • Callback system refers to the checking system that authenticates the user.
Methods of Verification
  • There are two methods used, which are user identification and processed object.

    • User identification refers to the process of validating the user.
    • Processed object refers to something the user has such as identification card, security token and cell phone.

1.2.2.1 List ways to protect privacy.

Privacy can be protected by privacy law and utilities software:

(a) Privacy Law - Malaysia emphasises on the following:

  • Security Services to review the security policy
  • Security Management to protect the resources
  • Security Mechanism to implement the required security services
  • Security Objects, the important entities within the system environment

(b) Utilities software

Example: anti-spam program, firewall, anti-spyware and antivirus.

1.2.1.3 State the need for intellectual property laws.

There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material. Intellectual property laws are needed:

  • to establish & safeguard the intellectual property which refers to works created by inventors, authors and artists.
  • as businesses today continue to expand globally.