Piano

Piano
I play piano.

Monday, November 29, 2010

Wireless Networking Precautions

Using a wireless internet network ( Wi-Fi) has many advantages for internet users. It allows you to be able to work in any room of your home and even outside your house and still be able to connect to the internet. Along with the advantages, Wi-Fi also comes with some security issues. If you can pick your Wi-Fi signal from outside your house, that means that others will be able to do the same. Wireless internet users need to take some extra precautions to protect their information from being taken or hacked into by others.

The best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA (encryptions on your computer) you can help prevent any intruders from accessing your computer and installing a virus or worm on it. This is very important for wireless internet users as any half-way decent hacker can use your Wi-Fi connection to get into your computer.




http://www.itlist.com/security-precautions-for-wireless-internet-users/

Internet Parental Control Software

Software controls can help parents monitor or restrict the online activities of their children. The best Internet parental control software not only prevents access to age-inappropriate content, but it also keeps children safe when they use chat programs or social networking sites. Internet parental controls most often come in standalone software for installation on household computers. More recently, some parental controls are offered as online, cloud-based services, making remote monitoring and use on multiple computers easier.

Most parental control programs operate on a yearly subscription, similar to antivirus software. If the subscription lapses, the software no longer works. Subscription-based parental controls usually include round-the-clock support and free updates as part of the service. Some types of parental control software is free to use, ranging from standalone freeware to the built-in functions of operating systems like Windows or Mac OS X. However, software critics say that free internet parental controls may not be comprehensive enough.




Sunday, November 28, 2010

How to create and use strong passwords

One of the problems with passwords is that users forget them. In an effort to not forget them, they use simple things like their dog’s name, their son’s first name and birthdate, the name of the current month- anything that will give them a clue to remember what their password is.

For the curious hacker who has somehow gained access to your computer system this is the equivalent of locking your door and leaving the key under the doormat. Without even resorting to any specialized tools a hacker can discover your basic personal information- name, children’s names, birthdates, pets names, etc. and try all of those out as potential passwords. To create a secure password that is easy to remember, do not use personal information, do not use real words, mix different character types, use a passphrase, and / or use a password management tool.


http://netsecurity.about.com/cs/generalsecurity/a/aa112103b.htm

Internet Filters

Internet filters are software tools that can help monitor Web content that can be viewed on a certain computer or network. In the case of family safetey settings, Internet filters can also help parents manage who kids can communicate with or how long kids can use the computer. Parents, guardians, or school administrators protect kids from viewing inappropriate material as well as identify which Web sites kids can visit.

Parents and guardians block sites by content type or only allow access to certain sites. You can prevent unwanted, explicit sexual content from appearing in your search results. Businesses block Web sites or applications that they don't want their employees to use at work. Setting Internet filters can help warn you about and block you from suspicious Web sites that might be fraudulent, also known as phishing filters. You can also keep spam out of your inbox, also known as spam filters.




http://www.microsoft.com/protect/terms/internetfilters.aspx

Internet Parental Guidance

Today's responsible parents are using internet filtering software to protect their children from predators on the internet. Responsible parents want to know and monitor what their children are doing online, safeguard their privacy, stop pornography and other objectionable material from coming into their home, and limit their children's online activities. Children and teenagers use computers and the internet more than any other age group.

The major film studios, television networks, and record labels have been forced by Federal legislation to restrict minors' access to adult material. However, no such legislation has been passed covering the internet. We fully support the unrestricted right of any adult of legal age to view any legal content they so desire. But our children need to be supervised and restricted from either accidentally stumbling into an adults-only area on the internet, or being lured there by a predator.




Friday, November 26, 2010

Digital Image Steganography

The term steganography comes from the Greek words meaning "to cover tightly" and "writing." It refers to the practice or art of concealing a message in any medium. Digital steganography refers to concealing a message in a digital format. Digital Steganography makes use of the fact that in a number of file formats, data is reduplicated or some data is of little importance, and the hidden message does not cause noticable changes to the file. It is used in graphics files, HTML, sound files, video, and text files, for example, but image files are favored and referred to as stego-images.

Digital steganography is related to hidden digital watermarking, but watermarking often uses smaller messages and has different purposes — often copyright, although to a certain extent, they are interchangeable. There is special software to enable the practice of digital steganography, and it may enable hiding a message within a digital watermark, although other methods may be more common. Some digital steganography software is better than others at effectively concealing messages.


http://www.wisegeek.com/what-is-digital-steganography.htm

Friday, November 19, 2010

Computer Forensics

Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. It can be used to uncover potential evidence like copyright infringement, fraud, blackmail, piracy, sexual harassment, and more. Computer forensics combines specialized techniques with the use of sophisticated software to view and analyze information that cannot be accessed by the ordinary user. This information may have been "deleted" by the user months or even years prior to the investigation, or may never have been saved to begin with - but it may still exist in whole or in part on the computer's drive.

In order to determine whether a computer holds information that may serve as evidence, the professional must first create an exact image of the drive. The examiner examines only this image drive to protect the original from inadvertent alterations. These images must be actual bit-by-bit or "mirror" images of the originals, not just simple copies of the data. Acquiring these kinds of exact copies requires the use of specialized forensics techniques. These mirror images are critical because each time someone turns a computer on, many changes are automatically made to the files. In a Windows® system, for example, more than 160 alterations are made to the files when the computer is turned on. These changes are not visible to the user, but the changes that do occur can alter or even delete evidence, for example, critical dates related to criminal activity.


Friday, September 24, 2010

HTML: A Fun Programming Language



HTML is the predominant markup language for web pages.  It stands for Hyper Text Markup Language. It is written in the form of HTML elements consisting of "tags" surrounded by angle brackets within the web page content. It allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts in languages such as JavaScript which affect the behavior of HTML WebPages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance and layout of text and other material. The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over explicit presentational markup.
In 1980, physicist Tim Berners-Lee, who was a contractor at CERN, proposed and prototyped ENQUIRE, a system for CERN researchers to use and share documents. In 1989, Berners-Lee wrote a memo proposing an Internet-based hypertext system.[2] Berners-Lee specified HTML and wrote the browser and server software in the last part of 1990. In that year, Berners-Lee and CERN data systems engineer Robert Cailliau collaborated on a joint request for funding, but the project was not formally adopted by CERN. In his personal notes[3] from 1990 he lists[4] "some of the many areas in which hypertext is used" and puts an encyclopedia first. The first publicly available description of HTML was a document called HTML Tags, first mentioned on the Internet by Berners-Lee in late 1991.[5][6] It describes 20 elements comprising the initial, relatively simple design of HTML. Except for the hyperlink tag, these were strongly influenced by SGMLguid, an in-house SGML based documentation format at CERN. Thirteen of these elements still exist in HTML 4. HTML is a text and image formatting language used by web browsers to dynamically format web pages. Many of the text elements are found in the 1988 ISO technical report TR 9537 Techniques for using SGML, which in turn covers the features of early text formatting languages such as that used by the RUNOFF command developed in the early 1960s for the CTSS (Compatible Time-Sharing System) operating system: these formatting commands were derived from the commands used by typesetters to manually format documents. However, the SGML concept of generalized markup is based on elements (nested annotated ranges with attributes) rather than merely print effects, with also the separation of structure and processing; HTML has been progressively moved in this direction with CSS.
HTML documents are composed entirely of HTML elements that, in their most general form have three components: a pair of element tags with a "start tag" and "end tag"; some element attributes given to the element within the tags; and finally, all the actual textual and graphical information content that will be rendered on the display. An HTML element is everything between and including the tags. A tag is a keyword enclosed in angle brackets. Most of the attributes of an element are name-value pairs, separated by "=" and written within the start tag of an element after the element's name. The value may be enclosed in single or double quotes, although values consisting of certain characters can be left unquoted in HTML (but not XHTML).[33][34] Leaving attribute values unquoted is considered unsafe.[35] In contrast with name-value pair attributes, there are some attributes that affect the element simply by their presence in the start tag of the element[5] (like the ismap attribute for the img element[36]).
HTML defines several data types for element content, such as script data and stylesheet data, and a plethora of types for attribute values, including IDs, names, URIs, numbers, units of length, languages, media descriptors, colors, character encodings, dates and times, and so on. All of these data types are specializations of character data. HTML documents are required to start with a Document Type Declaration (informally, a "doctype"). In browsers, the function of the doctype is to indicate the rendering mode—particularly to avoid quirks mode.
The original purpose of the doctype was to enable parsing and validation of HTML documents by SGML tools based on the Document Type Definition (DTD). The DTD to which the DOCTYPE refers contains machine-readable grammar specifying the permitted and prohibited content for a document conforming to such a DTD. Browsers, on the other hand, do not implement HTML as an application of SGML and by consequence do not read the DTD. HTML 5 does not define a DTD, because of the technology's inherent limitations, so in HTML 5 the doctype declaration, <!doctype html>, does not refer to a DTD.

Sources:
http://en.wikipedia.org/wiki/HTML