Rabu, 20 Oktober 2010

Computer Viruses

Computer viruses may not be aware of their fame and notoriety, but they certainly get their share of press. This article presents the top ten most famous computer viruses and thoughts on virus fame in the future.

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy diskCDDVD, or USB drive.[2]
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer wormsTrojan horses, most rootkitsspyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

The Top Ten

1. ILOVEYOU - (2000) One of the most widespread and rapidly spreading viruses ever, the ILOVEYOU virus spread via e-mail, posing as an executable attachment sent by a friend from the target's contact list.
2. Code Red - (2001) IIS on Windows servers were the target of this virus. It also launched denial of service (DoS) attacks.
3. Nimda - (2001) Nimda used seemingly every possible method to spread, and was very effective at doing so. Nimda is notable for being one of the fastest spreading and most widespread viruses ever.
4. Melissa - (1999) The Melissa virus is notable because it is a Word macro virus. It cleverly spread via e-mails sent to contacts from the infected users' address books.
5. Sasser - (2004) Sasser exploited a buffer overflow and spread by connecting to port 445 on networked Windows systems. The chaos caused was possibly the worst ever, as systems restarted or crashed.
6. The Morris Internet Worm - (1988) The grandfather of computer worms, the Morris worm infected Unix systems and was notable for its "accidental" virulence.
7. Blaster - (2003) Blaster exploited a Windows operating system vulnerability and let users know of its presence with a system shutdown warning.
8. SQL Slammer - (2003) This tiny virus infected servers running Microsoft's SQL Server Desktop Engine, and was very fast to spread.
9. Elk Cloner - (1982) Despite Apple's marketing that their systems are less prone to viruses that was not always the case. Notable as possible the first personal computer virus, Elk Cloner infected the boot sector of Apple II floppies.
10. Creeper - (1971) This is noted as possibly the first ever computer virus. It infected computers on ARPANET. Mostly harmless, the concept of Creeper has infected the minds of rogue programmers through today.







What is Identity Theft

Identity theft is a crime whereby criminals impersonate individuals, usually for financial gain. In today's society, you often need to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address change and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfers in your name, to wipe out your your bank account. 
Identity theft can also go beyond this type of a monetary impact. Thieves can use your information to obtain a driver's license or other documentation that would display their photo but your name and information. With these documents thieves could to obtain a job and file fraudulent income tax returns, apply for travel documents, file insurance claims, or even provide your name and mailing address to police and other authorities if involved in other criminal activities.

How to Protect Yourself

The Federal Trade Commission is one of many organizations that provides valuable facts and information to consumers concerning identity theft, including preventative and resolutions to identity theft concerns. For consumers who believe they are a victim of identity theft, the FTC recommends you take immediate steps to protect yourself such as placing fraud alerts on your credit cards, filing police reports, and filing a complaint with the Federal Trade Commission. It is also important to resolve specific fraudulent usage with organizations responsible for your bank accounts, credit cards, driver's license, investment funds, debt collectors and others.
Almost every worldwide government agency responsible for identity theft issues will tell you the same thing. The first step to fighting identity theft is to minimize the risk. To do this they urge consumers to protect their personal information. Start by asking companies how they use your information, and for online transaction, take a moment to review a Web site's privacy policy. In offline tranactions don't provide credit card numbers, financial account numbers, and personal identifying information over the phone unless you know the communication line is secure. Ideally, you should initiate the conversation. For Internet transactions, be sure the Web site offers secure data encryption and other services to protect your personal information.
Lastly, there are recommended everyday practices, such as keeping an eye on postal mail to ensure your bills are arriving when they should be, and taking the time to properly dispose of paper documents that may contain credit card numbers and other identifying personal information. The more private and secure you keep your personal identifying information, the less susceptible to identify theft you are.
Did You Know...
According to two studies done in July 2003 (Gartner Research and Harris Interactive), approximately 7 million people became victims of identity theft in the prior 12 months. That equals 19,178 per day, 799 per hour, 13.3 per minute. [Source Identity Theft resource Center]
Key Terms To Understanding Identity Theft:
security
In the computer industry, refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.
cyber forensics 
The application of scientifically proven methods to gather, process, interpret, and to use digital evidence to provide a conclusive description of cyber crime activities.


phishing
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.


e-mail spoofing 
Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source.

Misuse of the Internet

In the general sense, an internet (with a lowercase "i", a shortened form of the original inter-network) is acomputer network that connects several networks. As a proper noun, the Internet is the publicly available internationally interconnected system of computers (plus the information and services they provide to their users) that uses the TCP/IP suite of packet switching communications protocols. Thus, the largest internet is called simply "the" Internet. The art of connecting networks in this way is called internetworking.

The creation of the Internet

Main article: History of the InternetThe core networks forming the Internet started out in 1969 as the ARPANET devised by the United StatesDepartment of Defense Advanced Research Projects Agency (ARPA).
Some early research which contributed to ARPANET included work on decentralised networks (including damage survivability) , queueing theory and packet switching.
On January 11983, the ARPANET changed its core networking protocols from NCP to the then-new TCP/IP, marking the start of the Internet as we know it today.
Another important step in the development was the National Science Foundation's (NSF) building of a university backbone, the NSFNet, in 1986. Important disparate networks that have successfully been accommodated within the Internet include UsenetFidonet, and Bitnet. See History of the Internet.
During the 1990s, the Internet successfully accommodated the majority of previously existing computer networks. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the internet protocols, which encourages vendor interoperability and prevents one company from exerting control over the network.


Today's Internet

The Internet is held together by bi- or multilateral commercial contracts (for example peering agreements) and by technical specifications or protocols that describe how to exchange data over the network. These protocols are formed by discussion within the Internet Engineering Task Force (IETF) and its working groups, which are open to public participation and review. These committees produce documents that are known as Requests For Comments (RFCs). Some RFCs are raised to the status of Internet Standard by the Internet Architecture Board (IAB). Some of the most used protocols in the Internet protocol suite are IPTCPUDPDNSPPPSLIPICMPPOP3IMAPSMTP,HTTPHTTPSSSHTelnetFTPLDAP, and SSL.
Some of the popular services on the Internet that make use of these protocols are e-mailUsenet newsgroups, file sharing, the World Wide WebGophersession accessWAISfingerIRCMUDs, and MUSHs. Of these, e-mail and the World Wide Web are clearly the most used, and many other services are built upon them, such as mailing listsand web logs. The internet makes it possible to provide real-time services such as web radio and webcasts that can be accessed from anywhere in the world.
Some other popular services of the Internet were not created this way, but were originally based on proprietary systems. These include IRCICQAIMCDDB, and Gnutella.
There have been many analyses of the Internet and its structure. For example, it has been determined that the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks.
Similar to how the commercial Internet providers connect via Internet exchange points, research networks tend to interconnect into large subnetworks such as:


Internet culture

The Internet has a large and growing number of users that have created a distinct culture, Internet dynamics. seeNetiquetteInternet friendshipTrolls and trollingFlamingCybersexHacktivism or Hacker cultureInternet humorInternet slang, and Internet art.
The Internet is also having a profound impact on knowledge and worldviews. Through keyword-driven Internet research, using search engines, like Google, millions worldwide have easy, instant access to a vast amount and diversity of online information. Compared to books and traditional libraries, the Internet represents a sudden and extreme decentralization of information and data.
The most used language for communications on the Internet is English, due to the Internet's origins, to its use commonly in software programming, to the poor capability of early computers to handle characters other than western alphabets.
The net has grown enough in recent years, though, that sufficient native-language content for a worthwhile experience is available in most developed countries. However, some glitches such as mojibake still remain troublesome for Internet users.


Legal and moral issues

There is much public concern about the Internet stemming from some of the controversial material it contains.Copyright infringementpornography and paedophilia, so called "identity theft," and hate speech are common and difficult to regulate (see cyber law). "Sex" remains one of the most frequently searched terms on many Internetsearch engines (cf. sexual morality). Some of the concerns, which many argue are not rationally based, have even approached the level of moral panic, similar to the British one over video nasties in the 1980s.
The Internet has been blamed by some for the death of some people. Brandon Vedas died after overdosing on a mixture of legal and illegal drugs while other IRC chatters egged him on. Shawn Woolley shot himself after his life was ruined by an addiction to Everquest, according to his mother. Bernd-Jurgen Brandes was stabbed to death and eaten by Armin Meiwes after responding to an Internet advertisement requesting a "well-built male prepared to be slaughtered and then consumed."


Internet access

Countries with the best internet access include South Korea (50% of the population has broadband access) and Sweden, according to [1] "Web-savviest nation".




Public places to use the Internet

Public places to use Internet include libraries and Internet cafes, where computers with internet connection are available. There are also internet access points in public places like airport halls, sometimes just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", "web payphone".Alternatively there are Wifi-cafes ("hotspots"), where one needs to bring one's own wifi-enabled notebook or PDA, for which the cafe provides wireless access to the Internet.
The services may be free (possibly in connection with paid services such as buying coffee) or for a fee (metered access or with a pass for e.g. a day or month).
A hotspot may also be larger, e.g. including the piece of street in front of the library, a whole street, a campus including outdoor areas, a town part or, as is under construction in some places, a whole town; see alsoMetropolitan area networkWireless community network.
Advantages of using one's own computer include more upload and download possibilities, using one's favorite browser and browser settings (the preferences menu may be disabled in a public computer), and integrating activities on internet and on one's own computer, using one's own programs and data. (Using public computers one can use one's email box as storage area for data. For programs one may do the same, but the size of the mailbox and restrictions on the public computer limit the possibilities of running one's own programs.)




Source
Wikipedia.com
Google.com
Yahoo.com
Knowlegerush.com

Rabu, 06 Oktober 2010

Is Technology taking over our life?

Technology is the usage and knowledge of tools, techniques, crafts, systems or methods of organization. The word technology comes from the Greek technología (τεχνολογία) — téchnē (τέχνη), an 'art', 'skill' or 'craft' and -logía (-λογία), the study of something, or the branch of knowledge of a discipline.[1] The term can aeither be applied generally or to specific areas: examples include construction technology, medical technology, or state-of-the-art technology or high technology. Technologies can also be exemplified in a material product, for example an object can be termed state of the art.
Companies are downsizing because technology now does a job that a person once did. Good bye to the age old concept of people serving every function within a company. Consumers demand more for less, and the only way for companies to answer that call is to stay competitive by saving money and to fatten up the bottom line. This usually means a company must reduce it’s manpower as an effort to achieve this goal.
Still, with all of what today’s technological advancements have to offer, there are some areas that need improving, such as the automated phone system. I really get annoyed with some of these systems. They bombard you with a vast array of options and menus to choose from. "If you would like to speak to a customer service representative, please press one now." Beep. "I’m sorry, but no humans work here. Please choose another option." Beep. "I’m sorry, but that option is not offered. Please try again." Beep, beep, beep... "You seem aggravated and this system isn’t designed to address that. Please call back later when you aren’t so hostile." Doesn’t anyone just answer the phone anymore? 
I also get annoyed with the pre-screening that some of these automated phone systems do. They ask for your phone number and when you are able to speak to a real life person, the person asks for your phone number again. What was the point in the system asking me for my phone number if it didn’t do the live person any good? Should I be expecting this automated system to call me someday and say "Hi, Mike. How’s the wife and kids? If they are fine, please press one now"...
Don’t you just love it when the automated phone system keeps you on hold for a lengthy amount of time. A recorded voice, finally, interrupts the elevator music and says, "Please continue to hold. We’ll be with you shortly. If you would like to continue to hold, please press one now." The voice encourages you the way a Lamaze Coach encourages a woman giving birth: "Okay. Just a little longer now. You’re doing great. Breathe. Breathe. Okay, now push..."
Soon we’ll all be living like the Jetsons and everything in our lives will be automated. Rosie the Robot will be serving up your favorite dish while Astro embarrasses you by licking himself in front of company. The future won’t be all bad, though. 

With all the media about the recession and car plants, closing down, car plants have suffered from technology greatly.  A car plant use to require a lot more people to make vehicles in the past than it does now.  Most of its cars are made automatically, with just a few employees doing the work.  I read somewhere that this car manufacturer use to employ 5000 employees in the past and now with technology advances it went down to 1000.  This just shows that technology is silently getting rid of employees slowly as the technology improves, pretty soon it will just be all automated.

As I said earlier these self check outs are becoming increasing popular, and in the near future you will probably not see a cashier, stores are everywhere and if there are no cashiers there will be many people without a job, and we will miss the personalized service that some great cashiers give when we visit the store.  I’m sure all of you had some great conversations with some of those people operating the tills, and also the help some of them offer
Robotic gas pump, some places still have a Full Service gas station, which this will eliminate, what this is, is its a robotic arm fueling cars.  This will eliminate the jobs of those gas attendants at gas stations, and there are many gas stations in the world, and around each town.Blackberry, IPhone, and PDA’s now are taking many jobs, now CEO’s do not need personal assistants taking there emails, and calling them telling them important things, now a CEO can have there emails come directly to there phone, and reply back, they also have the ability to tell the whole company current notes anywhere they are, and also companies now have central servers with calendars on there phone programed for special times, and days of the week they have o be places.  Of course the good thing about this, is that you can be on a business trip and always have communication with the business.
There are so many more examples, but this just makes you think, when you go to one of these places already testing/operating these new technology advances, it makes you think at the amount of people who will affected by this, usually affecting the low income earners, and the CEO’s profiting.  But at the same time, these robots do not spend money like those people who worked at those jobs did, so this will also have some affect.  And in all those examples I posted, there are probably millions/billions of people working in those fields around the world, and making it difficult for most to go back to school to re-lean.

Rabu, 29 September 2010

Homework. September 29 2010

How is Social Networking affecting young generation. Write effects of Facebook specially on students. then discuss the social and ethical issues.


Facebook started out as Website for ratings girls with their looks online, But it gradually turns itself into a number one social network website. Facebook was founded by Mark Zuckerberg with his college roommates and fellow computer science students Eduardo Saverin, Dustin Moskovitz and Chris Hughes.[7] The website's membership was initially limited by the founders to Harvard students, but was expanded to other colleges in the Boston area, the Ivy League, and Stanford University.

Now Over 500 million people, over the world is using Facebook as its social network website and will keep on increasing its number. Mark Zuckerberg intended this website for people over 13 or older to enter this website. But of course their are a lot of breach of age in the Facebook, allowing anyone to enter a false age to their account verifying that they are 13 or older. Once, i tried entering year of birth as 1911, It actually works. This not only cause a lot of pre-teens to own an account. It becomes vulnerable to online predators and so much more.

Facebook is not only affecting the pre-teens but its also affecting the Young generations (Teenagers), I use to remember when we use to watch television for 2 hours and head out and play ball for at least a couple of hours. Kids these days would waste 10 straight hours in Facebook for the heck of it. The social network offers addicting games such as Farmville, Cooking mama Facebook edition Etc. This not only affects the children's social life but affecting their eye sight and missing the greatest feeling being a children. 

Almost half of the users in Facebook are students either High school or Middle school. its a social network where all of their friends would talk to each other for timeless of hours. These affects the studies of the children, distracting them from their homework or even their daily life. 


Socially The Facebook is one of them most respected website in the world and its revenue is over $800 million. People loves the idea of everyone meeting online such as Facebook, but now the school and work place would ban the idea of having Facebook in their facility because of such distraction it's block (Such as Gmis).
Their is a few problems in Facebook too such as Breaching into People's Privacy, now possible.



Conclusion, The Facebook website is either loved or hated by the community and people around the world. The people around Facebook are still Naive compared to the older people, I rarely open my Facebook usually it takes around 5 min to check my own profile. but remember to know between boundaries of using a Facebook and giving information to strangers.

Blog One

Apparently, i have to make another blog. Since i'll be doing my homework mostly here.The thing is i mostly write personal stuff inside so i dont really know what to write in this blog other then my homework which is sorta due today online (Hi Sir Tajvir!) and i might rarely post much on this account (Other then my homework assign to me by my teacher) and now. i introduce myself, my name is Eric. I use to own a blog here (Which will remain nameless) . But now i own another blog in Tumblr.
Its a better place for me to blog, Personally and for public. 



If you need to follow me here is my other accounts
Blog: Eric's Personal Blog
Twitter: Eric's Twitter



Thank you.
Eric