Welcome to my blog....

Welcome to my blog....

Monday, September 15, 2008

SOFTWARE ATTACKS

Security issues


  • Without security, both public and private networks are susceptible to unauthorized monitoring and access.
  • Internal attacks might be a result of minimal or nonexistent intranet security.
  • Risks from outside the private network originate from connections to the Internet and extranets.
  • Password-based user access controls alone do not protect data transmitted across a network.

Common types of network attacks


  • Without security measures and controls in place, your data might be subjected to an attack.
  • Some attacks are passive in that information is only monitored.
  • Other attacks are active and information is altered with intent to corrupt or destroy the data or the network itself.
  • networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

-Eavesdropping-


  • the majority of network communications occur in a plaintext (unencrypted) format, which allows an attacker who has gained access to data paths in a network to monitor and interpret (read) the traffic.
  • When an attacker is eavesdropping on communications, it is referred to as sniffing or snooping.
  • The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise.
  • Without strong encryption services that are based on cryptography, data can be read by others as it traverses the network.

-Data modification-


  • After an attacker has read data, the next logical step is often to modify it.
  • An attacker can modify the data in the packet without the knowledge of the sender or receiver.
  • Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit.
  • For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be changed.

-Compromised-key attack-


  • A key is a secret code or number required to encrypt, decrypt, or validate secured information.
  • Although determining a key is a difficult and resource-intensive process for an attacker, it is possible. After an attacker determines a key, that key is referred to as a compromised key.

TYPES OF SOFTWARE ATTACKS


VIRUS
  • attach to another program
WORM

  • replicate and spread itself
  • without requiring another computer program
TROJAN HORSE

  • software program hide in another program
  • activate itself when we open the file

We need to have a security in our gadget. So, it will be more safety..There are so many virus create which we do not know about the risks we will face it.For example, data modification.A bad hacker can modified our data without we realised it. We must have security to protect our data from lose.

The most popular virus is trojan. It easy to detect this virus if we always scan our program. We must have an antivirus and always update the software. If we dont, they will replicate and hide in other data.

In conclusion, we have take care of this seriously. It will become more problem if we do not prepare early.That's all from me..bye!!!!hehe

Note:

Tuesday, September 2, 2008

What gadjet that i have now??


The gadget that i have now is just nokia handphone model 5300 Xpress music.
It is really important in my life. I can capture pictures, listening to music and also playing a games through my handphones.It is easy for me to do everything just using my fingers. This handphones is my life..if i lose it, i will cannot replace it. It is because someone special gives to me. Wonderful right!!!hehe.
However, i still cannot fulfill my intensions. I want a exclusive gadget!!


My future gadget


Yeah!!This is my future gadget that i really want in my life!! The design is very elegant and exclusive. I love this iPhone..
There are so many advantages that i can get from this gadget. Even the price is really expensive. However,this is a technology that we must have now. If we can buy a laptop,it is not impossible to buy the iPhone. Right??

I cannot imagine if one day i get this gadget...










Here i show to all of you the characteristic of iPhones:


SIZE & WEIGHT


Height:
4.5 inches (115.5 mm)
Width:
2.4 inches (62.1 mm)
Depth:
0.48 inch (12.3 mm)
Weight:
4.7 ounces (133 grams)

Color
  • 8GB model: Black
  • 16GB model: Black or white




Display of iPhones
  • 3.5-inch (diagonal) widescreen Multi-Touch display
  • 480-by-320-pixel resolution at 163 ppi
  • Support for display of multiple languages and characters simultaneously

Audio

  • Frequency response: 20Hz to 20,000Hz
  • Audio formats supported: AAC, Protected AAC, MP3, MP3 VBR, Audible (formats 2, 3, and 4), Apple Lossless, AIFF, and WAV
  • User-configurable maximum volume limit
Do you know that iPhone supports so many language like:
  • Language support for English, French, German, Japanese, Dutch, Italian, Spanish, Portuguese, Danish, Finnish, Norwegian, Swedish, Korean, Simplified Chinese, Traditional Chinese, Russian, and Polish
  • International keyboard and dictionary support for English (U.S.), English (UK), French (France), French (Canada), German, Japanese, Dutch, Italian, Spanish, Portuguese (Portugal), Portuguese (Brazil), Danish, Finnish, Norwegian, Swedish, Korean (no dictionary), Simplified Chinese, Traditional Chinese, Russian, and Polish.
It so many benefits that i cannot explain more. I hope that i can buy and get this gadget as soon as possible. Wait for me iPhone!!!!hehehe

Thursday, August 28, 2008

Expression about Introduction to Literacy

Subject Introduction to Literacy really helps in our life especially in our jobs.
Nowadays, information system and information technology use in many ways.
It really close or integral in our life.

For example, if we want to do a business, we need to advertise our products or stuff. So,we need information system and information technology to make it work.

Information technology offers so many career opoortunities. If we have knowledge in IT, it can improve our chances of landing a good jobs.
Like myself, i want to be lecturer or a teacher, it can easily complete my works in a seconds.

Everything in organization like a school or university, cannot operate without IT.Right??
There are so many company or organization provides job opportunity widely to a person who have knowledge about IL.