Tuesday, November 23, 2010

Wireless Network Precautions


he best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA (encryptions on your computer) you can help prevent any intruders from accessing your computer and installing a virus or worm on it. This is very important for wireless internet users as any half-way decent hacker can use your Wi-Fi connection to get into your computer.
When you look for a router for your wireless internet, make sure to get one that has a firewall installed on it. This will greatly reduce the chances that someone will be able to hack into your computer. If you find that your router does not have a firewall installed on it, there are firewall software programs that you can add to your existing router.
HTML LINKS: http://www.itlist.com/security-precautions-for-wireless-internet-users/

Strong Password (How to Create and Use Them)

Lets assume that you have a 4 character password. Each character can be A-Z, 0-9, or an underscore ("_"). That means you have 37 possible keys for each character. That means that your password has 1874161 possibilities. This may sound like a lot, but modern computers can easily go through thousands of passwords per second if the login program isn't correctly secured. Adding just one more letter (or number) to your password increases the number of possible combinations by nearly 40 times.


These are difficult to guess, and impractical to guess since many computer systems make you wait for a period of time after an incorrect password before you can try again. A computer trying to guess would have more than three trillion passwords to go through.
HTML LINKS: http://www.microsoft.com/protect/fraud/passwords/create.aspx

Internet Parental Control Software

Internet filtering and parental control software program, gives you the ability to control and monitor your child's use of the Internet, irrespective of where you are: in the neighboring room, at work, or even on vacation, thus enabling you to protect your child from the dangers of the Internet. In addition, this program enables businesses to limit and control their employees access to the Internet and to any programs.


A parental control software program, Chronager gives you complete control over your child’s use of the computer: when he or she can use it for entertainment, and when for doing homework. It enables you to restrict the times when the computer can be used, and to set the times that your child may surf the Internet, play games, use particular programs, and watch movies.
HTML LINKS:http://www.softforyou.com/

Friday, November 5, 2010

Internet Filters

An "Internet Filter" is a hardware or software solution that prevents access to certain undesirable areas of the internet. They filter by various methods - some by comparing site requests with a list of previously known bad URLs and preventing viewing if they are listed, others by scanning incoming data and blocking it if it contains undesirable keywords, file types or other parameters. Sometimes the parent can control or create the list of keywords or sites filtered, sometimes not.


A children's browser is a special parent controlled browser like Internet Explorer or Netscape which allows access only to sites that are known to be suitable for children. Usually the browser operates with its own list of known good sites, and will not allow access to any others. They also frequently have email \ chat filtering ability or dedicated email\chat facilities that do not allow 'rude words' etc. They often have some parent-defined password facility or access control that prevents the child from exiting and using a normal browser, or reaching the desktop or other software.


HTML LINKS http://www.microsoft.com/protect/terms/internetfilters.aspx

Internet Parental Guidance






Since the advent of the Web, parents have worried about children visiting pornographic and violent Web sites. Then filters like NetNanny came along to block them. Now parents worry about instant messaging, e-mail, and peer-to-peer file sharing. Whether kids are looking for trouble or it's looking for them, the latest parental-controlsoftware can help monitor them online.
This year's packages are smarter, stronger, and simpler. While overblocking can be a problem, developers constantly tune their lists and filters. And since kids are often more computer-savvy than parents, developers have hardened security. Yet ease of use is still a prerequisite; many parents will set up complicated apps wrong or not at all.
childrenhtml links:
HTML LINKShttp://www.parentalguidance.org/

Digital Image Steganography

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos (στεγανός) meaning "covered or protected", and graphein (γράφειν) meaning "to write". The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography disguised as a book on magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some other covertext and, classically, the hidden message may be in invisible ink between the visible lines of a private letter.


Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
HTML LINKS: https://ccrma.stanford.edu/~eberdahl/Projects/Paranoia/index.html

Computer Forensics

 Computer Forensics (sometimes computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media.The goal of computer forensics is to explain the current state of a digital artifact such as a computer system, storage medium (e.g. hard disk or CD ROM), an electronic document (e.g. an email message or JPEG image). The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of events.
     Technicians may gather or process evidence at crime scenes, in the field of digital forensics training is needed on the correct handling of technology (for example to preserve the evidence). Technicians may be required to carry out "Live analysis" of evidence - various tools to simplify this procedure have been produced, most notably Microsoft's COFFEE . Sometimes technicians also conduct the acquisition/imaging stage of the process.

HTTP LINKShttp://www.us-cert.gov/reading_room/forensics.pdf

Friday, September 24, 2010

HW-1.doc

HTML, which stands for HyperText Markup Language, is the predominant markup language for web pages. It is written in the form of HTML elements consisting of "tags" surrounded by angle brackets within the web page content. It allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts in languages such as JavaScript which affect the behavior of HTML webpages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance and layout of text and other material. The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over explicit presentational markup. The most common filename extension for files containing HTML is .html. A common abbreviation of this is “.htm,” which originated because some early operating systems and file systems, such as DOS and FAT, limited file extensions to three letters.
                HTML documents are required to start with a Document Type Declaration (informally, a "doctype"). In browsers, the function of the doctype is to indicate the rendering mode—particularly to avoid quirks mode. The original purpose of the doctype was to enable parsing and validation of HTML documents by SGML tools based on the Document Type Definition (DTD). The DTD to which the DOCTYPE refers contains machine-readable grammar specifying the permitted and prohibited content for a document conforming to such a DTD. Browsers, on the other hand, do not implement HTML as an application of SGML and by consequence do not read the DTD. HTML 5 does not define a DTD, because of the technology's inherent limitations, so in HTML 5 the doctype declaration, <!doctype html>, does not refer to a DTD.
                HTML defines several data types for element content, such as script data and stylesheet data, and a plethora of types for attribute values, including IDs, names, URIs, numbers, units of length, languages, media descriptors, colors, character encodings, dates and times, and so on. All of these data types are specializations of character data. Most graphical e-mail clients allow the use of a subset of HTML (often ill-defined) to provide formatting and semantic markup not available with plain text. This may include typographic information like colored headings, emphasized and quoted text, inline images and diagrams. Many such clients include both a GUI editor for composing HTML e-mail messages and a rendering engine for displaying them. Use of HTML in e-mail is controversial because of compatibility issues, because it can help disguise phishing attacks, because it can confuse spam filters and because the message size is larger than plain text.
An HTML Application (HTA; file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a browser to provide the application's graphical interface. A regular HTML file is confined to the security model of the web browser, communicating only to web servers and manipulating only webpage objects and site cookies. An HTA runs as a fully trusted application and therefore has more privileges, like creation/editing/removal of files and Windows Registry entries. Because they operate outside the browser's security model, HTAs cannot be executed via HTTP, but must be downloaded (just like an EXE file) and executed from local file system.
Since its inception, HTML and its associated protocols gained acceptance relatively quickly. However, no clear standards existed in the early years of the language. Though its creators originally conceived of HTML as a semantic language devoid of presentation details, practical uses pushed many presentational elements and attributes into the language, driven largely by the various browser vendors. The latest standards surrounding HTML reflect efforts to overcome the sometimes chaotic development of the language and to create a rational foundation for building both meaningful and well-presented documents. To return HTML to its role as a semantic language, the W3C has developed style languages such as CSS and XSL to shoulder the burden of presentation. In conjunction, the HTML specification has slowly reined in the presentational elements. There are two axes differentiating various variations of HTML as currently specified: SGML-based HTML versus XML-based HTML (referred to as XHTML) on one axis, and strict versus transitional (loose) versus frameset on the other axis.