Activity 5.8
What are the advantages and disadvantages of a swipe card, access code or key to secure a room?
The advantage of a swipe card is: that it protects everything from hackers hacking in and other people wrecking your servers e.t.c
Disadvantage is that someone can steal it.
1. The advantages of access code: it protects your system from viruses and other people hacking in
Disadvantage of an access card is that it might have a virus and damage /delete your systems
2. An advantage of a key to secure a room is that it protects other people from coming in and wrecking your computer and your systems
The disadvantage is that someone can find the key and come in or a fire might occur and if you locked the room and forgot were the key is you cant get in or out the room which is a health and safety hazard
2 .WHICH SECURITY SYSTEMS THE MOST SECURE?
THE MOST SECURE IS DEADLOCKS /COMBINATION LOCKS
3. What is needed to keep a system available 24/7
Back up generators
Check system regulary
Wednesday, 16 September 2009
viruses
· Klez is a computer worm that propagates via e-mail. It first appeared in the end of 2001. A number of variants of the worm exist.
· Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.
· The e-mail through which the worm spreads always includes a text portion and one or more attachments.
· The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm).
· The first attachment is always the worm, whose internals vary.
· Once the worm is executed, either automatically by the buggy HTML engine or manually by a naive user, it searches for addresses to send itself to.
· When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.
· Later variants of the worm would use a false from address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.
What happens if you open the virus?
If you open the virus and your computer gets infected, it not only looks in your address book for additional email address, it also checks files such as temporary internet files for addresses.
What else?
….Your computer starts sending the virus out to those people. It does this WITHOUT your knowledge.
This is the HTML I used:
http://en.wikipedia.org/wiki/Klez_(computer worm)
http://www.dianestreasures.com/virus.html
Comparing Klez to Macro
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
The difference between Klez and Macro is that Klez is a worm which attacks internet stuff but unlike macro attacks programs like Microsoft word in its own language.
HTML: http://en.wikipedia.org/wiki/Macro_virus_(computing)
VIRUS CHECKING SOFTWARE McAfee
The company was founded in 1987 as McAfee Associates, named for its founder John McAfee. McAfee was incorporated in the state of Delaware in 1992. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. In 2004, a major restructuring occurred. In the spring, the company sold its Magic Solutions business to Remedy, a subsidiary of BMC Software. In the summer of 2004, the company sold the Sniffer Technologies business to a venture capital backed firm named 'Network General' - the same name as the original owner of Sniffer Technologies. Also, the company changed its name back to McAfee to reflect its focus on security-related technologies.
Among other companies bought and sold by McAfee (formerly known as Network Associates) is Trusted Information Systems, which developed the Firewall Toolkit, which was the free software foundation for the commercial Gauntlet Firewall, which was later sold by McAfee to Secure Computing Corporation. Network Associates, as a result of brief ownership of TIS Labs/NAI Labs/Network Associates Laboratories/McAfee Research, was highly influential in the world of Open Source software, as that organization produced portions of the Linux, FreeBSD, and Darwin operating systems, and developed portions of the BIND name server software and SNMP version 3.
The 2009 version costs $23.49
· Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.
· The e-mail through which the worm spreads always includes a text portion and one or more attachments.
· The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm).
· The first attachment is always the worm, whose internals vary.
· Once the worm is executed, either automatically by the buggy HTML engine or manually by a naive user, it searches for addresses to send itself to.
· When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.
· Later variants of the worm would use a false from address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.
What happens if you open the virus?
If you open the virus and your computer gets infected, it not only looks in your address book for additional email address, it also checks files such as temporary internet files for addresses.
What else?
….Your computer starts sending the virus out to those people. It does this WITHOUT your knowledge.
This is the HTML I used:
http://en.wikipedia.org/wiki/Klez_(computer worm)
http://www.dianestreasures.com/virus.html
Comparing Klez to Macro
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
The difference between Klez and Macro is that Klez is a worm which attacks internet stuff but unlike macro attacks programs like Microsoft word in its own language.
HTML: http://en.wikipedia.org/wiki/Macro_virus_(computing)
VIRUS CHECKING SOFTWARE McAfee
The company was founded in 1987 as McAfee Associates, named for its founder John McAfee. McAfee was incorporated in the state of Delaware in 1992. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. In 2004, a major restructuring occurred. In the spring, the company sold its Magic Solutions business to Remedy, a subsidiary of BMC Software. In the summer of 2004, the company sold the Sniffer Technologies business to a venture capital backed firm named 'Network General' - the same name as the original owner of Sniffer Technologies. Also, the company changed its name back to McAfee to reflect its focus on security-related technologies.
Among other companies bought and sold by McAfee (formerly known as Network Associates) is Trusted Information Systems, which developed the Firewall Toolkit, which was the free software foundation for the commercial Gauntlet Firewall, which was later sold by McAfee to Secure Computing Corporation. Network Associates, as a result of brief ownership of TIS Labs/NAI Labs/Network Associates Laboratories/McAfee Research, was highly influential in the world of Open Source software, as that organization produced portions of the Linux, FreeBSD, and Darwin operating systems, and developed portions of the BIND name server software and SNMP version 3.
The 2009 version costs $23.49
Wednesday, 9 September 2009
ACTIVITY 5.3
Activity 5.3
What is meant by business-relevant technology?
A business –relevant technology system has a definite purpose such as networking several computers together so folders on their hard drives can be shared allowing a team to work together
Identify advantages an estate agency might gain from using a network.
A small business, such as a local estate agency could network their computers into a business –relevant system. such a system would allow staff to show customers up-to-date property details from any of the computers agency .a great strength of this system is that a new property is added ,every computer would be able to view the details almost immediately.
Find out why people say that ADSL is a type of DSL?
THIS is because Asymmetric digital subscriber line (ADSL) is the popular of all the DSL types. Several homes and small businesses find ADSL easy to use. ADSL provides high speed transmission of information at a high bandwidth over regular phone lines. Unlike dialup phone, ADSL gives consumers permanent internet connectivity.
What is meant by business-relevant technology?
A business –relevant technology system has a definite purpose such as networking several computers together so folders on their hard drives can be shared allowing a team to work together
Identify advantages an estate agency might gain from using a network.
A small business, such as a local estate agency could network their computers into a business –relevant system. such a system would allow staff to show customers up-to-date property details from any of the computers agency .a great strength of this system is that a new property is added ,every computer would be able to view the details almost immediately.
Find out why people say that ADSL is a type of DSL?
THIS is because Asymmetric digital subscriber line (ADSL) is the popular of all the DSL types. Several homes and small businesses find ADSL easy to use. ADSL provides high speed transmission of information at a high bandwidth over regular phone lines. Unlike dialup phone, ADSL gives consumers permanent internet connectivity.
activity 5.1
Activity 5.1
identify the components used in a network that you know of
The components used in a network are: network cards, hubs switches, Ethernet, file server,, wifi
Describe the roles of the components you identified in question 1.
Network card :,( NIC), network interface card, or LAN adapter is a computer hardware component designed to allow computers to communicate over a computer network or to make it easier its role is to connect the network cable to a pc
Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment
Switch: is a computer network device that connects network segments. Both of their roles are to transfer file email e.t.c
Ethernet: Ethernet is a network standard for data transmission using either coaxial or twisted pair cable
File server: its role is to take all the information that needed and pass it to all the networks so whenever you need to work on another computer your work is on there
Wifi: its role is the same as Ethernet its just wire less
research and analyze reasons why switches are better than hubs
switches are better than hubs because they are much more ‘intelligent’ easier to use, not messy everything is ordered where its meant to go .unlike hubs have long cables which look like a tree trunk its much harder to use them because the cables are all over the place .(switches are more expensive than hubs)
identify the components used in a network that you know of
The components used in a network are: network cards, hubs switches, Ethernet, file server,, wifi
Describe the roles of the components you identified in question 1.
Network card :,( NIC), network interface card, or LAN adapter is a computer hardware component designed to allow computers to communicate over a computer network or to make it easier its role is to connect the network cable to a pc
Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment
Switch: is a computer network device that connects network segments. Both of their roles are to transfer file email e.t.c
Ethernet: Ethernet is a network standard for data transmission using either coaxial or twisted pair cable
File server: its role is to take all the information that needed and pass it to all the networks so whenever you need to work on another computer your work is on there
Wifi: its role is the same as Ethernet its just wire less
research and analyze reasons why switches are better than hubs
switches are better than hubs because they are much more ‘intelligent’ easier to use, not messy everything is ordered where its meant to go .unlike hubs have long cables which look like a tree trunk its much harder to use them because the cables are all over the place .(switches are more expensive than hubs)
my new blog
Hello ,
I have just created my new blog it was easy peasy lemon sqeezy ....
LOL LOL LOL LOL LOL LOL
: ) : ) : ) : )
: 0 : 0 : 0
I have just created my new blog it was easy peasy lemon sqeezy ....
LOL LOL LOL LOL LOL LOL
: ) : ) : ) : )
: 0 : 0 : 0
Subscribe to:
Posts (Atom)