Powered By Blogger

Search This Blog

You want to know me?!!

My photo
makilala, cotabato, Philippines

January 27, 2011

assignment #3

                            New gadgets for 2011


USB external hard drive: USB 3.0 SSD Aviator -2

Approximately one year ago, the first SSD drives were introduced: They constitute a new storage system that leaves some magnetic and mechanical parts behind in order to adopt an innovative, faster, silent and efficient way of storing information; however, this technology is still an expensive option with (relatively) low storage capacities and, for that reason, it has not been adopted massively in the market yet. Anyway, this is a great technology with many advantages. For example, the installation of the external SSD drives is a really easy process and they can be connected to any PC or laptop in seconds.


Computer / Tablet: AOC’s 8 Inch Breeze Tablet Breaks the Price Barrier


One of the things that’s keeping tablets in the hands of the elite instead of the grubby paws of the masses is the price tags on those things.  Why would you want something that offered a fraction of the functionality (albeit a large fraction) of a standard laptop for nearly half again as much money-wise?  Thankfully AOC has realized that they can make money selling tablets for less than a paycheck and their new 8 inch Breeze may just be the first machine under $200 worth buying.

USB External Drive – Freecom Offers World’s Slimmest Portable HDD



Hard Drives are just getting tinier and tinier and Freecom seems to be leading the pack on this miniaturization craze.  Their latest offering, the Mobile Drive Mg, is only 10mm thick!  That’s thin enough to forget it’s even in your pocket.  But can something so small be worth the price?
Thin apparently doesn’t mean small anymore because the Mobile Drive Mg is available in two storage sizes starting at 320GB and going all the way up to 750GB.  That’s pretty impressive in such a small package but how breakable is this thing?  You don’t have to worry (unless you sit on it) to protect the delicates inside, the case is manufactured from magnesium.
So, where do you get your hands on one of these?  Through Apple Premium Resellers only.  It’s an on hiccup of the kind you don’t see too often in the retail world but there you have it.


                        Acer Aspire One D255 outdoes its D260 Little Brother

Sporting the same 10.1 inch design its younger brother the D260 does, the D255 doesn’t look much different at first.  However, when you dig a little deeper (and by that I mean crack the case and look at the guts) it’s a slightly better machine though the external design is a bit tired.
While most users won’t notice the internal changes, they may notice the new, less glittery color scheme Acer has chosen to go with and they will definitely spot the incredibly large logo on the front of the case. I don’t know why the company (who became as “hot” as they are—and that’s an extremely relative term) for slapping together bargain PCs in cutsie colors with pretty much the same functionality across the board thinks users want to advertise the fact that they only paid $250 for their “netty.”

Wireless Mouse for Computer – Logitech’s New M515 is Slick

 

This new wireless mouse from Logitech is really awesome for a simple reason—it has a sealed bottom.  That means you never have to worry about your track ball getting clogged with gunk or your optical sensor having its view blocked by lint balls from outer space. 






Significance of this new gadgets :


  •  New Gadgets increase our efficiency. Before the invention of the mobile phone or the more recent e-mails, sending messages and letters would take days to reach its destination. 
  • The soft wares used for application in the internet and the telecommunication are nothing but technical gadgets. These gadgets actually have increased human productivity in terms of work and made the world a better place to live in.. A gadget brings joy to the family.
  • With advent in technology, mobiles were invented that allowed users the freedom to access calls when moving around. With a blackberry one can also avail internet facilities when moving around.
  • So,  this new gadgets not only make our lives easier but also save our money and precious time. Buying a single gadget will give us the functions of many. This makes gadgets cheap and affordable. It can therefore be concluded that  new gadgets are not only significant because they make our lives easy but also because we can play with them.



December 11, 2010

ASSIGNMENt1


    1.Why has there been a dramatic increases in the number of computer security indents in recent   years? 
There has been a dramatic increases in the number of computer security indents in recent years because of lots IT experts today making some malicious acts like creating a viruses, to destroy some memory or hacking some file,,so the build lots of security because in order to save their files or documents.. 

     2.What are some characteristics of common computer criminals?
     Are the following:
  Amateurs 
  Crackers or malicious  Hackers 
  Criminals Terrorists    

 3.What actions must be taken in response to a security indent?
Response plan       

               Develop well in advance of any incident
         Approved by

 Legal department Senior management Primary goals:
          Regain control
          Limit damage
 Review
          Determine exactly what happened
          Evaluate how the organization responded
Capture the perpetrator
Consider the potential for negative publicity
Legal procedent
          Hold organizations accountable for their own IT security weaknesses
Indent notification defined 
          Who to notify
          Who not to notify
Security experts recommend against releasing specific information about a security compromise in public forums
Document all details of a security incident
           All system events
           specific actions taken
           All external conversations

ASSIGNMENT #2


INTRODUCTION

A firewall protects your network from unwanted Internet traffic. The primary functions of a firewall are to let good traffic
pass through while ‘bad’ traffic gets blocked. The most important part of a firewall is its access control features that distinguish between good and bad traffic

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer based application upon a set of rules and other criteria.
A fire-resistance rated wall assembly intended to slow the spread of fire from one side to the other, and are certification listed. Firewalls subdivide a building into separate fire areas, and are located in accordance with the locally applicable building code. ...

Prevents certain computers or networks from accessing a user's computer.

Manage the access and filtering of users or processes allowed to access servers, hardware and software.

Firewalls come in many forms including subscription firewalls, email white lists and black lists and forms of protection for internet users and their PCs.a 2006 thriller film directed by Richard Loncraine and written by Joe Forte. Harrison Ford stars as Jack Stanfield, a security expert at a bank faced with a corporate merger and the offer of a new job.

A budgetary device separating certain Federal spending within the discretionary spending category from other spending in the discretionary category. Spending for programs with firewalls may not be reduced in order to increase spending for other discretionary programs. ...

Types of Firewalls
By Focus Editors 0Share

Some of the most powerful firewall software on the market is designed to run on an ordinary computer — probably a dedicated server if you're securing a large network. Other firewall software is designed to run on proprietary hardware that you have to buy along with the software, turning the bundle into a "security appliance." As a general rule, appliances are faster, easier to install and operate — and also more expensive. But there's no guarantee that an appliance will do a better job than a software-only firewall. Software firewalls tend to be more flexible, and it's easier to upgrade the hardware it's running on.

Network-Level Firewalls
The first generation of firewalls (c. 1988) worked at the network level by inspecting packet headers and filtering traffic based on the IP address of the source and the destination, the port and the service. Some of these primeval security applications could also filter packets based on protocols, the domain name of the source and a few other attributes.

Network-level firewalls are fast, and today you'll find them built into most network appliances, particularly routers. These firewalls, however, don't support sophisticated rule-based models. They don’t understand languages like HTML and XML, and they are capable of decoding SSL-encrypted packets to examine their content. As a result, they can’t validate user inputs or detect maliciously modified parameters in an URL request. This leaves your network vulnerable to a number of serious threats.



Circuit-Level Firewalls
These applications, which represent the second-generation of firewall technology, monitor TCP handshaking between packets to make sure a session is legitimate. Traffic is filtered based on specified session rules and may be restricted to recognized computers only. Circuit-level firewalls hide the network itself from the outside, which is useful for denying access to intruders. But they don't filter individual packets.



Application-Level Firewalls
Recently, application-level firewalls (sometimes called proxies) have been looking more deeply into the application data going through their filters. By considering the context of client requests and application responses, these firewalls attempt to enforce correct application behavior, block malicious activity and help organizations ensure the safety of sensitive information and systems. They can log user activity too. Application-level filtering may include protection against spam and viruses as well, and be able to block undesirable Web sites based on content rather than just their IP address.

If that sounds too good to be true, it is. The downside to deep packet inspection is that the more closely a firewall examines network data flow, the longer it takes, and the heavier hit your network performance will sustain. This is why the highest-end security appliances include lots of RAM to speed packet processing. And of course you'll pay for the added chips.



Stateful Multi-level Firewalls
SML vendors claim that their products deploy the best features of the other three firewall types. They filter packets at the network level and they recognize and process application-level data, but since they don't employ proxies, they deliver reasonably good performance in spite of the deep packet analysis. On the downside, they are not cheap, and they can be difficult to configure and administer.




www.fhwa.dot.gov/reports/financingfederalaid/appa.htm