Friday, April 16, 2010

Chapter 9 and 10 quiz

Chapter 9+10 quiz

1. For maintaining and tuning one's computer, the author recommends using a junk-cleaning program or Windows disk cleanup Utility for Windows computers. As for Macintosh systems, he recommends getting rid of unwanted applications, deleting files you no longer need or using the maintenance utility. He, also recommends for the Mac, deleting duplicated files and printer drivers that you do not need.

2. I have used Windows Disc cleanup utility to clean up my computer, as the author suggests. But generally when my computer gets too hard to manage, i keep files backed up on a separate hard drive and format the main hard drive. After the hard drive is formatted, I re-install Windows to the system.

3. The author describes Data scrubbing as a process that involves not only erasing the files, but also writing over them with ones and zeros so that the magnetic particles that store the information lose all record of what they once held.

4. Key Loggers are programs that record every keystroke you make and email the file to the hacker, who sifts through log files for passwords, banking information, and credit card numbers. 2 ways the author recommends for keeping your pc free of spyware are either using a combination of Lavasoft (the cleaner) and Windows Defender (the protector); both are free downloads. The absolute best way to protect your PC is to invest money on a commercial anti-spyware utility like Webroot Spy Sweeper. Some free anti-spyware utilities can sometimes be advertised as a anti-spyware program but in actuality could potentially be malware or spyware.

5. Phishing is an fake email often from either eBay, your bank, PayPal, or a financial institution that attempts to get you to type in your information for scamming purposes. Pharming is a type of identity theft committed when you land on a phony website.

5.

Friday, April 9, 2010

Chapter 8 Quiz

1.Wi-Fi, a substitue for IEE 802.11x, is a guide or set of instructions used for configuring radios that allow computers to talk to each other without wires. Wi-fi is a alternative instrument for data cables that most desktops and laptops are equipped with and grant access to a single base station wired to the Internet.

2. 3 Methods of telling how someone is leeching of one's wireless network are as followed. The first being, wireless router complimentary software that has a logging function documenting any and all previous websites trafficked via computer. The 2nd method requires computer security software such as norton Security 2007 accompanied by Intrusion Detection Software- software that alerts unwanted visitors. The 3rd method is another software program, NetBarrier, that, similiar to Norton, offers tools that monitor incoming/outgoing traffic over the network. In order to protect the computer from outside usage, the author suggests using a Wired Equivalent Privacy or Wi-Fi Protected access program that encrypts one's network. Another way of protecting a network, is to hide it by "closing"the signal so that it cannot be detected by any other wireless computer within the range of the Wi-Fi signal.

3. I agree with the authors opinion and assessment of the man fined 250 dollars for using another owner's wireless network. I feel that as long as the usage of the non-owner isn't harmful or defective to the actual owner's pc or network connection, then he should have the privilege to access. Another point is that if the actual owner was sincere about not sharing his network, he should be aware of the preference to secure the network.

4. 4 potential issues of using voiceover Internet Protocol services. For one different services work slightly different but with basic similarities. Another setback of VoIp services are with regards to emergencies. 911 doesn't work with VoIP. They have an enhanced 911 system where the user must share the precise address and emergency information to the provider but check up on the latest details of 2911 implementations to make sure the info is getting to the local emergency call center. One must also make sure that his service is completely function-able in the selected area. The next drawback is with regards to power and network outages. If the power is loss or the Internet signal fades then phoning access is disabled. Th e final possible issue with VoIP is with pricing. Cable providers and other traditional companies are beginning to charge more than providers like Comcast; and without the savings of VoIP, there isn't a major reason to switch.

5. 5 things that can help one deal with email are as followed. In order to maintain the inbox at a more manageable state is to never glance at an email for a moment and then move to the next because it wastes valuable time. The 5 tips that the author suggests for maintaining the inbox is that one either delete, answer, let someone else deal, save as reference or tag later. Deleting emails should be used for forward jokes,spam and uninteresting emailes that are classified as "junk." The author recommends answering emails that can be answered in 2 minutes or less. When getting emails that one feels would better interest a friend, the author suggests redirecting the email their way and having them deal with it. Other emails should be saved as reference like receipts, passwords, useful URLs or any other information that one may want to reference later. The final tip the author gives is to tag the email to be dealt with later and create a to-do list.

6. The author recommends three ways of dealing with spam. The best way is to not allow spammers to know one's existence. He stresses never posting email addresses anyware on the internet because they are often added to junki email lists. Another method that the author provides is to never reply to a spam or click the "unsubscribe link" because it will notify the spammer that it is an actual real person attached to the email address and will increase the number of spams received. The final method that the author recommends is to never buy anything advertised via spam because one's name will be added to a "sucker list" and the amount of spam one will receive after doing such will be poured in at astronomical rates.

Friday, March 26, 2010

Blog for chapters 6 and 7

1. The destination I searched for in the selected field was Virginia Beach, Virginia. Virginia Beach prides in welcoming college students to their resorts for their vast amount of activities targeted towards young adults. The website describes the location as having a long boardwalk filled with fastfood, ice cream shops and nightclubs. Aside from the beach, is a National wildlife park for bicycle riders and naturists. As far as travel information, the site recommends the Ramada Inn and Marriot Hotels.

2. Twitter can be identified as a social networking or blogging website. Twitter allows users to update their actions or thoughts to their followers through "tweets." I do not have a twitter account.

3. For checking credit reports, the author says that one can ask major credit agencies without pay because one is entitled to such requests. The fisco report helps lenders rate interests for a loan should be at or if a loan should even be given.

4. Microfinance is designed to help low income clients. The author recommends using Kiva through Google or Paypal. They recieve information through Google ads about poverty.

5. It will takes 361 months to pay off the entire debt paying $4,891. Trends include the balance dropping by 5 dollars and the overall balance dropping by 300 dollars with each payment.

6. The author recommends textpayme.com for paying debts between friends. After choosing with one's credit card accounts, money can be sent through text messages.

Friday, March 5, 2010

Chapter 5 Quiz

1. Finding truth in questionable information is done by visiting a website named snopes.com. It verifies information and notifies a user whether or not information may be false or accuate. 2 false statements I found on the website were African Americans are entitled to 5,000 tax credit for slave reparations and that the U.S government grants a 7 year tax holidays to immigrants.

2. Websites change regularly; there are ways of being notified of change and theres a way of checking to see if a site's information has expired. If one wants to be notified of an alteration in a website, enter the Website of interest in changedetection.com/monitor.html along with their email address; Change detection will visit the site and notify the person each time a change is made. If information expires and one wishes to save that information, they can click "Save page as.." from the "File" menu and choose "Text" from the "Save as type:" pull down menu. This saves the Web page's information in a folder on the computer's hard drive.

3. Fundrace.org can be used to track people's campaign contributions in local neighborhoods or to check contributions on a national scale. Fundrace.org can, also, be used to organize a block party to raise funds for your party/candidate. Another use of Fundrace.org is to check National News. The most recent donation made by television personality,Jerry Springer, was one of $4,600 to Hillary Clinton.

4. Liveplasma.com is a visual music "discovery engine." By entering the name of an artist it displays related bands. After entering an artist in liveplasma, it displayed several other artists in a web-like design and the artist that closest pattern the artist i searched was seen closest to my artist in the web.

5. A bitTorrent is used to speed up the process of filesharing and makes everyone's computer pitch in on the job of sharing the files. While files download, the smultaneously upload downloaded parts far other users. Legal and ethical issues arises when copyrighted information is downloaded. One may be fined or even face imprisonment for breaking such laws.

Tuesday, March 2, 2010

Blog Assesment

1. Safe ways of not getting cheated on websites is complain to the post office, file a complain with the internet crime complaint center, or ask the National consumers League for help.

2. Proxy bidding is an Ebay application that is used to automatically bid each time you're outbid.

3. Sniping services are used to get a jump on other bidders. Sniping is entering a bid at the very last possible second before the auction is finished.

4. The Triangulation scam is a scam made when wire transfers are done. The item comes shipped and marked as a gift and hides the address of the person who paid for the item. The victim may get accused with credit card theft or receiving stolen property.

5. A virtual credit card is generated by Citi, Bank of America or Discovery cardholders. The cardholders use the "ShopSafe" feature and it generates a 16 digit number that looks and works like a normal credit card.

Monday, March 1, 2010

Blog Proposal

  • Dark Knight. I wanted to elaborate into detail the moral themes and codes addressed in Christopher Nolan's, The Dark Knight, and apply the issues addressed to history and everyday life.
  • My city. Give an overview of the history of the capital of Pennsylvania and my hometown- Harrisburg, Pa.

Thursday, February 18, 2010

Chapter 1 assessment

1. IP addresses is a distinct address that every computer connected to the internet has. The purpose of the address is to allow the network to locate the computer. As for the Domain name server, its primary function is to translate IP numbers into Internet addresses that are human readable.

2. ICCAN stands for Internet Corporation for Assigned Names and Numbers. They overlook the domain name system.

3. 3 tips for running a successful blog are as followed- write about what you're interested in, use pictures and limit the number of links you have in an entry.

4. The author describes RSS as a way to "suscribe" to a blog. He recommends the RSS program readers "feed reader" or "aggregator." I have yet to use any RSS programs.

5. The steps to record a podcast are as followed- Choose a name for your podcast, Record your podcast episode, Add the audio to your podcast and the publicize your podcast. I have yet to download any podcasts.