Friday, April 16, 2010

Chapter 9 and 10 quiz

Chapter 9+10 quiz

1. For maintaining and tuning one's computer, the author recommends using a junk-cleaning program or Windows disk cleanup Utility for Windows computers. As for Macintosh systems, he recommends getting rid of unwanted applications, deleting files you no longer need or using the maintenance utility. He, also recommends for the Mac, deleting duplicated files and printer drivers that you do not need.

2. I have used Windows Disc cleanup utility to clean up my computer, as the author suggests. But generally when my computer gets too hard to manage, i keep files backed up on a separate hard drive and format the main hard drive. After the hard drive is formatted, I re-install Windows to the system.

3. The author describes Data scrubbing as a process that involves not only erasing the files, but also writing over them with ones and zeros so that the magnetic particles that store the information lose all record of what they once held.

4. Key Loggers are programs that record every keystroke you make and email the file to the hacker, who sifts through log files for passwords, banking information, and credit card numbers. 2 ways the author recommends for keeping your pc free of spyware are either using a combination of Lavasoft (the cleaner) and Windows Defender (the protector); both are free downloads. The absolute best way to protect your PC is to invest money on a commercial anti-spyware utility like Webroot Spy Sweeper. Some free anti-spyware utilities can sometimes be advertised as a anti-spyware program but in actuality could potentially be malware or spyware.

5. Phishing is an fake email often from either eBay, your bank, PayPal, or a financial institution that attempts to get you to type in your information for scamming purposes. Pharming is a type of identity theft committed when you land on a phony website.

5.

Friday, April 9, 2010

Chapter 8 Quiz

1.Wi-Fi, a substitue for IEE 802.11x, is a guide or set of instructions used for configuring radios that allow computers to talk to each other without wires. Wi-fi is a alternative instrument for data cables that most desktops and laptops are equipped with and grant access to a single base station wired to the Internet.

2. 3 Methods of telling how someone is leeching of one's wireless network are as followed. The first being, wireless router complimentary software that has a logging function documenting any and all previous websites trafficked via computer. The 2nd method requires computer security software such as norton Security 2007 accompanied by Intrusion Detection Software- software that alerts unwanted visitors. The 3rd method is another software program, NetBarrier, that, similiar to Norton, offers tools that monitor incoming/outgoing traffic over the network. In order to protect the computer from outside usage, the author suggests using a Wired Equivalent Privacy or Wi-Fi Protected access program that encrypts one's network. Another way of protecting a network, is to hide it by "closing"the signal so that it cannot be detected by any other wireless computer within the range of the Wi-Fi signal.

3. I agree with the authors opinion and assessment of the man fined 250 dollars for using another owner's wireless network. I feel that as long as the usage of the non-owner isn't harmful or defective to the actual owner's pc or network connection, then he should have the privilege to access. Another point is that if the actual owner was sincere about not sharing his network, he should be aware of the preference to secure the network.

4. 4 potential issues of using voiceover Internet Protocol services. For one different services work slightly different but with basic similarities. Another setback of VoIp services are with regards to emergencies. 911 doesn't work with VoIP. They have an enhanced 911 system where the user must share the precise address and emergency information to the provider but check up on the latest details of 2911 implementations to make sure the info is getting to the local emergency call center. One must also make sure that his service is completely function-able in the selected area. The next drawback is with regards to power and network outages. If the power is loss or the Internet signal fades then phoning access is disabled. Th e final possible issue with VoIP is with pricing. Cable providers and other traditional companies are beginning to charge more than providers like Comcast; and without the savings of VoIP, there isn't a major reason to switch.

5. 5 things that can help one deal with email are as followed. In order to maintain the inbox at a more manageable state is to never glance at an email for a moment and then move to the next because it wastes valuable time. The 5 tips that the author suggests for maintaining the inbox is that one either delete, answer, let someone else deal, save as reference or tag later. Deleting emails should be used for forward jokes,spam and uninteresting emailes that are classified as "junk." The author recommends answering emails that can be answered in 2 minutes or less. When getting emails that one feels would better interest a friend, the author suggests redirecting the email their way and having them deal with it. Other emails should be saved as reference like receipts, passwords, useful URLs or any other information that one may want to reference later. The final tip the author gives is to tag the email to be dealt with later and create a to-do list.

6. The author recommends three ways of dealing with spam. The best way is to not allow spammers to know one's existence. He stresses never posting email addresses anyware on the internet because they are often added to junki email lists. Another method that the author provides is to never reply to a spam or click the "unsubscribe link" because it will notify the spammer that it is an actual real person attached to the email address and will increase the number of spams received. The final method that the author recommends is to never buy anything advertised via spam because one's name will be added to a "sucker list" and the amount of spam one will receive after doing such will be poured in at astronomical rates.