Thursday 21 June 2012

How to keep the blog safe

To keep your blog safe
Password and email to yourself
Special characteristics (lowercase uppercase)
Change password in few days
The password should not be relevant to you
You should have to have anti viruses and scan your pc and firewall
You can only access the password through the company

ICT threats


Phishing scams
Phishing is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trust worthy entity in an electronic communication. Communication purporting to be from popular social web sites, auction sites, online payment processors or it administrators is commonly used to lure the unsuspecting public. Phishing is typically carried out email spoofing or instant messaging and if often directs users to enter detail of a fake websites whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to decetive users. And exploits the poor usability of current web security technologies to attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
  Denial of service attacks (DOS)  
An attempt to make a computer or network resources unavailable to its intended users. Although this means to carry out, motives for and targets of a dos attack may vary, is generally consists of the concerted efforts of a person, or multiple people to prevent an internet site of service from functioning efficiently or at all, temporally or indefinitely. Perpetrators of dos attacks typically target sites of services hosted on high profile web services such as banks, credit card payments gateways, and even root name servers.
Hacking
Hacking means finding out weaknesses in established systems and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it. Hackers may be motivated by a multitude of reasons, such as profit, protests or challenges. The sculpture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While others use a word hacker exists that are not related to computer security, they are rarely used in mainstream context. They are subject to lo

Social impacts of IT

Without IT work industry business would find it very hard to make a profit. The internet is by far the biggest source of income for most business. People can buy products on the internet and get the delivered straight on their door step. People can now also check there bank balance online and websites.
People can socialise over the internet via many different social websites like Facebook and Twitter. Music producers can upload their music onto music websites like sound cloud and myspace. Videos can also be posted all over the internet on many different video hosting websites like youtube and ebaumsworld.      

what are blogs

1 What are blogs?
A blog is a regularly updated websites consisting of regular article posting. Links to and from other blogs and tradional websites are a prominent feature of most blogs. A blog tends to be focussed on a single topic or issue.
2 What are the different types of blogs?
Collaborative blog
Tutorial blog
Travel and cultural blog
Fashion and lifestyle blog
Personal blog
Eclectic blog
Director Blog
3 How can a blog help business?
Blogging for a small business helps put a personal face of voice of the company and creates useful resources that encourage customers to return to the company website often. They can build a reputation quickly among customers, especially if the blog is maintained regularly.
4 What are the advantages and disadvantages of using a blog?
Freedom of speech
Share knowledge with other people
Make friends online
Can be used as a diary
Keep it contrarily updated otherwise you lose potential readers
Easy to start hard to maintain
The consumer and citizen are potentially better informed and this can only be good for the long term health of our societies and economies.
5 What is an RSS feed?
RSS (rich site summary) is a format for delivering regularly changing web content. Many news related sites, weblogs and other online publishers syndicate their content as an RSS feed to whoever wants it.

Specialist Communication Channels

MSN

MSN (originally The Microsoft Network) is a collection of internet sites and services provided by Microsoft. The Microsoft Network debuted as an online service and Internet service provider on August 24, 1995, to coincide with the release of the Windows 95 operating systems. The range of services offered by MSN has changed since its initial release in 1995. MSN was once a simple online service for Windows 95, an early experiment at interactive multimedia content on the Internet, and one of the most popular dial up Internet service providers.

Skype

Registered users of Skype are identified by a unique Skype Name, and may be listed in the Skype directory. Skype allows these registered users to communicate through both instant messaging and voice chat. Voice chat allows telephone calls between pairs of users and conference calling, and uses a proprietary audio codec. Skype's text chat client allows group chats,emotions , storing chat history and editing of previous messages. Offline messages were implemented in version 5, but removed after a few weeks without notification. The usual features familiar to instant messaging users — user profiles, online status indicators, and so on — are also included.

FaceBook
Facebook is a social networking service and website launched in February 2004, operated and privately owned by Facebook, Inc. As of January 2012, Facebook has more than 800 million active users. Users must register before using the site, after which they may create a personal profile, add other users as friends, and exchange messages, including automatic notifications when they update their profile. Additionally, users may join common-interest user groups, organized by workplace, school or college, or other characteristics, and categorize their friends into lists such as "People from Work" or "Close Friends". The name of the service stems from thecolloquial name for the book given to students at the start of the academic year by some university administrations in the United States to help students get to know each other. Facebook allows any users who declare their selves to be at least 13 years old to become registered users of the site.


Twitter

Tweets are publicly visible by default; however, senders can restrict message delivery to just their followers. Users can tweet via the Twitter website, compatible external applications (such as for smartphones), or by short message service (SMS) available in certain countries While the service is free, accessing it through SMS may incur phone service provider fees. 
Web conferencing refers to a service that allows conferencing events to be shared with remote locations. Most vendors also provide either a recorded copy of an event or a means for a subscriber to record an event. The service allows information to be shared simultaneously, across geographically dispersed locations in nearly real-time. Applications for web conferencing include meetings, training events, lectures, or short presentations from any computer. A participant can be either an individual person or a group. System requirements that allow individuals within a group to participate as individuals (e.g. when an audience participant asks a question) depend on the size of the group. Handling such requirements is often the responsibility of the group. In general, system requirements depend on the vendor. The service is made possible by Internet technologies, particularly on IP/TCP connections. Some web conferencing solutions require additional software to be installed (usually via download) by the presenter and participants, while others eliminate this step by providing physical hardware of appliance In general, system requirements depend on the vendor. Some web conferencing services vendors provide a complete solution while others enhance existing technologies. Most also provide a means of interfacing with email and calendaring clients in order that customers can plan an event and share information about it, in advance. A participant can be either an individual person or a group. System requirements
that allow individuals within a group to participate as individuals (e.g. when an audience participant asks a question) depend on the size of the group. Handling such requirements is often the responsibility of the group. Most vendors also provide either a recorded copy of an event, or a means for a subscriber to record an event. Support for planning a shared event is typically integrated with calendar and email applications. The term webinar is short for Web-based Seminar, a presentation, lecture, workshop or seminar that is transmitted over the Web, specifically a protmateau of web & seminar, to describe a specific type of web conference. Some argue that webinars might be one-was from the speaker to the audience with limited audience interaction, so one-way broadcasts are perhaps more accurately called webcasts. Webinars themselves may be more collaborative and include polling and question & answer sessions to allow full participation between the audience and the presenter. In some cases, the presenter may speak over a standard telephone line, while pointing out information being presented onscreen, and the audience can respond over their own telephones, speaker phones allowing the greatest comfort and convenience. There are web conferencing technologies on the market that have incorporated the use of VoIP (voice over Internet protocol) audio technology, to allow for a completely web-based communication. Depending upon the provider, webinars may provide hidden or anonymous participant functionality, making participants unaware of other participants in the same meeting.


June 2008, Twitter launched a verification program, allowing in celebrities to get their accounts verified. Originally intended to help users verify which celebrity accounts were created by the celebrities themselves (and therefore are not fake), they have since been used to verify accounts of businesses and accounts for public figures who may not actually tweet but still wish to maintain control over the account that bears their name - for example, the Dalai lama. Verified accounts can be identified by a white check in a blue background, known as a verification badge, next to the user's full name, on the profile itself or next to the name in search results.
Users can group posts together by topic or type by use of hash tags – words or phrases prefixed with a "#" sign. Similarly, the "@" sign followed by a username is used for mentioning or replying to other users. To repost a message from another Twitter user, and share it with one's own followers, the ret weet function is symbolized by "RT" in the message.

Web communication   

Friday 2 December 2011

My film review

When Domenic Toretto (Vin Diesel) is being transported to Lompoc prison by bus, his sister Mia Toetto (Jordan a Brewster) and friend Brian O’Connor (Paul Walker) lead an assault on the bus, causing it to crash and freeing Dom. While the authorities search for them, the trio escapes to Rio de janeiro. Awaiting Dom's arrival, Mia and Brian join their friend Vince (Matt Schulze) and other participants on a job to steal three cars from a train. Brian and Mia discover that agents from the u.s drug enforcement Agency (DEA) are also on the train and that the cars are seized property. When Dom arrives with the rest of the participants, he realizes that one of them, Zizi (Michael Irby), is only interested in stealing one car, a ford gt40. Dom has Mia steal the car herself while he and Brian fight Zizi and his henchmen, during which Zizi kills the DEA agents assigned to the vehicles. Dom and Brian are captured and brought to crime lord Hernan Reyes (Joaqium de Almeidia), the owner of the cars and Zizi's boss. Reyes orders the pair be interrogated to discover the location of the car, but they manage to escape and retreat to their safe house While Brian, Dom, and Mia examine the car to discover its importance, Vince arrives and is caught trying to remove a computer chip from it. He admits he was planning to sell the chip to Reyes on his own, and Dom forces him to leave. Brian investigates the chip and discovers it contains details of Reyes' criminal empire, including the locations of US$100 million in cash. Following the murder of the DEA agents aboard the train, blamed on Dom and his team, DSS agent Luke Hobbs (Dwayne  Johnston) and his team arrive in Rio to arrest Dom and Brian. With the help of local officer Elena Neves (Elsa Pataky), they travel to Dom's safe house, but find it under assault by Reyes' men. Brian, Dom and Mia escape, and Dom suggests they split up and leave Rio, but Mia announces she is pregnant with Brian's child. Dom agrees to stick together and suggests they steal Reyes' money to start a new life. The trio organizes a team to perform the heist, re Hobbs and his team eventually finds and arrests Dom, Mia, Brian and Vince. While transporting them to the airport for extradition to the United States, the convoy is attacked by Reyes' men, who kill Hobbs' team. Hobbs and Elena are saved by Dom, Brian, Mia and Vince as they fight back against Reyes' men and escape, but Vince is shot in the process and dies. Wanting to avenge his murdered team, Hobbs and Elena agree to help with the heist. The gang breaks into the police station where Reyes' money is kept and tear the vault from the building using their cars, dragging it through the city with police in pursuit. Believing they cannot outrun the police, Dom makes Brian continue without him while he attacks the police and the pursuing Reyes, using the vault attached to his car to smash their vehicles. Brian returns to kill Zizi, while Reyes is badly injured by Dom's assault. Hobbs arrives on the scene and kills Reyes. Hobbs refuses to let Dom and Brian go free but, unwilling to arrest them, agrees to give them a 24-hour head start to escape. The gang splits Reyes' money, leaving Vince's share to his family, before the members go their separate ways.Cruiting Han.