There is a new function on icloud called "Find My iPhone". It used to locate lost iPhone on a digital map in the icloud webpage. It is work simply by logging in to your apple ID that you use to buy songs and the digital map will show where your iPhone is and it can send signal to iPhone and command it to ring calling sound when you get near so it is easier to track the missing iPhone.
Describe the kinds of attacks.
- First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages.
Explain the security measures.
- Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
Define SEO.
SEO, (Search Engine Optimization) is a way of ensuring that your Web site shows up high in the rankings of search engines.
Describe the ten ways to improve a SEO.
1. Learn Basic HTML- To do SEO yourself, you need to have a rudimentary understanding of HTML programming.
2. Understand the Difference Between Search Engines- There are basically four types of search engines in use today, (Google, Yahoo!, Bing, Altavista) and each has different methods of ranking sites.
3. The Quick Fix: Meta-Titles- it is important to include keywords in your meta-title that are relevant to your Web site.
4. The More Links, The Better- It is important to have a high number of quality links to your website from other similar websites.
5. The Content of Your Content Matters- Search engines also have the technology to look at the actual content or words you put on your page. So, if a user types in a search for a particular keyword, the more often that keyword appears on your site, the more weight your site will receive, and the higher it will probably be ranked.
6. What About Keywords?- Meta-keywords are something you find in the source code of a Web page. They serve no other purpose than to try to convince search engines that a Web site should be highly ranked.
7. Experiment- The best way to improve your search engine ranking is to continue to experiment with different meta-titles, meta-keywords, content, and linking strategies.
8. Avoid Dirty Tactics- There are many ways to try to trick search engines, but if the search engine discovers your tricks, it may ban your website completely.
9. Paid-Inclusion is an Option- you can guarantee that a search engine will see your Web site, and that your Web site will be ranked if you pay either pay a one-time or annual fee.
10. When in Doubt, Use a Professional- Many Web site designers have full-time SEO personnel to make sure that your website is highly ranked.
Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections.
Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online.
How to provide mobile security?
Use anti-virus software
You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen.
Works Cited
http://www.cellphonebeat.com/10-security-software-smart-phone.htmlhttp://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.htmlhttp://expertitgurus.blogspot.com/2011_05_01_archive.html
Google improved its search algorithm so they can stay up-to-date. Since that information is travels very fast with the internet, Google will need to keep the information on their search engine fresh. Its new algorithm update will prioritize most recent news about the current events, latest sports results, and most recent information.
Identify the issue and scenario.
Describe 3 incidents of cyberattacks by China.
List some of the most desired data.
Describe how the US is responding to these cyberthreats.
all
nov 10
kuni
Identify the issue and scenario.
China and Russia have been accused of cyber espionage, stealing technological and commercial information from The USA and its Allies.
Describe 3 incidents of cyberattacks by China.
1. Google allege that intellectual property was stolen in a computer attack that also targeted at least 20 other large companies. And earlier this year Mountain View, Calif.-based Google said it believes hackers in China broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists.
2. Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company.
3. McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies.
List some of the most desired data.
Data from global oil, energy and petrochemical companies, Fortune 500 manufacturing company, U.S. Government officials, and military's gmail accounts.
Describe how the US is responding to these cyberthreats.
The Pentagon has begun a pilot program that is working with a group of defense contractors to help detect and block cyberattacks. They have called for greater communication about cyberthreats among the government, intelligence agencies and the private sector.
They intentionally sent a Trojan virus in to try and steel information from chemical and defense firms. They also used a Duqu malware attacks against organizations in at least eight countries.
1. Building Quality Back Links to Your Website - the way to a better ranking is to have quality websites link to yours. Such as websites in you niche or social media websites. If your site has these types of links search engines are more likely to give you website a higher ranking.
2. Anchor Text in Back Links - using anchor text also gets you a higher ranking, for example: if you use the URL www.sourcelinemedia.com - then the search engine only sees the site domain as part of its rankings. If you use anchor text such as Website Marketing and Design then search engines will rank you higher for anyone that searches for website marketing or website design.
3. On Page Optimization - Using key words helps to optimize your websites hits during a search. For example a site that has many key words relating to the information in its articles is more likely to get a hit on a search because the words relate to what they are searching. For example if you search Social Networking sites like Facebook, Twitter, and Tumblr would come up as the top few hits.
The Google algorithm is also called as page ranking. Page Rank depends on the outstandingly democratic nature of the web via to enormous link structure as the sign of the values for each individual page.
Google would understand a page A to page B as vote; it would look noticeably more at links age receiver and the sheer volume of votes. It would analyze what you are searching for and it would pick pages the most important page from the rest of the file that is relevant to your topic. Sometimes important pages wont answer you question. That's why Google page rank is combined with complicated text matching techniques to find the page that is important and similar to your question. Google does more then searching pages that has a match to your question it would examine the feature of the page content (satisfied) and that it would decide that is this page is a good match of your question.
Because many websites don't have the possibilities to get highly ranked, because they also need to compete with other websites that comes from the company and they got millions of back links. For example you want to make a website about selling second hand stuff. When your going to try to search about second hand stuff it would directly show you E-Bay because it more popular and it has more views. The websites that you may been searching for must be on the 15 page or more then that because the web may have not enough back links or even none.
Explain the problem.
How can a hacker get your social network's password?
If hacked, explain the method to restore your account.
Describe ways to prevent your email being hacked.
all
Feb 29
Tik
Explain problem.
- The issue of this article is that the hackers that hacked social network account, to steal or get your personal information on the account whish are the personal information, that could be danger to the account owners.
How can a hacker get your social network's password?
- They could get the password by just clicking the forget password button and remake you account your password, for example the email account that we could change the password if we lost them.
If hacked, explain the method to restore your account
- To restore the social network account, firstly you should remake the password, that hard to guess, and send the request or message to the providers that provide the social network. or using the link that is on the social network to restore your account.
Describe way to prevent your email being hacked.
- Use the hard password which they can't guess for example, don't use 123456789, because it's too easy.
- Do not let the social network remember you password.
- Keep the account and password with you, and do not tell anyone.
- Do not use or share or do anything with you account or password while you are using the public network.
- Do not post or share you personal information.
List the precautions Mr. Lieberthal takes when visiting China.
Define digital espionage.
Why is it easy to steal information remotely?
How was the US Chamber of Commerce hacked?
Explain the reason for thwarting the cybertheft of trade secrets.
all
feb 16
soo
paulo
List the precautions Mr. Lieberthal takes when visiting China.
* He leaves his cellphone and laptop at home.
* He brings "loaner" devices.
* He erases information before and after the trip.
* He disables Bluetooth and Wifi.
* He turns off his phone, and takes the battery out.
* He only connects to the internet through an encrypted password protected channel.
* He copies and pastes his password from a USB.
Define digital espionage.
Digital Espionage - The spying on digital information including corporate secrets and government secrets. These secrets are stored as digital data, and can be spied on and stolen.
Why is it easy to steal information remotely?
Because digital devices today are mostly connected to an internet network, and through this network, information can be stolen remotely if the hacker is able to hack into the system. Smart phones and digital personal devices are very common today. These devices are connected into workplace networks and carry information around. Hackers are able to hack into these devices and get onto the corporate network and steal information.
How was the US Chamber of Commerce hacked?
The US Chamber of Commerce was hacked through four of their employees, Asia policy experts' devices who travelled frequently to China. The Chamber's office digital devices including its printer and thermostat had a connection to an internet address in China. Through these remote connections to the digital devices, China could penetrate the inside information of the Chamber.
Explain the reason for thwarting the cybertheft of trade secrets.
Thwarting the cybertheft of trade secrets is to the benefit of the owner of those trade secrets. If cybertheft of trade secrets is not prevented, then other corporations would be able to use stolen trade information to their benefit, and possibly come out with the same product with slight modifications in order to gain more profit from other companies' ideas. This would also ruin the product
How will Google's privacy changes affect users?
Explain the reasons for making the changes.
Is there a way to prevent Google from combining the personal data it collects from all its services?
Explain the users major complaint about Google's new privacy policy?
How could the government regulate google's privacy changes?
all
March 6
chut
How will Google's privacy changes affect users?
- When you are logged into Google, the data that you search into its search engine can be culled to suggest videos for you on YouTube. If you use Google Docs, Google will alert you if you misspelled your friends' names or co-workers' names. Google will collect information from its devices that you use to empower the company to connect the dots from one service to another.
Explain the reasons for making the changes.
- Google wants to make use of all of its companies that they own. Plus all the data that they collect from their users worldwide. Google wants to use their services to its full potential. They want to tell their users that they are not drawing the users' profiles for their profit only.
Is there a way to prevent Google from combining the personal data it collects from all its services?
- No there are no ways to prevent Google from combining the data that Google collects from its services. Unless you are not logged on to one of Google's products. Even if you are not logged onto one of Google's services Google can still keep track of you by your IP address instead of your name. if you are logged on and you do not wish to be tracked you can delete your browsing history.
Explain the users' major complaint about Google's new privacy policy legal?
- The users are not allowed to consent to or reject this new privacy policy. Each users have different setting for their privacy so this new change will not allow the users to use different set of rules.
How could the government regulate Google's privacy changes?
- The government is carefully looking over Google when it comes to handling personal information of the people. Google settled this argument with the governemtn when Google made a mistake by exposing their client's email accounts. Google's handling over personal information will be audited every other year and they are not allowed to make changes that are misleading or deceptive.
Why are copyright violations a serious problem?
Describe two advantages and two issues with illegitimate downloading.
Explain two possible solutions to this kind of piracy.
all
feb 13
chut
Why are copyright violations are a serious problem?
Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem.
Describe two advantages and two issues with illegitimate downloading.
One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality.
An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue.
Explain two possible solutions to this kind of piracy.
One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
Cyber bullying happens through the use if IT devices, especially through social networks. It has psychological effects on the person being bullied.
An eighteen-year old boy Carney Bonner can be an example of cyber bullying. Carney was cyber bullied when he was 14 years old. He received constant text messages saying 'go kill yourself' or 'you're nothing.' This kind of messages made Carney anxious restricting him from social life.
A possible solution to cyber bullying is parents educating their child about being safe online. Also, the person who is being bullied can consult to someone he can trust. Keeping it to yourself is very bad.
How was the system hacked?
- Shodan search engine which specializes in finding online devices that could be used to discover cameras vulnerable to the flaw.
- People set the camera with an own password, it video stream became accessible to anyone who typed in the correct net address. This consisted of the user's IP address followed by an identical sequence of 15 characters. The camera captures people password and IP address. This will invade camera users' privacy.
Describe possible solutions.
- The Trednet has to foster its network system and try to do their security system that they have to make new firmware and update which resolves the vulnerability of its cameras.
The Piracy Problem: How Broad?
Why are copyright violations are a serious problem?
Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned.
Describe two advantages and two issues with illegitimate downloading.
Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world.
Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately.
Explain two possible solutions to this kind of piracy.
Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA.
Not enough is being done to tackle cyberbullying, according to the NSPCC.
Give examples of cyberbullying.
Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7.
Describe possible solutions.
Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks.
Trendnet securit
Explain the problem and solution.
How should you Choose a Laptop for Your Small Business?
How can you Recover a Lost Phone, Tablet, or Laptop?
How can you Stop Laptop Theft?
all
march 13
Kevin