Skip to main content

Home/ Globaltech/ Group items tagged check

Rss Feed Group items tagged

Alex Lenk

BBC News - Police crackdown on fake shopping sites - 1 views

  •  
    Alex October 30th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business and Employment. 2. Identify the main stakeholders to the IT system. The main stakeholders are the cyber thieves and the people getting lured into buying fake products. 3. Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in this article is privacy because the cyber thieves are trying to get bank information from customers by creating fake shopping sites. 4. Describe ITGS terminology and systems. E-Crime: Involves the use of computers, computer networks or the Internet as a tool for performing criminal activities. 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. Paul Hoare said that customers should buy product from legitimate sites only. You can also check the websites credentials to see if it was approved.
Azman Fadhilah

On Computers for 11/01/2010 - 0 views

  •  
    Gmail tips summary Basically, Gmail gives you a plenty of space to storage for example 7 gigabytes for free, which is already a lot. Even though you are running out of the space. You are able to get more spaces for just $5 per year, is quite cheap. What is so good about Gmail? The most useful feature is that you can link your other email account, AOL, Yahoo, or Hotmail right away to your Gmail, which means you do need to open up many email to check your Inbox. a) You can set up filters to skip the Inbox and go right to the folder or a trash can. b) If you happen to find some information that is quite old, Gmail uses GooGle search engine to allow you to find it easily. c) Gmail offers " canned message" You can set up a filter so that a certain type of email always gets a canned response.
anonymous

http://edition.cnn.com/2010/TECH/web/12/13/5.online.privacy.tips/ - 6 views

  •  
    summary march 29 kuni
  •  
    1. Adjust social-network privacy settings, You should adjust privacy setting in Facebook by changing the privacy option in Facebook. Facebook updated its privacy dashboard in October, which now, it can change the privacy setting in mobile phone, and you don't have to do it in computer. You can also protect twitter to not let show in the public. 2. Ensure personal data is sent over a secure connection, You should find if the site is secured enough before giving a credit card number. Make sure the adress shows that the site is encrypted. 3. Consider opting out of ad tracking, You should get rid of ad tracking by disabling the third party cookies. Now, no one will be able to track your pc. 4. Use private Web browsing features or install a VPN Install VPN for more strong security for your browser. Such as Little Snich, which gives out a warning sign every time the website automatically changes your settings. 5. Think before you post. You should always check and think if the site is secured enough to give out a privacy information or post email. You have to be careful to not let hackers get into your computer. And don't give out privacy information even to friends.
anonymous

Google expands social collaboration features in Docs | Cloud Computing News - Betanews - 0 views

  •  
    jenny - check and report
anonymous

Maximum PC | 30 Useful (and Unknown) Web Apps You Need to Bookmark - Page 2 - 1 views

  •  
    apps Anything good? may 19 woo
  •  
    1. Anything good? - ConvertCenter - Good for calculation checks while doing labs and conversions. - Aviary - An alternative to having to install photoshop which takes a long time and takes up space. - Wolfram|Alpha - Useful for math. - Floorplanner - I'm a nerd so there'll come a time I'm bored and play with it. - Drumbot - Something to keep me entertained. - Remember The Milk - To help organize my homework and schedules if I use it. - Zoho - Feels more like Microsoft word, feels like an alternative to Google docs.
  •  
    Tags: 3.2 Software
anonymous

Facebook does major overhaul of privacy settings - 1 views

  •  
    You may want to check your facebook settings again.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

Hackers steal SSL certificates for CIA, MI6, Mossad - Computerworld - 13 views

  •  
    brief all sept 7 Az
  •  
    1. Identify the area of impact the scenario relates to. Business, Goverment 2. Identify the main stakeholders to the IT system. Mozilla, Google, DigiNotar, CIA, MI6, Mossad, Microsoft, Yahoo, Skype, Facebook, Twitter, and Microsoft's Windows 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. SSL- Secure socket layer certificates used for transmitting private documents via the Internet. It creates an encrypted connection between your web server and you web browser that will protect transmitted private information from eavesdropping, data tampering, or message forgery. Man in the Middle- is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection, intruding into a connection, intercepting messages, and selectively modifying data. DigiNotar= DigiNotar is registered by the OPTA as a CSP that delivers qualified certificates that comply with the Dutch act on electronic signatures with respect to the European directive on electronic signatures. Sinces 2004 DigiNotar has entered the PKI hierarchy of the Dutch Government: PKIoverheid. This allows DigiNotar as Certificate Services Provider (CSP) to issue certificates complying with PKIoverheid specifications to government organisations. HTTPS: Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. 5. If possible, describe a solution to the concern (issue). Increase the security of the data for issuing a digital certificate to websites, and have updates of digital certificate periodically to check whether or not it has been compromised. Delete mo
anonymous

BBC News - Turkish net hijack hits big name websites - 12 views

  •  
    M12 analysis M13 brief sept 12-13 jen max
  • ...1 more comment...
  •  
    1. Identify the area of impact the scenario relates to. Security 2. Identify the main stakeholders to the IT system. The hacking group which is called 'Turkguvenligi' and seven victims (Sites) 3. Identify one ITGS social/ethical concern in the article. Privacy and anonymity 4. Describe ITGS terminology and systems. URL- A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for `Uniform Resource Locator'. Meaning, it is an address to access to web. DNS- DNS stands for Domain name system. It is a network service that is converting or interpreting domain or host name to IP address. In this case, it is easy to convert domain to IP address so, hackers could easily access to the webs. NBT- It stands for NetBIOS over TCP and IP. It is kind of rule for communicating that exists to run NetBIOS application in TCP and IP. NetBIOS application is an application or program interface that has been used in PC-LAN. TCP stands for transmission control protocol. It is a core protocol of the Internet Protocol Suite. SQL injection- It is a basic skill to hack information. Its ways to do is too easy so, most web sites are blocked for this. Hackers put special elements such as ' or ] between ID and password to call server to DB. They changed SQL sequence. Suppose, SELECT count(user_id) from USER_TB where user_id='test' and pw='1234' (Example) That sequence allows to login, and people can login if the result is over than 1. So, we put ' 'or 1=1 ' the space between ID and password and change it through injection attack. 5. If possible, describe a solution to the concern (issue). Since the seven web sites are hacked behind the scenes, security has to be reinforced than before. Also, they need to update the web site to check any 'debris' from attack. Although it has been announced that there are no lost, they might not confirmed for certain so, users better make sure the information is fine a
  •  
    1. Identify the scenario. Business 2. Describe a social/ethical concern and the relationship of one primary stakeholder to the IT system in the article. Security is a social/ethical concern because it regards the security of the Database Servers that are used to store the Domain Names and IP addresses. With insufficient security, the database security can be breached by outsiders and be altered. The primary stakeholder is Group NBT, and is the domain name management firm of NetNames and Ascio whose DNS Databases were compromised in this attack. Their SQL commands were infiltrated by the hackers, so that the information stored on their DNS Database was altered, that made website visitors be re-directed to spam websites. 3. Describe the IT concepts and processes. Domain Name System (DNS) - The address book for the website that links the URL of websites to IP address numbers that computers use to visit a website. IP Address - The numbers that are separated by period dots that make up a website's numerical address of its location. (DNS) Database - A database is a massive spreadsheet with numerous data types and forms used to store large amounts of data (in this case, websites' domain names URL and their respective IP addresses.) SQL Injection - SQL stands for Structured Query Language, used for database manipulation. This is a hacking method by using the various layers present in SQL commands, by 'injecting' a hidden command that enables to create a loop hole for access and change the database information. This includes changing strings of commands in the original SQL command into malicious commands, that are executed when the altered SQL command is executed. http://msdn.microsoft.com/en-us/library/ms161953.aspx
  •  
    4. Explain the relationship between the IT system referred to in the article and the concern presented above. The security of the DNS Databases run by NetNames and Ascio (two subsidiaries of domain name management firm Group NBT) is a concern. Their SQL commands were being altered and compromised, which resulted in the altered domain names and IP address links. Their relationship is that the concern is the IT system's (in this case the Database's) security. The IT system, Group NBT's Database, has a concern over it's security. The DNS Database system has a security concern because the hackers were able to alter the paths of redirecting certain websites to scam websites instead through a SQL Injection attack that manipulates the SQL command used to manipulate the domain name database. 5. Describe and evaluate the impact of a social/ethical issue on the stakeholders The social/ethical issue is security. The stakeholders are Vodafone, the Daily Telegraph, UPS, and four other websites, Turkish hackers (Turkguvenligi), and internet users who visited those seven websites within the hacking duration. This has an impact on their security issue because their database has already been compromised once, and unless they create a new system of security to prevent SQL injections, they will never be able to know when someone is changing their SQL command strings. They need to have someone constantly monitoring their SQL to see if there are any changes. The security issue impacts Group NBT because it makes their customers that use their services doubt the secure service because hackers were able to alter the redirection of customers to scam websites instead of their respective website. Therefore security, to a large extent, has an impact on Group NBT. 6. Explain and evaluate one solution to the issue identified. A solution to the issue identified by NBT was to further review their Database system to ensure customers of a more secure service, since it is impossible for a
anonymous

http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/ - 2 views

  •  
    Why were the customers spooked? Why is this a problem? Describe consolidated.db. Check this link: tracking and recording your location data. How is apple collecting geodata? Why is apple collecting geodata? Explain the problems with collecting geodata. Could law enforcement in America be able to subpoena these types of records from people's iPhones or iPads? april 26 cream
  •  
    How can iphone be hijacked? The experts say that what you would know when your iphone is being hijacked is when one giveaway is if you receive a text message containing a single square character. If that happens, he suggests you immediately turn off your iPhone. How can a user tell if she is being SMS attacked? The researchers said the hack involves sending a series of mostly invisible SMS bursts that effectively hijack an iPhone. From thereon, a hacker could control all the functions on the iPhone, such as e-mailing, dialing contacts - and, most alarmingly, sending more text messages to hijack even more iPhones. Just turn off your iphone right away!
  •  
    Cream: Wrong Comment for this article. Comment again with the right answers. incomplete
‹ Previous 21 - 31 of 31
Showing 20 items per page