Skip to main content

Home/ Globaltech/ Group items tagged downloader

Rss Feed Group items tagged

anonymous

Bangkok Post : Social networking' s DARK SIDE - 5 views

  •  
    Describe the following terms and explain possible solutions: drive-by downloads clickjacking targeted brand attacks on social networks MitB (Man-in-the-Browser) MitMo (Man-in-the-Mobile) advanced on-the-fly SSL hacking may 23 soo
  •  
    drive-by downloads Drive-by downloads are downloads to the computer that are harmful, and are downloaded because the user doesn't know that the download took place, what was downloaded (virus, malware) or downloaded something, but didn't know it was malware. When a malicious website is visited, malware may be downloaded to the computer without users even knowing. Solutions to prevent drive-by downloads include having the internet security suite (like Norton Internet Security) installed and kept up to date. Also, using a proxy can filter the web content (like Vidalia). The user's antivirus firewall should always be turned on. http://www.softwarenewsdaily.com/2010/12/drive-by-downloads-malware-installed-without-your-knowledge http://www.associatedcontent.com/article/794101/how_to_prevent_driveby_downloads_.html Clickjacking Clickjacking, also known as user-interface (UI) redressing, is one of the most common attacks against users by creating malicious pages that tricking users to click on buttons and links which reveal sensitive information, or can allow the attacker to take over control of the user's computer. The true function of the button is hidden under an opaque layer that shows something different to trick the users. A possible solution to clickjacking is the "walled garden" that iPhone has. It has a closed or exclusive set of information services provided for users, instead of allowing open access to apps and content. https://www.owasp.org/index.php/Clickjacking Targeted brand attacks on social networks Targeted brand attacks on social networks is attacking the big brand names, and attacking its reputation, currently common through attacks on social networks and phishing. Scammers that hijacked a social networking account can add random people to their friends list, and link them to malicious sites. Or an attacker would disguise themselves as the "official" profile of the brand company, and make friends and trick them into revealing sen
anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
anonymous

Court says ISPs can't be forced to monitor illegal downloads - 12 views

  •  
    summary all nov 28 alec
  •  
    BRUSSLES can't block users from downloading illegally because that would breach the EU rules. SABAM asked the court in Belgian to force scarlet to install a device to prevent users from downloading copyrighted work. Scarlet then had to install the device. The EU made a statement that that internet providers should have to install a filtering system. The ruling of that made the BEUC (consumer organization) get authorities thinking of a fairer way to provide legal downloads. Monique Goyens said that there is no point in trying to catch individual people for file sharing because there are so many it would be impossible to stop. EU - European Union SABAM - Belgian Society of Authors, Composers and Publishers BEUC - European Union Consumers Organisation
anonymous

On Computers » FACEBOOK DOWNLOADER - 1 views

  •  
    fyi dec 2
anonymous

http://www.macobserver.com/tmo/article/japanese_publishers_cry_foul_on_pirated_app_stor... - 6 views

  •  
    brief march 23 woo
  •  
    1. Identify the area of impact the scenario relates to. - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
anonymous

Download PDF Printer - 0 views

  •  
    makes pdf from print window
anonymous

Great Debate: Should any Internet freedom ever be sacrificed to fight piracy? | ZDNet - 10 views

  •  
    Agree or disagree? all feb 10 soobin
  •  
    Agree Agree to some extent. Internet freedom can be sacrificed only to a certain extent to fight piracy. Getting rid of internet freedom is basically the same thing as shutting out the communication lines of the world. The source of the reason why piracy is done is mainly due to the fact that people can't afford the items that they wish to use, or need to use, because they are ridiculously overpriced. These industries don't think that way because they want profit, however, if piracy was stopped, then no one will buy their products anyways because they still can't afford it. Popularity of the product will decrease, and the marketing of the product basically just failed. We need to compromise something so that piracy is decreased until there is no more. But suddenly stopping everything in one shot with something like SOPA isn't the way to go. Disagree I disagree. The internet should be free and open. We need to educate people not to download pirated software, movies and music. Doing so is the same as stealing from a shop, which most people would not do. Most people would be prepared to pay small amount for the right to download these things. If governments try to remove websites, it is the same as censorship which sometimes happens in dictatorships but should not happen in free societies. We really need freedom for the internet, so that we can easily share our own ideas, and thoughts. Unlike China, where people can't even talk gossip about governments, which is a basic human right. But China is still very famous for internet piracy. The United States should not have the power to prevent freedom of internet because they are not the world's police force. They should not have the power to dictate what happens in the rest of the world. That's why internet freedom should not be sacrificed.
Chut Sanghiran

Convert Youtube to MP3 & Download Youtube Videos - Free Downloader - 1 views

shared by Chut Sanghiran on 29 Feb 12 - Cached
  •  
    For Mr. Overacker
anonymous

BBC News - Why going online on smartphones can be costly - 15 views

  •  
    Why might smart phones be costly? Explain two possible solutions. all Nov 23 Tik
  •  
    Smart phones could be costly because it's download, upload and connect to the network almost all the time. People that use smart phones and don't have good deals or promotions,and people use data more than they think, so the phone company can cost the data that we download, upload with the network, and smart phones can do many thing that use a lot of data and it will cost a lot of money, for example sending 10 photos it's take 10MBand watch video on youtube it will take 15MB per video, etc. In this case the solutions are that users should make sure that they get the right deal or promotion, that they won't get a big bill in the end of the month. Secondly, there are people that use unlimit promotion, but every deal have a gap, so the phone company should tell their customers, or send the users a messages to warning them that they used data more than the deal they got.
anonymous

Canada regulator to reconsider Internet ruling | Reuters - 1 views

  •  
    Why would a government want to limit downloads? Feb 10 Soo
anonymous

How to Keep Your Computer Secure Video - 5min.com - 9 views

  •  
    M13 List and describe the guidelines for PC security. M12 Describe additional guidelines that should be considered for PC security. August 31 Chut Jenny
  •  
    Additional Guidelines: Password locking/encrypting important, sensitive information containing files and folders. Using a proxy or a VPN, to access the internet through the tunnel that can also include encryption. A Proxy and a VPN can scramble your IP address so the website cannot track you.
  •  
    Types of Securities. Firewall is a program that protects against intrusions and it helps ensure privacy. Anti-virus protects against computer viruses. A computer virus is a program that can multiply itself and infect a computer without the owner of the computer knowing or permissions. Anti-whatever else, malware, adware, spyware, Trojans etc. Why do you need it? People should have security programs to protect their computer from viruses or hackers. If you don't have any type of protection for your computer for your computer, your valuable information maybe stolen by hackers or erased by viruses. If you get viruses on your computer, you may need to take it to shops to repair it and need to pay for it. When do I need to use security programs? It depends on the activities that you do on your computer. How can I get viruses? There are several ways that you can get viruses. Opening attachments from anonymous emails, downloading torrents, movies, pictures, music and porn can give you viruses. Where can I get the right programs for my computer? download.com sourceforge.net majorgeeks.com Computer forums
anonymous

Your smartphone: a new frontier for hackers - Technology & science - Security - msnbc.com - 15 views

  •  
    Describe the different ways that iphones and android phones are being hacked. all sept 5 soo
  •  
    Malicious Applications that log details about incoming/outgoing phone calls, as well as recording the calls. They can create unwanted service charges subscriptions to phone users. The users may or may not even receive the "service" that was subscribed, and paid for. They cab intercept text messages, compromise emails, photos and private content. Malicious applications that appear to be games, calculators, or pornographic photos and videos are downloaded to smartphones. Malware that replies incoming text messages with spam links. E-mail based phishing - because the phone screens are smaller than computers, it is harder to tell apart phishing links and scams in the url. iPhone's unencrypted file of location logs for iPhone users. Jailbroken iPhones that run unauthorized content is also a gap where malware can get through. Because these apps are unauthorized, they haven't gone through Apple's authorization process, and can contain malware, and can hack the user's phone. o By Malicious Application= The Applications which Apple and Android offers to customer, sometimes have malicious worms or viruses. Sometimes, malicious applications masquerade to games, calculators, or pornographic photos and videos. Hackers made their own malicious app and phishing people to download. The payment will charge to the victim's phone bills. o By Phishing Texting= Personal texting sometimes contain spam and malicious links which lead to the hacking site o By Advertisement link= Viruses might attach to the advertisement link o By Weak Security= Weak security of iPhone and Android phone therefore, find the weak part of the phone and hack. o By E-mail= Users tend to be less caring on phones, as the words and the screen itself are small
anonymous

Couchbase Offers NoSQL for IPhone | PCWorld Business Center - 1 views

  •  
    Explain: NoSQL non-relational database Explain the advantages of CouchDB's noSQL . May 9 soo
  •  
     Explain  NoSQL= NoSQL is a category of database engines that do not support the SQL (Structured Query Language) in order to achieve performance or reliability features that are incompatible with the flexibility of SQL. - http://stackoverflow.com/questions/4154635/what-is-nosql-what-is-purpose-of-nosql-where-can-i-get-sufficient-material-on-n  Non-relational database= a non-relational database developed by Damien Katz, now the chief technology officer for Couchbase. The company claims that Mobile Couchbase is the first non-relational, or NoSQL database, built for iOS. - http://stackoverflow.com/questions/202819/what-is-an-example-of-a-non-relational-database-where-how-are-they-used  Explain the advantages of CouchDB's noSQL - CouchDB and noSQL architecture has a number of advantages that make it attractive to iPhone applications developers, the company asserts. - CouchDB= Efficient use of working memory, Amount of storage space (takes up relatively minimal, under 20 megabytes download size limit imposed by many people CouchDB's NoSQL has advantages such as its synchronization capabilities with minimal coding. Data can be automatically synchronized across a network. The app can store data created on the phone itself, all the while also synchronizing the same data with a cloud service or a data center. The storage space taken up by CouchDB's NoSQL has efficient use of working memory. When it is embed in an app, it can still keep the app to be under the 20 mb download limit, and doesn't drain the battery.
  •  
    1. ITGS 2. NoSQL 3. iPhone 4. Network 5. Database
anonymous

Net Cetera - OnGuard Online - 0 views

  •  
    Read Heads-up. Describe two guidelines from each section that you think are relevant advice. May 9 kuni
  •  
    Share with care Your online actions can have real-world consequences. The pictures you post and the words and the words you write can affect the people in your life. Think before you post and share. The advice, mainly for children, is that before you click to send email or when you're ready to post or send a message or a photo, download a file, game or program, or shop for something-stop for a second. Think about things like: Do you know and trust who you're dealing with-or what you're sharing or downloading? How will you feel if your information ends up somewhere you didn't intend? Get someone's okay before you share photos or videos they're in. Online photo albums are great for storing and sharing pictures of special events, and camera phones make it easy to capture every moment. Stop and think about your own privacy-and other people's-before you share photos and videos online. It can be embarrassing, unfair and even unsafe to send or post photos and videos without getting permission from the people in them. Interact With Tact Avatars are people too. When you're playing a game or exploring an online world where you can create a character and interact with others, remember real people are behind those characters on the screen. Respect their feelings just INTERACT WITH TACT like you would in person. Remember that your character or avatar is a virtual version of you-what does it tell people about you and your interests? Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using Report Abuse links can help keep sites fun for everyone. The Protection Connection Learn about social mapping. Many mobile phones have GPS technology, and there are applications that allow you to find your friends-and allow them to find you. Use GPS and social mapping apps only with people you know personally and trust. Take advantage of privacy features in
Rot Homkrathok

Kompozer - 0 views

shared by Rot Homkrathok on 04 Mar 13 - Cached
  •  
    How download it and stuff.
Kong Vichaboonsiri

Case Study - Red Dragon Taxi Company (May 2013) - ITGSOnline - Wiki and Eghs - 0 views

  •  
    The Case study for your examination this has arrived - and hot off the press, click below to download and have a brief look. Always remember this quote...
In Hee Jang

Report warns of Android security issues, increased malware, Web attacks - 1 views

  • “Malware writers have become increasingly creative with the tactics they use to get users to download malware,” Mahaffey wrote in a blog entry announcing the report. “Monetary motivations seem to be the primary goal, but the sheer amount of personal information stored in our smartphones also becomes a target for attackers to get creative.”
  •  
    San Francico based mobile security vendor announced that there is a lack of android security issues which increases malware and web atatcks.
anonymous

Privacy controversy over Path for iPhone, iPad should be a wake-up call - The Washingto... - 10 views

  •  
    Explain the issue with Path. Evaluate Apple's solution.  Should services such as Path take or hold our data? all feb 21 johnroy
  •  
    Explain the issue with Path. When you take apps by log in from your iOS device then it would take you personal information and put it into the Apple server. It does this without permission of the user. The reason why is doing this to locate the user where you are at and your friends. Evaluate Apple's solution. Their solution is just to add new feature so you would be aware that apps would take your private information and put into the main server apple server. When you're downloading or getting apps you need to approve that they get you privacy information. Should services such as Path take or hold our data? I believe that they shouldn't because it's hard to trust large companies. The information that they have could be sold to other person that interest about your privacy. Another possible solution is that the data that is stored could be hacked anytime and when this occurrence happens. The hacker can sell my privacy to someone or he directly knows where I live, what's my name and etc.
anonymous

Bangkok Post : Staying secure - 9 views

  •  
    Presentation: Explain the issue of mobile security. Provide a detailed explanation of how to provide mobile security. nov 14 champ az
  •  
    Mobile devices can be occupied by malware that are no longer only exist in the computer. With the growing population of smart phones, it also increases chance of getting viruses, worm, or Trojan. These viruses can invade by number in fonts, SMS or MMS messaging, downloadable content, public Wi-Fi or Bluetooth connections. Mobile malware can cause serious problems. They can drain your phone's battery very fast, delete your important information such as contacts or messages, and also it can destroy your phone's function completely. The worst thing it could do is to display your personal images online. How to provide mobile security? Use anti-virus software You can keep your mobile phone secured by using mobile security software such as Kaspersky Mobile Security. This software is a complete protection that will keep away malwares and block threatening network connections. It also has many features such as control of private contacts and phone numbers, blocking accession of other people, and an mobile phone locator application in case it get lost or stolen. Works Cited http://www.cellphonebeat.com/10-security-software-smart-phone.html http://linestechnology.blogspot.com/2011/06/overcoming-mobile-virus.html http://expertitgurus.blogspot.com/2011_05_01_archive.html
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
1 - 20 of 26 Next ›
Showing 20 items per page