Skip to main content

Home/ Globaltech/ Group items tagged from

Rss Feed Group items tagged

Natdanai Itthipalkul

Taiwan to step up cyberwar capabilities: report | Bangkok Post: tech - 2 views

  •  
    Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Photo illustration of keyboard with both Roman letters and Chinese "radicals" or "particles" - parts of Chinese charactures.
  •  
    Why are governments focus on cyber war nowadays? (Both defense and offense)
In Hee Jang

FinSpy Software Is Tracking Political Dissidents - 2 views

  •  
    SAN FRANCISCO - Morgan Marquis-Boire works as a Google engineer and Bill Marczak is earning a Ph.D. in computer science. But this summer, the two men have been moonlighting as detectives, chasing an elusive surveillance tool from Bahrain across five continents.
  •  
    Describe different ways of this type of software spying on people
anonymous

How To Block Facebook And Other Social Networks From Tracking You Online - 2 views

  •  
    more extensions to block tracking check out collusion
anonymous

Correction: Facebook-Privacy Q&A story - The Washington Post - 10 views

  •  
    How does Facebook use the information people share to make money? Describe the issues that Facebook should address. all Dec 6 cream
  •  
    How does Facebook use the information people share to make money? Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money. Describe the issues that Facebook should address. Issues that Facebook should address include: Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online. Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
anonymous

Great Debate: Should any Internet freedom ever be sacrificed to fight piracy? | ZDNet - 10 views

  •  
    Agree or disagree? all feb 10 soobin
  •  
    Agree Agree to some extent. Internet freedom can be sacrificed only to a certain extent to fight piracy. Getting rid of internet freedom is basically the same thing as shutting out the communication lines of the world. The source of the reason why piracy is done is mainly due to the fact that people can't afford the items that they wish to use, or need to use, because they are ridiculously overpriced. These industries don't think that way because they want profit, however, if piracy was stopped, then no one will buy their products anyways because they still can't afford it. Popularity of the product will decrease, and the marketing of the product basically just failed. We need to compromise something so that piracy is decreased until there is no more. But suddenly stopping everything in one shot with something like SOPA isn't the way to go. Disagree I disagree. The internet should be free and open. We need to educate people not to download pirated software, movies and music. Doing so is the same as stealing from a shop, which most people would not do. Most people would be prepared to pay small amount for the right to download these things. If governments try to remove websites, it is the same as censorship which sometimes happens in dictatorships but should not happen in free societies. We really need freedom for the internet, so that we can easily share our own ideas, and thoughts. Unlike China, where people can't even talk gossip about governments, which is a basic human right. But China is still very famous for internet piracy. The United States should not have the power to prevent freedom of internet because they are not the world's police force. They should not have the power to dictate what happens in the rest of the world. That's why internet freedom should not be sacrificed.
anonymous

Twitter tired? Fatigued with Facebook? Try a new network - 11 views

  •  
    Would you try a new network? all feb 10 nat
  •  
    Personally I wouldn't try new networks, unless I have friends there. A lot of my friends are focused on Facebook, and I don't mind sharing my content with people I am friends with, as I usually decline requests from strangers, and are friends with people who I actually know or have mutual friends. However, I wouldn't mind giving Pinterest a go, as I think it sounds interesting, and also it sounds like Tumblr, which I like a lot, because we can share images with people with the same interest.
anonymous

BBC News - Hackers outwit online banking identity security systems - 9 views

  •  
    Describe the kinds of attacks. Explain the security measures. all feb 9 kevin
  •  
    Describe the kinds of attacks. - First attack is called "Upgraded Security System." On the webpage of the bank, this kind of trick is shown. and when the user is attracted by the offer, money is moved out of the account but this hidden from the user without knowing owner. Second attack is called "Man in the Browser." A malware sticks between the connections of the user and the webpage. It shows the users false pages. Explain the security measures. - Secure keys are used these days. For an example, in order to log in on a website, you have to insert correct numbers or letters shown not really clearly on the side. It prevents other softwares to use your account.
anonymous

Ten Ways To Improve Your Search Engine Ranking - FindLaw - 10 views

  •  
    Define SEO. Describe the ten ways to improve a SEO. all nov 10 kuni
  •  
    Define SEO. SEO, (Search Engine Optimization) is a way of ensuring that your Web site shows up high in the rankings of search engines. Describe the ten ways to improve a SEO. 1. Learn Basic HTML- To do SEO yourself, you need to have a rudimentary understanding of HTML programming. 2. Understand the Difference Between Search Engines- There are basically four types of search engines in use today, (Google, Yahoo!, Bing, Altavista) and each has different methods of ranking sites. 3. The Quick Fix: Meta-Titles- it is important to include keywords in your meta-title that are relevant to your Web site. 4. The More Links, The Better- It is important to have a high number of quality links to your website from other similar websites. 5. The Content of Your Content Matters- Search engines also have the technology to look at the actual content or words you put on your page. So, if a user types in a search for a particular keyword, the more often that keyword appears on your site, the more weight your site will receive, and the higher it will probably be ranked. 6. What About Keywords?- Meta-keywords are something you find in the source code of a Web page. They serve no other purpose than to try to convince search engines that a Web site should be highly ranked. 7. Experiment- The best way to improve your search engine ranking is to continue to experiment with different meta-titles, meta-keywords, content, and linking strategies. 8. Avoid Dirty Tactics- There are many ways to try to trick search engines, but if the search engine discovers your tricks, it may ban your website completely. 9. Paid-Inclusion is an Option- you can guarantee that a search engine will see your Web site, and that your Web site will be ranked if you pay either pay a one-time or annual fee. 10. When in Doubt, Use a Professional- Many Web site designers have full-time SEO personnel to make sure that your website is highly ranked.
anonymous

BBC News - EU and US cybersecurity experts stress-test defences - 9 views

  •  
    How did they test their response to a cyber attack? all nov 10 alec
  •  
    They intentionally sent a Trojan virus in to try and steel information from chemical and defense firms. They also used a Duqu malware attacks against organizations in at least eight countries.
anonymous

In Piracy Debate, Is the Sky Falling? - NYTimes.com - 29 views

  •  
    Why are copyright violations a serious problem? Describe two advantages and two issues with illegitimate downloading. Explain two possible solutions to this kind of piracy. all feb 13 chut
  •  
    *Why copyright violations are serious problem?
  •  
    Why are copyright violations are a serious problem? Major entertainment companies are losing millions and billions or money due to these copyright violations. More people are turning to online pirated goods instead of buying legitimately. These companies who are losing their profits are not happy about this problem. Describe two advantages and two issues with illegitimate downloading. One advantage is that pirated download saves you a lot of money. You wouldn't have to spend any money downloading these stuffs. Another advantage is that you can mass download it or download just some parts of it. For example if I wanted to listen to only one song of an album I can just download it off the internet for free, I wouldn't have to buy the real Cd which costs quite a lot of money and listen to only one song. Most artists today sell their Cd's for a high price but the qualities of their songs are not so high plus one Cd usually contains only 5 to 8 tracks. Comparing with the old times, one Cd contains about 15 to 20 tracks and it would still cost less and the songs do have good quality. An issue to this is that it is illegal. Downloading pirated goods are not so different from shoplifting or stealing. These goods have owners which the owners are willing to sell them but we who download them illegally are just taking them for granted. Another issue is that if this continues then the companies will not make as much many as before. This of course would affect the artists, celebrities, directors etc., directly. It can cause problems with jobs. If those people do not make money, then there would be no jobs. There are many jobs in the entertainment business which can be destroyed by this issue. Explain two possible solutions to this kind of piracy. One possible solution is to make it legal to download pirated goods. It may be the best solution possible at this moment. Many people are agreeing that it should be legal when it comes to downloading pirated goods. The enterta
anonymous

BBC - Newsbeat - Not enough done to tackle cyberbullying, warns NSPCC - 6 views

  •  
    Give examples of cyberbullying. Describe possible solutions. all feb 13 jang
  •  
    Cyber bullying happens through the use if IT devices, especially through social networks. It has psychological effects on the person being bullied. An eighteen-year old boy Carney Bonner can be an example of cyber bullying. Carney was cyber bullied when he was 14 years old. He received constant text messages saying 'go kill yourself' or 'you're nothing.' This kind of messages made Carney anxious restricting him from social life. A possible solution to cyber bullying is parents educating their child about being safe online. Also, the person who is being bullied can consult to someone he can trust. Keeping it to yourself is very bad.
anonymous

US water facility 'was shut down by hackers' - Telegraph - 17 views

  •  
    How was the attack done? How did they know an attack happened? Why is this an important issue? Describe a possible solution. all nov 23 Chut
  •  
    How was the attack done? The hackers were able to obtain credentials from a company that makes software used to control the industrial systems. How did they know an attack happened? They knew that there was an attack because one of the pumps that is used to deliver water to the city was turned off. Why is this an important issue? This is an important issue because it indicates the amount of attention the United States government is giving to cyber-attacks. A terrorist attack like the one happened on September 9th 2001 can be said to be the faults of those who were monitoring the cyber activity. If the government aren't able to connect the dots to why they are doing this and the patterns of the attacks it might cause the US to be under attack like what happened over ten years ago. Describe a possible solution. Since that the credential software are saved on the clients' server, the employees can do a part in protecting the software. The staffs can help support the software.
anonymous

A Clever Robotic Arm on Kickstarter, Straight From Chinese Factory Whizzes | Wired Desi... - 2 views

  •  
    Describe how the technology works and the product limitations. HL only March 11 Jean presents
anonymous

Control these large smart appliances with your iPhone | Appliances - CNET Reviews - 1 views

  •  
    Describe IT Dawoon Oct 2
  •  
    Most smart appliances have an accompanying application. Those applications are available on iOS and android. (Samsung's washer and dryer application is working on only iOS and Samsung's Galaxy mobile devices, not the rest of the Android devices.) There are some examples of using iOS to control the smart appliances 1. LG Smart ThinQ LFX31995ST LG Smart ThinQ app will tell you the internal temperatures of both the refrigerator and freezer, and whether it's on energy-saving mode or not. You can make grocery lists and automatically update your inventory once you've checked an item off the list. Also, you can search for recipes on the fridge based on what your fridge has in stock. 2. Whirlpool WRL767SIAM Side-by-Side Refrigerator with 6th Sense Live it transmits information directly to the free app on your smart device. Whirlpool's app can let you know, if the refrigerator door is open or if there has been a power outage. Whirlpool has also enabled this refrigerator to connect to the smart grid if it's available in your area, which will let you monitor energy usage through its app. 3. GE Profile PT9550SFSS Built-In Double Convection Wall Oven The game-change app turns your phone into a remote control for the oven. You can set the temperature, mode, and time for both ovens independently and turn them on with app. 4. LG Smart ThinQ LRE3027ST oven Smart ThinQ app will allow you to search for recipes and then cue up the cook time and temperature accordingly, but you still have to manually press start on the oven itself. LG app allows you to run diagnostics on the range to make sure that everything is running as it should be. 5. LG Smart ThinQ WT6001HV Washer/Smart ThinQ DLEX6001V Electric Dryer LG's Smart ThinQ washing machine features a gorgeous touch screen and connects to LG's Smart ThinQ app via your smartphone or tablet. It doesn't have a smart-grid function like some other washer/dryer apps, but it's otherwise similar in that it lets you check your wash cycle
anonymous

How Google could have made the Web secure and failed -- again | Common Sense Tech - CNE... - 1 views

  •  
    Describe IT Jason Oct 4
  •  
    Google have transfer you automatically to its "encrypted" service, one designed to prevent potential "eavesdropping" on your searches. Google have use SSL( secure socket layer) to protect your search. Is can also be use when you are logging on to your bank account online. Google have introduce the SSL search, with the SSL search you can do your searches on Google with more secure and you are in private so no one can see what are you searching. Before Google URL was HTTP/www.google.com but now it is HTTPS/www.google.com. Its secure now. Google have use SSL to help protect your data from unwanted access. So what you are connected to internet café, local hotspots or hotel your data will be secure. But Google is not responsible for any viruses you get over the internet searches. The SSL will only protect your personal information.
Alex Lenk

BBC NEWS | Technology | Supermarket of the future - 2 views

  •  
    Jean October 10th  Describe the IT system by watching the video Answer here
  •  
    Basically just watch the video... ok lets start 1. The apps used in the supermarket needs to be downloaded by the clients before use. 2. Enter the store and open your apps from your mobile. 3. Pick the goods you want and scan the code off the bar code (using your cell phone) 4. The list of goods you buy will be store into your cell phone. 5. After scanning click the finish shopping button on your apps and the cell phone will generate a big bar-code which mix all the code you scan into one master-code. (like mixing salad after you put vegetables in) 6. Go to the paying counter and insert the master-code into the paying machine. 7. The machine will tell you how much to pay and client pay by cash, credit card and etc, Extra ( you can play stepping on fish in the supermarket for fun) Oh and there is a useless robot roaming around also.
Alex Lenk

Seeing That Ad on Every Site? You're Right. It's Tracking You. - NYTimes.com - 0 views

  •  
    Smile October 28th  BAA
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and leisure, 2. Identify the main stakeholders to the IT system. The main stakeholders of the Internet users and the internet advertisement provider (such as Google) 3. Identify and describe one ITGS social/ethical concern in the article. A social/ ethical concern in this article is privacy. This article refer to advertisement stalking you around and show up in every site that you are in. The concern is privacy because of the tracking of ads on the users. The IT systems uses cookie to track the user. For example if a user open a commercial website such as ebay and amazon the clicking into a certain product will place a cookie onto your web browser. The next time the user open the web browser, the ads will track you around. The companies that it target marketing which shows users the product that they are interest in at the right time. However is it ok for this ads to track the users around? 4. Describe ITGS terminology and systems. Web browser: a software application for retrieving, presenting and traversing information resources on the World Wide Web. Cookie: Computing a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server. 5.Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article. One solution that can help solve this problem is to install an adsblocker. Advertisement blockers will block the advertisement from showing on the web browsers. However the cookie is still in your computer. Some web browsers or operating system allow the user to delete the cookie on your computer.
Alex Lenk

Twitter Lurches Toward Social E-Commerce | Wired Business | Wired.com - 1 views

  •  
    Rock October 28th  Describe the IT systems
  •  
    The article is talking about how customer can link their American Express card with the the customer their twitter account. People who sync their American express card with their twitter account can simply order or buy product by tweeting. 1. User have to sync their American Express card with their Twitter account, account information will be kept secret. 2. After account had been establish, User can access store that are involve with Twitter campaign. 3. If user find any tempting product, they can simply tweet it or go buy it directly from the store and get discount 4. Product price will be charged to user's American express card and deliver to user address
Alex Lenk

Maybe Your Old Credit Cards Are Smart Enough - NYTimes.com - 3 views

  •  
    Jason October 17th  BAA
  •  
    1.Identify the area of impact the scenario relates to. Business and employee 2.Identify the main stakeholders to the IT system. The main stakeholder in this article is the credit cards company such as, Visa, MasterCard & American Express. The customer how are using these credit cards company service as well. 3.Identify and describe the ITGS social/ethical concerns in the article. The social/ethical concern in the article is Reliability/ Security. In this article it talk about the old expired credit card that can be re-used again. Unwanted access and get a magnet chip/stripes of a credit card and still use it, to buy whatever they want. The magnet chip/stripes still provide some information of the conventional card. 4. Describe ITGS terminology and systems. PIN- A PIN is a 4-digit number that is used in combination with your Social Security Number, name, and date of birth to identify you as someone who has the right to access your own personal information Chips- is an integrated circuit in which all the components needed for a computer or other system are included on a single chip 5. Describe the solution stated in the article or find a solution to the concern (issue) discussed in the article When a customer uses their credit card to buy product from shops their must type in they PIN to continue the process and if the PIN is enter incorrectly the process cancels. This will allows the original card hold to buy the products only. Dynamics Inc recently unveiled smart-card technology that doesn't require a smart reader but could still require a PIN: the issuer could program the card so that the PIN has to be tapped on special buttons found on the card itself.
jasonkerr

Kibot the robot entertains kids, spies on them - 0 views

  •  
    AI Rock Summary Answer here :)
  •  
    Korean children, already fast becoming a robot-friendly lot, have a new companion in Kibot, a monkey-faced bot that can read fairy tales, sing songs, take pictures, and make video calls via a display embedded in its tummy. It is like a robot that will keep children accompany, Kibot, which runs on a rechargeable battery and is manufactured by iRiver, has plenty of other tricks up its sensor-enabled sleeves, too. It responds to gestures, like pats, by turning and pleasantly saying, "It feels good." When it encounters an obstacle, it can change direction to avoid it. It can take pictures and record and play back customized voices. It even serves as a language tutor for Korean and English. About the only things it doesn't do, seemingly, are scratch its head and swing from branch to branch.
« First ‹ Previous 61 - 80 of 110 Next › Last »
Showing 20 items per page