Skip to main content

Home/ Groups/ Globaltech
anonymous

20 Things I Learned About Browsers and the Web - 8 views

anonymous

BBC News - Free wi-fi in central London promotion launched - 8 views

  •  
    Explain possible security problems with this plan and possible solutions. all nov 8 woo
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Web Browser Privacy Check - 8 views

  •  
    Try it. Explain the purpose of this site. What does *) mean? all aug 30 Az
  •  
    Explain the purpose of this site. The purpose of this site is to inform users what security related information is exposed by the web browser to any website that the users visited. This website can also be used to judge how effectively your identity is hidden if you are accessing the site via a proxy or a VPN. What does *) mean? The items marked with the asterisk will be most likely to be recorded by web servers.
anonymous

BBC News - Worm steals 45,000 Facebook passwords, researchers say - 8 views

  •  
    Explain the ways these networks are being hacked. How could you know if your facebook account had been hacked? all jan 17 jang
  •  
    Explain the ways these networks are being hacked. It is explained in the article that these networks are being hacked by using the stole credentials to log into the user's Facebook account. When the hackers logs into the Facebook account, it is used to transmit malicious links to other people such as friends. Friends would be a trustworthy person so the link would be visited. This would increase the speed of the malware's speed. Also, some users use the same password for many accounts which can be used by ill-intentioned people on the web. How could you know if your facebook account had been hacked? For you to know if your Facebook account had been hacked, users should run an anti-virus software to check and get rid of any malware that is hacking your account.
anonymous

BBC News - Mobile phones could soon be 'powered by walking' - 7 views

  •  
    Explain the problem and solution. august 30 all alec
  •  
    The device is designed to absorb and feed on micro droplets of water. However if someone were to step in a large puddle of water the device could be over loaded and burnout. Also with the problem of how to transfer the energy a cable would work the best because if you use wifi or Bluetooth other devices could pick up that signal and steal the energy supply for their own use. A solution to the way power is generated it to do something similar to the Japanese train station and make the pad in the shoe absorb shockwaves from each step instead of the micro water molecules also if it were shock absorbent it could be but into a waterproof case so that it can withstand rain and puddles. Explain the purpose of this site. What does *) mean? This site tells you how secure your web browser is and what security is currently in place. *) means this information is most likely be recorded by web servers.
anonymous

Remove Malware from Your Computer Video - 5min.com - 7 views

  •  
    Describe the steps for removing malware. All September 2 Champ
  •  
    - First, you must know that your computer is really having malware. If your computer slow down, maybe it just doesn't have enough RAM. You can check by using system cleaning tool called CCleaner, it is a best known for cleaning out files, cookies, and also can clean your hard drive. After using CCleaner, you should restart your computer. - run the Anti-Virus scan and try to restore your system. By doing so, you will need system backup, to save your important documents. If you did not back up, you can use Malwarebyte's Anti- Malware and try deep scan. If the scan still doen't work, you might have to spend sometime uninstalling things that you doesn't want but it is not so affective because most of them are not able to uninstall. It is more effective to use free virus scan. - Use Virus Scanning Tools 1. Kaspersky- it will tell you the infection. It takes about two hour depending on your software. 2. Norton Power Eraser- It will scan and clean your computer for free. 3.Trend Micro HijackThis- It can generate log and you can post these log in forum such as Bleepingcomputer.com or Geekstogo.com where experts can view your post and they might give you some advices you.
anonymous

Guest Post: Using NFC tags with your Android PhoneGoMo News - 7 views

  •  
    How does this work? What is nfc used for? Can this be used for pay phones? sept 12 - 13 Chut rebecca
  •  
    How does this work? - NFC tags are just RF chips. They use radio frequency to communicate with each other. What is NFC used for? - They can be used for many purposes. Since that it can communicate with other devices that use NFC tags as well, it might be used as a credit card-like payment device, being to pay for something by just your phone. Anything that also uses NFC tags may be synchronized to work together. Can this be used for pay phones? - Yes it can. If payphone also have NFC tags, people may be able to call without having to insert a coin or a card.
anonymous

Music Lessons on Webcams Grow in Popularity - NYTimes.com - 7 views

  •  
    Describe the technology. Explain the advantages and disadvantages. all jan 17 Tik
  •  
    - this technology is that the normal video communicate that by the internet to connect to each other. For example, Skype, or Facetime etc. Advantages and disadvantages. - The advantage is that when children want to learn some music but parents don't have time to drive them to the music school, they could have lessons at home which is easy to do. - The disadvantage is that we need many thing to learn via computer, for example, webcam or video camera, good quality speaker, good quality microphone etc.
anonymous

Project Glass: One day... - YouTube - 7 views

  •  
    Completely annoying or totally indespensable? And make a question if you can, such as: Why does he have to go to a book store to learn to play a ukulele when he has google in front of his eyeballs? all April 9 kevin
anonymous

Lost Your Phone? The Government Wants to Find it For You - 7 views

  •  
    Explain the 3 safety measures. all April 25 Presentation by Helen including a list of helpful tips.
alec crosson

Next-Generation 911 Is Finally Poised to Take Off - 7 views

  •  
    What are the advantages to being able to text 911? What are the possible flaws in the system? all April 26 Kong
anonymous

View: IPads Won't Make Textbooks More Affordable - Bloomberg - 7 views

  •  
    Discuss the advantages and problems with etextbooks. all feb 3 johnny
  •  
    Advantages: The advantage of using an electronic textbook is that you're not wasting tones of paper and inks that it been stamp or written on the textbook. This would be already a good sign of eco-friendly. The etextbook also give the option that another textbook couldn't do by adding music and videos to it. The idea of carrying an electronic device that is not so heavy like the thick books would relief you already. Disadvantages: The trouble of the etextbooks is that the prices of the textbooks dosent reduce extensively enough for the students. Another Issue is that student can't sell their textbooks anymore to others when they are not using anymore. To get these types of etextbooks you need to spend an amount of $500 iPad which is very expensive for some people.
Avik Bag

BBC - Future - Health - Internet offers rural India a digital lifeline - 7 views

  •  
    How can the Internet be really essential in villages? What are the drawbacks and maybe certain improvements.
  • ...1 more comment...
  •  
    Strands?
  •  
    Health Internet
  •  
    May 23
anonymous

How to Check if a Web Site Is Safe Video - 5min.com - 7 views

  •  
    Describe the steps for checking the safety of a site. All September 2 Tick
  •  
    - Always check the URL to see that where it take place is logic. - Use site: google.com/safebrowsing/diagnotis?site= then type the name of the site you want to go on after type =. - Use the site: hosts-file.net then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Use safeweb.norton.com, then type the name of the site you want to go on into the seach box, then it will show you hat is that site is safe. - Also you can use unmaskparasites.com - If you use Mac os or ios you dan't have to care about it because you are safe.
anonymous

Unmanned aerial warfare: Flight of the drones | The Economist - 7 views

  •  
    Summarize m12 nov 2 az
  • ...1 more comment...
  •  
    On September 30th, a missile strike launched from a UAV killed Anwar al-Awlaki, al-Qaeda's most effective propagandist. This was an example of how the UAV are changing today's combat. These babies are equipped with sophisticated sensors and carry Hellfire missiles and laser-guided bombs. There may not be a man in the cockpit, but each Reaper UAV requires more than 180 people to keep it flying. A pilot is always at the controls from a ground control unit and another officer operates its sensors and cameras. UAV have become the weapon of choice over the past decade. Theres not a month that passes without reports that an al-Qaeda or Taliban leader has been killed by UAVs. There are more hours flown by America's UAS than by its manned fighter jets and more pilots are being trained to fly them than their manned equivalents. The frequency of drone stikes on terrorists in Pakistan has rose from one every 40 days to one every four days under Obama's admin. The UAV's ability to loiter for hours, minutely observe human activities while transmitting full motion video to its ground crews and can strike with pinpoint accuracy has made it the essential weapon in America's war on terrorism. Drones come in many different shapes and sizes. Predators and Reapers are the larger and more popular ones. Some are micro sized devices that imitate a bird used for eavesdropping or a mid sized plane that can be hand launched by soldiers to tell them what is happening over the hill. The medium sized UAVs would be able to defend airspace against enemy intrusion to attacking enemy air defenses. The largest UAV would operate as airborne warning and control, aerial refueling tankers, lift transports and long range bombers. The next generation of drones will also have AI, which allows them to shoot to kill. The UAS are used for "dull, dirty, dangerous, difficult or different" tasks. These tasks include surveillance missions requiring time and a degree of persistence that crews of
  •  
    manned aircraft couldn't provide. Also, UAS could be used to fly in to observe or take samples after a chemical or biological attack. Any missions too dangerous for manned aircraft will be taken care of by the UAV. UAV have other advantages over manned aircraft as they have more detailed information about their targets, their strikes are more accurate and cause fewer civilian casualties. They are also cheaper and smaller. Since they have no pilot, the space could be used for fuel and thus they can fly much longer than manned aircraft. Without the need to accommodate crew, drone can be given radar-cheating stealthy shapes and can maneuver better. There are however a problem afflicting the drones as they depend on two-way satellite communications. If the datalink is broken the remote pilot will lose control of the aircraft. For missions requiring constant oversight, the vulnerability to electronic jamming or a direct attack on a communications satellite is a huge problem. Another problem is that the dones has a slight delay between the remote pilot and the aircraft. To reduce latency, small, solar, or laser powered ultra long endurance drones can form a chain in the sky along which satellite signals can be bounced. To reduce the workload on pilots, big UAV can take off and land automatically. The US Air Force plans to have a pilot operating up to four drones at a time. Civil liberty advocacy groups have raised concerns about targeted killings by drones. Bus as long as a UAS pilot can trust data from remote sensors, he or she should be able to make a proper assessment the same ways as the pilot of a manned aircraft. UAS pilot will be in a better position to do so since he or she will have more time to assess the situation accurately and not be exhausted b the physical battering of flying a jet.
  •  
    Allowing the UAV to fire a weapon based entirely on its own data analysis raises a lot of ethical problems. Using UAV to kill enemies thousands of miles away is like a cowardly action of a bully sheltering behind superior technology. There are fears that UAS will lower the political threshold for fighting and an essential of restraint will be removed. Drones make leaders fonder of war.
Jang Han

Are Facebook posts hurting your career? - 7 views

  •  
    How are Facebook posts hurting your career? Identify two types of posts that can hurt you.
  • ...4 more comments...
  •  
    Employment Internet
  •  
    May 23
  •  
    Cant watch the video
  •  
    can't watch either.
  •  
    try to find the video clip on the list below the site
  •  
    i can't either
anonymous

Blogs Wane as the Young Drift to Sites Like Twitter - NYTimes.com - 7 views

  •  
    Go to each link in the article and describe it. march 3 Nat
  •  
    Facebook : It is the world's largest social network site, which was founded in 2004 by Mark Zuckerberg. It has become a very developed source on the internet, where users can like, share, comment on something without leaving the web page that they were at. There are approximately 500 million users worldwide. Twitter : Twitter is a social networking site that was started up by a group of 10 people called Obvious, and it has become popular for its simplicity of "micro-blogging" where a twitterer or tweeter sends short messages called tweets, within 140 characters, and are shared with people that follow you, and to the public. Pew Research Center- It is a research center for the people and the press, and it is an independent, non-partisan public opinion research organization that studies attitudes toward politics, the press and public policy issues. Huffington post : Huffington post is a news website that began in 2005, and it has become the most heavily visited news web sites in the country. BlogHer : is a group blog, online community, and refers to an annual blogging conference for woman.  Lisa Stone, Elisa Camahort Page and Jory Des Jardins founded BlogHer in 2005 in response to the question, "Where are all the women bloggers?" Tumblr : Tumblr was founded in 2007 by David Krap, and it is a social networking site that allows user to post text, images, videos ,links, quotes and audio, which can be reblogged by other users who follow your blog. Google : Google was founded in 1998, and is known as the world's most popular internet search engine. Google hosts and develops a number of internet-based services and products,and generates profit primarily from advertising through its AdWords program, which has helped them earn huge profits for their company. LiveJournal : LiveJournal is a virtual community where Internet users can keep a blog, journal or a diary. LiveJournal is also the name of the free and open source server software that was desig
anonymous

'App Economy' credited with creating 466,000 jobs - latimes.com - 7 views

  •  
    Why is the app economy growing so quickly? List the kinds of jobs app companies create. all feb 13 Palm
  •  
    The Piracy Problem: How Broad? Why are copyright violations are a serious problem? Copyright violations are a serious problem because it is equivalent to stealing. A person who watches from free online movies doesn't realize that all the people behind the movie used their time, labor and energy to create that movie, not to mention the amount of money that was used to produce the movie. So, to broadcast it to as free movie is truly unfair for all the industries concerned. Describe two advantages and two issues with illegitimate downloading. Advantages: (1) People around the world who can't afford to have it have the option of having for free. (2) It is available anytime, anywhere in the world. Issues: (1) Million of dollars as revenues and earnings are stolen from industries (movie, music, TV, etc.). (2) It will cause the affected industries to increase the price of their "product" when purchasing it legitimately. Explain two possible solutions to this kind of piracy. Possible solutions: (1) If people around the world really see stealing as a morally corrupt practice, then let us all shun away from the use of the internet. (2) If we can't afford to avoid the disadvantages of the Internet, let us all practice, encourage and teach honesty. This golden virtue is the only potent cure against SOPA and PIPA. Not enough is being done to tackle cyberbullying, according to the NSPCC. Give examples of cyberbullying. Some examples of cyberbullying are the following: receiving nasty text messages or e-emails 24/7. Describe possible solutions. Some possible solutions are the following: students must not give their mobile number to acquaintances or other students who are their close friends; never chat to anyone whom you don't know; when you received nasty text messages from your mobile phone, change your mobile phone number right away; and lastly be very selective in choosing whom to friend in FB or in other social networks. Trendnet securit
anonymous

BBC - Newsbeat - Not enough done to tackle cyberbullying, warns NSPCC - 6 views

  •  
    Give examples of cyberbullying. Describe possible solutions. all feb 13 jang
  •  
    Cyber bullying happens through the use if IT devices, especially through social networks. It has psychological effects on the person being bullied. An eighteen-year old boy Carney Bonner can be an example of cyber bullying. Carney was cyber bullied when he was 14 years old. He received constant text messages saying 'go kill yourself' or 'you're nothing.' This kind of messages made Carney anxious restricting him from social life. A possible solution to cyber bullying is parents educating their child about being safe online. Also, the person who is being bullied can consult to someone he can trust. Keeping it to yourself is very bad.
« First ‹ Previous 61 - 80 Next › Last »
Showing 20 items per page