Sunday, January 16, 2011

♀new gadgets of 2011!!☻

                                       NEW GADGETS OF 2011!


We got to touch a Motorola Xoom, but that was about it
That said, there were a couple devices that really committed to the tablet design and may turn out to give the iPad a run for its money. The dual-core ARM-powered Motorola Xoom and BlackBerry PlayBook look like they will be promising competitors, especially once they get access to 4G networks come summer. The PlayBook may turn out to be in the worse shape of the two with its small app selection.
Tablets and hybrids aside, other technologies were redeemed for me at CES. I couldn't believe the push that 3D TV was getting at last year's show, and hoped that manufacturers wouldn't manage to sell the concept to the public by brute force. Thankfully, it appears they haven't been able to find many followers willing to sit in their living rooms wearing 3D glasses to give a sitcom more visual dimensions than the content itself (see: Two and a Half Men 3D). As a way of meeting the skeptics halfway, some companies have started to put out glasses-less 3D sets.
While I'm still not sold on the higher costs of the medium as a whole, a 3D TV that works without props is much more appealing. I have no doubt the price of these glasses-less models will put the prices of glasses-using screens to shame. But a glasses-less TV is something I could see myself buying when the costs become more reasonable a few years down the line, whereas I would rather dig through a junkyard for a working CRT before I'd pay a premium to sit in my own living room wearing "futuristic" glasses.

3D and iDevices

by Chris Foresman
Two big trends that really stuck out to me during CES were the increasing push behind 3D and the staggering array of accessories for Apple's iDevices.
Movie studios and theaters have used 3D as a way to generate more revenue at the box office and offer an experience that's different than what most people can get at home. But now, TV and Blu-ray player manufacturers are pushing 3D tech into the living room. Sets using active, LCD shutter-type glasses have been around for a couple years, and scores of companies were showing off sets that use passive glasses or no glasses at all. Most new Blu-ray players support 3D as well.




A 3D laptop from Toshiba
But the 3D trend extends beyond the home theater. I saw laptops with 3D capabilities. I saw still cameras capable of shooting 3D images. I saw camcorders capable of recording 3D videos. Nintendo is about to release a 3D-capable handheld gaming system. At this point, I half-expect Apple to release iMovie 3D sometime in 2011.
3D tech is still in a relative infancy, however. It has still yet to win over a majority of consumers, and has yet to prove itself as a successful trend. But consumer electronics companies are intent to ride the 3D wave for the time being.
The other thing that really struck me is the sheer number of various iPad and iPhone accessories. In particular, there seemed to be an endless array of cases made in every color and of every material. I saw iPad cases made of carbon fiber, of various thinly-carved exotic woods, and silicone cases for iPod touches in nearly every color in the Patone swatchbook.
There were tons of licensed accessories, many featuring cartoon characters like Hello Kitty, Sesame Street, Captain America, and M&Ms. There were hundreds of speaker docks, some in the shape of animals, some in the shape of old-school audio components, some in amorphous shapes that defied description. Several companies had Bluetooth keyboards marketed specifically for the iPad, in both "full-size" and compact form. A few companies had various styli for writing and drawing on iPhones and iPads. And accessory maker Griffin teamed up with Crayola to create an iPad-specific stylus that worked exclusively with a Crayola coloring app. You know, for kids.
Even as the iOS device market has begun to mature, and alternate platforms like Android have begun to catch up in terms of unit market share, it still boggles the mind that so many companies can continue to exclusively target Apple's mobile devices.

New mobile form factors

by Ryan Paul
Although a large chunk of the mobile industry has become fixated on that tablet craze, there are still some legitimate innovators out there aiming ahead of the curve and developing new kinds of mobile form factors and experiences. What impressed me most at CES were the unusual mobile computing devices with novel designs and capabilities.
The Motorola Atrix with its netbook dock
The most compelling example was Motorola's Atrix smartphone, which can plug into to a netbook shell or multimedia dock in order to provide a more desktop-like computing experience. The device has a whole separate software environment with GNOME and Firefox for conventional computing. The next generation of Android smartphones, with powerful multicore processors, are almost capable of handling an average user's desktop computing workload.
Although the Atrix was the most impressive smartphone that I saw at CES, there were a handful of other products that similarly blur the boundaries between device categories. Razer's Switchblade, a 7-inch Windows-based pocket computer, offers a radical new take on mobile PC gaming. Samsung also had a compelling twist on mobile computing with its sliding PC, one of the best tablet/netbook combo hardware concepts that I've ever seen.
It seems like the biggest barrier holding back more of this sort of innovation are the limitations of Microsoft's Windows operating system, which doesn't scale down well to these kinds of devices and creates an x86 dependency. If Microsoft can make its new ARM-based version of Windows into a credible mobile computing platform and deliver a fresh new user interface that is better-suited for small displays, it's possible that we could see hardware vendors start to do a lot more experimentation with unique mobile form factors and new kinds of mobile computing experiences.

BlackBerry PlayBook

RIM BlackBerry PlayBook demo
We were already impressed with Research in Motion’s BlackBerry PlayBook going into CES, but we fell even more in love with the tablet once we got our hands on it. At 7 inches, it’s more portable than the iPad and other 10-inch tablets, and I found it to be surprisingly fast. Clearly, RIM’s reliance on QNX’s software for the PlayBook’s OS is a good thing, as the tablet is light years beyond anything we’ve seen from the company. Not only is the PlayBook a great-looking tablet, but it also gives us hope that RIM’s phones will finally get modernized with the new QNX OS.


Microsoft Surface 2


Microsoft’s touchscreen tabletop Surface was an interesting, but unwieldy, product. Surface 2 fixes pretty much all of the first version’s issues — it no longer requires a bulky cabinet, for one — and it basically gives LCDs the power to see. Its PixelSense technology lets LCD displays recognize fingers, hands and other objects pressed directly onto the screen. And since it’s no longer bulky, Surface 2 can be wall mounted — opening up a plethora of new uses.

Monday, December 6, 2010

IT104JayrDomingo








Purpose of a firewall

A firewall is usually placed in front of a group of machines and its primary function is to control communication from and to this group of machines. Communication between two machines over the Internet is a stream of packets (datagrams) send in both directions. The firewall examines all packets that is about to be routed through the machine and, based on a set of rules, determines if the packet is allowed to pass through the machine or not. This functionality is often referred as a packet filter.
The secondary function of a firewall is to modify the packets passing through the firewall. This is called Network address translation (NAT), as the modifications usually applies to either sender or receiver information contained in the packets. NAT can for example be used to allow machines without a public addressable Internet protocol (IP) number, to access the Internet through a firewall, by using the IP-number of the firewall as the sender identification. This is also called ip masquerading, as it disguises the address of the machines behind the firewall.
 
Sources:
                             http://answers.ask.com/Computers/Networking_and_Security/what_is_firewall


What is a firewall? 


Ø   A firewall is set in place to prevent unauthorized users from gaining access to a computer while allowing the owner to use the computer as he or she
      normally would.



Ø   A firewall is a virtual wall that is supposed to only allow certain functions out to
      the internet, and block unauthorized entrances to the local network



Purpose of a firewall

A firewall is usually placed in front of a group of machines and its primary function is to control communication from and to this group of machines. Communication between two machines over the Internet is a stream of packets (datagrams) send in both directions. The firewall examines all packets that is about to be routed through the machine and, based on a set of rules, determines if the packet is allowed to pass through the machine or not. This functionality is often referred as a packet filter.
The secondary function of a firewall is to modify the packets passing through the firewall. This is called Network address translation (NAT), as the modifications usually applies to either sender or receiver information contained in the packets. NAT can for example be used to allow machines without a public addressable Internet protocol (IP) number, to access the Internet through a firewall, by using the IP-number of the firewall as the sender identification. This is also called ip masquerading, as it disguises the address of the machines behind the firewall.
 
Sources:
                             http://answers.ask.com/Computers/Networking_and_Security/what_is_firewall


What is a firewall? 


Ø   A firewall is set in place to prevent unauthorized users from gaining access to a computer while allowing the owner to use the computer as he or she
      normally would.



Ø   A firewall is a virtual wall that is supposed to only allow certain functions out to
      the internet, and block unauthorized entrances to the local network

IT104JayrDomingo



   Question 1:
 
 Why has there been a dramatic increase in the number of computer related security incidents in recent year?

Answer: 
                
·       Security of information technology is of utmost    importance
      Protect confidential data

·       Safeguard private customer and employee data
      Protect against malicious acts of theft or disruption
      Must be balanced against other business needs and issues
·       Number of IT-related security incidents is increasing around the world.




·       Computing environment is enormously complex
      Continues to increase in complexity
      Number of possible entry points to a network expands continuously
                                            


   Question 2:

What are some characteristics  of common computer criminals including their objectives?

  Answer:

                                                      Types Of Attacks

          Most frequent attack is on a networked computer from an outside source

                              Viruses

                                                                         Pieces of programming code
                                     Usually disguised as something else
                                      Cause unexpected and usually undesirable events
                                      Often attached to files
                                      Deliver a “payload”

  Definition:
         Does not spread itself from computer to computer
       Must be passed on to other users through
         Infected e-mail document attachments
         Programs on diskettes
         Shared files
         Macro viruses
       Most common and easily created viruses
       Created in an application macro language
Infect documents and templates

 
Worms
         Harmful programs
       Reside in active memory of a computer
         Duplicate themselves
       Can propagate without human intervention
         Negative impact of virus or worm attack
       Lost data and programs
       Lost productivity
       Effort for IT workers
 
           Cost Impact of Worms
 
Tbl03-01 
 
 

  Trojan Horses

         Program that a hacker secretly installs
         Users are tricked into installing it
         Logic bomb
       Executes under specific conditions
 
 


             Denial-of-Service (DoS) Attacks

         Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks
       The computers that are taken over are called zombies
         Does not involve a break-in at the target computer
       Target machine is busy responding to a stream of automated requests
       Legitimate users cannot get in
         Spoofing generates a false return address on packets


   Denial-of-Service (DoS) Attacks (continued)

         Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on
         Egress filtering - Ensuring spoofed packets don’t leave a network
  

    Perpetrators

         Motives are the same as other criminals
         Different objectives and access to varying resources
         Different levels of risk to accomplish an objective

     Denial-of-Service (DoS) Attacks

         Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks
       The computers that are taken over are called zombies
         Does not involve a break-in at the target computer
       Target machine is busy responding to a stream of automated requests
       Legitimate users cannot get in
         Spoofing generates a false return address on packets


 Denial-of-Service (DoS) Attacks (continued)

         Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on
         Egress filtering - Ensuring spoofed packets don’t leave a network


                        Perpetrators


         Motives are the same as other criminals
         Different objectives and access to varying resources
         Different levels of risk to accomplish an objective


        Denial-of-Service (DoS) Attacks

         Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks
       The computers that are taken over are called zombies
         Does not involve a break-in at the target computer
       Target machine is busy responding to a stream of automated requests
       Legitimate users cannot get in
         Spoofing generates a false return address on packets


 Denial-of-Service (DoS) Attacks (continued)

         Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on
         Egress filtering - Ensuring spoofed packets don’t leave a network


                        Perpetrators
         Motives are the same as other criminals
         Different objectives and access to varying resources
         Different levels of risk to accomplish an objective


Classifying Perpetrators of Computer Crime

Tbl03-02b 



Hackers and Crackers

         Hackers

       Test limitations of systems out of intellectual curiosity

         Crackers

       Cracking is a form of hacking

       Clearly criminal activity

 

Malicious Insiders

         Top security concern for companies

         Estimated 85 percent of all fraud is committed by employees

         Usually due to weaknesses in internal control procedures

         Collusion is cooperation between an employee and an outsider

         Insiders are not necessarily employees

       Can also be consultants and contractors

         Extremely difficult to detect or stop

       Authorized to access the very systems they abuse

 

Industrial Spies

         Illegally obtain trade secrets from competitors

         Trade secrets are protected by the Economic Espionage Act of 1996

         Competitive intelligence

       Uses legal techniques

       Gathers information available to the public

         Industrial espionage

       Uses illegal means

       Obtains information not available to the public

 

                          Cybercriminals

         Hack into corporate computers and steal

         Engage in all forms of computer fraud

         Chargebacks are disputed transactions

         Loss of customer trust has more impact than fraud

         To reduce the potential for online credit card fraud sites:

       Use encryption technology

       Verify the address submitted online against the issuing bank

       Request a card verification value (CVV)

       Use transaction-risk scoring software


   Question 3:

What actions must be taken in response to a security incidents?

 Answer:

Educate users about the importance of security
Motivate them to understand and follow security policy
Discuss recent security incidents that affected the organization
Help protect information systems by:
Guarding passwords
Not allowing others to use passwords
Applying strict access controls to protect data
Reporting all unusual activity
 
Implement a layered security solution
Make computer break-ins harder
Firewall
Limits network access
Antivirus software
Scans for a specific sequence of bytes
Known as the virus signature
Norton Antivirus
Dr. Solomon’s Antivirus from McAfee 
 
 
 
Sources:   www. google.com.ph
                  www. ask.com