Latest Entries »

INT PROJ WEEK 7

Euan – Finished program coding started testing and scripting video

Martin – Finished Logo and and welcome page

INT PROJ WEEK 4

Euan – Construction of Program begun

 

Martin – Construction of Website begun

 

Found desktop recording software.

INT PROJ WEEK 2

Euan – Created Mock up on Powerpoint, sketched main page and poll page for website, completed time sclae and final parts of Learning Outcome one.

Martin – Found free file hosting server, Acquired code for custom made poll, sketched welcome page for website. Helped complete timescale.

INTPROJ WEEK 1

Euan & Martin:- Decided on project and who has what responsibilities

Euan:- Looked into linking a database to a program, made HCI designs for program.

Martin:- looked into setting up a server such as the use of free servers, paid server use and self hosting (IIS).

An acceptable use policy is a set of rules set out by the owner of a network or website describing what the network or site can be used for. The are often used by businesses, schools, universities, internet service providers and website owners. The most common reason for one being put in place is to try and prevent illegal actions being performed on their network or website. It is also used to prevent legal action being taken against the author of the policy. The policy is enforced by moderators and administrators.

Work

I finally found myself a job ending my unemployment. I’ll be beginning work in Domino’s soon. It may nto be big but it will help me put myself through college and finally get my driving license. All progress is good, as they say. Even better when you are paid for it.

Phishing is criminal fraud used to acquire a person’s username or password by pretending to be a credible entity in an electronic communication. For example an E-mail pretending to be your bank wanting a security up date.

 

Packet sniffing, it may be used to monitor and troubleshoot network traffic by a network or system administrator. This is perfectly legal. The packet sniffer catches all packets of data that pass through a given network interface. This is how an administrator can use a packet sniffer to find bottle neck points in a network and keep it running efficiently

 

Impersonation, this is the act of pretending to be something that you are not. It can extend to the crime of theft of identity and over the internet is very easy to perform once the correct information has been acquired. This could be as simple as someone using another’s E-mail address or claiming to be someone else on a blog. It can go as far as using their banking information to steal their money directly from the bank.

 

Denial of service, this kind of attack is an attempt to stop a user from accessing a page or function on a web page thus denying them some of its services. The means to carry out, the motivation for, and the target of one of these attacks can change greatly the key is that it denies the use of some or all services to a user.

 

Replay of messages, A message’s replay is a caption in front of a message that distinguishes what computer on a network has sent the received message. Message reply attacks are when a message is intercepted by a third party who then uses that message replay to pretend to be someone else and send on their own message.

 

Password cracking, is the process of recovering passwords from data that has been stored or transmitted in a computer system. The most common approach is to repeatedly guess a password. This can be used by a user to recover a lost password, to gain unauthorized access to a system for malicious purposes, or by a system administrator to determine the security of a password.

 

Guessing of public/private keys, a key is used to decrypt a piece of data it may receive. If someone intercepts this piece of data they would need to figure out the key to break the encryption. The acting of guessing the key is simply that, guessing as to what the key to the encryption may be.

 

Viruses (Trojan and worm):

Trojan horse, a Trojan horse is basically a hidden virus. It appears to perform an action you would want on our computer, such as downloading anti-virus software, but instead downloads a harmful virus onto the computer. These viruses do not transmit themselves or replicate themselves

 

Worm, a computer worm is a self replicating malware computer program. It sends copies of itself throughout other computers using the network. It may be able to get around a user’s anti-virus so it can copy itself throughout a network with no user intervention. The worm can be used to consume bandwidth or computer storage space by self replicating.

 

Port scanning, a port scanner is used to check for open ports on a server or host. It can be used by administrators to check security or by attackers to try and gain access to the server of host and compromise it.

 

Cookies, a cookie is small program which saves information on the computer system. This information most commonly refers to browser habits but can sometimes be used to remember passwords.

 

Spyware, is a type of malware that can be put onto computers to collect little bits of information at a time on their users without their knowledge. Spyware is especially good at avoiding anti-virus software.

 

Adware, is a program that automatically downloads, plays, or displays advertisement to a computer. Adware in and of itself is not very dangerous but it may have integrated into it spyware such as a keylogger.

CHRISTMAS

Just wanted to say to anyone that reads this blog:

MERRY CHRISTMAS!!!

Really? That as big as I can get it? I said size = “50”… Oh well. Merry chirstmas everyone.

(I know its early but who knows when I will get back on here)

My image

WARNING YOU MAY BE OFFENDED

As I increase the number of comments I leave more and more people may notice my image. Yes it is the hammer and sickle, yes I am a communist, no I’m not going to try and convert you and no I don’t want to hear your hate speech.

Maybe I’ll explain why I am a communist if someone asks but for now I’ll leave it as is. I am a communist and proud and in the world of free speech, which I do not wish to stifle in the least, I am free to be one.

___________________ ##
_____________________ ###
_________________________ ####
__________#######__________### #
__________######_____________# ####
_______######________________# ####
_____######__###______________ _#### #
________##_____####___________ __### ##
_________________####_________ ___## ###
___________________### #_________## ####
_____________________# ####______## ####
________###_____________###### ##### ##
______###_#####___________#### ##### #
___###______######### ##########
_#####___________##### ######__#### #
####__________________________ ____###

My teacher is missing for my hardware class today as is my partner for this project. I shall enter a link to his blog at a later date.

So with those two gone I decide to take some time to enter in this blog. OUr task today is to research a processor but as my research is complete I have already researched he characteristics of the appropriate proccessor. So with the work done before it started I wonder what to do now. The next step would be looking at how to overclock a processor. So I suppose I’ll look at that. If anyone reads this at all and has any ideas or simply knows then please, leave a comment with your advice and knowledge.