? ?colorful?????Dark Tree? ????? ?? ???Rating: 4.3 (23 Ratings)??2949 Grabs Today. 27033 Total Grabs. ????
??Preview?? | ??Get the Code?? ?? ???????????????????????????Look to The Stars? ????? ?? ???Rating: 4.5 (24 Ratings)??2632 Grabs Today. 26005 Total Grabs. ??????Preview?? | ??Get t BLOGGER TEMPLATES - TWITTER BACKGROUNDS ?

Tuesday, March 23, 2010

Computer security

Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

Authentication technologies

SecurEnvoy SecurAccess New Release 5.3 click HereTurn any phone that can receive SMS texts into an authentication token SecurAccess from SecurEnvoy allows organisations to provide remote staff with industry standard two factor authentication without the pain and cost of deploying legacy hardware tokens. SecurAccess fully integrates into Microsoft Active Directory, Novell E-Directory, Sun Directory Server and OpenLDAP. Integration is simple and requires no schema changes. No additional database’s are required which reduces costs and simplifies on-going support Software is not required on the users phone which eliminates complex testing, support and training issues. This is particularly relevant as phone interfaces are constantly changing with each new model. The key strategy for successful use of SMS for delivering passcodes is resolving intermittent network coverage and SMS delivery delays. SecurAccess is fundamentally designed to resolve these issues by utilising: • Pre-loaded one time passcodes (each authentication attempt sends the next required passcode) • Three pre-loaded one time passcodes with each message (3 authentications before requiring the next message) • Reusable session passcodes that change each day or multiple days • Optional self help web interface to allow users to request temporary passcodes • Passcodes can be sent via email End user experience, good security shouldn’t add complexity, SecurAccess is designed to keep authentication as easy as possible by: • Reusing the existing Microsoft (or other directory) password as the PIN (one less secret to remember) • Dynamically updating the previous SMS message (no need to delete old text messages) SecurAccess seamlessly integrates with all leading remote access servers and web services including Microsoft OWA, Citrix, Juniper, Cisco and many others. For a list of third party integration guides click Here

Computer crimes

Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include:
Malware (malicious code)
Denial-of-service attacks
Computer viruses
Examples of crimes that merely use computer networks or devices would include:
Cyber stalking
Fraud and identity theft
Phishing scams
Information warfare

Monday, March 22, 2010

Computer virus

A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3]
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed

Multimedia

Multimedia is media and content that uses a combination of different content forms. The term can be used as a noun (a medium with multiple content forms) or as an adjective describing a medium as having multiple content forms. The term is used in contrast to media which only use traditional forms of printed or hand-produced material. Multimedia includes a combination of text, audio, still images, animation, video, and interactivity content forms.
Multimedia is usually recorded and played, displayed or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. Multimedia (as an adjective) also describes electronic media devices used to store and experience multimedia content. Multimedia is distinguished from mixed media in fine art; by including audio, for example, it has a broader scope. The term "rich media" is synonymous for interactive multimedia. Hypermedia can be considered one particular multimedia application.

Definition of ICT

ICTs stand for information and communication technologies and are defined, for the purposes of this primer, as a “diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.” [4] These technologies include computers, the Internet, broadcasting technologies (radio and television), and telephony.
In recent years there has been a groundswell of interest in how computers and the Internet can best be harnessed to improve the efficiency and effectiveness of education at all levels and in both formal and non-formal settings. But ICTs are more than just these technologies; older technologies such as the telephone, radio and television, although now given less attention, have a longer and richer history as instructional tools. [5] For instance, radio and television have for over forty years been used for open and distance learning, although print remains the cheapest,most accessible and therefore most dominant delivery mechanism in both developed and developing countries. [6] The use of computers and the Internet is still in its infancy in developing countries, if these are used at all, due to limited infrastructure and the attendant high costs of access.
Moreover, different technologies are typically used in combination rather than as the sole delivery mechanism. For instance, the Kothmale Community Radio Internet uses both radio broadcasts and computer and Internet technologies to facilitate the sharing of information and provide educational opportunities in a rural community in Sri Lanka. [7] The Open University of the United Kingdom (UKOU), established in 1969 as the first educational institution in the world wholly dedicated to open and distance learning, still relies heavily on print-based materials supplemented by radio, television and, in recent years, online programming. [8] Similarly, the Indira Gandhi National Open University in India combines the use of print, recorded audio and video, broadcast radio and television, and audioconferencing technologies. [9]