I found recent three computer news.
The headline of the first one is “Computer Surveillance- What Does it Offer?”
This news tells us that computer surveillance is used to check employees’ e-mails, internet-use, phone calls, and computer-use in 77.7 percent of major U.S. companies. One of the reasons is that Companies’ employers are concerning about following two things. The first one is that many employees use their companies’ computers for private use in their working hours. The second one is that companies attempt to prevent employees from using companies’ computer to commit fraud crimes and using the system to send sexual materials, which causes the companies to get in a lawsuit trouble. Companies can easily install computer monitoring software, which is needed to use computer surveillance. The computer surveillance enables the companies to see not only users’ e-mail accounts and password but also the contents of emails and web-pages that users saw.
The headline of the second one is “Domestic Violence Victims Keep Track of Offenders with Computer Monitoring.”
This news tells us that more than 40 states of the U.S. have the computer system called “VINE” ( Victim information and notification everyday). The system tracks offenders by monitoring computerized booking systems and protects victims by giving information of offenders. For example, when an offender’s status in custody is changed, the victim are notified it within 15 minutes. In addition, not only victims but also offenders’ family members, the news media, and victim advocacy group can use VINE.
The headline of the third one is that “150 USD for Each Notebook from One Laptop per Child Project”
In the U.S., the project “One Laptop per Child” is making progress now. The U.S. will deliver almost 2500 laptop computers as test drive to state educators in Brazil, Libya, Pakistan, Rwanda, Thailand, and Uruguay. One laptop is US $150. Only 2 watts of power is needed to use the laptop all day. The display is switched to black and white for sunlight viewing. The laptop uses the flash-based memory, and USB port is dependent. The ultimate goal of the project is that 150 million laptops will be delivered to children of developing countries.
Sunday, February 25, 2007
Saturday, February 17, 2007
Introduce 3 good web sites
I know a lot of good web sites because I enjoy surfing the Internet in my free time. Among the web sites, I choose three good web sites.
Firstly, Wikipedia is one of my favorite web sites. Wikipedia is kind of a free encyclopedia. If I do not know the meanings of words, I can look up the words using the Wikipedia. I just type the word that I want to search, and then the web page shows the meaning of the word. I can get not only the meaning of the word, but also a lot of useful information of the words such as historical backgrounds. For example, if I search the word “bees” on the web page, the web page will show bees’ body structures, common habits, and various roles of bees in their communities in addition to a basic definition of bees. However, the information on Wilipedia does not have 100 percent creditability because it is not made by professional people, but if you keep this in mind, you can enjoy the web page. Link Page → http://en.wikipedia.org/wiki/Main_Page
Secondly, Japan National Tourist Organization Web site is also a useful website especially for foreigners who visit to Japan. It is because the web site has a lot of sections such as “Find a Location,” “Arrange Your Travel,” “Japan in Depth,” and “Festival and Events”. Therefore, we can get information that we need to know when we travel to Japan. In the section of Arrange Your Travel, we get information about Japanese money, Guide service, Customs, and so on. In the section of Japan in Depth, we can learn Japanese history. Among these sections, the most fantastic one is “Find a Location”. When we click"Browse the Map of Japan" in this section, it leads us to Japanese map. When we move the cursor over a name of place such as Kyoto, we can see a close-up map of Kyoto and see more detailed information of Kyoto. And then we move the cursor over the name of temple we want to visit, we can see a few explanations about the temple with a small picture. When we want to know more about the temple, we click on “Detailed Page” which is connected to the link page. We can get whole information about the temple in the link page. From these points, the web site is very useful and recommendable to see.
Link Page→http://www.jnto.go.jp/eng/index.html
Link Page→http://www.jnto.go.jp/eng/index.html
The web page draws us into the fantastic world!
Link Page → http://home.disney.go.com/index
Friday, February 9, 2007
What is "Social Engineering"?
Social Engineering
Social Engineering is illegal techniques to obtain personal information or companies’ confidential information by tricking people. Using the information, social engineers attack the people and companies’ computer networks, disturb the computer system, and steal the companies’ important information. Social Engineers use various ways to get personal and companies’ information. Among them, pretexting and phishing are the most prevalent ways to deceive people into releasing their information.
Pretexting
Social engineers draw personal and confidential information from the people and companies by phone. Social Engineers often call a target and pretend to be the person’s co-workers, police officers and bankers and ask the target to say their personal information. Also, they often pretend to be private investigators and ask companies to release customers’ information, and then, they steal the customers’ telephone records, utility records, banking records and so on.
Phishing
Phising is done by social engineers through e-mails. Social engineers send fraudulent e-mails that look like legitimate emails from reliable companies such as banks and credit companies. The e-mails ask the targets to send their personal information to verify it. The targets who take the e-mail on trust send back the e-mails with their personal information. In addition to that, in the e-mails, there is a link to a web page. The web page often has famous companies’ logo and information to make it look like a reliable web page. Also, it has a request form that asks personal information; therefore, the targets fill out the request form and send it without noticing that they are deceived.
Besides the pretexing and phishing, there are various ways to obtain personal information illegally. Therefore, we should keep in mind that social engineers aim at our personal information using clever tricks, and we should have responsibility for our information.
Links http://www.webopedia.com/TERM/s/social_engineering.html
Social Engineering is illegal techniques to obtain personal information or companies’ confidential information by tricking people. Using the information, social engineers attack the people and companies’ computer networks, disturb the computer system, and steal the companies’ important information. Social Engineers use various ways to get personal and companies’ information. Among them, pretexting and phishing are the most prevalent ways to deceive people into releasing their information.
Pretexting
Social engineers draw personal and confidential information from the people and companies by phone. Social Engineers often call a target and pretend to be the person’s co-workers, police officers and bankers and ask the target to say their personal information. Also, they often pretend to be private investigators and ask companies to release customers’ information, and then, they steal the customers’ telephone records, utility records, banking records and so on.
Phishing
Phising is done by social engineers through e-mails. Social engineers send fraudulent e-mails that look like legitimate emails from reliable companies such as banks and credit companies. The e-mails ask the targets to send their personal information to verify it. The targets who take the e-mail on trust send back the e-mails with their personal information. In addition to that, in the e-mails, there is a link to a web page. The web page often has famous companies’ logo and information to make it look like a reliable web page. Also, it has a request form that asks personal information; therefore, the targets fill out the request form and send it without noticing that they are deceived.
Besides the pretexing and phishing, there are various ways to obtain personal information illegally. Therefore, we should keep in mind that social engineers aim at our personal information using clever tricks, and we should have responsibility for our information.
Links http://www.webopedia.com/TERM/s/social_engineering.html
Sunday, February 4, 2007
What do I know about the Mac?
The Mac
I don’t know about the Mac very much, but I learned the advantage and disadvantage of using the Mac in the last class. Among the knowledge about the Mac that I learned in the class, I will tell three good points of using the Mac.
Firstly, there are very low possibilities for the Mac to be attacked by viruses. While the Windows computers are always exposed to the risks of catching 60,000 computer viruses, it is unlikely for the Mac to be attacked by viruses. It is because the Mac has excellent security system against viruses. In addition to that, only the small number of people uses the Mac, so it is unlikely for the Mac to be a target of the hackers.
Secondly, the Mac is versatile and easy to use. We can use the windows on the Mac. For example, we can use Vista or Windows XP application on the intel-powered Mac. In addition to that, the Mac develops stylish graphic interface, so it is easy for beginners to use it and understand the function because what they see is what they get.
Thirdly, Mac has satisfactory customer service. We can receive worldwide user support from the Apple. It is difficult for the users of the Mac to get support from friends and exchange information with other users because there are not so many people who use the Mac. However, users of Mac can receive reliable customer service and get it fixed with a warranty.
If you want to know about the Mac more, I recommend you to see http://www.apple.com/getamac/
I don’t know about the Mac very much, but I learned the advantage and disadvantage of using the Mac in the last class. Among the knowledge about the Mac that I learned in the class, I will tell three good points of using the Mac.
Firstly, there are very low possibilities for the Mac to be attacked by viruses. While the Windows computers are always exposed to the risks of catching 60,000 computer viruses, it is unlikely for the Mac to be attacked by viruses. It is because the Mac has excellent security system against viruses. In addition to that, only the small number of people uses the Mac, so it is unlikely for the Mac to be a target of the hackers.
Secondly, the Mac is versatile and easy to use. We can use the windows on the Mac. For example, we can use Vista or Windows XP application on the intel-powered Mac. In addition to that, the Mac develops stylish graphic interface, so it is easy for beginners to use it and understand the function because what they see is what they get.
Thirdly, Mac has satisfactory customer service. We can receive worldwide user support from the Apple. It is difficult for the users of the Mac to get support from friends and exchange information with other users because there are not so many people who use the Mac. However, users of Mac can receive reliable customer service and get it fixed with a warranty.
If you want to know about the Mac more, I recommend you to see http://www.apple.com/getamac/
Subscribe to:
Comments (Atom)