Network Security at Work


If you have a small business with a few workstations at the office, you'll still need to take active steps in protecting your network. After all, you'll never know what any of your employees could be up to while surfing the net. Although they wouldn't will it to compromise the security of the network nor your business, some of them unknowingly do so due to lack of education. They may think there's nothing wrong with clicking a link on a spam mail they got when that link would have linked them directly to a hacker' s website. In other words, there has to be a way for employee's browsing habits to be monitored and observed in order for your network technician to know what dangers he may be up against when it comes to keeping the network in good shape.

Moves to protect a network definitely need to be fully functional, which means they must not leave out any chance for the dangers to find their way into the network. There has to be an administrator who will be in charge solely of keeping it clean and working well. Sometimes, small businessmen take this for granted, not realizing that one false move by an uneducated or reckless employee can get all computers on the network to crash. Definitely, the administrator should be consistently what people using the network are using it for. There must be clear guidelines on the use of the Internet. In fact, Internet usage that is not directly related to the job at hand must be banned altogether to reduce the risk of compromising the network's security.

Another step a businessman can take is to have network security experts conduct a seminar within the office to be attended by all network users. People usually put their computers or networks at risk due to the absence of knowledge about these risks. By carefully taking the time to inform employees about the dangers associated with certain Internet activities such as file-sharing using peer-to-peer sites and downloading software whose integrity is unknown. When people are aware of the presence of threats, they would usually take it upon themselves to be more careful an d conscious of their Internet activities in the future, unless the intention is really to compromise the network.

Of course, to make sure that important files are never affected and always accessible for retrieval in case problems with the computers or the network come up, it is recommended that all of such files be safeguarded with backups on a remote access server site. You'll never know when a bug begins to strike and wipe out your entire hard drive. Just to not leave anything to chance, which could mean too great a loss, it is important to have backups all the time.

In terms of prevention of online risks, a good move would be to install an IP changing software. With this program, anyone on the network is able to surf the web with their IP address hidden. And when the IP is hidden, so is that link between the hacker and his victim.




Anonymous surfing has been one of the more effective ways to keep away from hackers and with the use of an IP hider, this becomes a very easy job.




Home Networking in the Digital Age


When computers first became available to the general public, it was rare for any home to have more than one unit, let alone a network of computers. But as modern technology became cheaper, more accessible and within the reach of everyone, tech-savvy homes are now linking up their laptops and plugging in their PCs into home networks.

What is a home network?

A home network is simply a method of allowing computers to communicate with one another. If you have two or more computers in your home, a network can let them share:

� Files and documents

� An Internet connection

� Printers, print servers and scanners

� Stereos, TVs and game systems

� CD burners

To set up a home network, you'll need a few basic components including more than one computer, hardware such as a router and software, either built in to the operating system or as a separate application, to co-ordinate the exchange of information. You will also need a 'path' for the information to follow from one computer to another. This is usually supplied via a WiFi system. The two most popular home network types are wireless and Ethernet networks. In both of these types, the router does most of the work by directing the traffic between the connected devices. By connecting a router to your dial-up, DSL or cable modem, you can also allow multiple computers to share one connection to the Internet.

Any risks?

With any network, there are always risks. If all of your computers are connected to the same network, a virus uploaded onto one computer will infect all the other computers linked to the same system. This is why it is imperative that you install effective firewalls and anti-virus software into your network to protect your system from outside attacks.

Most routers combine wireless and Ethernet technology and also include a hardware firewall already built into the system, but you can increase your security by adding your own software protection. Software firewalls installed onto your computers block all incoming information by default and prompt you for permission to allow the information to pass. In this way, a software firewall can learn which types of information you want to allow into your network. It is advisable to regularly update your firewalls and anti-virus protection to keep hackers and malicious users at bay.

Ethernet and wireless networks each have advantages and disadvantages. Wired networks provide users with plenty of security and the ability to move lots of data very quickly. They are faster than wireless networks, and very affordable. However, with wired networks, the clue is in the name - you will have cables linking your network so if you're not happy about a house full of cables to connect your system, a wireless WiFi network may be a better and more user friendly option. The system itself may be slower, particularly if a computer is further away from the main router, but you do cut down the amount of hardware and cables needed to create the network in the first place.

Wireless networks are more susceptible to interference in the radio waves due to walls and distance of networked computers from the wireless router, but do allow you the freedom to utilise the system anywhere in the house (or even outside in the garden). Wireless networks are by far the most popular home networking system, despite some drawbacks and as the technology improves and routers become more powerful, are becoming the networking option of choice for the majority of home users.




IT247.com has one of the UK's largest catalogues of IT, consumer electronics and related accessories, at highly competitive prices and best availability. Buy Laptop Computers and Internet Security Products online at http://www.it247.com.

Alison Brundle
Design Co-Ordinator
alison.brundle@scc.com




Simple Wireless Security Configuration


More and more people everyday are switching over to wireless technology. They are using it at home and at work to be able to connect to the internet without having the hassle of being connected with a hard line Ethernet cable. There are many advantages to doing this. With the power of laptops getting better everyday and more and more requirements for being mobile, it is a perfect solution. The problem is, many people just set up their router at home and connect without any security enabled.

Without the proper protection on your network you can open yourself up to many hazards. The worst outcome being a hacker getting into your personal computer and stealing your information and possibly your identity. It is essential to have proper protection if you are using wireless.

Ok, so you just purchased a Linksys 54G wireless router and are ready to install it. You have no idea how to configure it and found that it works by just connecting it. You scan for available wireless networks and see "linksys" SSID and it is open. You connect and have internet. Great, you're done and everything works. Wrong, if you can connect without a password, so can anyone else in the area.

First things first, we need to change the SSID and set a strong password for wireless. If you have over 20+ characters there is no way anyone can break in to it by brute force. It would take them in upwards of a few billion years at 60 passwords a second 24/7/365.

To connect to your router to manage it we need to find out the default address. You can either look in the documentation it came with or find out for yourself. To do this go to the command line by going to your start menu and opening the Run command. In the provided line type cmd; this will open a command line. In the command line type ipconfig. This will show you four lines for each adapter. We are interested in the line that says Default Gateway. If you have a Linksys router it should be 192.168.1.1. Now we take that address whatever it may be and type it into your internet browser URL line. When you hit Go a username and password box will show up. The default will be in your documentation but it is mostly Username: admin Password: admin. When you get in you will be brought to a home screen. For now all we want to change is the time zone setting towards the bottom and then hit the save settings button. The router will save and bring you back to the home page.

Next, to change the wireless settings. At the top of the home page there are a few menu buttons. Look for the one called Wireless and click on it. There should be four or five tabs in the wireless group. Basic Settings is the first. Here is where you set your SSID. Choose something you will recognize but not give away any information such as "CHome". You can change the channel it is broadcasting on here is there are a bunch of other access points using the same channel but you should be ok with channel 6. Finally, have the broadcast SSID radio button selected then hit save.

After the page comes back go to the Security page under Wireless, and you will see a few more selection areas. Under the security mode drop down select WPA Personal (PSK). PSK stands for Pre-Shared Key which will be your password to connect to the wireless. Please, please do not choose WEP, it is outdated and can be broken into within 30 by anyone with half a brain. Finally, choose your pre-shared key. For the best security make it at least 15 characters. It will not be hidden so if you forget it you can always log into your router and see what it is. Have a mixture of numbers, letters, capitalized letters, and special characters for the strongest password. After you save the settings on this page you are done setting up your secure wireless access point.

One last thing you need to do before you leave the router is change the default admin password. This can be found under the administration tab at the top of the page on the Management page. The password is the first box called Router Password. Change this to something you can remember but somewhat difficult. If you lose this password you will not be able to get into your router without resetting it and having to start all over.

That is it. It may look complicated but if you follow this step by step you should be able to configure your wireless in less than 15 minutes and never have to worry about someone breaking into your network.




If you have any questions please visit my website [http://www.computerevival.com] and go to the support page for contact information.

Branden DiLorenzo a professional computer systems technician.

For more computer related tips go to visit ComputeRevival for a load of free information related to common PC problems, products to help your system and a very helpful support center who will try to answer any and all computer related issues you are having. If you can't find your answer, just ask our team and we will find an answer ASAP.

http://www.ccissolutions.com




WAP Architecture - Wireless Telephony Application

The wireless telephony application (WTA) environment provides a means to create telephony services using WAP. WTA utilizes a user-agent, which is based on the WML user-agent, but extends its functionality that meets special requirements for telephony services. This functionality includes.

? WTAI : An interface toward a set of telephony-related functions in a mobile phone that can be invoked from WML and/or WMLScript. These functions include call management, handling of text messages, and phone book control. WTAI enables access to functions that are not suitable for allowing common access to them, e.g., setting up calls and manipulating the phone book without user acknowledgment.

? Repository: Since it is not feasible to retrieve content from a server every now and then, repository makes it possible to store WTA services in the device in order to enable access to them without accessing the network.

? Event handling: Typical events in a mobile network are incoming calls, call disconnect, and call answered. The event handling within WTA enables WTA services stored in the repository to be started in response to such events.

? WTA service indication: It is a content type that allows a user to be notifi ed about events of different kinds (e.g., new voice mails) and be given the possibility to start the appropriate service to handle the event. In the most basic form, the WTA service indication makes it possible to send a URL and a message to a wireless device.

The WTA framework relies on a dedicated WTA user-agent to carry out these functions. Only trusted content providers should be able to make content available to the WTA user-agent. Thus, it must be possible to distinguish between servers that are allowed to supply the user agent with services containing these functions and those who are not. To accomplish this, the WTA user-agent retrieves its services from the WTA domain, which, in contrast to the Internet, is controlled by the network operator. WTA services and other services are separated from each other using WTA access control based on port numbers.

Source of Information : Elsevier Wireless Networking Complete 2010

Top Security Systems And Gadgets You Should Consider Using For Your Home And Business


Being vulnerable to all sorts of crimes can be very scary. But if you are one step ahead of these crimes, you can lead a normal life without having to look back at your shoulder every now and then. With the help of advanced security systems, keeping your home and business establishments is now easier. You can rest assured that your home as well as your business is safe by using reliable security systems.

Top Surveillance Systems And Gadgets

CCTV Monitors

CCTV Monitor or Closed Circuit Television Monitors has been around for quite some time. Take advantage of modern digital surveillance systems to prevent crimes. Basically surveillance monitors are comprised of hardware and software. The hardware will collect information and transfer that information to fiber optic lines that lead to control rooms. These control rooms are manned by security professionals.

There are various types of closed circuit television. There are compact cameras that work better for small business establishments and homes. It is better to use direction-controlled models because they work better under dark lighting and they have broader surveillance range.

Look for a closed circuit television provider to understand the type of surveillance camera that will work better for your needs.

CCTV DVR

CCTV with DVR systems became more popular in the mid 90's. Today, the CCTV with DVR technology is already computer-based. DVR or Digital Video Recorder is hooked up to the CCTV and allows the users to record images at a higher resolution. When you need to look at previously captured images, you can use the DVR without interrupting its recording cycle.

It also shows the time and date the images are captured so investigation is easier. Most business and home owners prefer using CCTV with DVR because of the additional security that it brings to the table.

IP Cameras

IP Cameras or Internet Protocol cameras are a kind of CCTV camera that makes use of the internet or a computer network to send and receive data. This is one of the most beneficial surveillance systems today because of its ability to transmit Pan, Tilt and Zoom commands using a single network cable. Even if you are away from your home or from your store, you can still check out the security around that area by using a secure network. This system allows remote accessibility.

This kind of system is more ideal for larger homes and establishments. Instead of installing CCTV to the various areas of the building or the house, install IP cameras instead to cut down on costs. Managing these cameras is also easier.

Hidden Cameras

Hidden CCTV systems are surveillance cameras in disguise. They might look like random things such as clocks, smoke detectors, cellular phones, speakers, thermostats, binders or boxes but they are actually hidden cameras designed to capture images. A lot of manufacturers create small and undetectable hidden cameras.

Infrared Business Cameras

These are more ideal for business establishments that operate at night, especially those that have low lighting conditions such as clubs and bars. What makes this different is that they have their own invisible infrared light. They can work at night and during the day. They can also be used for parking lots.

Hybrid Digital Video Recorders

They are not your average DVR systems. The Hybrid ones are more functional because they offer more advanced video management and data integration. They already have their own processors so they can record data like a computer. They can also work in networking CCTV cameras so you can cut the cost of purchasing IP cameras. Some brands incorporate Core 2 Duo micro processors. They are also more ideal when it comes to recording images. Some can record up to 480 images per second. These are more expensive but they work great for larger business establishments and public infrastructure such as banks, corporate establishments and schools.

Many people refuse to part with their hard-earned money to purchase modern security systems. But there is no price to you and your family's security. Installing CCTV DVR and CCTV monitors alone can significantly lessen the likelihood of crimes.




Iain Jenkins writes articles for CCTV Direct who provide security systems to businesses and private customers. Their CCTV DVR products are reliable and offer excellent value for money. In addition, customers can purchase CCTV monitors for direct surveillance.




What Exactly is Internet Security?


The risks of conducting online transactions are not new to both common Internet users and online corporations alike. However, not all are equipped with the knowledge and resources to protect themselves from those risks. Internet security then has been a top priority of the I.T. industry and many programs and applications are being developed to ensure this. But what exactly does Internet security protect one from?
The following are challenges that Internet security strives to address.

1. To filter or remove inappropriate or profane materials such as pornography, racial intolerance and copyright infringed materials.

Since the Internet is user-oriented, most of the information that go through it are unfiltered. Commonly, a lot of these information may include inappropriate material which are not conducive for the workplace, classroom or home. More importantly, for minors, they might be exposed to information that will compromise their safety, their morality and etc. Pornography especially, may stir the loss of productivity among employees and it may even lead to the possibility of sexual harassment cases due to provocation by the material.

2. To protect from hackers and Identity thieves

Hackers can get valuable information through almost any means. The danger of these thefts not only compromises the user's confidential information, often times, it compromises their lives as well. Take Identity theft for example. Once user's identities have been stolen online, it may be hard for them to apply for loans, scholarships, credit grants and etc. A company's success may also be compromised once hackers steal information from its private network. It may result to financial loss.

3. To protect against viruses, spyware, adware and other types of malware that may compromise user information security

Viruses are a type of malware that invade one's computer system and duplicates itself within it. They are destructive especially to the user's files and they're typically used by hackers to steal information from a computer. Viruses are usually embedded in emails or websites. They are currently the greatest threat to Internet Security because of its evasiveness and it is currently on the rise.

4. Protection from DoS (Denial of Service Attacks).

Denial of Service Attacks or DoS, are made to deny access to a networked resource. DoS usually crash servers by engulfing the network with ample traffic that degrades service. These DoS attacks prevent a network from performing normal activity efficiently. They make productivity almost impossible by continuously overriding the networks.

5. Protection from active content, such as ActiveX and Java.

ActiveX, a programming language that embeds small programs in web pages, are typically not considered secure to allow into a network. This is because it paves the way for malicious programmers to write controls that may compromise user information security like deletion of files or obtaining of files. Java is another program that embeds small programs, called applets, in web pages. It usually is considered safer than ActiveX but nevertheless, it is best filtered out for more security and because there have been many instances of bugs in these safety mechanisms.




Tina L. Douglas is a skilled writer from California. With numerous experiences in the field of writing for several financial institutions, she is greatly qualified across a variety of economic issues. Her notable pieces of writing involve internet security software.




Computer Security


Computer Security is a branch of technology known as information security as applied to computers. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system

Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do.

Typical approaches to improving computer security can include the following:

o Physically limit access to computers to only those who will not compromise security.

o Hardware mechanisms that impose rules on computer programs, thus avoiding depending on computer programs for computer security.

o Operating system mechanisms that impose rules on programs to avoid trusting computer programs.

o Programming strategies to make computer programs dependable and resist subversion.

Computer Security has three Layers:

o Hacking

o Cracking

o Phreaking

Hacking:

Unauthorized use or attempts to circumvent or bypass the security mechanisms of an information system or network.

Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal.

Cracking:

The act of breaking into a computer system.

Software Cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware.

The most common software crack is the modification of an application's binary to cause or prevent a specific key branch in the program's execution.

Phreaking:

The art and science of cracking the phone network.

Security by design:

The technologies of computer security are based on logic. There is no universal standard notion of what secure behavior is. "Security" is a concept that is unique to each situation. Security is extraneous to the function of a computer application, rather than ancillary to it, thus security necessarily imposes restrictions on the application's behavior.

There are several approaches to security in computing; sometimes a combination of approaches is valid:

1. Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity).

2. Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example).

3. Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity).

4. Trust no software but enforce a security policy with trustworthy mechanisms.

12 tips for computer security:

1. Update / patch ALL your software every now and then!

2. Check / adjust ALL your settings so they are safe, since they ARENT by default!

3. Use firewall, like ZoneAlarm to control what goes in and out from your computer!

4. Use good passwords: at least 13marks long, containing both letters and numbers. Remember to change your password every few months atleast and dont ever use the same password in two places!

5. Get a good antivirus program: NOD32, F-Secure or Norton Antivirus and keep it updated!

6. Don't open or execute files that you are not 100% sure are absolutely safe nomatter where or how you get them.

7. Wipe your historyfiles (like cookies, internet history and temporary files, etc.), logs and personal files, with specific wiping program (like Eraser) instead of just deleting them.

8. Use encryption to enhance your privacy! Use encrypted email (like Hushmail or Ziplip), www-surfing and encrypt sensitive files on your computer (PGP).

9. When you are finished using some internet-based service like email, sign out of it rather than just closing your browser! Also, when you leave your computer, make sure that none of such programs or connections are left open that someone could abuse. In WindowsNT/2k/XP, press Windowskey+L to lock the workstation.

10. Don't use public computers for anything you need to type in your logins, they usually have Trojan horses that capture your passwords.

11. Make backups and store them in safe place! Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location, but floppies will usually be just fine for storing documents, etc.

12. Install and Use a Hardware Firewal




Regards,
Kethy Wright
http://www.perceptionsystem.com

Kethy Wright is having a good Skill in Computer Hardware & Computer Security Systems. Know about for your Computer Security from his knowledge here.




How a Network Security Company Can Help Businesses


The modernization of technology has provided companies all over the world with information and communication solutions that has changed the way businesses operate. However, along with the conveniences offered by modern technology comes a whole host of security threats that all companies should learn to address. This is why looking for practical and reliable network security solutions is very important.

Network security covers all the measures and requirements that a company or organization needs to protect the network, computer systems as well as all the resources which are network accessible. Through securing your company's network, your data, programs and IT infrastructure would be protected from unauthorized entry and any malicious activity. You would also be able to regularly monitor and measure the effectiveness of your company's network.

Today, companies can easily hire a security company that would be able to provide them with all the services that they need. Among the things that security companies offer include the protection of the valuable information assets, the provision of data availability and the preservation of the privacy of clients, employees and suppliers.

There are several stages which most security companies follow in order to create a structured security system for a business or organization. One would be the definition of the environment and the assets. This would include the organization as well as its interactions its clients, partners, suppliers and customers. It also covers the process of information valuation. It is important to cover this stage as establishing the value of your assets would be the best way to determine the appropriate cost of a network security plan.

The second stage would be the analysis of security risks. This includes the evaluation of the types of threats that your company or organization is most vulnerable to. These threats would include those which are accidental and intentional as well as those which are natural and man-made. Some of the possible effects of threats to your company's information assets would include copying, modification, destruction and unauthorized disclosure.

In order to come up with a solid security approach for your company, a security solutions provider would also be evaluating several factors and aspects that your company may or may not already have. This would include procedural security, personnel security, physical security, disaster recovery plan, environmental security, media security, hardware and software security and system security. Once they have a good idea how your business operates, they would be able to set up a suitable network security system.




If you liked this article, you should read Network Security Company and Computer Security Companies.




WAP Architecture - Wireless Application Environment

The uppermost layer in the WAP stack, the wireless application environment (WAE), is a general-purpose application environment based on a combination of WWW and mobile telephony technologies. The primary objective of the WAE is to establish an interoperable environment that allows operators and service providers to build applications and services that can reach a wide variety of different wireless platforms in an effi cient and useful manner. Various components of the WAE are:

? Addressing model: WAP uses the same addressing model as the one used on the Internet (i.e., URL). A URL uniquely identifi es a resource on a server that can be retrieved using well-known protocols. WAP also uses Uniform Resource Identifiers (URI). A URI is used for addressing resources that are not necessarily accessed using known protocols. An example of using a URI is local access to a wireless device�s telephony functions.

? WML: It is WAP�s analogy to HTML and is based on XML. It is WAP�s answer to problems such as creating services that fi t on small hand-held devices, low bandwidth wireless bearers, etc. WML uses a deck/card metaphor to specify a service. A card
is typically a unit of interaction with the user (i.e., either presentation of information or request for information from the user). A collection of cards is called a deck, which usually constitutes a service. This approach ensures that a suitable amount of information is displayed to the user simultaneously since interpage navigation can be avoided to the maximum possible extent. Key features of WML include variables, text formatting features, support for images, support for soft-buttons, navigation control, control of browser history, support for event handling (e.g., telephony services) and different types of user interactions (e.g., selection lists and input fields). One of the key advantages of WML is that it can be binary encoded by the WAP Gateway/Proxy in order to save bandwidth in the wireless domain.

? WMLScript: It is used for enhancing services written in WML. WMLScript can be used for validation of user input. Since WML does not provide any mechanisms for achieving this, a round trip to the server would be needed in order to determine whether user input is valid if scripting was not available. Access to local functions in a wireless device is another area in which WMLScript is used (e.g., access to telephony related functions). WMLScript libraries contain functions that extend the basic WMLScript functionality. This provides a means for future expansion of functions without having to change the core of WMLScript. Just as with WML, WMLScript can be binary encoded by the WAP Gateway/Proxy in order to minimize the amount of data sent over the air.

Source of Information : Elsevier Wireless Networking Complete 2010

E-Mail Security - Getting the Basics Right


Most of us consider email an essential part of life these days. Unfortunately this popularity has led to an increase in viruses and fraud and it's important that you learn to protect yourself from these kinds of threats before it's too late.

Viruses

You should always be careful when opening an attachment from anyone, even someone you know well. Email viruses often arrive as part of an email attachment; they infiltrate address books and send infected e-mail to everyone in your address book so it's possible for you to receive a virus from a colleague or friend and it's possible for them to receive a virus from you.

Ideally, if you know you'll be sending attachments you should let the person know that you're sending an attachment so they know that it is safe to open as well. It's ideal if your contacts can return this favor too so everyone knows what's going on.

If you're concerned about email viruses the best thing you can do is to add anti-virus software to your computer (you should have this already in reality). The software scans every e-mail that you receive. This is especially relevant if you work in an environment where the computers are networked because of the viruses downloaded onto one computer it can infect the entire network and cause a massive amount of damage.

Phishing

Another popular security risk also arrives via email. This one is called 'phishing' and tricks the recipient into disclosing personal information and passwords. These e-mails often use the logos of a financial institution, online retailers and others to trick you into believing that the e-mail is real.

When you receive one of these phishing e-mails you will usually be told that the financial institution or other company needs a password or financial information from you. You'll be asked to click on a link in the e-mail which will send you to a third-party site and you will be asked to input your credit card information, PIN or your password information.

To determine if an e-mail is a phishing e-mail you can look at the text that comes along with the e-mail you receive. You will not be addressed by name but rather as a 'valued customer' or 'friend' - this should set off alarms straight away.

Another tipoff is you'll find a link that doesn't correspond to the text describing it. For example, if you check the status bar when you highlight the link the text might say something like Microsoft but the URL will be something completely different such as .don't go here.com.

There are specialized software programs that can detect phishing but they're not always as accurate as you would like them to be. The best solution for this is to simply be on your guard, not click on any links that look suspicious and certainly not give any personal information such as passwords or credit card information. If you really believe that the e-mail is on the up and up you can call the company and provide information that way.

Back up your email

Just like any other data, email should be backed up, on a regular basis. It can be easily done by exporting messages to a folder and backing up the folder with a backup program. The data will be backed up onto a removable disk, a writable DVD or CD or other kind of backup media.

If you want more assurance, you can purchase a backup e-mail program that will eliminate you having to do all the backing up yourself.




Are you worried sick about the threats that are out there waiting to harm your computer and your private information? You should be worried! A single virus can cause mayhem on your computer and destroy years of work or memories. Learn how to protect your PC with computer security programs that will let you surf and enjoy your computer time in peace. Click on over to http://www.CPUSecurity.com for more information.




Computer Engineering Vs Computer Science


Computer engineering, as the name suggests, is related to the engineering of your system hardware. It includes the designing of computer hardware and devices. It is derived from the science of computing such that it is the practical application of the computing science principles.It also includes some principles of electrical engineering. In short this engineering is based on the laws of computer science, electrical engineering, mathematics and physics.

The main subjects dealt in this engineering includes display engineering, multimedia computations, image and speech processing, networking, pattern recognition, computer perception and sensors, VLSI systems, robotics, computer architecture etc.

Display engineering deals with the display mechanisms of a system. Multimedia computing include the handling of all kinds of data like the textual data, sounds, voice or audio, still images, animated images, video and more. It involves encryption, coding and decoding etc. Image and speech processing methods are used to deal with the processing of multimedia in a secure way. Networking of computers is a vast field that takes care of all the networking operations such as assembling network units, establishing connections, configuring them, initiating communication and data transfer and so on. It also handles designing and implementation of vast distributed computing networks that includes LAN, MAN and WAN. Pattern recognition and computer sensors are used for information security. Robotics is a practical application of artificial intelligence. Very Large Scale Integrated systems are a study to design microelectronic devices. Architectures from these take care of the designing of hardware and software for optimal results.

Continuing with our computer engineering vs computer science, we are now going to move on to the science, which on the other hand is the study of methods, principles and laws for handling of information. It also lays the theories for designing and implementing them. The science subject leads to the subject of engineering.

The main subjects that come under computer science are artificial intelligence, computer architecture, software systems, numerical methods, algorithms, theory of computations, computer graphics, networking protocols, databases, operating systems, simulation and modeling, parallel computations and software engineering.

Artificial intelligence is an area that is concerned with the intelligent behavior in machines or software. Computer architecture explains the science behind the designing and construction of computer hardware and software for effective and efficient working. Software systems deal with programming languages, programming environments, operating systems, interpreters, compilers etc. Algorithms and theory of computations are used to develop programs that produce effective, efficient and optimal results and solve the computer problems. To conclude, we can say that the computer science is a subject that is mostly studied by scientists while on the other hand, computer engineering is a subject that is studied by the engineers.




Computer Engineering vs Computer Science is a really important area that requires a lot of attention to its details. So what ever attention you are after, make sure to take your time as much as possible. If for some reason you find that you personal computer is running freezing up or running slow, check out these great tips which will help you solve a very simple question: Why does my computer keep freezing up or running slow?

I started writing when I was about 12 years old, on my little journals, after so many years I still enjoy writing about all sorts of topics, related to computers, games, internet, IT, animals and many others. Writing is something I have great passion on doing it. The era of technology came by to make it more simple and more easy to get my writings done faster and looking way better as well. I hope you have enjoyed the above article as much as I did writing it.




Keep the Crooks Out of Your Computer! How to Protect Yourself From Online Crime


You'd never ask a convicted burglar to watch your house while you're away, and you'd never ask a known criminal to babysit your kids, right? So why, then, are you allowing identity thieves into your computer, giving them access to all your personal and financial information, right now - possibly even while you're reading these words?

"But wait a minute," you may be thinking. "My computer is perfectly safe and protected. I installed an anti-virus program two - maybe three - years ago."

Okay, let's assume your computer is protected at some level. How do you think your internet and computer protection ranks against such companies as Microsoft, Network Solutions, or even the U.S. Department of Defense - Department of Homeland Security? If you think they have better protection than you, which they obviously should, then you'll be disheartened to know that each of them had their network hacked in 2009, potentially exposing hundreds of thousands of people's personal information to identity thieves.

And these companies aren't alone. In 2009, hundreds of companies, from small hospitals to big corporations to top secret government agencies, have had their computers compromised. From January 2009 through November 2009, over 13.7 million Americans fell victim to identity thieves, resulting in financial losses totaling upwards of $50 billion.

To put it in a clearer perspective, approximately 7% of all adults have had their identities misused in 2009, with each instance resulting in approximately $3,500 in losses. Additionally, close to 100 million Americans have their personal identifying information placed at risk of identity theft each year when records maintained in government, corporate, and home computers and networks are lost or stolen. These alarming statistics show that identity theft may be the most frequent, costly, and pervasive crime in the United States.

One victim, Suzanne in San Diego, spent 600 hours and nearly $6,000 trying to clear her name when identity thieves stole her information from CitiBank and racked up thousands of dollars in fraudulent charges. But don't fool yourself into thinking that online thieves only go after big companies. The fact is that the favorite targets of online criminals are home and home office computers. Why? Two reasons: 1) These computers are usually not as protected as computers at big companies, and 2) These computers are often connected by broadband to the Internet - since the connection is always open, there is more opportunity to locate these computers with scanners and then break in.

So beware...YOU could be the next victim!

You Can Lower Your Risk of ID Theft

Fortunately, there are simple steps you can take at home, right now, to keep your computer safe and protect your personal information. Each of the following tips are super easy to do and very inexpensive (most are even free). Yet they can save you both time and money, and give you the peace of mind knowing your computer is safe and your personal information is protected.

o Install an anti-virus program. One of the key components to online safety is to have an anti-virus package. Even better is to get a suite that has anti-virus, anti-spyware, and a personal firewall. This way all the programs work together and don't interfere with each other. Regardless of which program you choose, it's best to purchase it from a traditional store or name-brand online retailer you trust rather than download the program from just any "discount" online store. Why? Because when you go to a website to download a program, you never know what you're really getting. There have been instances where people paid money for a downloadable anti-virus program, but what they really paid for was a program filled with viruses. So unless you're on the website of a well-known anti-virus company (and you're 100% certain it's their real site, not a site a criminal has mimicked), get the program at your local office supply store and install it from the disc in the box.

But simply installing the software isn't enough. You also want to go into the "Settings" tab of your program and make sure updates happen on a regular basis. This ensures your version of the product is the most up-to-date. Additionally, make sure scans are actually happening. You can set the scans to be done automatically at a certain time (highly recommended), or you can opt to manually initiate the scans.

o Update your applications. Identity thieves have learned that many people are getting better at downloading patches for their operating systems; however, they also know that most people don't patch their applications (their individual programs). As a result, ID thieves are attacking individual applications to get access to your computer. Some common applications that are being attacked include Adobe Acrobat Reader, Adobe Flash Player, Apple QuickTime, Internet Browsers such as Firefox, Safari, and Internet Explorer, and many other applications you likely use every day.

Fortunately, many companies are releasing security patches for their applications on a regular basis. So you can go to each company's site directly and look for patches yourself. Another option is a program at www.secunia.com, which offers a software inspector for home users. You can do a scan online and they'll give you a list of the applications on your computer that are not secure. Then they will help you take the necessary steps to enhance your security. No matter how you choose to update your applications, the key is to do it.

o Use a firewall. Many home modems and routers have firewalls in them. Unfortunately, some of the best features of those firewalls are often turned off. You'll likely need an IT professional to help you determine the right settings for you. However, the good news is that something called Network Address Translation, or NAT, is usually automatically turned on and it basically hides the addresses of your devices from the outside world.

Realize that firewalls are often like Swiss cheese. They have to allow some information in and out of your computer; otherwise, you wouldn't be able to access the internet or your email. The challenge for your firewall is determining which information is okay to go in and out. This also means that if a friend or family member is in your house and installs something on your computer with a CD-ROM or DVD, your firewall has no chance of detecting that intrusion because that's not what it's designed for. So you can't just say that you have a firewall and trust it to catch everything.

If you have a small business or if you do stock trading or banking online, you may want to augment the simple firewall that comes in your device with an additional firewall you can purchase, which is much more robust. These devices have extra tools in them that allow the firewall to do its job better. You can also use a program running on your computer, called a software firewall. An example would be the firewall that comes with your operating system or one that comes with an anti-virus package suite. Whatever additional firewall protection you give yourself, the harder you make it for identity thieves to get in and steal your data.

Stay Safe Today

Just as you lock your car when it's parked and you secure your home when you leave for the day, you need to proactively protect your computer. The good news is that staying safe online can be just as simple and second nature as protecting everything else in your life. Start with these three easy solutions. Once you're done, you can move on to other aspects of computer and online safety found in the short and simple videos at www.learntobesafeonline.com. By doing so, you can keep yourself from being the next identity theft victim and save yourself a lot of frustration and thousands of dollars. The choice is yours: do nothing and be a victim, or take action now and reduce your risk. Which do you choose?




Go to http://www.learntobesafeonline.com/ to view free and informative videos on how to protect yourself from online fraud, cyber attacks, phishing schemes, identity theft, and much more. Since we all use the Internet, shouldn't it be a safe place to work, learn, and play? Mike Foster is recognized by many as America's IT Security Specialist and is committed to helping people stay safe online.




Defining Good Internet Security


There have always been debates as to how much Computer Security is actually needed these days. The debate rages on not just with professionals but those who use their computers mostly from the home as well. While there will probably never be a distinct answer as to how much is actually needed the answer is always going to be different depending on how a computer and network are used as well as what type of data they store and even the type of applications used within those machines. Those using home desktops and laptops will generally require far less Internet Security than those running a business. An individual browsing the internet and checking his/her email don't need as comprehensive security because they don't attract much attention to themselves. Sure they are faced with threats such as zero day attacks and even identity theft but to a far lesser extent that say a business who's network houses thousands of clients personal banking information and contact information. Therefore the average home user can get away with simple set of PC Security tools that simply scan for and eliminate threats when found. Business operators however will need a tremendous amount of security as threats are greater simply because of the high profile nature of business and the amount of critical data being stored.

Business owners and operators will typically need not just the ability to scan and eliminate threats from their networks and individual PC's but will also need comprehensive Endpoint Security that offers dependable protection against attacks. A business needs to invest in a solution that can manage Vulnerability Management on it's own so that unidentified threats are marked as such and eliminated well before they can infect your network. This type of intrusion prevention can save you time and recourses your business may not have so it's smart to look for applications that deliver these things.

Getting back to home and casual PC users, generally speaking these people should strive to find a program that provide antivirus and antispyware support which is usually all the Desktop Security one would need in the home, provided of course that computer isn't housing private or important data. Many casual users, having a lack of such knowledge end up with a purchase that provides to much or to little protection. Casual users beware. Don't get caught up in the scare tactics some companies use to oversell you. Yes threats are out there and yes no one is immune from them but the majority of attacks and theft occur at the business level so as long as the program you invest in delivers both the ability to detect and remove all threats and is easily updated you have little to worry about.

The next logical step in any debate regarding PC Protection is going to be which vendor to give your business to. Having worked with computers for over thirteen years I can tell you that there companies that provide solutions to just home users as well as companies that create their products solely for those in business and/or individuals with a background in computer technology. There are also those companies that create programs that can be applied to either scenario. So which one do you give your business too?

A number of factors are going to come into play when making this decision. The first thing any individual or business should do is consider what others have to say about the vendor and the application you're interested in. Also take into consideration what the nature of reviews have been regarding this product. Next pricing and budget are going to play a large role. Those worried that cheaper means a product of lesser quality, think again. Several companies offer Free Antivirus Software downloads so that you can take their product for test run and in some cases will allow you to use the limited free version for as long as you like. Of course these all come with the ability to upgrade to the full paid version at any time. If it works well and fits your PC Security Software needs then by all means use the free version. Once the monetary aspect of your investment has been settled one should begin comparing cost vs. product and determine if what you're getting is worth the cost. In many cases a business or even individual will purchases one application only to find that another is required to deliver "complete" security. The best programs will deliver everything in one application thus saving you time and money which essentially is what all businesses want to do.




So now you have to ask yourself which program and vendor are right for me? I personally rely on vendors that aren't as big as some of the others. Take eEye for example. They are a large company yes, but as they're not the biggest name in PC Security yet, they have more to prove and work harder to ensure you keep your business with them.

Scott is an avid computer and technical enthusiast. http://www.eeye.com




A Computer Security Geek Goes to Las Vegas


Las Vegas:

An IS Perspective on New Slot Machines

A recent trip to Las Vegas prompted an "aha moment". After I got over the initial shock of how much things have changed since the days when I used to frequently travel to Vegas (I was one of those thousands who used to regularly attend the COMDEX show), I ventured back onto the gaming floor. Aside from having a lot more poker tables than I remember from 8 years ago, the thing that struck me was that the slot machines changed. Where once the gaming floors were full of the "jing, jing, jing" of coins hitting the metal trays of the slot machines, there are now magnetic card readers, bar code scanners and separate machines that convert bills into "credits" and back again. Money gets converted to digital bits, printed on bar-coded cards that players plug into slot machines and "all payouts are by cash out slips only". The Gaming Industry has gone high tech and like all firms that have valuable information resources, they need to protect them. Imagine for a moment being able to "sniff" the traffic on the wire between the gaming floor and the casino's data center! As a matter of fact, I was so interested in the new style of slot machine that I devoted the better part of an afternoon to researching "Server Based Gaming".

It turns out that Server Based Gaming (SBG) is the newest trend in slot machines and isn't as new as I thought, having been around since 2006. If your mind is like mine, you are already thinking about the security implications of turning stand alone, totally autonomous slot machines into computer terminals. Of course the stand alone slots were not without problems but digitizing financial data and sending it zipping across a network has a unique set of concerns that any financial institution will attest to. Storing data on a centralized server is Security Best Practice 101 and few could argue against the wisdom of it. However, the issue becomes more complicated when we consider that a casino has hundreds, perhaps even a thousand, slot machines scattered across hundreds of thousands of square feet of floor space. Initial security concerns regard the data transmission: what type of cable is used (fiber is the most secure but also most expensive and requires special networking equipment); are the machines themselves even wired to accept fiber or are the connections Cat 5; is each machine "home runned" or are they consolidated at a switch located in one of those locked cabinets under the slot machines; if Cat 5 cable is used, what preventive measures are in place to prevent someone from "sniffing" the electronic data leakage from the wire; since players are issued a "cash out card" with a bar code on it, what encryption algorithms are used to prevent gamers from altering the data to increase their "payout"? The Gaming Industry has a long history of attracting very clever criminals (remember the students from MIT who won $10M?). I wonder how long before a similar group of intellectually gifted and monetarily motivated individuals focuses on SBG. In fact, a recent study sponsored by the National Indian Gaming Commission (NIGC) has identified several areas of concern for SBG .

The NIGC findings sound hauntingly familiar to all those security professionals charged with protecting enterprise data resources. Concerns about unauthorized access, intrusion detection, incident response, lack of security policies and a disaster recovery plan are common in all Information Security environments. What proactive measures are being taken to protect the network? Are internally sponsored Penetration Tests performed? The challenge of protecting hundreds or thousands of computer assets, insuring the Availability of the asset and guarding the Integrity of the data from these assets is likewise an everyday worry for CISO's. What makes the Gaming Industry different is that if any one of these assets is compromised, the financial loss could be in the millions of dollars, and the likelihood is that an attack will not target only one machine. And unlike any casino scam of the past, with data now being stored electronically, the attacker(s) does not have to physically be present. Casinos are now subject to the same risks as financial institutions.

Allow yourself to imagine an "Oceans 131/2" scenario. The progressive slot machine jackpot is at $14M. A disgruntled technician at the slot machine manufacturer maintains a "backdoor" to the SBG slots to save the drive time and the long walk through the casino to a particular machine. An accomplice is in place spinning the wheels and losing dollar after dollar at the progressive slot. At a specified moment, the technician pushes an unauthorized "software update" to the slot which alters the cash out ticket software. The accomplice now cashes out and receives an altered ticket which shows $10,000 not $10. The technician then replaces the original software and the scam moves to another slot, another casino, another city. With only about 6 slot machine manufacturers in the US, the possibility of "disgruntled employee" abuse is very high. While this scenario may seem farfetched, the notion of 6 college students beating Las Vegas casinos for $10M over a 10 year period also seemed too incredible to believe. Until it happened.

But more likely and much less "Hollywood-esque" would be the same type of security breach that happens at alarming levels in regular industry. A group of hackers finds an interesting IP address and begins exploring. Perhaps the IP address belongs to the slot machine manufacturer which allows them entry to the manufacturer's LAN. Or perhaps the IP address belongs to a slot machine itself. Or imagine if the IP belonged to the server which houses the information for all the SBG machines in the casino. Mother lode! In addition to a treasure trove of information contained within the gaming network segment, could the attackers connect to the hotel and food service segments of the casino's infrastructure? If so they would have access to reams of PII data as credit card data. As every fan of gaming knows, "whales" are the life blood of casinos and these multi-billionaires have credit cards with astronomically high spending limits (an American Express black card is truly wondrous to see). A data compromise of this scale would be a catastrophe for a gaming facility.

Defending such a unique infrastructure presents a daunting task. Corporate resources need to be allocated, policies need to be written and implemented in an area that previously did not require them, and employees need to be educated about the new threats. Perhaps most important is to maintain background checks on employees (both in the casino itself as well as for third parties) who have access to the servers and the SBG machines. And these risks are in addition to the "normal, everyday" risks of running a data center where millions of dollars routinely fly across network cables. The Information Security Professionals for Las Vegas casinos definitely have their hands full.




Chaz Sowers is a security consultant currently on assignment with Infotech Consulting. In addition to regular computer security duties, recent activities have included Incident Response at a major government defense contractor as well as work in the Gaming Industry. Security frameworks and security architecture continue to be areas of interest. Mr. Sowers holds the certifications of: CISSP, CISM and QSA.




Network Management Strategy


Those in network management function as security, monitoring, control, allocation, deployment, coordination and planning personnel for a businesses network. Network management therefore describes the act of managing all of those roles. There are lot of protocols that exist for the operation of network management and its support including programs such as CMIP, Common Information Model, Java Management Extensions, Netconf, SNMP, Transaction Language 1 and WBEM.

The most important area of network marketing is routing. Routing is the process in which people select a path within a computer network that will be used to send data back and forth between computers. This area of network management focuses on using nodes, or more often they are referred to as routers, to pass logically addressed packets of information from their source to their destination in a process called forwarding. This is typically done through the use of routing tables which keep up a record of the most efficient routes on which to transfer the information.

Another key aspect of network management is security management. The goal of security management is to protect the network from unauthorized access which includes all of the networks sub-functions including the authorization of subscriber access, the distribution of security related events, control of distributing cryptographic keying material and the reporting of security related events.

Both the security and quality aspects of network management are related to configuration management. This is the department that manages security features in a specific business network by controlling any and all changes that are to be made to the software, hardware, firmware, documentation and test features within the businesses system. As the companies network system changes and grows the configuration management team keeps the system under control and is responsible for maintaining both security and quality.

Then there are two main areas of the software configuration management. The first area focuses on storing entities from the software development project, sometimes referred to as the component repository management. The other area is known as engineering support and is focused on producing these entities.

In order to have a successful network management team there also need to be an accounting management. This team focuses on the financial status of the business network by controlling and reporting its functions. Accounting management accomplishes this by doing analysis, planning and controlling the financial data and reporting any managerial decisions. Those involved in accounting management will work with bank account maintenance, developing financial statements and analyzing the businesses cash flow and financial health.




Jen Carter is team member and writes regularly about computer network consulting, network security and LAN Consulting




How Laptop Security Software Can Protect You From Computer Identity Theft


Computer identity theft is increasingly common.

Computer identity theft is what happens if someone gets access to your personal information, such as your social security number, credit card number, driver's license number and passports without your knowledge by accessing the information on your computer. Often this information is from your laptop computer that has been stolen.

How common is it for laptop computers to be stolen?

It is estimated that more than 500,000 laptops are stolen annually in the United States alone and the number continues to rise. This is a staggering amount of laptops that are on the streets and in the hands of people that may want to steal your personal information. Stolen laptop computers are a very common event which is why the police find it difficult to have the time to assist with the recovery of the laptop let alone deal with the criminal access of your personal information. Laptop security software is a common sense practical solution to prevent computer identity theft.

How secure is the information your laptop computer?

Your laptop is usually your link to the cyber world. It connects you to many business and social networking sites as well as allowing you to order items online. It is now normal to send private information across the internet. It has become a normal part of the world that we live in. What would happen if your laptop was stolen? You may not only lose personal and commercial information stored on your computer, but also the thief would have access to your personal identification details which could mean that the thief could steal your identity. Thieves use this information to carry out illegal transactions purporting to be made by you. Preventing this occurring can save you a lot of money, time and inconvenience.

Top 10 reasons for using laptop security software for protection from computer identity theft.

1. The number of laptops being stolen along is constantly increasing and the chance that your laptop computer will be stolen is constantly rising.

2. Laptop security software helps prevent you from being the victim of computer identity theft.

3. It helps you protect your personal information and keep it secure even in the event of computer theft as you can remotely retrieve files from your laptop and delete them.

4. When you remotely delete files they are deleted to a high forensic standard that prevents them being recovered by computer hackers thereby not only protecting your personal information, but also commercially sensitive information.

5. With one remote command you can render the stolen laptop unusable if you wish.

6. It allows you to access files on the stolen computer without the thief being aware that it is occurring. The laptop security software can record all activity that occurs thereby allowing you to backtrack any unauthorized activity that occurs.

7. Provided you purchase the best laptop security software it allows you to geo locate the stolen laptop to within 60 feet of its location to assist with recovery.

8. If you have valuable business information on your laptop computer laptop security software is a cheap method of insurance.

9. If you are a professional or business person your laptop computer may not only have business information in its files, but confidential personal information of your clients that could be accessed and misused.

10. Protecting yourself from being sued for negligence for not taking reasonable risk management steps to your protect clients' personal information from identity theft is a clear benefit.

What you want from laptop computer software:

The following features and benefits of laptop computer software are essential:

* Invisible internet access to your stolen laptop.

* The ability to remotely access your files on your stolen computer from another computer to delete the files or retrieve them and then delete them.

* To have a Geo locate feature which you can use to locate where your laptop is which allows you to alert the authorities to recover your stolen property.

* Monitor and record what the thief is doing because this not only helps law enforcement officials recover your stolen computer, but also allows you to undo any damage they may have already been done.

* To render your stolen laptop unusable remotely once you realize that it has been stolen.

Read the Resource Box to discover how to the find the recommended solution to help prevent computer identity theft.




Jack Taggerty is a freelance author who owns a number of websites and blogs and knows that the security of your personal information and that of clients is essential to prevent computer identity theft. Follow this link to read his recommendations to help prevent it: http://www.identity-theft-scout.com/laptop-security.html




Introduction to Wireless Application Protocol


WAP has become the de facto global industry standard for providing data to wireless hand-held mobile devices [4 � 10] . WAP takes a client/server approach and incorporates
a relatively simple microbrowser into the mobile phone, requiring only limited resources
on mobile phones. WAP puts the intelligence in the WAP Gateways while adding just
a microbrowser to the mobile phones themselves. Microbrowser-based services and
applications reside temporarily on servers, not permanently in phones. The WAP is aimed
at turning mass-market phones into a network-based smart phone. The philosophy behind
WAP�s approach is to use as few resources as possible on the hand-held device and compensate for the constraints of the device by enriching the functionality of the network.
WAP specifi es a thin-client microbrowser using a new standard called wireless markup
language ( WML ) that is optimized for wireless hand-held mobile devices. WML is a stripped down version of HTML.

WAP specifies a proxy server that acts as a gateway between the wireless network and the wire line Internet, providing protocol translation and optimizing data transfer for the wireless handset. WAP also specifies a computer-telephony integration application programming interface ( API ), called wireless telephony application interface ( WTAI ), between data and voice. This enables applications to take full advantage of the fact that this wireless mobile device is most often a phone and a mobile user�s constant companion. On-board memory on a WAP phone can be used for off-line content, enhanced address books, bookmarks, and text input methods.

The importance of WAP can be found in the fact that it provides an evolutionary path for application developers and network operators to offer their services on different network
types, bearers, and terminal capabilities. The design of the WAP standard separates the
application elements from the bearer being used. This helps in the migration of some
applications from short message service (SMS) or circuit-switched (CS) data to general
packet radio service (GPRS), for example. WAP 1.0 was optimized for early WAP-phones.

The WAP cascading style sheet (WAP CSS) is the mobile version of a cascading style sheet. It is a subset of CSS2 (the cascading style sheet language of the WWW) plus some
WAP-specific extensions. CSS2 features and properties that are not useful for mobile Internet applications are not included in WAP CSS. WAP CSS is the companion of XHTML Mobile Profi le (XHTML MP). Both of them are defined in the WAP 2.0 specification, which was created by the WAP forum. XHTML MP is a subset of XHTML, which is the combination of HTML and XML. There are many WAP 2.0-enabled cell phones on the market currently. Before creating WAP 2.0, developers used WML to build WAP sites and HTML/XHTML/CSS to build web sites. Now with WAP 2.0 they can make use of the same technologies to create both web sites and WAP sites. Documents written in XHTML MP/WAP CSS are viewable on ordinary PC web browsers, since XHTML MP and WAP CSS are just the subsets of XHTML and CSS.

The following are the goals of WAP:
? Independent of wireless network standards;

? Interoperability: Terminals from different manufacturers must be able to communicate with services in the mobile network;

? Adaptation to bounds of wireless networks: Low bandwidth, high latency, less connection stability;

? Adaptation to bounds of wireless devices: Small display, limited input facilities, limited memory and CPU, limited battery power;

? Efficient: Provide quality of service (QoS) suitable to the behavior and characteristics of the mobile world;

? Reliable: Provide a consistent and predictable platform for deploying services;

? Secure: Enable services to be extended over potentially unprotected mobile networks while preserving the integrity of data;

? Applications scale across transport options;

? Applications scale across device types;

? Extensible over time to new networks and transport. WAP is envisaged as a comprehensive and scalable protocol designed for use with:

? Any mobile device from those with a one-line display to a smart phone;

? Any existing or planned wireless service such as the SMS, CS data, unstructured
supplementary services data (USSD) and GPRS;

? Any mobile network standard such as code division multiple access (CDMA), global system of mobile communications (GSM), or universal mobile telephone system (UMTS); WAP has been designed to work with all cellular standards and is supported by major worldwide wireless leaders such as AT & T wireless and NTT DoCoMo;

? Multiple input terminals such as keypads, keyboards, touch-screens, etc.

Source of Information : Elsevier Wireless Networking Complete 2010

The Pros & Cons of Cloud Computing, and is it Secure?


Remember, our simplified definition of cloud computing consists of shared computing resources that are virtualized and accessed as a service through an APL.

The Pros

1- Costs/capital expenditures

If cloud computing is right for your company, then major cost savings can be seen in buying and maintaining the needed infrastructure, support equipment, and communication costs. The vendors and/or service provider, who charge the users a utility or user type fee, own these costs.

2- Scalability

One of IT's biggest problem is the constant need to add more equipment to keep up with the growing demand of accessing, storing and analyzing information by both internal and external users. One example is in the data center where adding servers is a major cost issue (actually power for the data center is the number one issue, but it is related to the growing need for items like servers). Since cloud computing is virtual, one can expand or contract equipment/infrastructure as demands change.

3- Start - up

Since the cloud (theoretically) contains the infrastructure and applications, all one just needs to do is "dial" in to the cloud. One can start using applications immediately versus a customary installation, testing and then providing access to the appropriate user community. (Training is assumed to a constant.)

4- Business Applications

Again, the cloud (actually the vendors and/or service providers) through contracts (Service Level Agreements -SLAs) provides numerous business applications for any user who is their client. Again like scale, enterprises only need to know which applications they need to run their business and understand what is actually provided to have access to various business applications. (Training is assumed to be a constant.)

5- Flexibility

Since cloud computing is a virtual offering, a user has the flexibility to choose, on a regular basis, the applications, amount of bandwidth or the number of users by basically modifying his user contract and increasing or decreasing costs at a known rate or factor.

The Cons

1-SLA Agreements

This is the tricky and most important one. SLAs can be very involved and it really leaves the onus on the user to understand and define all requirements in specific detail, and more importantly understand what one is getting in the terms of support, performance, security, etc. A good example is quality of service; one should understand what is offered and what the recourses are if the specified quality is not maintained.

2-Performance

Performance guarantees are usually part of the SLA document, but I have singled this one out because it is critical to maintain the performance (uptime) one needs both for internal AND external users. Understand if the performance guarantee is defined as an average or just during peak times versus a "uniform" performance. If performance is compromised, it can impact many things including revenue and your company's goodwill.

3-Vendors

Not all vendors are created equally! Many vendors are claiming to provide cloud computing, but in reality, they are just providing a specific service, or a specific application or worst they are a middleman and provide no value-add at all. As I sated in my previous posting, one needs to understand the difference between cloud computing and hosted services or managed services or seemingly some form of virtualization. My best advice is to definitely get with reference customers and see if they model what you would like from the cloud.

4-Security

We all know that the internet has some security issues and since the cloud utilizes the internet coupled with applications infrastructure and support, users should be aware of the potential for new threats and increased risk exposure. It is important to include your firm's risk tolerance in any decision to move to cloud computing, as not all the security issues are understood, and new ones will arise.

5-IT Staffing

If one does utilize the cloud, then make sure one understands the vendor staffing that is available to support your needs and hundreds of others using their cloud. A number of vendors out-source staffing and some of the personnel may not be as good as your own internal organization. Ask the potential service provider if they have trained personnel to support the applications you request.

As I have always stated, know your strategy for your IT organization and your lines of business and weigh whether the "pros" out weigh the "cons" for going with cloud computing. Note that there are a number of advantages and disadvantages; do not be swayed by looking at cloud computing from only a cost-saving point of view.

In all probability the answer will be some thing in the "middle", i.e. some hybrid form of cloud computing.

As for security and cloud computing

In Forrester's article titled " A Close Look At Cloud Computing Security" by Chenxi Wang, Ph.D. Wang states "While cloud computing is able to deliver many benefits, organizations should not jump on the "cloud" wagon without a compelling business driver and a clear understanding of the security, privacy, compliance, and legal consequences. An effective assessment strategy covering these items will help you reach the ultimate goal: Make the cloud service work like your own IT security department and find ways to secure and optimize your investments in the cloud."

Forrester includes data protection, disaster recovery, and identity management as some of the areas under security and suggest that an audit of the potential cloud provider to see what level of security is actually provided.

As for compliance, the user should analyze how the cloud may or may not impact one's compliance requirements.

For legal and contractual issues, Forrester advises that one understands who owns/is responsible for what, between the user and the provider (the data, the infrastructure, etc.)

Another article by Network World's Jon Brodkin titled "Gartner: Seven Cloud - Computing Security Risks" he talks about seven security risk areas.

1. Privileged user access, sensitive data processed outside the enterprise.

2. Regulatory compliance, how does the cloud provider match your guidelines?

3. Data location, where exactly is your data housed?

4. Data segregation, understand that your data is "sitting" next to other's data

5. Disaster Recovery, what happens when there is an outage?

6. Investigating inappropriate or illegal activity may be impossible in cloud computing,

7. Long-term viability, what happens if your provider "goes away"?

Another article in Network World that reported on the RSA conference, and stated that the former technical director of NSA, Brian Snow is very concerned about vendors offering cloud computing from a security point of view. He is concerned about vendors not addressing current security issues and about new issues that cloud computing will create. Ironically another panelist was concerned about "Big Brother" listening in on cloud computing and how this might impact enterprises' privacy and compliance issues.

So to wrap up, the internet has security issues, and since cloud computing is in the internet, cloud computing will have those security issues, ones listed above, and ones yet to be discovered. It comes down to the risk profile for your corporation; what level of risk is right for your company relative to investing in cloud computing? Obviously part of the risk assessment depends on your type of company. If you are a financial advisor or in stock management where your intellectual property is basically the company then cloud computing as we currently know it is not right for you at any cost savings. If you resell ping -pong balls (no offense to ping- pong ball resellers) than the risk is relatively low and the savings from cloud computing outweigh the security and other considerations.

Have you conducted an adequate risk assessment before deciding to move to cloud computing?




Dick Lush http://www.firealarmmarketing.com or dick.lush@firealarmmarketing.com or phone 508-643-0411

Fire Alarm Marketing is a marketing and business development consulting team that focuses on product introductions, revenue generations, building partnerships and creating new opportunities and markets. We are a New England based company with more then 40 years of collective experience.




What Can You Do With a Computer Science Degree?


If you are a classroom wizard when it comes to solving math problems, have been tinkering with the computer ever since you could spell "computer," or if your idea of a good Sunday afternoon is watching re-runs of Big Bang Theory or reading Dilbert, then you probably don't have to spend sleepless nights worrying about which college major to choose.

Congratulations, for you are probably a perfect match for a computer science degree!

And if you're wondering what you can do with a computer science degree, here are a few exciting careers that you might choose.

Software engineering: Computer software engineering is one of the more popular occupations among graduates of computer degree programs. Computer software engineers are responsible for designing and developing software that makes computers perform specific tasks. There are two main categories of computer software engineers-applications software engineers and systems software engineers. Since the use of computer applications is so widespread, software engineers can find employment in a variety of industries.

Programming: Although the terms "computer programming" and "software engineering" are often used interchangeably, there are subtle differences between the two roles. While software engineers design software, programmers convert that design into logical code that actually makes the software work. Programmers write programs using various programming languages like C#, C++,.NET, Java, etc. and are also responsible for repairing broken code and updating existing programs.

Network and system administration: These professionals design, install, and maintain an organization's computer systems. They are entrusted with the responsibility of deploying network hardware and software on employee systems; ensuring uninterrupted network connectivity; and troubleshooting problems whenever they arise.

Database administration: Database administrators, or DBAs, are responsible for the design, implementation, maintenance, storage, and repair of an organization's databases. Their job is to ensure the optimum performance of the company's databases and design, as well as to implement improvement strategies. They work closely with systems administrators, software developers, and other technology staff of an organization.

Information security specialists: This is one of the most important IT jobs, given the increased threat from cyber-attacks that modern-age computer systems face. Computer security specialists, also known as information security specialists, have the crucial job of ensuring the security of an organization's information systems and preventing access by unauthorized and destructive forces. To protect their company's information systems, information security specialists install and monitor security software; train users on how to ensure their computer's security; spread awareness about the importance of maintaining systems security; and respond to security breaches.

Telecommunication specialists: These professionals are responsible for designing, installing, and maintaining audio, visual, or data communication systems. They are also responsible for diagnosing and repairing problems with communication equipment.

Web development: Web developers create web applications by using the various software languages and tools at their disposal. They may be responsible only for the back-end technical aspects of web development or can be involved with creating the front-end layout and design of a website. Web developers also maintain and enhance the performance of existing applications.

If any of the above careers sound exciting to you, then a computer science degree is just what the doctor ordered. Now that computer science degrees are available with a variety of academic emphases, such as programming and networking, you can get an even more focused education and be on your way to the possibility of a dream career!




California College San Diego (CCSD) has trained graduates for new careers since 1978. CCSD, located in San Diego, National City and San Marcos offers associates, associates of occupational studies, and bachelor's degrees in healthcare, business, and information technology, and master's degrees in healthcare and business. CCSD also provides college degree programs that can be completed in faster-than-traditional time with its FastFlex option.




Keep Your Cyber Space Secure


Being secure, is a concept which most human beings want to experience in their everyday lives. It is something we no longer take for granted in our fast technological age. There are all types of security, including national security, public security, and in the physical realm we encounter airport security, school security, shopping center security and home security, just to mention a few. There is also financial or monetary security.

In the world of computing, there are also all types of security, whether it be, network security, computing security, data or information security and application security. You can try free antivirus programs for windows xp and free antivirus protection software download. There are some concepts which occur throughout varying areas of security.

1. Threat. This is a way of setting off a risk that is malicious.
2. Vulnerability. A weakness that can be exploited by a threat.
3. Exploit. This is a vulnerability which has been triggered by a threat.
4. Countermeasure is a way to stop a threat from triggering a risk event
5. Assurance involves the guarantee that your security system will deliver what you expect it to.
6. Defense insures you never rely on only one security measure. There are free antivirus programs for windows xp and free antivirus protection software download for you to try.

With all this in mind, it makes sense to ensure that you have countermeasures in place to defend your system from threats and vulnerabilities when on the Internet. Every user is continually at risk and is a potential target.

Take all the precautions necessary to keep your network, information and applications free from attack. While it should be remembered that no user is one hundred percent secure, the main objective is to keep your system as resistant as possible from attack.

All software should be the latest version. Site Advisor or similar software is recommended along with the latest version of WordPress. Your Java run time (jre.exe) also should not be forgotten.

Do all you can to keep your cyber space secure.




MaryAnn Hay
http://allfreeantivirus.com




Computer Security Training


Computer security training is considered as one of the hottest programs for the new millennium. It is a major part of information technology that prepares students to protect computers and networks. Computers undergo constant attacks from various virus programs and instances of frauds that cause the loss of millions of dollars annually. Computer security training programs assist users to overcome these difficulties. Colleges and universities, technical schools and online programs are the main arenas that provide advanced computer security training.

As all other IT programs, computer security training programs also start with foundation classes. Fundamental programs offer students a comprehensive knowledge about the tools and techniques to manage risks, and to detect and prevent computer attacks. Some of the major concepts discussed are hackers, software piracy, viruses, identity theft, stalking and credit card fraud. Students learn the latest technologies for protecting systems such as securing the operating systems, audit techniques, identification and authentication, cryptography and other network security mechanisms. The security training also encompasses sessions in threat assessment, incident investigation, system security administration, risk management and online security testing. Those who look for a career in computer security technology development get advanced training in system security engineering, software design, development and testing, secure operating system design, and design and application of network security techniques.

A computer security professional has a good idea about the planning, co-ordination and implementation of security techniques to protect computers from illegal attacks. They are also trained in educating users on computer security, monitoring the network for security breaches, installing safety software and taking instant action against cyber attacks.

Online computer security training is a new trend that teaches the latest technologies to save computers from online attacks. Online certificate and degree programs are available. Recognized online training programs help to attain credentials in security training. These valuable skills are useful for marketing yourself to computer security firms.

As a mandatory technology for this century, many offices and organizations employ computer security personnel to take care of crises during their normal functioning.




Computer Training provides detailed information on Computer Training, Computer Internet Training, Computer Graphic Training, Computer Forensics Training and more. Computer Training is affiliated with Computer Science Education [http://www.e-ComputerEducation.com].




How to Secure Patient Information in a Medical Practice


Security seems to be the last thing on a doctor's minds when they open and run a practice. Security goes hand in hand with liability and HIPAA rules. Failure to comply with HIPAA can result in the following:

- HIPAA allows both civil and criminal penalties, including fines and possible jail time.

- HIPAA allows fines of up to $100 for each violation of the law, to a limit of $25,000 per year for violations of the same requirement.

- Criminal sanctions for knowing misuse or disclosures carry fines of $50,000 to $250,000 and one to ten years imprisonment.

Having said that, there have been only a few fines actually imposed. The liability equation changes drastically depending on the types of patients you have. There are countless lawsuits where the staff is involved in leaking patient information to the media about celebrity patients.

Securing your office involves two main areas of focus: data that is paper based and data that is electronic. Paper based records need to be secured in locking storage rooms and or locking filing cabinets. All paper that contains patient information needs to be shredded. Unfortunately most practices that I perform an audit on do not shred their garbage where photocopies of patient IDs, credit cards, medical information end up when the printer, fax or copier do not perform properly. This is still the biggest threat and easiest to fix with a paper shredder.

EMR systems are great for office efficiencies but are more complex to secure.

The following is a basic outline to secure your medical practice and reduce your exposure to possible liabilities:

General Guidelines

1. Determine all points of entry into your network (DSL, VPN, Dial-up modems).

2. Make sure all entry point devices have passwords and are not set to factory defaults.

3. Make sure you have a firewall installed between your network and the Internet. The firewall needs to also have a password that is not the factory default.

4. Make sure all wireless access points have encryption enabled.

5. Make sure all computers have screen savors with passwords. Also make sure the password is not taped to the screen! Still the most common breach.

Technical Guidelines (performed by a security expert)

1. Run a network scan to determine how many computers and network devices are attached to the network. Removed all non-approved devices.

2. Run a port scan on every network attached device to determine each device's vulnerabilities. Close all non-required ports.

3. Run a port scan on the firewall from outside the office to indentify any unsecured ports. Close all non-required ports.

4. Review firewall logs for any intrusions. Reports any suspicious activity.

5. Review workflow and how staff handles patient records. Make recommendations.

6. Force staff to change passwords monthly. Don't allow them to tape password to monitor.

7. Standardize the desktops. A typical audit returns computers with Windows 95, Windows 98, NT, XP and Vista. Migrate all computers to one standard operating system such as Windows XP or Vista.

8. Remove all non-work related software. Music and file sharing software pose risks.

9. Check for remote desktop access software that users install to bypass the firewall and gain access to their desktop. (LogMeIn.com, GoToMyPc.com, VNC)

10. Make sure computers have virus protection that is up to date.

11. Make sure computers have a firewall running.

12. Turn on the screen savor with password protection to protect against the cleaning staff.

13. Make sure all patient information that is thrown in the trash is shredded.

14. Create procedures to properly secure patient records. (Don't leave a patient folder in an exam room. If you view patient records on a computer in the exam room, make sure you lock the screen when you step out. Don't leave patient files in the back seat of your car.)

Once your network is secure, your attention needs to be focused on training and staff behavior. In just about every office I visit, the staff has downloaded music applications with some applications used to find music on the internet. What starts as a harmless act of simply trying to have music to pass the time on slow day's turns into exposing the whole network to Trojans and Viruses. The computer is compromised even with the latest anti-virus software and firewall because the user was tricked into downloading harmless looking software bypassing all safeguards. The first thing the programs do is disable the anti-virus programs and Microsoft software updates. This leaves them free to propagate throughout the network.

Conclusion

Security is not a one time event. Security needs to be built into every process. I do a complete audit when I start a project and close all discovered vulnerabilities. Clients like a monthly or random security scan to discover if the new policies are being followed. You can always contact us and we will be happy to give you a free consultation and or point you in the right direction!




Globotron.com We are like your accountant who takes care of all your financial needs; we take care of all your business technology needs in the NYC area. We work with your business to properly align technology to provide you with the competitive advantage you need. We are not another vendor selling you a product but your partner managing all your technology needs including working with your existing vendors. We do not point fingers when something goes wrong, we fix it no matter whose problem it is!




 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger