ELLAS

ELLAS

Tuesday, November 25, 2008

how to use google searching effectively




Google is an internet search engine. In order to get the best results, the words used are important. A lot of time people type in a word and the results that come out are not what they were looking for. A reason for this could be because people do not know how to effectively search Google.
Three tips to improving our search results are, (a) not to type in questions because the result s will not directly answer the question. (b) Do not use vague words. If the terms used in the search engine are ambiguous the results will also be ambiguous. Therefore, we must be specific. And lastly, (c) when looking for a specific word of quote, it is a good idea to use quotation marks especially if what was wanted were those exact words.

Internet parental control software




Spector Pro is a product that takes hundreds of snapshots every hour and it include true emails, chars and instant messenger captures. Now the Spector Pro also has a “Key Logger” in order to keep track of every type of character. An important characteristic of Spector Pro is that a notification is sent immediately when the child comes across dangerous or inappropriate web sites, emails and even charts.
Spector For MAC is the specifically designed for a Macintosh computer and it is used to monitor programs. This program also records everything done on the internet. This Spector also takes hundreds of snapshots every hour just like the Spector Pro does and one can see exactly what the mouse, the child and even an employee was doing both online and off.

Wednesday, November 5, 2008

Internet Monitoring, Blocking, and tracking




Internet monitoring is a way of testing or tracking a user’s internet use with a particular website or even within a business. This is done in order to make sure that the customers can access the companies’ online applications and that all actions on the website can be reached. In order to see if a server is available across the globe, a number of servers are located in different parts of the world. Clearly, if there are more servers in more locations, the picture on the website available will be better.
Internet blocking, on the other hand, is about not allowing a particular website to be viewed. This is usually done in schools in order to prevent students from browsing the net during class. It is also a way of stopping young children accidentally going into an adult type website especially if the parent cannot be around the child when he or she is on the internet.
link-3

Internet Parental Guidance




When there are young children in the house using internet, parents should keep an eye on their children by having a shared email account and password. They should also talk to the children about the people they are meeting on line. When meeting people online and wanting to meet up in person, the parents must set a rule saying that they cannot meet without a parent supervising. In addition, as a parent, they can complain about unsolicited emails to the Internet Provider.
Guidance and supervision regarding internet use by young children can also be done by keeping the computer in a family area. It is also a good idea to spend time with the children online in order to learn about their interests. A parent should tell their child that if at any point they start feeling uncomfortable with what they are seeing online, they should log off, exit the page or go back. Lastly, the parent should have strict rules on what a child can ordering products on line

Link-4

Wireless Networking




It is important to have a secure wireless network at home simply because if it is not safe, anyone close by can spy on your online activities. It could be as serious as someone being able to access the computer’s hard drive. Even when it is not that serious, the problem of neighbors using your internet connection can be a result of non safe wireless networking.
In order to have a safe network, one should use encryption; one should not have the “Announce Yourself” enabled and should change the access point’s default because a hacker can lock you out of your own network. One should also have limited access to their access point, for example put a limit on the number of computers that can use the wireless internet. A wireless card has a Media Access Control address which could be used to secure the network but it is not a perfect security mechanism as a hacker can use a protocol analyzer to determine which MAC address are in use on the network.






Internet Filters




It is important for parents to have internet filter software in order to protect their children form “predators on the internet”. Several children use the internet, in fact, 90% of children between the ages of five to seventeen use computers and 75% of children between the ages of fourteen to seventeen use the internet. It is said that households with children under the age of eighteen are more likely to use the internet in comparison to houses that do not have children under the age of 18.
Parents who are concerned with what their children watch over the internet can install software that will block the child’s access to many pornographic sites. Filtration can occur at different levels and before installing this software it is also important to know that when a child browses on the internet, it is easy to see what sites they have visited. Some filter software are, NetNanny, Bsafe, PC Tattlertale, iProtectYou, and many others.

link-6

Strong Password







In order to have a strong password there are certain dos and don’ts. A password must contain six or more characters and can either be capital letters, lower case letters, numbers and even symbols such as !@#... it is suggested that there is at least one character symbol character after the first one. If the password is being changed it is advised that it is greatly different from the previous word.
Some don’ts regarding passwords are a matter of safety for the user. It is advised that you do not use any part of your username. It is also not right to use name of family members, friends, pets or co-workers nor is it safe to use computer terms and names. Using computer commands, Sites Company names hardware and software is also risky. Using personal information such as a birthday, address or phone number is unsafe. A strong password is one that is not a simple pattern. It is also strong if the characters are not in alphabetical or numeric order. In addition, a strong password is not in keyboard row, i.e. asdfg. It would be advised not to use words that can be found in the dictionary as well as not using a bank account PIN, a credit card number or a college ID. Lastly it would be a great idea to change ones password every six months in order to make it harder for someone to hack into the password.

Link-7

Monday, September 29, 2008

Homework #1: A Fun Programming Language)




HTML stands for Hyper Text Markup Language. It is the main language for the web page and it provides a way to describe the structure of text based information in a document. This can be done by denoting certain text as links, headings, paragraphs, lists and it supplement that text with interactive forms embedded images and other objects. HTML can describe the appearance and semantics of the document and it can also include embedded scripting language code which can affect the behavior of the web browser and other HTML processors.
There are different types or versions of standard HTML. There is the Dynamic HTML, the XHTML, character encoding, Front family, HTML editor, HTML element, HTML scripting, layout engine, quirks mode, style sheets, Unicode and HTMC, W3C, and web colors. There are also layout engines for HTML, HTML5, non- standard HTML and XHTML.

Monday, September 22, 2008