Sunday, December 7, 2008

7. How to use Google searching effectively?



Typically, when you want to find out information about something you can type in google.com and then type into the search box whatever you are looking for. There are other options that a person can use to find more information to specify what you need to search for. For example, there is the advanced search button. When you click advanced search you are given the option to write specific words to help find whatever it is you are looking for.

Besides for finding information, google also allows you to find images, maps, news, it allows you to check email, shop for items, and find scholarly articles on research. You can do this by typing what the information you are looking for in the search button. You then hit enter, and this will bring you to a new screen. Go to the top of this page and you get the options of either clicking, images, news, maps, shopping, etc.. You then can choose which of these you want to go into. Google is a very useful tool for most people. If you ever need to find something out. I would suggest using google.

www.google.com

6. Wireless networking precaugtions



When you begin to use a wireless network you make yourself susceptible for hackers to hack into your computer. Going totally wireless at home brings with it some possible problems as any new technology will do. Not the least of those concerns is security. Going wireless means by definition that access to your computing resources and the internet is occurring without wires, through the air. And just as every computer in the house can access those digital signals, so can those outside the house and those who might not wish to use those signals properly. Therefore when planning your wireless network at home, some precautions and preventative measures should be observed so assure that your network at home is just as secure in a wireless mode as it was when you used cables and physical connections.


Here is a checklist to remind you about saftey precautions when using a wireless network:
  • Change the default SSID for each wireless network access point device.
  • Disable automatic SSID broadcast.
  • Turn on WEP encryption.
  • Research upgrading your wireless network encryption to WPA/TKIP.
  • Filter the MAC address of your network card.
  • Change all default user names and passwords for new network access devices.
  • Change the default IP subnet that your wireless router is preset to (192.168.1.0).
  • Disable DHCP IP address generation.
  • Implement firewall protection between the wireless network and other networks and between the wireless network and the internet.
http://www.pool-king.com/secure-wireless-network.php

5. Strong Password



Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts. A password is strong when, you Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal.Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess. Combine letters, numbers, and symbols. The greater variety of characters that you have in your password, the harder it is to guess.

There are six steps to creating a strong password: 1. Think of a sentence that you can remember. 2. Check if the computer or online system supports the pass phrase directly. 3. If the computer or online system does not support pass phrases, convert it to a password. 4. Add complexity. 5. Finally, substitute some special characters. 6. Test your new password with Password Checker.


http://www.microsoft.com/protect/yourself/password/create.mspx.


4. Internet Parental control software



Parental Controls" is a term that has been widely used to describe tools that allow parents to choose appropriate content for their children. Parental control software has been developed for everything from TV to the Internet. Safe Eyes falls in the later category of Internet parental control software. Safe eyes is a flexible set of tools that allows anyone to determine the type Internet usage that is appropriate.

Safe Eyes Parental Control Software Includes:

  1. Content Controls - Flexible content control allows you to select the types of website that are appropriate.
  2. Program Controls - Control Instant Messengers, P2P File Sharing, and other harmful programs.
  3. Time Controls - Control the amount of time spent online, and the times when the internet is available.
  4. Usage Logging - Create and review logs of websites visited, programs used on the Internet, and Instant Messaging Chats.
  5. Usage Alerts - Be notified instantly via email, text message, or phone call when someone visits inappropriate websites.


http://www.internetsafety.com/safe-eyes-parental-control-software.php

Saturday, December 6, 2008

3. Internet Monitoring, Blocking, and Tracking



These software's help protect your computer from viruses and other spam that will come onto your computer. The blocking software stops outside information from entering your computer. It will send you a quick message telling you that your computer is blocking an item do you want to keep it blocked.

The tracking software track viruses and other information. It will make sure that your computer is not vulnerable to getting a virus. The monitoring helps you monitor what your children can see and what your children can go on to use on the web.

2. Internet Filters




The danger for children on the World Wide Web comes with its openness. The web is completely unregulated. Anyone can post information on the Web and provide links to other pages. Parents need to do something to protect their children from these dangers. Parents can do four things to provide safety for their children. These four things are: use internet blocking or filtering software. Provide education, talking to your child about safety on the World Wide Web.
Establish family rules about internet use, and Make it a rule that the child not give out family information without the parent’s consent.

Internet filtering comes in two categories:
Software that the parent can load onto the computer at home.
Programs that can be activated through the internet provider, which will filter web sites for you.

The filtering mechanism on these programs work by:
Scanning sites and blocking those that contain specific words.
Blocking sites that are found to contain sexually explicit, violent or hateful material.
Limiting a child's search to a predefined set of sites or to sites that meet certain criteria






1. Internet Parental Guidance



It is the parents responsibility now a days to filter the internet and protect their children from predators, and from material that is not suitable for children. Parents can do this by going on the inernet and setting up parental blocks and filters that will deny their children access to certain web pages.

KidSafe.com - Child Safety and Parenting Articles and News Kid Safe is one of the largest parenting resources on the web. We offer a huge collection of child safety articles and products that will keep your family safe and secure.




http://www.resources.safestware.com/privacy-security-for-the-family.htm

Thursday, September 25, 2008

homework 1- What is HTML

HTML: A fun programming language


HTML is a computer language used to help create different websites. Once a website is made it can be seen using the internet. The letters HTML stand for Hypertext Markup Language. HTML has different codes and syntax; just like other language have different codes or syntax. Hypertext is the method in which you move around the internet or the web. By clicking on different hyperlinks you can search around the internet visiting different websites. Markup is what HTML tags do inside the website. This is talking about what kind of text, font, or style of writing that this website is using.

HTML consists of a series of codes typed into a text-file by the site author. The text is then saved as an html file, and then viewed by using a browser such as Explorer, or Firefox. The browser that you then choose to use will read the file and translate the text into visible form.

People sometimes wonder what they need to create their own websites, or even wonder if there is any software that needs to be loaded in order to use html. All a person needs to create their own website and use html is a text editor and a web browser. The text editor is used to write down your HTML and CSS files. If a person is using windows, then they can simply use their notepad on the computer. If a person is using a MAC then they can use a Text Editor. Finally, a person needs to have an internet browser in order for them to obviously go online and create their new web page. It is probably best to have all the different types of browsers loaded on to your computer even though you are probably only going to use one or two of these browsers.

HTML has a long history of when it began. HTML is an evolving language that has changed from years to years. The first HTML language was called HTML 1.0. During the time HTML 1.0 was out, people were not involved in creating their own websites. In fact, the language of html was very limited. A person can basically use only simple texts when creating different web pages. The next html that came out was called html 2.0. This html had all the specifications of html 1.0, but there were some added features to the 2.0 version. This version was used up until about 1997. At this point in time people really got into the html game. However, there was a problem. Netscape at this time was the most used browser around the world. People would create their websites using Netscape. The websites created on Netscape though did not always look the same when people used other browsers. To sum it up, if you created a web page on Netscape, it would look completely different if you would use a different browser such as Explorer. A man named Dave Ragget so this happening and he created our next form of html, and it was called html 3.0. This new html included many new features, and more powerful opportunities for webmasters, however the browsers now became extremely slow. Due to the slowness of this new html most people began to abandon this new html, and they began using the older versions again. New tags were still being made, and it was apparent that a standard needed to be met between all of the browsers. People in charge of the internet noted that they needed to take these problems slowly, and that they needed to update browsers slowly, so that all of them can be compatible. The next html did just that. The new html was called Wilbur or also known as html 3.2. This version of html was a toned-down version of the already existing html. This helped the plan of updating html’s slowly for better compatibility. The final html that came out was called html 4.0 or also known as Cougar. This html was a combination of the older htmls with some specific features from the ill-fated html 3.0. At this point in time Microsoft came out with its new browser called Internet Explorer. Explorer was supported by html 4.0, and had excellent support by most new tags and new attributes. Once html 4.0 had been out for a little while, the documentation was

then revised and corrected in a few minor ways, and was soon entitled html 4.01. This is the final version of specification.

Ultimately, HTML has been used for years. HTML is needed to help create different websites. It is very easy to learn how to use htmls. In the past there were different versions of html. However through the years html has been updated, and made better for society’s use of the internet.

Thursday, September 18, 2008