Tuesday 24 May 2016

Hello again to my dearest reader and i'm very2x sorry for the late post due to some circumstances.But anyway, as usual, I'll be posting about something what i've learned from class.In our class, our lecturer Dr johari have explained and be more detailed on topology. Hence he showed us a video regarding network topology, that is  MIT blossom;
 
'MIT Blossoms, one of the most exciting and effective uses of educational technology to help high school students learn math and science, doesn’t boast the latest in artificial intelligence or adaptive algorithms. Its secret weapon is, rather, a canny understanding of human psychology—both students’ and teachers’. Technologically speaking, its basic model could be executed with an old television and VCR.'

The video shows us how the topology works using catering management during weeding. The catering can either use Mesh,Star and Bus topology as an example. To be more clear,i've but a link below to watch the video.
Here is the link of the video of mit blossom that cooperate with UTM.

Wednesday 4 May 2016

Le Networking/Computer security, basics yet vital.










So for this week, we have learned about Networking/Computer security which has been taught to me back in Labuan Matriculation College, under the subject Science Computer. So be for we get into the topics, we need to know what is the risk we are exposed when using network.

 So in Class, among them are,:
Pishing



SPAM



Virus
Trojan Horse


 As long as we' re connected top Internet, we are exposed to Hackers and Scammers that will do anything to trick us,so the above things are among the most used technique to trick people nowadays.

For Phishing and Spamming, they both are under the category onf Web Spoofing, where

->Spoofing is as  a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

  •   Spam - is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail.   
  •  Phishing scam -is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
















 After that, we will aslo encounter virus,


 Computer Virus:
- is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
 -it can spread throughout and may damage files and system software, including the operating system.




This is how Virus works.



 And for the last threath we face are Computer Trojan Horse:

 
Trojan Horse:
-Is a program that hides within or looks like a legitimate program. It does not replicate itself to other computers.

- it can spread throughout and may damage files and system software, including the operating system.








And the additional stuff we also learned are, worms,

 Worm is program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.

 This will cause the computer to lag,







Hence to encounter this all, we need :


  • Avast
  • Avira
  • Spyhunter(Paid Software)
  • Kypersky
  • Norton

 And many more Antivirus that can prevent all infection on Computer while connection the internet.