Tuesday, November 10, 2009

JAVA

Variables on Java

A typical program uses various values and these values keep changing while the program is running. For example, you create a program that is used to perform calculations, the values entered by one user will obviously be different from the values entered by another user. This also means that, when creating the program, you cannot know all possible values that will be entered in your program. You should still be able to manage the values that the users will eventually enter in your program.

If you create a program used to perform calculations as introduced above, when a user enters a new value that would be involved in the calculation, to manage that value, you can (temporarily) store it in the computer memory. Since the values entered in a reserved memory area change regularly, they are called variables. Because neither you nor the compiler can predict all possible values that would be used, there are safeguards you can use. First, you must ask the compiler to reserve an area of memory for a value you intend to use. Asking the compiler to reserve an area of memory is referred to as Declaring a Variable. Remember that when you declare a variable, the compiler reserves an area of the compiler memory for you. Eventually, you can put the desired but appropriate values in that memory space.

After declaring a variable, when you need the value stored in its memory area, you can ask the compiler to retrieve it and hand it to you. To effectively handle this transaction, the compiler would need two pieces of information from you: a name of your choice for the memory area that will be reserved, and the type of value that will be stored in that area of memory. Based on this, the formula to declare a variable is:

TypeOfValue VariableName

As done in some languages like Pascal or Basic, we will start with the name.

The Name of a Variable

When you want the compiler to reserve an area of memory for some values used in your program, you must set a name, also called an identifier, that will allow you to refer to that area of memory. The name can be anything of your choice but there are rules you must follow:

  • The name of a variable can be made of one letter (a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u, v, w, x, y, z, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, or Z) only
  • The name of a variable can start with a letter, an underscore "_", or the dollar sign $. The name cannot start with a digit. If the name starts with an underscore, the second character must be an alphabetical letter
  • After the first character, the name of the variable can include letters, digits (0, 1, 2, 3, 4, 5, 6, 7, 8, or 9), or underscores in any combination
  • The name of a variable cannot be one of the words that the Java languages has reserved for its own use. A reserved word is also called a keyword. This means that you cannot use one of the following keywords to name your variable:

Beyond these rules as a foundation, you can add yours. For example, we will follow suggested standards of the Java documentation. The rules will follow are:

  • A name will start with a letter in lowercase. Examples are age, f4, name, g_14, country
  • When a name is a combination of words, only the first name will start in lowercase. Examples are firstName, dateOfBirth, pi_314159
  • When the name is an abbreviation, we will use uppercase on all characters. Examples are EAU, UN, CIA, NSA
Variable Initialization

After declaring a variable, you can store a value in the memory reserved for it. When you have just declared a variable, it may not hold a significant value. To know the value it has, you should put an initial value into that memory space. Putting an initial value is referred to as initializing the variable.

To initialize a variable, on the right side of its name, type the assignment operator, followed by the value you want to put in the reserved memory. As we will see in the next few sections, you cannot and should not put just any type of value in a variable. We will see that there are different types used for different variables.

After declaring a variable and once it has a value, to display that value, you can provide the name of the variable to the parentheses (in future lessons, we will learn that this is referred to as passing) of the System.out.print() method.

Source : http://www.functionx.com/java

Thursday, June 4, 2009

Wireless Spoofing

There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

MAC Address Spoofing

The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

Typical APs control access by permitting only those stations with known MAC addresses. Either the attacker has to compromise a computer system that has a station, or he spoofs with legitimate MAC addresses in frames that he manufactures. MAC addresses are assigned at the time of manufacture, but setting the MAC address of a wireless card or AP to an arbitrary chosen value is a simple matter of invoking an appropriate software tool that engages in a dialog with the user and accepts values. Such tools are routinely included when a station or AP is purchased. The attacker, however, changes the MAC address programmatically, sends several frames with that address, and repeats this with another MAC address. In a period of a second, this can happen several thousand times.

When an AP is not filtering MAC addresses, there is no need for the attacker to use legitimate MAC addresses. However, in certain attacks, the attacker needs to have a large number of MAC addresses than he could collect by sniffing. Random MAC addresses are generated. However, not every random sequence of six bytes is a MAC address. The IEEE assigns globally the first three bytes, and the manufacturer chooses the last three bytes. The officially assigned numbers are publicly available. The attacker generates a random MAC address by selecting an IEEE-assigned three bytes appended with an additional three random bytes.

IP spoofing

Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

The IP layer of the OS simply trusts that the source address, as it appears in an IP packet is valid. It assumes that the packet it received indeed was sent by the host officially assigned that source address. Because the IP layer of the OS normally adds these IP addresses to a data packet, a spoofer must circumvent the IP layer and talk directly to the raw network device. Note that the attacker’s machine cannot simply be assigned the IP address of another host X using ifconfig or a similar configuration tool. Other hosts, as well as X, will discover (through ARP, for example) that there are two machines with the same IP address.

IP spoofing is an integral part of many attacks. For example, an attacker can silence a host A from sending further packets to B by sending a spoofed packet announcing a window size of zero to A as though it originated from B.

Frame Spoofing

The attacker will inject frames that are valid by 802.11 specifications, but whose content is carefully spoofed as described above.

Frames themselves are not authenticated in 802.11 networks. So when a frame has a spoofed source address, it cannot be detected unless the address is wholly bogus. If the frame to be spoofed is a management or control frame, there is no encryption to deal with. If it is a data frame, perhaps as part of an on-going MITM attack, the data payload must be properly encrypted.

Construction of the byte stream that constitutes a spoofed frame is a programming matter once the attacker has gathered the needed information through sniffing and probing. There are software libraries that ease this task. Examples of such libraries are libpcap (sourceforge.net/projects/libpcap/), libnet (libnet.sourceforge.net/), libdnet (libdnet. sourceforge.net/) and libradiate (www.packetfactory.net/projects/libradiate/ ).

The difficulty here is not in the construction of the contents of the frame, but in getting, it radiated (transmitted) by the station or an AP. This requires control over the firmware and driver of the wireless card that may sanitize certain fields of a frame. Therefore, the attacker selects his equipment carefully. Currently, there are off-the-shelf wireless cards that can be manipulated. In addition, the construction of special purpose wireless cards is within the reach of a resourceful attacker.

Source : http://www.cs.wright.edu

Thursday, April 16, 2009

Online Computer Education

Author: johnxuster

Today, internet become a important part of our life. we can do many things such as shopping, making friends and even studyinig online. As we known, more and more people from all over the world are interested in what online computer education has to offer.online computer education becomes more and more popular.

Online computer training courses and software tutorials help you to advance your skills quickly and easily. Computer elearning avoids the hassles of traveling to and from campus s, as well as set schedules that run interference in hectic lifestyles. With hundreds of online computer education courses available at your fingertips, online courses vary from basic to advanced level and are all accessible from your home computer.

There are many benefits for online education, evidence, If you are interested in online computer education you are not alone. The fact of the matter is that learning how to use the computer is one of the most important things that you will ever have to do.
If you are one of those people who really want to learn a lot about computers, taking online courses may be your best bet. You can gain all of the knowledge that you could ever need, and from there put it to good use. So even if you do have to pay for an online computer education, for most it is well worth the money in the end.

Online computer education can help you succeed in a new career.Computer Education courses are available in many Computer Schools or Colleges. Many have Computer Education that is an all important part of any Curriculum. Search for schools that are geared towards business in general, and ask if they offer online computer training. You can also find online computer training institutions and courses by searching the net. These online Computer courses allow you to work and learn from your own home with your own time slots, and may be the right course for someone who is looking for a second degree and does not wish to go through the entire College experience all over again.

The information technology department is a vital area of every large business, and you can learn to be an information systems technician online. Learn to manage an IT department, and to develop strategies to best utilize the flow of information within an organization. The best online training in computer information systems can qualify you for an important career as a chief information officer or systems analyst.

In addition, there is now hundreds of online courses available ranging from basic to advanced courses. You are also able to get a professional certification and online degrees through your home PC that gives you no reason not to want to do your computer education from your home PC.

The term computer science covers a broad spectrum of online computer education. Online studies in computer science can be concentrated in areas of programming, IT, software engineering, and many others. You could begin learning computer science online by enrolling in an associate degree program or bachelor degree program that may take between two and four years to complete or continue your online education for another two to four years to obtain master degrees in computer science or even doctorate degrees.

So if you want to begin your education online, be ready to go. you will find it really interesting.
johnxuster

About author :
I am special in the latest and valuable computer technology studying. See More education online information on my laptop
Article Source: http://www.articlesbase.com/online-education-articles/online-computer-education-682068.html

Computers and Internet Contribute to Education

Author: andy tao

The education field has changed in many ways today. Almost every student wants a computer, whether it is at home or at school. They also demand the use of the Internet, as they say they can access information online for homework as well as projects. This is something that has changed the way students study around the world.

It has made things easier for them, as they can access all the information they want for any tests they are preparing for as well. The advantage of the computers is that one can also learn online through tuitions. Online tutoring has become very popular around the world in the last few years.

As students may not get individual attention at school, they have the option of learning more online. They get to hire teachers from other parts of the world, and with the help of instant messaging as well as calls online, they learn all that they want. They not only get all the attention they want, they get it for a very low cost.

Computers are also used extensively in schools today. They serve various purposes, from using simple facilities up to complicated ones such as graphics. There are even exclusive graphics and computer schools, which will prepare individuals for what they want to do in the field as a career.

When students prepare for projects, they can use the Internet to get information. The internet is vast, and there is plenty of information from a to z about any topic you might look for. However, these resources have to be used in the right way when it comes to education.

Teachers in schools must ensure that they plan the curriculum well, so that students do not go overboard with the use of computers for unnecessary things. Most of the developed countries run schools with the help of computers. From students’ database to preparing questions for exams, everything is done through computers.

Some countries are still working towards developing this area, as it is has become very challenging to work without the help of computers. Things will likely change in the next few years as well. Computers have become an integral part of the education field, and they contribute largely to the same.

The other advantage of computers is the fact that they are very cheap today. Thus, any student can afford to buy this, for the help of their education.

HostgatorReview.org is hostgator review and host gator coupon site.
More host gator coupons can be found at hostgatorreview.org/hostgator/hostgator-coupon/
Article Source: http://www.articlesbase.com/internet-articles/computers-and-internet-contribute-to-education-260698.html

Effectiveness of Computer Assisted Instruction in Reading Achievement Among Secondary School Students

COMPUTER ASSISTED INSTRUCTIONS IN READING ENGLISH AT HIGHER SECONDARY LEVEL

Author: S.BARATHI
Technology is an ever-increasing part of the English Language arts classroom Today's teachers are developing new and exciting means of integrating Language writing and literature with innovative technologies.

The President of India, A.P.J. Abdul Kalam, formally launched the India-U.S. Edusat Network at Rashtrapati Bhavan on 8th December 2005. His advocacy for a knowledge grid connecting educational institutions, research facilities and industries is the logical follow-up of a series of measures that have been undertaken by Anna University to ensure that tele-teaching reaches even to the remotest corners of the state. This will enable the knowledge users to have access to high-performance computing environment, virtual reality, simulation systems, parallel/clustered servers, and super computer infrastructure from any end of the grid.

According to him, the whole purpose of education in a country was to develop and enhance the potential of human resource
and progressively transform it, into a knowledge society. Every Nation wants to produce students who ultimately become the knowledge workers in their own economy to be global citizens. In the 21st Century, the need for competitiveness, in the field of Higher Education knows no bounds. In the words of Dr.Kalam, "The competitiveness is powered by knowledge power. Knowledge power is powered by innovation. Innovation is powered by science and technology and technology is powered by resource investment". (The Hindu, Friday, December 9, 2005).

The progress and growth of Technology in Higher Education is significant and it can be measured in terms of the excellent output in research – teaching – research cycle leading to societal transformation. Gartner has projected that the total Indian enterprise IT spending (not including consumer IT spend) including hardware, software, telecommunications and IT services will reach Rs. 1,903 billion in 2006, growing at a compounded annual growth rate (GAGR) of 20.8 per cent from 2004 to 2009. The aim of this paper is to focus on the 'Impact of Technology on Teaching and Learning in Higher Education'.

Education is facing a significant challenge in preparing students and teachers for future" knowledge based society". In recent years the educational access to digital information and communication technology (ICT) has grown dramatically. ICTs are quickly becoming more accessible, like computer, internet and WWW. ICTs are not single technology but it is a combination of hardware, software, media and delivery systems. ICT can influence much in developing teaching and learning environment in the following ways, which is quite different from older technologies.

Integration of multiple media : into single educational application.

Interactive and include the capacity to control, manipulate and contribute to information learning environment.

They are flexible offering freedom from rigid scheduling and from barriers of time and location.

Through connectivity they provide access to every other person on the planet who has a internet account, to hundreds and thousands of information archives and to million of web-pages.

Because of these differences, the teaching and learning environment finds new frontiers and educators are finding powerful new ways to integrate digital ICT into the curricula at the higher education levels, all over the world. Of course India is not an exception.

The various information and Communication technological tools such as web resources, educational CDs, computers, multimedia etc find place in teaching, learning, research, administration and data management. These ICT tolls have changed the learning styles of the students. Learning in the higher education level is not simply knowledge acquisition but knowledge 'managing' and knowledge 'creating'. Hence the present study attempts to find out the impact of ICT tools in the learning style, and awareness about these tools among graduate and postgraduate students, their attitude towards the integration of these tools in the learning process which enables the educational planners and policy makers to update or modify the present curriculum and methodology of teaching.

The impact of Technology on teaching and learning in Higher Education has enhanced students' achievement in mastering the following skills.

Basic Skills Instruction


* Computer assisted instruction to drill

* Multi-media software – teach to a variety of learning styles.

* Videodiscs – strengthen basic skills.

* Video and audio technologies – bring material to life.

* Distance learning –at least as effective as traditional methods of instruction.

* All forms – develop new skills related to use of technology itself, necessary in workplace.


A five-year report (1987-1992) by the Sacramento School District in California found that students using multimedia and telecommunications showed improved attitudes toward reading, social studies, and science and became more active and independent in learning. Some also showed improved reading scores.

Whether Computer Assisted Instruction (CAI) can improve reading achievement of students has been a crucial question addressed by studies in the past. Many research studies reveled that Computer Assisted Instruction does have a positive effect on reading achievement. Although the effects of CAI in many studies were not homogeneous there seems to be no particular study characteristic that might have caused the heterogenity.

There is general agreement that reading is essential to success in our society. The ability to read is highly valued and important for social and economic advancement. The consensus supports the belief that reading is fundamental.

Most children learn to read fairly well. However there are children whose educational concerns are at risk because they do not read well enough to ensure understanding or to meet the demands of an increasingly competitive economy and changing demographics. It is the opinion of educators that not all of the children in schools are learning to read as well as they should. Many of them are experiencing serious difficulty in learning to read and as they progress through the grades they continue to lag in reading achievement.

Computer assisted instruction (CAI) is among the range of strategies being used to improve students achievement in school subjects including reading. Programs for CAI have come a long way since they were first developed over two decades ago. These programs tutor and drill students diagnose problems, keep records of students progress, and present material in print and other manifestations. It is believed that they reflect what good teachers do in the class room.

Students are expected to benefit from CAI. Among the benefits that have been expected are better and more comfortable learning for students since they learn at their own pace and convenience; opportunities to work with vastly superior materials and more sophisticated problems; personalized tutoring; automatic measurement of progress, and others.

Teachers as well are expected to gain from CAI. Among the benefits that have been expected are better and more comfortable learning for students since they learn at as they experience less drudgery and repetition greater ease in up dating instruction materials, more accurate appraisal and documentation of students progress and more time to work directly with students. With increasing advances in computer technology Computer Assisted Instruction (CAI) is now seen by many as a method of providing relevant instruction for large number of students.

Learning from computers encompasses approaches to CAI in which the computer is used as a means for transmitting specific subject matter, such as reading. Te flow of information is basically from the computer to the student with the computer presenting learning material or activities for student responses. The computer retains records of the student's progress Through the course of study. Based on the degree of interaction between student and computer researches have identified three levels of CAI:

DRILL AND PRACTICE:-

The computer provides the student with exercises that reinforce the learning of specific skills taught in the class room and supplies immediate feedback on the correctness of the response. Used in this manner, CAI functions as a supplement to regular classroom instruction and may be especially useful when a teacher does not have the time to work individually with each student. Drill and practice on the computer may also motivate students more than traditional work book exercises.

TUTORIAL :-

Tutorial CAI provides some information or clarifies certain concepts in addition to providing the student with practice exercises. In this sense the computer begins to take over actual instructional functions tailored to the student's individual level of achievement.

DIALOGUE :-

With this type of computer use the student takes an active role in interacting with the computer giving instructions in the form of a computer language so as to structure the student's own curriculum. The computer provides information, exercises and feed back Dialogue CAI is believed to come closest to actually substituting for regular instruction.

The verdict for the use of computers in education seems to be in. As stated by the National Center for Education statistics (NCES) computers have become an essential tool in our society. Early exposure to computers may help students gain the computer literacy that will be crucial for future success in the workplace. Access to computers at school and at home allows students to retrieve information, manipulate data and produce results efficiently and in innovative ways. Examining the extent to which students have access to computers at school and at home may be an indicator of how well-prepared students will be to enter an increasingly technological work place.

Has computer assisted instruction CAI produced benefits that result in greater achievement for students in this case in reading?

Soon after the introduction of CAI educational researches began to develop evaluation studies produced potentially useful information on the effects of CAI their messages were shrouded in ambiguity. One reason for unclear messages was that each evaluation report was published separately making the total picture somewhat murky.

Another problem had a deeper and more serious nature. These evaluation studies were never exact replications of one another. They differed in experimental design and execution, setting and the type of computer applications investigated. To confound matters evaluation findings or results tended to differ from one investigation to another findings from different studies differed from each other with some studies producing contradictory results. As well many of the reviews are typically narrative and discursive in presentation resulting in their multiplicity of findings not capable of being absorbed by the nearer without quantitative methods of reviewing.

CONCLUSIONS :-

Alarms about a "literacy crisis" among young people have been sounded on a regular basis for more than a century. Yet as each generation of students matures, it is able to accomplish the reading and writing tasks necessary for society to continue. Perhaps then, rather than sounding more alarms, it is time to consider what anxieties, particularly economic anxieties, drive the perpetual literacy.

Computer-Supported Collaborative Learning (CSCL) is often presented as a promising learning method. However, it is also facing some new challenges. Apart from answering the question of whether or not working with CSCL generates satisfying learning outcomes, it is important to determine whether or not all participants profit from collaboration, with the computer as a means of communication.

Students whose language, ethnicity and race are not represented in a school's dominant culture experience varying degrees of success in reading achievement, resulting in persistent gaps in reading achievement. Culturally responsive instruction can help to close that gap. This is teaching strategy capitalizes on the knowledge and literacy strategies students learn in their homes and communities.

Experiments that assign intact groups (usually schools) to treatment conditions are increasingly common in educational research. The design of group randomized experiments requires knowledge of the intraclass correlation structure to compute statistical power and to determine the sample sizes required to achieve adequate power.

Some researchers have argued that the different domains comprising language (e.g., phonology, semantics, and grammar) may influence reading development in a differential manner and at different developmental periods. The purpose of this study was to examine proposed causal relationships among different linguistic subsystems.

Article Source: http://www.articlesbase.com/information-technology-articles/effectiveness-of-computer-assisted-instruction-in-reading-achievement-among-secondary-school-students-758089.html

Wednesday, April 15, 2009

Why Add Streaming Audio To Your Website

by: ripsaw

If you have a message you need to get across streaming audio may be just what the doctor ordered. Your website will almost always convert better with audio buttons. Almost any survey you see posted on websites will state that adding audio to your website will increase sales and your conversion rate. There are many reasons to add streaming audio to your site. Some of the more common uses of audio on your website are as follows.

Speaker: Someone who needs to get their speeches or sermons heard would be advised to use the power of the Internet to get their message across. Your voice will be heard all around the world.

Musician: A local band does not have to stay local in this day and age. The dream of many musicians is to be able to make a living with their music. This dream is now possible; you can have fans from all over with the power of the Internet.

Businessman: Local Businessmen can share their product and sales pitch from their own office any time day or night. Your product can sell itself while you are home asleep or taking the day off at the beach.

Internet Marketer: The guys selling products on the web can increase their conversion rate with streaming audio. Audio books or Ebooks read aloud into a microphone are all the rage at the moment.

You want to go to the trouble of learning to add audio to your website because you will soon be recognized as someone who knows what is going on in your chosen field. When the person visiting your site hits the play button you will be an expert in their eyes and treated with respect as an expert in your field Some people can get a website up and running with text and a few images. It takes a little more effort to add streaming audio to your site.

How do you add streaming audio to your website you may be asking. It really is quite simple.

Record the audio you want to put on your website.
Edit the audio
Convert the audio into the correct format using one of the popular programs
Copy and paste the code your program gives you into your web page.
Upload your web page and audio buttons onto your server.

Streaming audio is not that hard to get up on your website. The software available today makes this process easy to master. Look around the Internet, pick out a good tutorial website and get your streaming audio up on your site today.

Article Source: http://www.ArticleStreet.com/

Wednesday, April 1, 2009

How To Secure A Computer

Source : IT Planet.com

Internet is a full of threats like viruses, spyware, adware, Trojan horses and web worms. Similarly there are known threats to the emails like phishing, identity theft and sending spam etc. There are different email security mechanisms and you can protect your email by securing the email gateway, email encryption, implementing firewall and using the anti-phising techniques.

Additionally, you need to secure the email client program and set the filters to block the emails from the unauthorized sources and from known persons. Today organizations look for the email security solutions to provide the safest delivery of the emails to their clients. As discussed above there are many solutions that reduce the email attacks.

Most of the email related security breaches come due to the lack of knowledge and awareness. Any scammed email may results in the loss of financial information and may cause virus attack etc. These attacks jeopardize the organization’s businesses and results in the financial losses for the individuals and for the organizations. The following tips will certainly help you to deal with the email security threats.

1. Install an up-to-dated an Antivirus program to your computer.
2. Install and configure firewall software or hardware to your computer and especially on the gateway computer.
3. Never open any email attachment from the unknown source or sender.
4. Install and configure the Email security software to your computer GFI email security is one of them.
5. Digitally sing your emails.
6. Make sure that your email authentication process is encrypted.\r\n
7. Use a secure email client.
8. Don’t reply to the spammers emails.
9. Protect your network with the firewall and antivirus solutions against the email threats.
10. Never send your personal information to anyone like SSN, Credit card number, date of birth, bank account’s detail and others through the email.

Wednesday, March 25, 2009

Know More About Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL) is the most widely used technology for providing a secure communication between the web client and the web server.Most of us are familiar with many sites such as Gmail, Yahoo etc. using https protocol in their login pages.When we see this, we may wonder what’s the difference between http and https.In simple words HTTP protocol is used for standard communication between the Web server and the client. HTTPS is used for a SECURE communication.
What exactly is Secure Communication ?

Suppose there exists two communication parties A (client) and B (server).

Working of HTTP

When A sends a message to B, the message is sent as a plain text in an unencrypted manner.This is acceptable in normal situations where the messages exchanged are not confidential.But imagine a situation where A sends a PASSWORD to B.In this case, the password is also sent as a plain text.This has a serious security problem because, if an intruder (hacker) can gain unauthorised access to the ongoing communication between A and B , he can see the PASSWORDS since they remain unencrypted.

Now lets see the working of HTTPS

When A sends a PASSWORD (say “mypass“) to B, the message is sent in an encrypted format.The encrypted message is decrypted on B’s side.So even if the Hacker gains an unauthorised access to the ongoing communication between A and B he gets only the encrypted password (”xz54p6kd“) and not the original password.This is shown below


How is HTTPS implemented ?

HTTPS is implemented using Secure Sockets Layer (SSL).A website can implement HTTPS by purchasing an SSL Certificate.Secure Sockets Layer (SSL) technology protects a Web site and makes it easy for the Web site visitors to trust it. It has the following uses

1. An SSL Certificate enables encryption of sensitive information during online transactions.
2. Each SSL Certificate contains unique, authenticated information about the certificate owner.
3. A Certificate Authority verifies the identity of the certificate owner when it is issued.


How Encryption Works ?

Each SSL Certificate consists of a Public key and a Private key. The public key is used to encrypt the information and the private key is used to decrypt it.When your browser connects to a secure domain, the server sends a Public key to the browser to perform the encryption.The public key is made available to every one but the private key(used for decryption) is kept secret.So during a secure communication, the browser encrypts the message using the public key and sends it to the server.The message is decrypted on the server side using the Private key(Secret key).

How to identify a Secure Connection ?

In Internet Explorer, you will see a lock icon Picture of the Lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar.You can click the lock to view the identity of the website.

In high-security browsers, the authenticated organization name is prominently displayed and the address bar turns GREEN when an Extended Validation SSL Certificate is detected. If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED.

So the bottom line is, whenever you perform an online transaction such as Credit card payment, Bank login or Email login always ensure that you have a secure communication.A secure communication is a must in these situations.

Original Source :
Writer By : Srikanth
Source : www.gohacking.com

Tuesday, March 24, 2009

Jardiknas or National Education Network

In Indonesia Jardiknas is a massive infrastructure specially built as an intranet connection.
The development of this infrastructure started in early 2007 and estimated to finish in 2009.



Technology: MPLS, VPN-IP and VSAT-IP
Acess : Teresterial (wireline, wireless) and Satellite



This network will covers:
• Official Zone
• Higher Level Education Zone (INHERENT)
• Lower Level Education Zone
• Personal and Community Zone

In order to carry this mission, the Department of Education Republic of Indonesia will be performing a large scale training for 1.9 million teachers and officers who will be in charge of the network.

- Jardiknas connect all Provincial and Regency/Kabupaten office of Education Administration and Schools and Universities throughout Indonesia

- The aim of Jardiknas is to facilitate and optimize data and information flow and learning resources among education institution.

- Jardiknas also help information and data flow in a transparent, efficient, and effective way.

- Jardiknas also help decision support system for the Ministry of Education and the office at Provincial and Regency/Kabupaten level.

Retreive From:
- Giri S Hadihardjono, The National Council for Information and Communication Technology - Asia Africa Open Source Conference, Jakarta, 18-19 November, 2008
- jardiknas.diknas.go.id
- http://vsatku.blogspot.com/

Jardiknas or National Education Network

In Indonesia Jardiknas is a massive infrastructure specially built as an intranet connection.
The development of this infrastructure started in early 2007 and estimated to finish in 2009.

Technology: MPLS, VPN-IP and VSAT-IP
Acess : Teresterial (wireline, wireless) and Satellite

This network will covers:
• Official Zone
• Higher Level Education Zone (INHERENT)
• Lower Level Education Zone
• Personal and Community Zone

In order to carry this mission, the Department of Education Republic of Indonesia will be performing a large scale training for 1.9 million teachers and officers who will be in charge of the network.

- Jardiknas connect all Provincial and Regency/Kabupaten office of Education Administration and Schools and Universities throughout Indonesia

- The aim of Jardiknas is to facilitate and optimize data and information flow and learning resources among education institution.

- Jardiknas also help information and data flow in a transparent, efficient, and effective way.

- Jardiknas also help decision support system for the Ministry of Education and the office at Provincial and Regency/Kabupaten level.

Retreive From:
- Giri S Hadihardjono, The National Council for Information and Communication Technology - Asia Africa Open Source Conference, Jakarta, 18-19 November, 2008
- jardiknas.diknas.go.id

Monday, March 23, 2009

Starting a Blog

by Peter Barnes


The multitude of steps required to successfully start a blog can become a little complex, especially if you are determined on making it your #1 source of income. This article should be considered a brief tutorial as opposed to a whole walkthrough. If you're just starting out, taking notes on this article is a great place to get grounded in the fundamentals.
Your first step will be to discover a theme, something in which you already have knowledge of or wouldn't mind writing about, while taking search engine popularity into consideration.

The second step when beginning a blog is to pick out a blogging service. There are many good services available. Two of these are TypePad.com and Xanga.com. Most of these make it easy for you to add revenue-growing ads, such as Google Adsense.

Third, you should determine the appearance of your blog. From the colors to the number of columns, those individuals who want to pull in a decent income from their blogs have to make sure that the blog's appearance is decent.

Those interested in starting a blog should also consider investing in an offline blogging client. These allow you to type your blog entries in a word processing format, similar to MS Word. This makes it less difficult for you to publish blog entries.

Another great idea is to add 'bells and whistles' to your blog to make it more magnetic to visitors, and those who are frequent readers. Bloglet, for example, permits readers to sign up to your site and receive an email whenever you make a new post.

You should also publicize your blog through blog tracking sites such as Pingomatic. Another good idea is to submit your best posts to Blog Carnivals. High quality posts on many topics are collected at these types of sites.

Adding content on a regular basis is the only way that your blog will get acknowledged. If done right, it'll create a great source of income for you down the line.

http://www.profit-from-blogging.com/

Friday, February 13, 2009

2008 Security Survey: We're Spending More, But Data's No Safer Than Last Year

In the face of growing demand to target security investments based on risk management principles--a domain foreign to many CIOs and infosec practitioners--there's wisdom to be garnered from our peers.
By Mike Fratto
InformationWeek
June 28, 2008 12:02 AM (From the June 30, 2008 issue)


Zero in on the information security risks facing your company, or you'll likely find yourself overwhelmed. That's the overall message of our 2008 InformationWeek Strategic Security Study, which polled nearly 1,100 IT and business professionals about plans and priorities for securing their companies' assets.

Getting the money for security isn't the biggest problem: Fully 95% will see their budgets either hold steady or increase this year. It's that the money isn't making data safer. Sixty-six percent of respondents say their vulnerability to breaches and malicious code attacks is either the same as last year or worse. Since when is "no worse than before" an acceptable return on investment?
Here's one illustration from our security study of how risk management can focus companies on the most important threats: Insecure coding practices are a pox on all our houses. Roughly half of respondents whose organizations have risk management plans in place specify security features at the time of application design. Of those without risk management plans, just 22% focus on code security.
We need the jolt that this security study provides. Twenty-one percent of companies never conduct security risk assessments, and of those that do, just one in five imposes the rigor of using a specialized external auditor. This despite 63% contending with government or industry regulations related to data security, many of which don't give adequate guidance on how to comply. Best practices are the best defense in such gray areas.

Companies also are behind in implementing encryption to protect customer and employee data. We had hoped that the ongoing parade of high-profile data losses would set most companies on the road to comprehensive privacy protection. So we were discouraged that the only actions to safeguard customer data that are used by more than half of companies are ... informing employees of standards and putting a privacy policy on the Web site. Fine steps, but they don't exclude the need for encryption (used by 34%) or privacy policy audits (25%). Amazingly, 11% say they have no privacy safeguards for customer data. Zip. Zero.

We could go on, and we will. But we need to stop for a second and ask, what gives?

Tuesday, January 20, 2009

How to Make Money on Internet

by De

Complete And Comprehensive Guide To Improving Your Internet Marketing Knowledge. Over 250 Individual Videos Show You How. Well, this comprehensive series of Internet Marketing Tutorial Video consists of over 250 individual videos, giving you over 2000 minutes of easy view videos. A step by step guide on exploding your business to the internet Improving Your Internet Marketing Knowledge!
What many untrained Internet marketers do not realize is there there are literally thousands of niche markets worth millions of dollars each online. These niche markets have a demographic that's ready and willing to make purchases online. These markets are lucrative enough to potentially wipe your financial problems away with one successful product launch. Imagine being able to launch a hugely successful product to a target niche audience without worrying about competition. The formula to discovering these niche markets is a closely guarded secret amongst elite Internet marketers. This is your opportunity to learn their secret. Top Dollar Niche Is An Ebook That Teaches People How To Cash In On Thriving Niche Markets. Top Dollar Niche Click Here!

You are about to learn the secret art of Fire-And-Forget! That's why some internet marketers make huge incomes, and others struggle for pennies from Adsense, Clickbank, Ebay, Amazon, and others. My system shows you how to take a single domain name, and a single hosting account, and spin that platform into a niche autoblogging empire; ALL ON COMPLETE AUTOPILOT! The 100k+ Blogging Formula Is Setting The Blogosphere On Fire! Blogging Formula !

http://www.goarticles.com/cgi-bin/showa.cgi?C=1468076