Monday 19 September 2011

Network

topologies
A network is a group of two or more computer systems linked together. There are many types of computer networks, including:

  • local-area networks (LANs) : The computers are geographically close together (that is, in the same building).

  • wide-area networks (WANs) : The computers are farther apart and are connected by telephone lines or radio waves.

  • metropolitan-area networks MANs): A data network designed for a town or city.

  • In addition to these types, the following characteristics are also used to categorize different types of networks:

  • topology : The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. 

  • protocol : The protocol defines a common set of rules and signals that computers on the network use to communicate. One of the most popular protocols for LANs is called Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network .

  • architecture : Networks can be broadly classified as using either a peer-to-peer or client/server architecture.

  • Monday 12 September 2011

    Computer Security Day - Computer Security is Everyone's Responsibility

    http://www.cybersafe.my/wcsd/images/banner.jpg

    53 ways to participate/observe the Computer Security Day

    1. Display computer security posters.
    2. Present computer security briefings.
    3. Change your password.
    4. Check for computer viruses.
    5. Show computer security videos, films or slides.
    6. Protect against static electricity.
    7. Modify the logon message on your computer system to notify users that Computer Security Day is November 30.
    8. Vacuum your computer and the immediate area.
    9. Clean the heads on your disk drives or other magnetic media drives.
    10. Back-up your data. (after being certain that it is virus-free.)
    11. Delete unneeded files.
    12. Initiate a computer security poster design contest for next year.
    13. Demonstrate computer security software.
    14. Publicize existing computer security policy.
    15. Issue new and improved computer security policy.
    16. Declare an amnesty day for computer security violators who wish to reform.
    17. Announce COMPUTER SECURITY DAY in your internal newsletter.
    18. Examine the audit files on your computers.
    19. Verify that the "Welcome" message that is normally used on your computer is appropriate for your organization.
    20. Write-protect all diskettes that are not to be written to.
    21. Take the write-protect rings out of the tapes in your library.
    22. Verify your inventory of computer applications.
    23. Verify your inventory of computer utilities and packaged software.
    24. Verify your inventory of computer hardware.
    25. Install and inspect power surge protection as appropriate.
    26. Install fire/smoke detection and suppression equipment in computer areas.
    27. Eliminate dust from computer areas, including chalk dust.
    28. Provide dust and water covers for personal and larger computers.
    29. Post "No Drinking" and "No Smoking" signs in computer areas.
    30. Develop a recovery plan for all computer systems that require one.
    31. Verify that passwords are not "Posted" and all other keys are secured.
    32. Verify that backup power and air conditioning fit your needs.
    33. Have a mini training session to provide all computer users with a basic understanding of computer security.
    34. Verify that all source code is protected from unauthorized changes.
    35. Verify that each computer has trouble log and that it is being used.
    36. Verify that appropriate off site storage exists and is being used.
    37. Remove all unnecessary items such as extra supplies, coat racks, and printouts from the computer room.
    38. Select a computer system on which to perform a risk analysis.
    39. Begin planning for next year's COMPUTER SECURITY DAY.
    40. Change the FORMAT command in DOS to avoid accidentally FORMATing of disks.
    41. Protect the computer on your store-and-forward phone message system.
    42. Hold a discussion of ethics with computer users.
    43. Volunteer to speak about computer security at a local computer club or school.
    44. Collect Computer Security Day memorabilia to trade with others.
    45. Register and pay for all commercial software that is used on your computer.
    46. Register and pay for all shareware that you use regularly.
    47. Install all security-related updates to your computer's operating system.
    48. Help a computer novice backup their files.
    49. Protect all cabin computers from floating droplets of liquid.
    50. Plan to attend a computer security meeting or seminar.
    51. Consider the privacy aspect of the data on your computer and protect it.
    52. Update your anti-virus program
    53. Add to this list . things that you believe would benefit all advocates of computer security

    Corel CorelDRAW Graphics Suite X5 + Crack (x32-x64)



    Corel CorelDRAW Graphics Suite X5 + Crack (x32-x64)
    Multilanguage | COMPLETE VERSION | 500 MB
    Genre: Graphics & Design

    CorelDRAW Graphics Suite X5 - a new graphics package that allows you to confidently move forward any graphic project. Sharp tools, the best on the market compatible files and updated content will help you bring creative ideas into professional results, ranging from colorful logos and signs to unusual marketing materials and attractive web graphics.
    It consists of vector graphics CorelDRAW X5, raster graphics editor PHOTO-PAINT X5, a program for transforming raster images into vector Corel PowerTRACE X5, a program for creating screenshots Corel CAPTURE X5, as well as e-book on the work of the package CorelDRAW Handbook. This package combines the full range of excellent design capabilities, speed and ease of use.
    NO PASSWORD

    Internet Download Manager IDM 605 Build 11 CRACK


    Internet Download Manager : The fastest download accelerator

    Internet Download Manager (IDM) is a tool to increase download speeds by up to 500 percent, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.

    Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.

    Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, directories with authorization, MP3 audio and MPEG video content processing, and a large number of directory listing formats. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

    Key features of Internet Download Manager:

    * All popular browsers and applications are supported! Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
    * Download with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP and HTTPS protocols.
    * Download Speed. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
    * Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
    * Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
    * Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
    * Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
    * Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
    * IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
    * IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
    * Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
    * Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
    * Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
    * Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
    * Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
    * Drag and Drop. You may simply drag and drop links to IDM, and drag and drop complete files out of Internet Download Manager.
    * IDM is multilingual. IDM is translated to Arabic, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, French, German, Hungarian, Italian, Japanese, Lithuanian, Macedonian, Polish, Portuguese, Romanian, Russian, Slovenian, Spanish, Thai languages.

    What's new in version 6.05 Build 10:
    * Made a workaround to resolve compatibility problems of IDM network drivers with antiviral software drivers which caused some sites to load slowly in browsers

    Multilingual: English, Spanish, French, Italian, Deustch, Japanese, Portugues, etc
    Compatible with: Windows 95/98/Me/2000/NT/XP/2003/Vista/Server 2008/7 (32/64-bit)


    TYPES OF SECURITY MEASURES

    • Data backup
    • Cryptography
    • Anti virus
    • Anti spyware
    • Firewall
    • Human aspects

    COMPUTER SECURITY

    1.HARDWARE SECURITY
    -Hardware security refers to security measures used to protect the hardware specifically the computer and its related documents
    -The examples of security measures used to protect the hardware include PC-locks,keyboard-locks,smart cards and biometric devices.

    2.SOFTWARE SECURITY AND DATA SECURITY
    -Software and data security refers to the security measures used to protect the software and the loss of data files.
    -Examples of security measures used to protect the software are activation code and serial number.

    3.NETWORK SECURITY
    -The transfer of data through network has become a common practice and the need to implement network security has become significant.
    -Network security refers to security measures used to protect the network system.One example of network security measures is firewall.With firewall,network resources can be protected from the outsiders.