Linggo, Hulyo 31, 2011

The Z Spot

Hello students! I decided to come up with my own corner in our blog for me to give my assessment on your activities. This will be a weekly post so that I can observe the progress of your projects and assignments. 
My first post will just be reminders and it goes something like this:
        • 3rd year IT students should join the yahoo groups so that your Network Assessment documentation will be submitted there. My updates regarding the project will be posted there as well. http://groups.yahoo.com/group/dvcit2009/
        • In posting your winning article for our Elective 1 subject, please include your own views about it and the resource as well because that is part of your grade aside from getting 10 comments from the visitors and posting it on the scheduled date.
        • Midterm exam for Data Communication and Networking is on August 4, 2011. 
        • You may also like http://www.facebook.com/pages/Davao-Vision-Colleges-Inc/246301252053569 and http://www.facebook.com/pages/Zirdge-Llego-United-First-Class/250662451611501 for other announcements.    
I am not asking that much,all I want is to give you an idea on how to value deadlines and set your priorities wisely because the school is just a training ground in preparation for your future battle.
Sir Zirdge believes in you so much!♥ 

Biyernes, Hulyo 29, 2011

Computer Hacking by Udieh

What is Computer Hacking?
  
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
http://www.wisegeek.com/what-is-computer-hacking.htm


Top 10 Hackers

1. Jonathan James:
James rose to fame when he became the first underage to sent to prison for cyber-crime, i.e. hacking. By the time he was being sentenced, he was only 16 years old. To him, his online exploits were simply for fun and not anything else. His main targets were blue chip corporate organizations. He managed to install a backdoor virus in the system of a government agency – DTRA. Using the backdoor, he was able to read sensitive e-mail messages and capture usernames and passwords of the agency employees stored in the database. In addition, he managed to hack into NASA computers and did away with application programs valued at $1.7 million. On realizing this, NASA was compelled to switch off its computer systems costing them approximately $41,000 in the process.

2. Adrian Lamo:
Adrian Lamo was made famous after managing to break into various corporate organizations’ computer systems, i.e. New York Times and Microsoft Inc. He was nicknamed “homeless hacker” given that he utilized computers in public libraries and cyber cafes to hack into other networks. Lamo’s work mainly consisted of finding flaws in corporate organizations security systems and alerting them of it. Some of the organizations that Lamo managed to hit were Yahoo, Citigroup, Bank of America and Cingular. What made Lamo’s activities illegal is that he was not hired by any of the companies to find and rectify flaws in their systems. After breaking into New York Times local area network, he was able to include himself as part of the network administrators thus giving him access to personal data, i.e. social security numbers.

3. Kevin Mitnnick:
Unlike other hackers, Kevin Mitnick is a self-proclaimed hacker with the nickname “hacker poster boy”. His arrest was highly publicized by the police. Whereas, the media managed to make him as one of the most feared hackers, in actual sense his work was lesser compared to the above two. The Department of Justice has labeled him as one of the most wanted cyber criminals. There are two movies which detail his exploits, i.e. Freedom Downtime and Takedown. His hacking activities begun when he started to exploit the Los Angeles bus punch thus enabling him to get free rides in the buses. He got into trouble with the law when he decided to on a hacking spree from coast to coast. However, his main undoing was when he managed to hack into a fellow hacker computer, Tsutomu Shiomura.

4. Kevin Poulsen:
Kevin is also referred to as Dark Dante. He rose to fame for hacking into LA radio’s KIIS-FM telephone lines. This act enabled him to acquire a brand new Porsche in addition to other property. He got into trouble with the law when he decided to hack into the FBI database. As he was being pursued, he got deep in mucky waters by hacking into the federal PCs so as to obtain wiretap information. Unlike other hackers, his hacking activities mainly revolved around hacking into telephone networks. Surprisingly, when his picture was eventually released on television show, the telephone lines crashed. Eventually, he was arrested in a supermarket.

5. Robert Tappan Morris:
Morris is famed for developing the Morris worm. It is the first worm which was released on the web. As a result of his actions, he became the first individual to be prosecuted under the 1986 Computer Fraud and Abuse Act. The code used in the worm was written by Morris whilst he was still a student at Cornell. His main intention was to get to know the extent of the internet. However, the worm managed to duplicate itself all over the World Wide Web bring a couple of networks to a halt. To date, the number of computers that were affected by the worm is still not known

6. Stephen Wozniak:
Steve Wozniak has been famously referred to as the other Steve of Apple Computers. Steve Woznak is best known for helping Apple Computers to better their products by recognizing flaws and fortifying them.

7. Tim Berners-Lee:
Whereas, Tim Berners-Lee is accredited for inventing the World Wide Web, while he was still a studying at the Oxford University, Berners-Lee was found to be hacking together with a friend. Due to his actions, he was banned from using the institutions computers

8. Linus Torvalds:
Linus Torvals is known as the godfather of Linux Operating System. While he was still a student, Linus exploited the weaknesses of the operating systems in use and decided to come up with his own.

9. Richard Stallman:
Richard Stallman began his hacking activities whilst he was still a student at MIT. His desire was mainly driven by the need to remove restrictions on computer use in the institution laboratory. He would mainly break passwords used on computer systems and send word around that computers were free to use.

10. Tsutomu Shiomura:
His rise to fame was the most unfortunate. After Kevin Mitnick broke into his computer, he vowed to assist the authorities in bringing him to justice. 
(http://top-10-list.org/2011/07/27/top-10-computer-hackers/)

Disadvantages and Advantages of Computer Hacking

The "advantage" so to speak of computer hacking is that you get programs, etc free. However, IMHO, the disadvantage is that since it is illegal (in the United States) if you are caught, then you can end up in prison with some pretty hefty fines. For example, if one hacks Microsoft Vista (as an example) and Microsoft discovers it Microsoft will press charges. I believe the prison term is up to 10 years, while the fine is anywhere from $10K to $100K. I am sure Keving Mittnick could tell you more.
http://www.blurtit.com/q111250.html 


Computer hacking is defined as accessing others account without any approval from the owner. This hacking is illegal actually but why there are still people tempt to do it so. Maybe it because they can gain money from it or to destroy ones reputation. (Udieh)



 



Huwebes, Hulyo 21, 2011

The Difference Between a Cell Phone, Smartphone and PDA

What Is a Mobile Phone?
 
An electronic telecommunications device often referred to as a cellular phone or cell phone. Mobile phones connect to a wireless communications network through radio wave or satellite transmissions. Most mobile phones provide voice communications, Short Message Service (SMS), Multimedia Message Service (MMS), and newer phones may also provide Internet services such as Web browsing and e-mail.

Sample pictures of Mobile or Cellular phones

 

 Sample video of a Mobile phone


       
What Is a PDA?

Short for personal digital assistant, a handheld device that combines computing, telephone/fax, Internet and networking features. A typical PDA can function as a cellular phone, fax sender, Web browser and personal organizer. Unlike portable computers, most PDAs began as pen-based, using a stylus rather than a keyboard for input. This means that they also incorporated handwriting recognition features. Some PDAs can also react to voice input by using voice recognition technologies. PDAs of today are available in either a stylus or keyboard version.

Apple Computer, which introduced the Newton Message Pad in 1993, was one of the first companies to offer PDAs. Shortly thereafter, several other manufacturers offered similar products. Today, one of the most popular brands of PDAs is the series of Palm Pilots from Palm, Inc.

Sample pictures of PDA

Sample video of  PDA


What Is a Smartphone?

             A smartphone is considered to be the combination of the traditional PDA and cellular phone, with a bigger focus on the cellular phone part. These handheld devices integrates mobile phone capabilities with the more common features of a handheld computer or PDA. Smartphones allow users to store information, e-mail, install programs, along with using a mobile phone in one device. A smartphone's features is usually more oriented towards mobile phone options than the PDA-like features. There is no industry standard for what defines a smartphone, so any mobile device that has more than basic cellphone capabilities can actually be filed under the smartphone category of devices.

Sample pictures of Smart phone's



Sample video of Smart phone's


 
Source:

http://www.webopedia.com/DidYouKnow/Hardware_Software/2008/smartphone_cellphone_pda.asp. 
http://www.youtube.com/watch?v=hQUt8C4iVKc
http://www.youtube.com/watch?v=Iz4GwLpxAhc
http://www.youtube.com/watch?v=MnGFy_6Ts7s

My opinion:

My views and opinion about my article is that, we have the right as consumers or buyers to choose what is the best phones, gadgets we want to have that definitely fits our needs, in order for us to have an ideas and views about this here are some examples and guideline info (the one that i have post). so if you think you want an easy user of cell phones, choose mobile phones. A handheld device that loves you most upon writing, we have PDA cellphones. And by just dragging an item (touch screens), Smartphone is for you ...
By:  MARY HIALEAH  P. MARTILLAS


Wave-power ships could bring cheaper clean electricity



SHIPS that harvest energy from the waves and store it in batteries could one day generate electricity from the world's oceans more cheaply than today's wave-power devices.
The ships would sail to a suitable location, drop anchor and start generating electricity from wave energy. Once their batteries were fully charged they would return to shore and feed the electricity into the grid.
Unlike conventional wave-power devices, the ships would not need undersea cables to link to the electricity grid, says Andre Sharon at Boston University and the Fraunhofer Center for Manufacturing Innovation, also in Boston. These cables typically cost more than $500,000 per kilometre and account for a significant fraction of the cost of conventional wave-generated electricity.
The 50-metre-long ships would harvest wave energy via buoys attached to their sides by pivoting arms. While the hull remains relatively stable, the buoys would bob up and down on the waves, causing the arms to pivot back and forth and drive a generator producing up to 1 megawatt of electrical power. The batteries are planned to have a capacity of 20 megawatt-hours, so the ships would have to stay at sea for at least 20 hours for a full charge. Sharon presented the concept at the Clean Technology 2011 Conference and Expo in Boston.
Unlike conventional wave-power devices, the power-generating mechanism will not have to withstand severe storms, as the ships could be kept in port during bad weather. Fixed wave-power generators must be built to cope with extremely high waves, which adds substantially to their cost, Sharon says. Costs could be cut further by retrofitting existing vessels, which could either have their own engines or be towed out to sea and back.
Sharon used 3D printing to produce a prototype, and tested it in a wave tank. He calculates that the system should generate electricity at a cost of $0.15 per kilowatt-hour. This would make it cheaper than energy from existing wave systems, which costs between $0.30 and $0.65 per kWh. Offshore wind energy costs from $0.15 to $0.24 per kWh, and solar power around $0.30 per kWh.
Mark Jacobson, director of the atmosphere and energy programme at Stanford University in Palo Alto, California, calls the idea "very creative". He notes that unlike electricity from many other renewable sources, power from the batteries could be held back and used at times of peak demand.

Videos of Wave Power Ship:


Point of view:

This new kind of electricity provider is somehow one of the alternative ways for us to help the producers of electricity may less the more production of the said technology.
Even there are some disadvantages may occur from the new technology, but in somewhat way we can proved and testify it's usefulness to our needs. And even if this technology is still unknown by the society, maybe the reason is that the discoverer are still trying to know and under go on a certain testing for it's convenient use.
this would be all. thank you.

by: Argen Lerm Torres



by: ARGEN LERM TORRES