Thursday, 15 November 2012

INTERNET AND IT'S SAFETY
The internet is a global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions. Accoding to Internet World Stats, as of December 31,2011 there was estimated 2,267,233,742 internet users worldwide. This represents 32.7% of the world's population.

This are problems you might have when using the internet:
VIRUS:
A computer virus is a program or piece of code that is loaded onto your computer without your knowlede and runs against you wishes. Viruses can also replicate themselves. All computer viruses are man-made. a simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all avaible memory and bring the systemto a halt. An even more dangerous type of virus is one capable of transmitting itself across netwrok and bypassing security systems.
Viruses can get on to your computer through
  • Visiting certain websites
  • Opening emails downloading attachements or content from the Internet
  • using infected protable storage devices such as memory sticks, CDs, DVDs
  • Connecting to an infected hard disk.
SPYWARE:
A Spyware is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be download from the internet howeve it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware  monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even password and credit numbers.

COOKIES:
A cookie is a small file which stores information related to your internet activity and then reports this back to the website server.
Cookies are used legimately by website creators to enable websites to be customised for individual users.
For example, if you go on the BBC website, you can customise the hompage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can ucause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.

PHISHING:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The email directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user information.

SPAM:
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

HACKERS:
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer withouth your permission in order to steal information which they could use for malicious or criminal purposes.
Using peer-to-peer software could increase the risk of hackers accessing data stored on your computer.

IDENTITY THEFT:
Identity Theft is a crime whereby criminals impersonate individuals, usually for financial gain. In todays;s society, you often neeg to reveal personal bits of information about yourself, such as social security numbers, a signature, name, address, phone numbers, and even banking and credit card information. If a thief is able to access this personal information, he or she can use it to commit fraud in  your name. With this information the thief could do things such as apply for loans or new credit card accounts. They can then request a billing address chnage and run up your existing credit card without you knowledge. They can also use counterfeit checks and debit cards, or authorize electronic transfer in your name, to wipe out your bank account.


This is a list of how we can protect ourselves from this risks:
  • Copyright
  • Patents
  • Trade Marks
  • Other protection


  • COPYRIGHT:
    A Copyright protects the form of expression of a creator against copyin. literary, dramatic, musical and artistic works are included within the protection of U.S copyright law. The USPTO does not register copyrights, are the copyrights office does not.
    Copyright protection is  given to the authors of "original works of authorship, " including literary, dramatic, musical, artistic and certan other intellectual works. This protection is available for both published and unpublished works.
    The owner of copyright has the exclusive right to do and to authorize others to do the following:
    • Reproduce the work in copies or sound recordings.
    •  Make derivative works based upon the original.
    • Distribute copies or sound recordings of the original to the public by sales, rentals, leasing, lending or licensing.
    • Perform the original publicly: and that would include the use of digital audio.
    • Display the original publicly.

    PATENT:
    A patent is a set of exclusive rights granted by a government to an invento or applicant for a limited amount of time (normally 20 years from filing date). It is a legal document defining ownership of a particular area of new technology.
    Patents are Granted in over 150 countries and are predicted on the theory that inventors are more likely to invent and disclose that knowledge to the public in exchange for a limited period of exclusivity. the right granted by a patent excludes all other from making, using or selling an invention or products made by an invented process.

    TRADEMARK:
    Trademarks is a distinctive sign or indicator used by an individual, business organization, or ohter legal entity to identify for consumers that the products or services on or with wich the trademark appears orignate from a  unique source, designated for a specific market, and to distinguish its products or services from those of ohter entities.

    Wednesday, 14 November 2012

    FROM BRICK TO SLICK

    HISTORY OF MOBILE PHONES

    Vintage mobile phones                                         
    Although most of us feel like we couldn't live without our mobile phones, they've not really been in existence for long. In fact, mobile phones as we know them today have only been around in the last 10 to 15 years.

    THE FIRST MOBILE PHONES

    Mobile phones particularly the smatrphones that have become our inseperable companions today, are relatively new. However, the origin of the mobile phone goes bakck to 1908 when a US Patent was issued in Kentucky for a wireless telephone.
    The story of the modern mobile phone really begins in the 1940s when engineers working at AT&T developed cells for mobile phone based stations.
    The very first mobile phones were not really mobilephones at all. They were two- way radios that allowed people like taxi drivers and emergency services to communicate. Instead of relying on base stations with seo=perate cells (and the signal being passed from one cell to another), the first mobile phone netwroks are often referred to as 0G mobile phones, or Zero Generation mobile phones. Most phones roday rely on 3G or third-generation mobile technology.

    THE DEVELOPMENT OF MOBILE PHONE TECHNOLOGY

    A Motorola employee called Martin Cooper is widely considere to be a key player in the history of mobile phones, inventing the first mobile phone that was for practical use. Handsets that could bet used in a vehicle had been developed prior to Martin Cooper's phone, but his was the first usable truly portable mobile telephone. Cooper made mobile phone history in April 1973 when he made the first ever call on a handheld mobile phone

    

    LANDMARK IN MOBILE PHONE HISTORY

    • Japan became first country to have a city-wide commercial cellular mobile phone network in 1979
    • The Nordic Mobile Telephone (NMT) system launched in Denmark, Norway, Sweden and finland in 1981.
    • The next major step in mobile phone history was in the mid eighties with the First Generation (1G) filly automatic cellular networks were introduced.
    • The first ever mobile phone to be approved by the FCC ( Federal Communications Commission) in the USA was the Motorola DynaTac in 1983.

    MODERN MOBILE PHONES
    Mobile telephony developed on lieaps and bounds over the next decade, particularly with the arrival of handover technology. This allowed users to keep their connections as they travelled between base stations- so as a user walked from one mobile phones mast to another, the conversation woul not drop or be interrupted.
    The birth of the Second Generation (2G)  mobile phones was in Finland in 1993. It was also the year that the first SMS text messages were sent and that data services began to appear on mobile phones.
    Mobiles that we use today are 3g mobiles or third generation mobiles. 3G launched in 2001 and allowed operators to offer a huge range of advanced services such as video calling and HSPA data transmission.
    Now the UK market has matured there are several network providers competing for business. These include:
    • Three
    • O2
    • Orange
    • Tesco Mobile
    • T Mobile
    • Virgin Mobile
    • Vodafone
    THE ENDS OF THE LINE FOR MSN WEB MESSENGER
    Microsoft have announced that their veteran web-based messaged client will become unavailable from this Tuesday, June 30. The service has offered access to their popular instant messaging network through a web browser for the past five years
    Since early this year  a newer replacement service for MSN Web Messenger has been available as part of Windows Live Hotmail, featuring direct integration with the email interface and your contact list (known as Windos Live Messenger). This will now become the only officially supported web-based client for accessing the Windows Live Messenger network, apart from the Windows Live Messenegr Web Toolkit which allows developers to integrate messaging controls into their own websites.
    The new web messenger service is available directly from your Hotmail Inboxand acts as another location for Messenger's multiple points of presence (MPOP) feature, meaning that you can sign into the web service whilst still signed into the Windows Live Messenger client on one or more computers. Once signed in, it allows you to easily see which of your contacts are online and if the sender of an email is in your contact list then you can even see if they are available to chat when reading their message. If your Live ID doesn't use Hotmail for its email (as it is hosted on another domain) then you can still access the web messenger in a similar way through Windows Live People
    MSN Web Messenger is one of the last  remaining MSN branded web applications still available, with other online services such as Hotmail and software such as Messenger itself having moved having moved to the Windows Live brand several years ago, so it's good to see this outdated service finally being retired. As Ars points outMicrosoft MoneyMicrosoft Encarta and Windows Live OneCare are also all set to be discontinued from June 30.

    http://www.neowin.net/news/main/09/06/27/end-of-the-line-for-msn-web-messenger
    TASK 1.21

    Find out the differances between IMAP4 and POP3. Write a brief description of how each protocol works.

    USING INBOX TO GET E-MAIL

    Each time you get your e-mail using Inbox, you are using an Internet standard protocol to retrieve your e-mail from the mail server. This protocol defines the Inbox features and capabilities, and how you interact with your mail server. The Pocket PC supports both POP3 (Post Office Protocol version 3) and IMAP4 (Internet Message Access Protocol version 4) protocols for retrieving e-mail. Once you dial your ISP or corporate network to access e-mail, these protocols facilitate the download. Let's look at what POP3 and IMAP4.


    WHAT IS IMAP4 PROTOCOL?

    The IMAP4 protocol provides the ability to download e-mail messages to your Pocket PC. You can control whether e-mail messages are synchronized with your mail server. You can choose to store e-mail in separate folders, and you can select whether or not to synchronize a specific folder. You can even, if you wish, download mail one message at a time.


    WHAT IS POP3 PROTOCOL?

    The POP3 protocol provides the ability to download e-mail messages to your Pocket PC. You can control whether the whole message is downloaded, or whether the messages are then deleted off your e-mail server. You can compose messages offline and send them. However, you cannot synchronize your e-mail directly with your mail server. In addition, POP3 does not support multiple folders for e-mail. All e-mail is received in the same folder.
    DISADVANTAGES OF VIRTUAL LEARNING!
     
    • High possibility of learning disorders, because this system let students to learn independently, causing the lazy students pnly receive materials from students who deligently seek information. For example teacher put some note in blog and let student read and take a note from there.
    • The facilities are still insufficient, especially in rural areas who do not have basic amenities and student from poor family didnt have a pc or connection to the internet. Si it also make learning process difficult.
    • Learning does not occur in a face to face or two way communication, even it happened, in a very little situation.
    • Lack of control of the instructor. student doing their homework by themeself. While surfing, they have also access to other website and not doing their homework better.
    • Students can create problems themselves by signing up for online classes without having the basics such as an email address or an account with an Iinternet Service Provider.
    • Internet students are put at a disadvantage when it comes to networking and forming new relationships. Students can get to know each other over the net however it does not replace the bond that is formed from face-to-face meetings.
    • Higher prices for Interenet based learning can discourage students from this method of learning. Actually comaprisons of different colleges have proven that some institutions are chrging students twice the tuition to do Internet courses. Standford unicersity is known for charging its online students $45,000 in tuition compared to $26,000 for an engineering master's degree.




    PROS AND CONS OF BANNING CELL PHONES IN PUBLIC PLACES

    Some of us have simply had it with cell phone use in public places. In April 2010, Florida Circuit Judge Anthony Johnson ordered a mobile phone owner to toss her phone in the garbage after it rang in his courtroom. Many behaviors stemming from lack of consideration for others have led to bans on cell phone use in businesses and public places.
     
    PROS
    
     
    PRO: SAFETY
     In airplanes and hospitals, cell phones can interfere with the functioning of delicate instruments, a serious consideration. Many states have banned cell use while driving, citing a relationship between phones and traffic accidents. A 1997 "New England Journal of Medicine" study found that talking on a phone while driving quadrupled the risk of an accident, nearly equal to the danger from driving drunk.

     
    PRO: PEACE AND QUIET
    In airplanes and hospitals, cell phones can interfere with the functioning of delicate instruments, a serious consideration. Many states have banned cell use while driving, citing a relationship between phones and traffic accidents. A 1997 "New England Journal of Medicine" study found that talking on a phone while driving quadrupled the risk of an accident, nearly equal to the danger from driving drunk.
     
    PRO: INCOVENIENCING OTHERS
    Often cell phone users will multitask, attempting to carry on a conversation while using an ATM, driving or completing a store transaction. Their divided attention becomes an obstruction to the cashier and an inconvenience to those behind them, who must wait longer.
    CONS
     
    CONS: SAFETY Some argue that having 911 available at the touch of a button is critical to maintaining personal security. Cell phone bans impede drivers' ability to report an accident, road rage incident, medical emergency or crime. Drivers assert the importance of calling for directions if lost or receive help if their car breaks down


    CONS: EMERGENCIES
    Genuine emergencies do occur, and some calls truly cannot wait. People who have sick or elderly family members, parents expecting an important call from their child, and those in the midst of a crisis believe it's acceptable to leave their phones on in public
     
     
    CONS: PERSONAL FREEDOM
    Some Americans believe they have a right to talk on their phones under the First Amendment, and that cell phone bans intrude on their personal freedom. As they pay a high monthly price for this communication option, they believe they can use the devices wherever and whenever they choose
     
     
     
     
     
     
    
    
    
    
    TASK 1.19
    Discuss with your patner what you would do in the following situations:

    a) You have been chatting with another girl and you want to meet up?
    Answer: well i think the best thing to do is to go with someone, because even though you've been chatting with th person for quite long it still remains the fact that you don't know the person.

    b) You are on a social network site and see a rude picture
    Answer: if I should see a rude picture on a social network i'll probably go away from the page and avoid seeing it.

    c) You see pictures of someone that you do not get on with on a social networking site. There is an option for you to write something underneath the picture.
    Answer: I wouldn't write underneath the picture because it will be so immature of me.

    d) You notice tha one of your friends has not protected their website, giving anyone access to see what is on their profile.
    Answer: If i notice that one of my friends has not protected his website i will advice him him to do so and explain the dangers of not protecting profiles on social networks.

    e) Your friend uses IM  and webcam to talk to other friends. There is one person she chats to who never turns on his webcam, making the excuse that it does not work.
    Answer: I would advice my friend to stop chatting with that person or stop videocalling with the person because it might be dangerous.
    WHAT IS SOCIAL NETWORKING?
    Instant messaging and VoIP are great for communicating with just a few people, but what if you want to communicate with large numbers of people?
    Ruby likes to use social networking sites. These websites are specially designed to bring together people who share interests. They also enable users to connect with friends, family and colleagues online. They ,provide a range of ways for users to interact, such as chat, messaging, email, video,voice,file, sharing, blogging and discussion roups. Users can play games and quizzes th BGF BNMM  at allow them to share information with each other.
    Sociak networking is very popular; the websites are used by millions of people all over the world every day. Popular social networking sites include facebook MySpace, Bebo and Twitter. Some sites allow users to personalise their own space by adding photos, links and blogs, and by adapting the layout to their own individual style.


    WHAT WAS THE FIRST SOCIAL NETWORKIG SITE? AND IT'S IMPACT
    Early social networking websites started in the form of generalized online communities such as THE WELL (1985), Theglobe.com (1994) and Tripod.com (1995). These early communities focused on bringing people together to interact with each other through chat rooms, and share personal information and ideas around any topics via personal homepage publishing tools which was a precursor to the blogging phenomenon. Some communities took a different approach by simply having people link each other via email addresses.These sites included Classmates.com (1995), focusing on ties with former school mates, and SixDegrees.com (1997), focusing on direct ties. User profiles could be created, messages sent to users held on a "friends list" and other members could be sought out who had similar interests to yours in their profiles (Boyd & Ellison 2007, p.3).Similar features had existed in some form before SixDegrees.com came about, but this would be the first time these new developments (that would later catch on and become immensely popular), the SixDegrees.com simply wasn't profitable and eventually shut down and Amazon.com bought up PlanetAll. It was even described by the websites's owner as "simply ahead of its time". New social networking methods mwere quickly developed by the end of 1990s which changed the social networking enabled the graphing of user's own social network-thus linking social networks and social networking became the largest and fastest groqing site in the world, not limited by particular geographical followings

    ADVANTAGES OF SOCIAL NETWORKS


    • Social networks are boredom killers are especially for students during vacations and even elderly people who are retired from their jobs.
    • Through Social ads and fans page you can advertise your business. For example facebook offers a very customizable ads placement service, which is also very easy to use and cost effective. Its ads allows you to target people of specific ag, geographic location, interests, etc making your ads most useful and effective.
    • Kids can gain social confidence from interacting with other people online, which may help them feel more secure in new situations such as going to college, joining a sports team and meeting new friends.

    DISADVANTAGES OF SOCIAL NETWORKS
    • You are putting out information about your name, location, age, gender, and many other types of information that you may not want to let others know. Most people would say be careful, but no one can be certain at any given time. As long as people can know who you exactly are, then some can find ways to do you in.
    • You are putting out information about your name, location, age, gender, and many other types of information that you may not want to let others know. Most people would say be careful, but no one can be certain at any given time. As long as people can know who you exactly are, then some can find ways to do you in.
    • In addition to the above it's worth considering how your child may be impacted emotionally by frequent usage of social networking sites. Some experts have warned that sites such as Facebook and Bebo can have a negative effect on children who are less confident and self-assured, as they can equate their happiness and success as individuals with how many friends they have on Facebook. Even if a child isn't being bullied as such, they can experience self-esteem issues if their online network isn't as big as their friends, or they have been excluded from a certain online group.
    • Unfortunately some users can harness social networking sites to carry out 'cyber-bullying' where malicious comments are posted online about an individual and/or that user receives abusive messages or other content. Some tech-savvy users may even be able to hack into another user's account to harass them so it's important your child is aware of these dangers and understands they must be reported as soon as possible. As social networking allows people to take on a different online persona, this can encourage individuals who wouldn't be a bully in the real world to take part in unpleasant activities because their real identity can be covered up.

    Tips for staying safe on social networking sites

    • Ensure your child is the minimum age required to join a social networking site.
    • Never give out personal details such as addresses or mobile phone numbers on social networking sites. It's also best if your child doesn't use their real name on their profile.
    • Be very wary of accepting friends who you do not know personally.
    • If your child is the victim of any form of harassment or abuse, ensure you keep a record of all communication to pass over to the relevant bodies.
    • Try to use a 'disposable' email address for registering with social networking sites and avoid using your real name for the address. Hotmail or Yahoo! provide free email addresses.