™ There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application. The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share files between your desktop and laptop for example. But are these concerns grounded in truth? Is there really a privacy issue here? I downloaded and installed the new Desktop Search beta the other day. It has some interesting new features such as the ability to remove panels from the sidebar and dock them anywhere you like on your desktop. And there are several more panels available to let you do anything from manage what is indexed, to passing time by playing games. One of the coolest features is its ability to reach beyond the desktop it is on to do a variety of things. Now, I can play tic tac toe with co-workers, or even friends around the world. But the biggest, and most troubling update to some is the ability to remotely index files, as well as share them using Google servers to temporarily store the items. By turning this feature on you give Google the right to store your files for up to 30 days. Therein lies the crux of the issue there seems to be no way around this 30 day requirement. All I have to say is ‘so what?’ So what if you have to give Google this ability? Google will encrypt the data so that no one else can access it. And even if there is some sort of DOJ subpoena requiring access to these files I don’t think it would stand up in court. This is because Google has set up a network whereby all your Google activities are tied to one Google account. Your personalized home page, gmail, google analytics, adwords and adsense accounts all share the same Google account. Therefore, it would be difficult for anyone to get a subpoena to review information pertaining to only part of that account. Legalities aside, if you are that concerned about the privacy being surrendered to Google in order to use this system then don’t sign up for it. You can still download and use the new Desktop Search with most of its new features, but you don’t have to use the file sharing. But what if you want to share files between computers? Well, do what I did go to your favorite electronics store and buy a flash drive. I just bought a USB flash drive with over 2 gigs of storage for under $100. Now I can easily transfer anything between any computer with no worry of some government agency wanting to know what’s on it. As I said, I do have the new Google Desktop installed, and I did look at the settings for the search and file sharing, but I didn’t turn them on. I have no need to be able to search my home computer from work and vice versa, nor do I need to share files between the two computers. And if I did, I’ll simply use the FTP site I have set up on a 샌즈카지노 computer at home or the aforementioned flash drive. Really, when it comes to all the other ways that Google captures your personal data, from search history to Gmail, should we be all that concerned that some files may end up being stored on a Google server somewhere? I think we should have other concerns. For example, I think we should be concerned about what Google already knows about us via those services I mentioned earlier. I think business owners should be concerned that such a service would allow employees to easily steal and transfer data to and from work. I think if you are that scared of the US government infringing on your privacy then you shouldn’t have a Google account, nor Google Desktop Search nor a Gmail account. In fact I don’t think you should have any Internet accounts because quite honestly everyone is a target for the DOJ. Further, I can almost guarantee you that your local ISP will fold and hand over the data much easier than Google will. So before you start complaining about how Google could infringe your privacy, remember that YOU have the ability to stop it from happening. It’s just a matter of choosing to do so.
0 Comments
™ It is deniable that our works and lives are more convenient and easier when using wireless. We can work anywhere and that is why wireless networks are becoming so popular. Especially if you have broadband 코인카지노 Internet access, a wireless router can give you instant communication with the world. Imagine you are sitting by the pool and enjoying chatting through the Internet. Or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all. Unfortunately, many, or even most, wireless units don’t come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider. Identity theft seems to be the most serious problem. If your network is unsecured, the personal data on your wireless electronic equipment is also unsecured. The order you just placed for a book at Amazon may have given your contact and payment information to an unscrupulous hacker! Nearly every town in which “WiFi” is common will have “War Drivers” and “War Chalkers” at work. These are people who walk or drive around town with wireless equipment, searching for unsecured networks. The “Chalkers” then live up their name, marking curbs and other public items with chalk so that others can more easily find and exploit your network. In fact, not all “War Drivers” are hackers, of course. Many just want to use your network for free, but the risk is high if you don’t learn how to protect yourself. You can usually find quite a bit of free information as to how to secure your network at the website of your router’s manufacturer, or by doing a search in a search engine for a phrase like “secure home wireless.” In addition, there are also your neighbors who may find your network by accident and enjoy nosing into your activities and using your Internet access at will, slowing down your network speed in the process. Even many businesses use cheap, home-use quality equipment for their company networks. With the poor security often found on small business networks, anyone with a basic knowledge of wireless can access sensitive company and customer data. It is highly recommended that you hire service companies to secure your network for you, or else you will have to bear with a risk of being exploited. A search of your local yellow pages or an inquiry at your neighborhood computer store should yield professional help and get your private data private again. ™ Wireless networks use radio waves instead of wires to transmit data between computers. Here’s how: The Binary Code: 1s and 0s It’s well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of beeps. These beeps are so fast that they’re outside the hearing range of humans. Morse Code: Dots And Dashes It works like Morse code, which is a way to transmit the alphabet over radio waves using dots (short beeps) and dashes (long beeps). Morse code was used manually for years via telegraph to get information from 1 place to another very quickly. More importantly for this example, though, it is a binary system, just as a computer system is. Wireless networking, then, can be thought of as a Morse code for computers. You plug in a combined radio receiver and transmitter, and the computer is able to send out its equivalent of dots 메리트카지노 and dashes (bits, in computer-speak) to get your data from here to there. Wavelengths And Frequencies You might wonder how the computer can send and receive data at high speed without becoming garbled nonsense. The key to wireless networking is how it gets around this problem. First, wireless transmissions are sent at very high frequencies, which allows more data to be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) — a frequency similar to mobile phones and microwave ovens. However, this high frequency produces a wavelength that is very short, which is why wireless networking is effective only over short distances. Wireless networks also use a technique called “frequency hopping.” They use dozens of frequencies, and constantly switch among them. This makes wireless networks more immune to interference from other radio signals than if they transmitted on a single frequency. Internet Access Points The final step for a wireless network is to provide internet access for every computer on the network. This is done by a special piece of wireless equipment called an access point. An access point is more expensive than a wireless card for 1 computer, because it contains radios capable of communicating with around 100 computers, sharing internet access among them. Dedicated access points are necessary only for larger networks. With only a few computers, it is possible to use 1 of them as the access point, or to use a wireless router. Industry Standards Wireless equipment from different manufacturers can work together to handle these complex communications because there are standards which guide the production of all wireless devices. These standards are technically called the 802.11. Because of industry compliance with these standards, wireless networking is both easy to use and affordable today. Wireless Is Simple To Use If all this talk of frequencies has you worried — relax. Wireless networking hardware and software handle all of this automatically, without need for user intervention. Wireless networking, for all its complicated ability, is far simpler to use than you might expect. ™ As far as I’m concerned, wireless networks would have to rank as one of the best inventions in history. They really are the best thing since sliced bread. I mean, really, bread is easy enough to cut yourself, but have you ever tried to wire up a network? Its a lot of hard yakka as many would say. WiFi is the wireless way to handle networking. It is also known as 802.11 networking and wireless networking. The big advantage of WiFi is its simplicity. You can connect computers anywhere in your home or office without the need for wires. The computers connect to the network using radio signals, and computers can be up to 100 feet or so apart. So, in the spirit of spreading the word, I’m 우리카지노 going to give you some great reasons why you need a wireless network. Sharing Internet Access. Wireless networking gives you a cheap and easy way to share one Internet connection between multiple computers, eliminating the need for more than one modem. You can even add new computers to your network simply by plugging in a wireless card and switching them on — they get an Internet connection straightaway! There aren’t many wired networks that can say that. Sharing Files and Printers. A wireless network gives you access to your files wherever you are in your home, and makes it easy to synchronise the data on a laptop with a home computer. It is much easier to send files between computers with a wireless network than it is to send them by email, or even by burning them to a CD. Plus, with the printer connected, you can also write things wherever you want, press print, and go and collect them from a printer connected to another computer — printers that are plugged into one of the computers on the network are shared between all the computers automatically. Always On Connection A big factor in the spread of broadband was that it let Internet connections be always-on, without needing to dial in. Well, wireless networking lets network connections be always-on, meaning that any of your computers can connect to the Internet whenever you want! You can take laptops from room to room, and it doesn’t matter — they’ll always have access. Plus, there’s not even any need to set up a username and password system, as wireless networks work without logging in. It’s just so convenient! No More Wires. This, of course, is the biggest reason why you should switch your network over to wireless. Wires are inconvenient, expensive, ugly and dangerous — you’ll be delighted to see the back of them. The average Ethernet wire doesn’t cost that much per metre, but once you’ve bought enough metres to do whatever you need to do, well, it tends to add up quickly. Not only that, but if you want to run your wire between rooms or floors, you have to knock holes in the walls — which might not even be allowed if you’re renting. I know plenty of people in rented apartments who had to keep their network confined to one room until they went wireless. With wireless networking, well, you can even take your computer outside, if you want to! No more wires also means no more spaghetti all over the floor and in the corners. Not only does this improve the safety of your home, as it’s all too easy to trip over exposed wires, but it also means that you don’t have to go to all the trouble of packing all the wires up and re-connecting them at the other end when you move. It also means that you don’t have to examine every wire for damage if your Internet connection breaks down. Play LAN and Internet Games. You might have seen an option in your favourite game to play over a LAN. Well, wireless networks are LANs, which means that your whole family can play that game together — without needing the computers to be anywhere near each other. It’s far more fun to play against real people you know than to play against random people over the Internet, not to mention that the game will work much faster. You could even invite your friends to bring their computers and join in — a ‘LAN party’! An added benefit is that wireless equipment lets you easily connect any games consoles you or your kids might have to the Internet, and start playing online. It’s far easier to play online with a wirelessly connected Xbox or PlayStation 2 than to have to connect it to your modem every time. Convinced Yet? If you’re excited, then that’s great — keep reading these articles for advice on how to set everything up. If you don’t think it’s for you yet, well, don’t give up on it — I’m sure you’ll come round when you realise just how easy and cheap wireless really is. ™ STEP 1 – Stripping Start by pulling out about 12 feet of bulk network cable to making the process a little easier. Carefully remove the outer jacket of the cable exposing about 1 1/4″ of the twisted pairs. Be careful when stripping the jacket as to not nick or cut the internal wiring. After removing the outer case you will notice 8 wires twisted in pairs and a rip cord (white thread). STEP 2 – Inspecting Inspect the newly revealed wires for any cuts or scrapes that expose the copper wire inside. If you have breached the protective sheath of any wire you will need to cut the entire segment of wires off and start over at step one. Exposed copper wire will lead to cross-talk, poor performance or no connectivity at all. It is important that the jacket for all network cables remains intact. STEP 3 – Preparation To prepare the wires and to make them easier to work with, you can untwist the pairs so they will lay flat between your fingers. The white piece of thread can be cut off even with the jacket and disposed. STEP 4 – Layout Now based on the wiring specifications you are following you will need arrange the wires in a certain pattern. There are two methods set by the TIA, 568A and 568B. 568B is the most common network cables, widely used for computer networks and digital phone systems. So for our demonstration we will use that. Starting from the left-top side of the RJ-45 plug, the wiring should be in the order shown at the right. STEP 5 – Jack Preparation Again, press all the wires flat between your thumb and forefinger as shown in step three. Verify the colors have remained in the correct order. Using a pair of scissors, cut the top of the wires even with one another so that they are 1/2″ long from the base of the jacket. Ensure that the cut leaves the wires even and clean; failure to do so may cause the wire not to make contact inside the jack. STEP 6 – Wire Insertion Ensuring that the wires remain flat and in order, push them into the RJ-45 plug with the flat surface of the plug on top. The white / orange wire should be on the left looking down at the jack. You can tell if all the wires made it into the jack and maintain their positions by looking head-on at the plug. You should be able to see a wire located in each hole, as seen at the bottom right. You may have to use a little effort to push the pairs firmly into the plug. The cabling jacket should also enter the rear of the jack about 3/16″ to help secure the cable once the plug is crimped. STEP 7 – Crimping Now place the wired plug into the crimping tool. Give the handle a firm squeeze, you should hear a ratcheting noise as you continue. Once you have completed the crimp, the handle will reset to the open position. STEP 8 – Testing Once your new cable is completed, it is not a bad idea to test the cable to ensure that it will function in the field. It is vital that all eight wires have connectivity and are in the correct order. Mis-wired network cables could lead to headaches down the road. In addition, with power-over-ethernet making its way into the market 코인카지노 place, crossed wire pairs could lead to physical damage of computers or phone system equipment; making it even more crucial that the pairs are in the correct order. A simple cable tester can quickly verify that information for you. ™ With everything becoming available wireless these days a great innovation is the wireless media router. What is a wireless media router? Its a router that allows the transmission of 우리카지노 signals from the router to anywhere in the house that has a receiver. Wireless routers are becoming more and more popular. They have many uses, one of which is viewing pictures and movies from your computer on your television. This comes in very handy when you have media files that you cant burn on CD or cannot be played on your DVD player. A second use would be to transmit paid television. For example if you paid for HBO usually you would be able to only view it on one nominated television. With the wireless media router you can send the signal you television is receiving, HBO, to any other television in the house. You can even change the channel from the remote television while viewing. The third use would be watching television at a location where an antenna is not available. This means no more long cables leading from room to room just to be able to watch television. Depending on the amount of receivers you have you can receive the signal from multiple televisions. How does it work? The receivers are connected to the remote televisions. The router takes the signal from the source television and distributes it to the remote televisions by way of the receiver. On the remote television a certain channel is dedicated to this receiver meaning you can watch independent television, and easily switch the channel to the signal being received from the wireless router. This also makes running your entertainment room a breeze. The receiver can also be hooked up-to a projector making it easy to view anything you wish. This means you will not need to purchase separate DVD players VCRs for every room. ™ Valuing Network Certifications – Is The Time, Money And Effort Worth The Bother? There are many ways to get any of the large number of network certifications now available. There’s not only software certification like those offered from Oracle, Java, Microsoft, etc. but there’s also direct network hardware certifications from strong companies like Cisco and then there’s the server administration, hardware repair, security and several sub category type certifications. All are available but the question is if these have any real value in the marketplace. The answer, unfortunately is not simple. This is because while many companies demand a certain certification, they will also bend the requirement and allow you to get certified once you have the job. There’s also people in the marketplace who are strong proponents of certification or another. The reason for this is usually because they have that certification and by requiring it, they somehow believe it validates their decision to obtain the training and pass the tests. The reality is that like a good resume and education pedigree, certifications help get you in the door. Think about it for a moment. If you were hiring a network administrator, you would probably ask for the usually experience and basic education and some type of networking certification. If 100 people claiming the same skills and experiences levels all apply and all have at least the single required certification while 10 have not only the network cert but also maybe several MS and a security certificate, which candidates applying would probably get scheduled for interviews? Right! It would be the ones with the better paper qualifications. So the value of a certification can be measured by it’s recognition as important by employers, and the relative value they place on such training. If you’re applying in network shops that value certifications, then they will naturally place a premium on the fact that your have that training and will probably reflect that in an increased earnings range. The real key however is to recognize that employers are NOT employing you because you have a certification. You must have the skills necessary to do the job and meet the requirements of the position. No amount of certifications can make up for a strong work ethic and solid experience. With today’s study materials, almost anyone can learn enough to pass the required tests and become certified. This however does not make anyone competent to work on a network anymore than walking into a garage makes one a mechanic. It’s skills, talent and knowledge that are truly desired. Microsoft Certifications are one of the most widely pursued and acclaimed professional certifications in the IT industry. Preparing MS certification tests, however, is a significant undertaking whether you’re just out of college or have been in IT field for years. IT professionals are continuously demanded to acquire new knowledge in order to perform well on their jobs as new technology in the IT industry emerged at a pace that has never been seen before. Regardless what certifications (Microsoft Certified Professional or MCP, Microsoft Certified System Administrator or MCSA, Microsoft Certified System Engineer or MCSE ) you are pursuing, a thorough planning will increase the chance of success. The importance of hands-on Experience, no matter if it’s your own little network at home or at your job, experience matters! Being 코인카지노 able to apply the knowledge gained by the study necessary to obtain your certification is just as important as the exam itself. When preparing for any certification test, have a network available to physically learn the principles being taught. You network might only be a couple of old PC’s and a switch but it’s enough to understand the principles and basic information. You gain valuable skills that cannot be obtained any other way except through hands on work. Finally, consider using CBT’s or computer based training as part of your test preparation. These tools are a great way to take your level of understanding to a new level. This is also true of practice exams. If you develop the skills necessary to support the certifications, all your training, costs and effort will pay off handsomely. With your knowledge and training, you can expect to be have an easier time getting considered for positions, moving up in a company, and enjoying a solid work career. ™ 1. Network interface(Data link) layer 2. Network layer 3. Transport layer 4. Application layer Network interface layer The lowest layer of the TCP/IP model. Its task is to provide access to the transmission physical medium and it differs according to the implementation of the medium. Network layer The network layer provides network addressing, routing and datagram transmission. Used protocols that will be of interest further regarding DHCP are IP and ARP. IP protocol It is the basic protocol of the network layer and in general the internet as a whole. It sends datagrams, which are independent units that contain information about the destination, source and the sequence number of the datagram. The sequence number is used for message reconstruction, since the delivery order of the datagrams might not be the same as their order in the message and delivery reliability isn’t guaranteed at all. IP protocol versions: “IP v4 – 32 bit addresses. Provides approximately 4 billion unique addresses which aren’t sufficient at present times. “IP v6 – 128 bit addresses. The transition to v6 will bring (is bringing) higher security, QoS, packet segmentation and many more IP addresses. (the transition from IP v4 to IP v6 must be supported by the system provider) ARP protocol The ARP abbreviation stands for Address Resolution Protocol. This protocol is used to find the physical address (MAC) based on a known IP address. If required ARP sends information concerning the wanted address to all the stations in the network – Broadcast. The stations consequently answer with a message containing their MAC. If the wanted device/station is outside the node/segment, the appropriate router will answer instead of it. Transport layer The transport layer is implemented only in terminal devices and it adjusts the behavior of the network according to the requirements of the device/application. Application layer The application layer is composed of programs that use net services to fulfill the needs of users. Examples of specific protocols are for instance FTP, DNS and DHCP. Application protocols use TCP, UDP or both services at the same time. So called ports are 우리카지노 used to differentiate between application protocols, they represent a type of label of the application. It is possible to change the ports in the settings of the service, but each service has a default port that isn’t changed for most services and is used as an unwritten standard. ” FTP = 21 ” DNS = 53 ” DHCP = 67 68 ™ There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application. The biggest concern seems to come with the ability to search and share multiple computers with one account. In other 우리카지노 words, you could use a single desktop search account to search, index and allow you to share files between your desktop and laptop for example. But are these concerns grounded in truth? Is there really a privacy issue here? I downloaded and installed the new Desktop Search beta the other day. It has some interesting new features such as the ability to remove panels from the sidebar and dock them anywhere you like on your desktop. And there are several more panels available to let you do anything from manage what is indexed, to passing time by playing games. One of the coolest features is its ability to reach beyond the desktop it is on to do a variety of things. Now, I can play tic tac toe with co-workers, or even friends around the world. But the biggest, and most troubling update to some is the ability to remotely index files, as well as share them using Google servers to temporarily store the items. By turning this feature on you give Google the right to store your files for up to 30 days. Therein lies the crux of the issue there seems to be no way around this 30 day requirement. All I have to say is ‘so what?’ So what if you have to give Google this ability? Google will encrypt the data so that no one else can access it. And even if there is some sort of DOJ subpoena requiring access to these files I don’t think it would stand up in court. This is because Google has set up a network whereby all your Google activities are tied to one Google account. Your personalized home page, gmail, google analytics, adwords and adsense accounts all share the same Google account. Therefore, it would be difficult for anyone to get a subpoena to review information pertaining to only part of that account. Legalities aside, if you are that concerned about the privacy being surrendered to Google in order to use this system then don’t sign up for it. You can still download and use the new Desktop Search with most of its new features, but you don’t have to use the file sharing. But what if you want to share files between computers? Well, do what I did go to your favorite electronics store and buy a flash drive. I just bought a USB flash drive with over 2 gigs of storage for under $100. Now I can easily transfer anything between any computer with no worry of some government agency wanting to know what’s on it. As I said, I do have the new Google Desktop installed, and I did look at the settings for the search and file sharing, but I didn’t turn them on. I have no need to be able to search my home computer from work and vice versa, nor do I need to share files between the two computers. And if I did, I’ll simply use the FTP site I have set up on a computer at home or the aforementioned flash drive. Really, when it comes to all the other ways that Google captures your personal data, from search history to Gmail, should we be all that concerned that some files may end up being stored on a Google server somewhere? I think we should have other concerns. For example, I think we should be concerned about what Google already knows about us via those services I mentioned earlier. I think business owners should be concerned that such a service would allow employees to easily steal and transfer data to and from work. I think if you are that scared of the US government infringing on your privacy then you shouldn’t have a Google account, nor Google Desktop Search nor a Gmail account. In fact I don’t think you should have any Internet accounts because quite honestly everyone is a target for the DOJ. Further, I can almost guarantee you that your local ISP will fold and hand over the data much easier than Google will. So before you start complaining about how Google could infringe your privacy, remember that YOU have the ability to stop it from happening. It’s just a matter of choosing to do so. ™ An intranet is basically a private web based network. It uses all of the technology of the internet but is safe and protected behind a firewall that keeps unauthorized personnel out. Companies have been using them for years as a method of streamlining their internal communications. Because a web browser can run on any type of computer, the need to maintain multiple paper copies of documents that are constantly changing can be eliminated. Documents like training manuals, internal phone books, procedure manuals, benefits 메리트카지노 information, employee handbooks, requisition forms, etc. can be maintained as electronic documents and updated at almost no cost. The savings in paper and other material costs can be significant But the most powerful aspect of an intranet is its ability to display information in the same format to every computer being used. That allows all of the different software and databases a company uses to be available to all employees without any special equipment or software being installed on their systems. This universal availability of information is sparking an era of collaboration unlike anything ever seen before. The departmental barriers that exist in many companies are slowing breaking down because now colleagues can share information readily using the company intranet. Options for implementing an intranet There are a variety of options for setting up an intranet. They include building your own intranet technology, purchasing and installing third-party software, or purchasing access through an extranet ASP. Here is a quick summary of the advantages and disadvantages of each approach: 1. Building it yourself Advantages: Complete control of user interface design; ability to customize level of functionality; integration into internal systems, and direct access to user activity. Disadvantages: High up-front development cost; requires staff expertise in the development of extranets, commitment of internal staff for 6 months to a year for planning, execution, review and implementation; and an ongoing commitment of internal staff for internal and client support, hosting, maintenance and upgrades. 2. Purchasing/installing third-party software Advantages: Proven track-record of packaged solution; ability to choose functions and to customize user interface, more rapid implementation compared to building it yourself. Disadvantages: High up-front purchase cost; commitment of internal staff for customization and implementation; on-going commitment of internal staff for internal and client support, hosting, maintenance and upgrades; and extensive internal and client training 3. Using a Service Provider (ASP) Advantages: Proven track-record of the application; low cost of entry and predictable cost over time; virtually immediate implementation; no commitment of internal staff for internal support, hosting, or maintenance; and upgrades at no cost by extranet experts, and savings on internal server use. Disadvantages: Less freedom in user interface design, and fixed functionality. In the final analysis The approach you choose depends on how you work, the technical and financial resources at your disposal, and how rapidly you need to move forward. |
Archives
January 2023
Categories |