Thursday, December 3, 2009

blog 5

1. www.youtube.com can have music on their site and is free.

www.last.fm is an online music radio and you cant download the music off it.

http://new.music.yahoo.com is a new and free and has music on their website to stream on your computer.

2. www.napster.co.uk Napster is a paid service when you pay £5 and you get 5 songs to keep and 8 million songs to listen to.

http://mp3.rhapsody.com/home.html is another paid service. You pay for each album.

www.eMusic.com is a website where you pay a monthly service and you get to listen to music and get to keep a few.

3. Downloading music off of illegal websites is a breach of copyright and is punishable by law. It also makes your computer vulnerable to different types of viruses and spy-ware.

Thursday, November 26, 2009

IT Acceptable use policy for students:

Introduction:

An acceptable use policy is a set of rules and regulations that students must agree to and abide by to use the student network. If you choose to break these rules and regulations it may result in disciplinary action.

  1. You are not allowed to be using computers for your personal use if people are waiting for a computer to become available.

  1. The following is not allowed to be used on computers

    • Downloading Illegal Material
    • Grooming
    • Cyber bullying
    • Scamming People
    • Threatening people
    • Identity theft

4. When using emails you must not

· Send emails to people that you don’t know

· Send Threating messages to other people

· Use bad language when online

· Send Illegal Music through email.

· You must not attempted to mail bomb a website for example sending lots and lots of emails to one website and making there computer crash.

5. Downloading Files

When using the computer you should not download illegal music and software on to a computer if you do this you are breaking the law and could get into trouble for doing this.

6. Behaviour

You should not use the computer to hack on to other peoples Files or to get there personal details. You should never threat any one or say something that some might find not nice. You must never take indecent pictures and put them up online.

7. Using the internet

When you are using the internet you must remember that other people are on the internet as well you should not Downloading Illegal Material like for example download illegal music and software. Say something nasty on a Social networking site that might upset other users when online.

8. Breach of Internet Use Policy

If you fail to keep to this policy this may result that you may be stopped from using certain things on the internet. You will also be breaking the law and this may result in disciplinary action.

Thursday, November 12, 2009

I have learned a lot about downloading files and what I should avoid and the alternatives. Many people download illegal files off the internet, most of them are Music and films; these are downloaded and shared using P2P Software such as Kazaa, Limewire and online torrents. Almost everything on the internet is copyrighted and shouldn’t be downloaded without their consent. There is an alternative out there for downloading music such as Online Stores like Napster, iTunes and Amazon. Napster got shut down for allowing its users to download music illegally and without paying, and it has now come back as legal download software.

F0H5 10 – Internet Safety

BLOG 3: Internet Defences

Section 1: Content Filtering Software

1. In your own words, explain what content filtering software is.

Filtering software is where the administrator blocks inappropriate websites from being seen in some organisations.

2. Using an Internet search engine, find 3 different content filtering software, and answer the following questions:

a) What are the names of the 3 content filtering software you have chosen? (Also give the web address of the software).

Net Nanny Parental Controls. www.hermanstreet.com

Safe Eyes 2009 www.internetsafety.com

CyberSitter www.hermanstreet.com

b) Which of the 3 do you think is best?

Net Nanny

c) Why?

Because, it is easy to use, easy to install which makes it good for home users. It also supports ME, XP, Vista and Windows 7. The other two Filters are good they lack the ease of use and installation. Net Nanny is also the Cheapest.

Section 2: Proxy server solutions

1. In your own words, explain what a proxy server is.

A Proxy Server allows you to access web pages without communicating with them directly. Some people use Web Proxy to bypass a Blacklist of inappropriate web sites. Big Organisations use Proxy Servers to collect all of the IP addresses for each computer in the organisation.

2. Using an Internet search engine, find 3 different proxy servers, and answer the following questions:

a) What are the names of the servers? (Give the web addresses as well).

Real Hide IP 3.5.2.6 http://www.real-hide-ip.com

Hide The IP 2009 2.7 http://www.hide-the-ip.com

Smart Hide http://www.smarthide.com/

b) Which of the 3 do you think is best?

I think Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

c) Why?

Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

Section 3: Passwords and Password Security

In your own words explain what makes a good, secure password. Make up 3 examples of secure passwords. A Secure Password must have symbols letters and numbers. Ch£$$£YM0NK£Y, B££PL33R, C00LGl4$$3S

Section 4: Backup and Restoring Data

1. In your own words explain what backing up and restoring data is.

Backing up data is when you either create a restore point in windows so you could restore it if something went wrong, or you can create a disk image of your PC on Disk, and big companies use expensive hardware to back up data.

2. Why is it useful?

It is useful incase something goes wrong and you need to restore your PC to the way it was in the past.

Thursday, November 5, 2009

BLOG3

F0H5 10 – Internet Safety

BLOG 3: Review of Internet Threats

In your own words, explain how you would protect yourself from the following:

Phishing

You should never click on links that you think is not your bank and should also use the latest email clients to block off such spam. You can also adjust your web browser to tighten up security if you use web based email clients. Also having an internet security suite should prevent it too.

Identity Theft

The best way to prevent identity theft is to check monthly statements. If you shred all your statements then no one can see your bank details. Also, use a Credit Card online as it is a lot safer then using a Debit Card. Do not fill in details about your credit card or debit cards on online sites as they might Pharm for your details.

Hackers

Have a Good Firewall and Anti-Virus and scan your pc weekly using the anti-virus program

Cyberbullying

Block the Bully on the social networking sites and report them to either the police or to the social networking site.

Grooming

Do not give away any information about where you live and how old you are and so on… If you have told Internet Groomer this information, report it to the police ASAP!

Thursday, October 29, 2009

Cyber Bullying and Internet Grooming.

CyberBullying is when the bully uses internet services such as MSN, Bebo and Facebook. CyberBullying is a Criminal Offence and punishable by Law. CyberBullying can also happen on mobile phones using the SMS feature. There is also alot of websites trying to put out this new way of Bullying. Sometimes they also make hate websites for one person and this can cause bigotry and racism. CyberBullying is when the Bully constantly tries to annoy, upset or embarress the victim on internet services such as MSN and Bebo.

Internet Grooming is a serious problem on the internet. This is mainly aimed at younger people. The Groomer wont tell anybody much information about himself and sometimes even pretend to be someone else and younger. The aim of this is for the groomer to collect as much information about them as possible and try to be friends with them and eventually meet them in person, this is normally when the illegal activity happens, usually of sexual nature.

Identity Theft, Hoaxes, Ransomware and Hackers.

Today i learn't about Identity Theft, Hoaxes, Ransomware and Hackers.

I done a quiz on Identity Theft and it is when people send emails from fake emails pretending to be something their not to steal your identity. Identity Theft could also be when people email you about getting credit cards and with that information they will steal your information.

An Internet Hoaxe is when they try and make you believe that some threat to their internet safety is true. They have told people to delete certain files that will slow down or break the computer.

Ransomware is when someone encrypts your files and makes them inpossible to get to unless you have the password to open the encrypted files. The person who has done this will send an email to the owner of the files and demand money to get the password and remove the encrypted files, this is an illegal act. Normally people would pay money to the ransomers and get the password to open the files rather than going to authorities.

Hackers is when someone uses certain software to break into computer systems when they have no right to be there. They use a Vulnerability Scanner to check were the weak points of your computer system is. They also check your ports to see which ones are open, your firewall prevents this from happening. Although, some hackers have changed their ways and have now made companies where they check how good your internet safety is and then if they find any weak points they would patch it up to try and make their computer system hacker proof.

That is all i have learn't today! :)

Thursday, October 22, 2009

Phishing

What i've learned about Phishing:

I have learnt that many people around the world try to get your credit card details and will impersiantate a bank or other people to do get it.

I have had a few spam emails about how they need my details because a rich guy died in South Africa, i have no relatives over there so i did not respond.

I learnt a good bit about Phishing today.

I have also played a few quiz games and watched 3 movies which were a helpful way to learn.

Thursday, October 8, 2009

Blog 2

Section 1: Anti-Virus Software.

Explanation of Anti-Virus Software;

Anti-Virus software protects your PC from lots of different viruses. It is normally paired up with a Firewall to prevent incoming viruses.

The Anti-Virus software scans your files on your PC for threats and viruses.

Internet Search for 3 Anti-Virus software;

Kaspersky Internet Security Suite. http://www.kaspersky.co.uk/

McAfee Total Protection. http://www.mcafee.com/uk/

Norton 360 V3.0. http://www.symantec.com

Which do you think is the best and why?

I think Kaspersky Internet Security is the best Anti-Virus software because it has very good reviews and also does not use a lot of the computers resources.

The reason why I think Kaspersky is the best Security Software is because of personal experiences. I have used all 3 software packages and Kaspersky has always caught what I needed it too. McAfee and Norton 360 V3.0 has both uses a lot of resources. This is not good if you don’t have a new PC which can handle it easily.

Section 2: Anti-Spyware Software

Anti-Spyware Software Packages helps protect your PC from pop-ups, slow performance and bad security threats caused by spyware and other unwanted software. You must also update your spyware software a lot to keep it from being outdated and useless again new threats.

Spy Sweeper 2009. http://www.webroot.com

Spyware Doctor. http://www.pctools.com

STOPzilla. http://www.stopzilla.com

Spy Sweeper is the best Anti-Spyware Software because it is easy to use, detection rate is good and removal of the spyware is good. STOPzilla isn’t as easy to navigate through the options as Spy Sweeper 2009. Same with Spyware Doctor.

Spy Sweeper has very good support while Spyware Doctor and STOPzilla doesn’t.

Section 3: Spam Filters.

A Spam Filter is a software program that sorts out your incoming mail to see which is spam or not. Spam Filters can be installed onto an Internet Server or a Private Network or on your Personal Computer.

Mailwasher Free Spam Filter. http://www.mailwasher.net/

SPAM Fighter. http://www.spamfighter.com/

SpamEaterPro. http://www.spameaterpro.com/

I think Mailwasher is the best. It has a very good detection rate of spam mail compared to the others. Also, Mailwasher is completely free.

Section 4: Internet Security Suites

Internet Security Suites is a Package of Software. There is normally a Anti-Virus and Firewall in the package and it. Both programs are designed to work together really well so it might have better detection rates than a separate Anti-Virus and Firewall.

Comodo Internet Security: http://personalfirewall.comodo.com/

McAfee Internet Security Suite:

http://www.mcafee.com/uk/

Kaspersky Internet Security:

http://www.kaspersky.co.uk/

I think Comodo is a great Internet Security package because it is completely free. It also has a really effecting Firewall and AntiVirus.

Thursday, October 1, 2009

Adware, monitors and then sends pop ups which might trick you into buying their product!
Some freeware publishers bundle adware with their software because they receive money to do so. In this case, the publisher will include a warning about the adware during program installation using the End-User Licence Agreement (EULA).

Today I did work about Internet Security. For example we did a group discussion about Spyware and Malwares. I learnt a lot of things Spyware collects information and uses it against you. We also learnt how to find out if we got spyware on our PC’s at home and how to get rid of it.

Your browser being redirected to sites other than the ones you have specified. This is known as "browser hijacking".

A change in your Internet browser's home page.

Increased appearance of pop-up ads

Unusual and random error messages.

Keys that don't work (for example, the "Tab" key might not work when you try to move to the next field in a Web form)

Degradation of system performance, especially the CPU and memory.

Comodo Firewall:

Why use our Firewall?

Comodo Firewall Pro introduces the next evolution in computer security: Default Deny Protection (DDP™). What is DDP? Most security programs maintain a list of known malware, and use that list to decide which applications and files shouldn't access a PC. The problem here is obvious. What if the list of malware is missing some entries, or isn't up to date? DDP fixes this problem to ensure complete security. The firewall references a list of over two million known PC-friendly applications. If a file that is not on this safe-list knocks on your PC's door, the Firewall immediately alerts you to the possibility of attacking malware. All this occurs before the malware infects your computer. It's prevention-based security, the only way to keep PCs totally safe.

Firewall is a component of Comodo Internet Security, which comes bundled with Comodo Antivirus. You have the option to only install Firewall if you prefer.

Firewall is also a part of Comodo Internet Security Pro, which gives you the most robust defense and inlcudes other components like WiFi security, live 24/7 expert assistance for numerous computing needs. Try it free for 30 days.

Firewall Features:

  • Easily understood and informative alerts
  • No complex configuration issues—perfect for amateur users
  • Lots of configuration options let techies configure things just as they like
  • DDP-based security keeps you informed and PCs safe
  • Quickly learns user behavior to deliver personalized protection
  • User-friendly, attractive graphical interface

One of the first steps in securing a computer is downloading and activating a quality firewall to repel intruders. Only this free firewall software has access to Comodo's extensive safe-list of PC-friendly applications, a key component of Default Deny Protection. Check out our firewall software today or upgrade to 360-degree protection with Internet Security Pro.

PC Tools Firewall:

PC Tools Firewall Plus is a powerful free personal firewall for Windows® that protects your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information.

PC Tools Firewall Plus is advanced technology designed especially for people, not just experts. Powerful prevention against attacks and known exploits is activated by default while experienced users can optionally create their own advanced packet filtering rules, including IPv6 support, to customize the network defenses. All you need to do is install it for immediate and automatic ongoing protection.

That's how PC Tools Firewall Plus provides world-leading protection, backed by regular Smart Updates, real-time protection and comprehensive network shielding to ensure your PC remains safe and hacker free. PC Tools products are trusted and used by millions of people every day to protect their home and business computers against online threats.

We recommend you use PC Tools Firewall Plus in combination with Spyware Doctor for comprehensive system protection against spyware, adware and other threats.

PC Tools Firewall Plus Key Feature Highlights

  • Hides your PC from Internet hackers.
  • Fine-grained control over inbound and outbound traffic.
  • Easy to use. Designed for both novice and expert users.
  • No interruptions when playing full-screen games.
  • Optional password protection for rules and settings.
  • Best of all it’s FREE. No catches, limitations or time-limits.

Blog 1

F0H5 10 – Internet Safety

BLOG 1

What is a firewall?

A Firewall is a software package which monitors internet activity. If there are any abnormal activities the firewall will prevent such attacks.

In your own words explain what a firewall does

A Firewall prevents any viruses getting into your PC

Using an Internet search engine, search for 3 different firewalls. Which ones did you look at?

Comodo Firewall, PC Tools – Firewall, ZoneAlarm.

Copy the information from two of the firewalls into a Word document and save it onto your user area as firewalls.

Choose two of the firewalls. Which ones did you choose?

Comodo Firewall, PC Tools Firewall.

Compare the two firewalls, which do think is better, and why?

I believe Comodo Firewall is better because it has the option of having an free internet security suit. It also has very good detection rate from personal experience.