Thursday, November 26, 2009

IT Acceptable use policy for students:

Introduction:

An acceptable use policy is a set of rules and regulations that students must agree to and abide by to use the student network. If you choose to break these rules and regulations it may result in disciplinary action.

  1. You are not allowed to be using computers for your personal use if people are waiting for a computer to become available.

  1. The following is not allowed to be used on computers

    • Downloading Illegal Material
    • Grooming
    • Cyber bullying
    • Scamming People
    • Threatening people
    • Identity theft

4. When using emails you must not

· Send emails to people that you don’t know

· Send Threating messages to other people

· Use bad language when online

· Send Illegal Music through email.

· You must not attempted to mail bomb a website for example sending lots and lots of emails to one website and making there computer crash.

5. Downloading Files

When using the computer you should not download illegal music and software on to a computer if you do this you are breaking the law and could get into trouble for doing this.

6. Behaviour

You should not use the computer to hack on to other peoples Files or to get there personal details. You should never threat any one or say something that some might find not nice. You must never take indecent pictures and put them up online.

7. Using the internet

When you are using the internet you must remember that other people are on the internet as well you should not Downloading Illegal Material like for example download illegal music and software. Say something nasty on a Social networking site that might upset other users when online.

8. Breach of Internet Use Policy

If you fail to keep to this policy this may result that you may be stopped from using certain things on the internet. You will also be breaking the law and this may result in disciplinary action.

Thursday, November 12, 2009

I have learned a lot about downloading files and what I should avoid and the alternatives. Many people download illegal files off the internet, most of them are Music and films; these are downloaded and shared using P2P Software such as Kazaa, Limewire and online torrents. Almost everything on the internet is copyrighted and shouldn’t be downloaded without their consent. There is an alternative out there for downloading music such as Online Stores like Napster, iTunes and Amazon. Napster got shut down for allowing its users to download music illegally and without paying, and it has now come back as legal download software.

F0H5 10 – Internet Safety

BLOG 3: Internet Defences

Section 1: Content Filtering Software

1. In your own words, explain what content filtering software is.

Filtering software is where the administrator blocks inappropriate websites from being seen in some organisations.

2. Using an Internet search engine, find 3 different content filtering software, and answer the following questions:

a) What are the names of the 3 content filtering software you have chosen? (Also give the web address of the software).

Net Nanny Parental Controls. www.hermanstreet.com

Safe Eyes 2009 www.internetsafety.com

CyberSitter www.hermanstreet.com

b) Which of the 3 do you think is best?

Net Nanny

c) Why?

Because, it is easy to use, easy to install which makes it good for home users. It also supports ME, XP, Vista and Windows 7. The other two Filters are good they lack the ease of use and installation. Net Nanny is also the Cheapest.

Section 2: Proxy server solutions

1. In your own words, explain what a proxy server is.

A Proxy Server allows you to access web pages without communicating with them directly. Some people use Web Proxy to bypass a Blacklist of inappropriate web sites. Big Organisations use Proxy Servers to collect all of the IP addresses for each computer in the organisation.

2. Using an Internet search engine, find 3 different proxy servers, and answer the following questions:

a) What are the names of the servers? (Give the web addresses as well).

Real Hide IP 3.5.2.6 http://www.real-hide-ip.com

Hide The IP 2009 2.7 http://www.hide-the-ip.com

Smart Hide http://www.smarthide.com/

b) Which of the 3 do you think is best?

I think Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

c) Why?

Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

Section 3: Passwords and Password Security

In your own words explain what makes a good, secure password. Make up 3 examples of secure passwords. A Secure Password must have symbols letters and numbers. Ch£$$£YM0NK£Y, B££PL33R, C00LGl4$$3S

Section 4: Backup and Restoring Data

1. In your own words explain what backing up and restoring data is.

Backing up data is when you either create a restore point in windows so you could restore it if something went wrong, or you can create a disk image of your PC on Disk, and big companies use expensive hardware to back up data.

2. Why is it useful?

It is useful incase something goes wrong and you need to restore your PC to the way it was in the past.

Thursday, November 5, 2009

BLOG3

F0H5 10 – Internet Safety

BLOG 3: Review of Internet Threats

In your own words, explain how you would protect yourself from the following:

Phishing

You should never click on links that you think is not your bank and should also use the latest email clients to block off such spam. You can also adjust your web browser to tighten up security if you use web based email clients. Also having an internet security suite should prevent it too.

Identity Theft

The best way to prevent identity theft is to check monthly statements. If you shred all your statements then no one can see your bank details. Also, use a Credit Card online as it is a lot safer then using a Debit Card. Do not fill in details about your credit card or debit cards on online sites as they might Pharm for your details.

Hackers

Have a Good Firewall and Anti-Virus and scan your pc weekly using the anti-virus program

Cyberbullying

Block the Bully on the social networking sites and report them to either the police or to the social networking site.

Grooming

Do not give away any information about where you live and how old you are and so on… If you have told Internet Groomer this information, report it to the police ASAP!