Oh My Network~~


Leave a comment

File-Sharing Is Riskier Than You Know


The sheer ease of file-sharing in 2012 is astounding but what might be even more shocking is the number of people who choose to download files like music and movies illegally. Despite steps taken to stymie file-sharing (exorbitant fines, the high-profile demise of upload site Megaupload, slicker detection algorithms to hunt out wrongly shared files, and, of course, the Digital Millennium Copyright Act), millions of people all over the world are still doing it. According to an article from The Guardian, over 43 million people illegally downloaded songs in the UK alone during the first six months of the year. But the landscape overall is still largely unchanged; virtually everything you could possibly think of is available just as quickly and still without cost. File-sharing though seemingly innocuous, is a risky habit that makes you, your personal information and computer or phone susceptible to harm.

Let’s start off with the most obvious thing: malware. A study a few years ago found that nearly 20 percent of files downloaded from the internet, legal and illegal, contain some form of malware. This malware could come in the form of a browser-redirect code — in which you type in some URL and the malware sends you somewhere else — one that throws up bonus ads all over your websites or a virus even more likely to cause serious damage to your computer. A whole lot of malware exists to steal personal information from you: social security numbers, credit card numbers, passwords. It burrows into your operating system and does its thing most times without you even knowing about it.

If you’re using BitTorrent to illegally procure files, you’re possibly opening doors in your system for things to enter without your knowledge and therefore without your consent. That is, this is a problem within the torrenting applications themselves — which might be cracking open your security firewall without your knowledge — not necessarily the files themselves.

There’s two more points about file-sharing that get a bit less attention. The first is that by running a bunch of torrents, you’re you’re negatively affecting your machine’s performance and leaving less bandwidth for other applications to do important things, like back up your system. If you’re sharing a connection with maybe some roommates, this could be trouble. Or, what’s even worse, is if you’re on a sharing binge while on your work computer. A lot of stuff invisible to you might not be so much to your irritable IT guy. There’s not much more embarrassing than getting ratted out to the boss for stealing _The Hangover Part II_. Most companies also have No File-Sharing policies so if getting berated isn’t enough of a deterrent, getting fired should be.

Finally, if you’re illegally file-sharing, you might just get busted. It happens and the Recording Industry Association of America and the US judicial system are largely unforgiving. Stealing files is, after all, illegal. Granted, trouble is more likely to come your way via malware, but the law is most certainly not on your side. And if you’re going to dive into the murky seas of file-sharing, at the very least pack an anti-virus program. Or two or three.

From : http://inthepersonalcloud.com


Leave a comment

World’s Cheapest Computer Finally Makes It To The US Market


The Raspberry Pi Foundation announced that  its $25 Model A computer is now available for purchase in the United States through the electronics reseller Allied Electronics.

The model A is a ten dollar price cut from Raspberry Pi’s original Model B mini computer.

While it doesn’t come close to rivaling Apple design standards, being essentially little more than a circuit board with a few basic hardware components attached, the Model A has enough processing power to run a home media center, according to the foundation.

The release of the computer represents the latest milestone in the democratization of microprocessing power and is expected to be well received by tech geeks, DIY enthusiasts, aspiring entrepreneurs and educators in developing countries.

According to TechCrunch, the Model A uses a third less power and could potentially be powered by solar power or another renewable energy source. The Model A has a 750 MHz processor, 256 megabytes of RAM, a USB 2.0 port, an HDMI port, an SD memory card and a 1/8 inch audio output. The computer also has an HD video camera connector designed for a Raspberry Pi-made camera, and the entire computer is designed to run the Linux operating system.

Made available on the Europe market in early February as well as in Asia just last week, sales of the Model A have been “a few thousand a week” so far, according Raspberry Pi founder Eben Upton.

“We burned through the first 20,000 units quite quickly, and are building a few thousand a week at the moment, but we don’t have good visibility of sell through yet,” he told TechCrunch. “I’d expect us to dip in and out of availability for the next month or so until we reach a steady state.”

The Raspberry Pi founder said the not-for-profit organization has sold the popular computers to buyers around the world, even in the emerging markets of Africa.

“It’s very strong in South Africa,” he told TechCrunch. “We’re looking to use South Africa as a springboard to increasingly affluent per capita cities of sub-Saharan Africa.”

“There’s a lot of tech in Ghana,” he added. “There’s a lot of tech in a lot of these places and an emerging middle class who we think are ready for this kind of innovation.”

Upton has said that he founded Raspberry Pi with the intent of providing a computer platform that enables kids to learn how to write computer code. The device’s affordable price in combination with the interconnectedness of the Internet means that the next Steve Jobs or Bill Gates could emerge from anywhere in the world, regardless of socioeconomic status.

Besides enabling children around the world to connect to the web, Raspberry Pi’s computers have been embraced by DIY enthusiasts, for both recreational and entrepreneurial purposes. Brooklynite Matt Richardson revealed in a web video that he used a Raspberry Pi to create a bike headlight that also projects a bicycle’s current speed.

David Akerman, another DIY enthusiast, attached a Raspberry Pi to a high altitude weather balloon in southern England. The device was able to send back pictures from almost 25 miles above the Earth.

Source: Brett Smith for redOrbit.com – Your Universe Online

1 Comment

9 Tech Tips for Job-Hunting Grads


Recently graduated and looking for a job? A few simple tips about writing better cover letters and resumes or choosing the right words when networking, can enormously affect your life for the better. Graduates usually know they should clean up their Facebook profiles and join LinkedIn, but there’s a lot more to having a savvy online presence and positioning yourself for the job you want.

Here are nine tips related to technology, job search sites, and networking online, that will steer you toward greater success in your jobs search, at a new job, and hopefully through your professional life.

1. Tailor your cover letters and resumes for each job. Many graduates know they should write a unique cover letter for each job application, but you should also write an original resume that speaks to the position and employer, too. For details on how exactly to do this, see my complete article on tips for resumes and cover letters.

2. Look for jobs in four online places. There are four primary places you should be looking for jobs online:

  • general job websites, such as LinkedIn and CareerBuilder,
  • field-specific job websites, meaning sites that cater to your area of expertise; for example, JournalismJobs.com for journalists,
  • location-specific job sites; for example, practically everyone in the San Francisco Bay area posts on Craigslist.org, even if they also post to other sites, and
  • social networks, which may also include email.

Look broadly. You’re not going to see great jobs that suit you every single day, so the wider you cast your net, the better. See also the 10 best job search websites.

3. Be organized in searching for a job. To effectively plaster your resume every place it would count, you’ll need a very organized approach so that you’re not applying to the same position twice or otherwise emailing the same few people repeatedly. I’ve written an entire article devoted to managing an online job search that contains a lot of specific how-tos and tips.

. Show your interests without sounding desperate (i.e., network!). Use social networks to tell everyone you know about what your strikes your interest, as well as your skills and areas of expertise. Tell them how interesting and valuable you are without sounding desperate for a job, which is a real turn-off. Post about topics that genuinely interest you, and share why. Follow up with comments along the lines of, “That kind of thing would be an ideal career for me. I’d love to learn how to get my foot in the door!” People will bite. Use those connections, and again, try to not come off as desperate. Sound curious to learn. And be concise.

5. Use one email address. It’s crucial that you have one professional email address that you use for all your job hunting, networking, and other professional outreach. It should be a professional-sounding address made up of your name or some very simple variation of your name and initials. Don’t include a city abbreviation, year of birth, or university affiliation in your email address. You don’t want the address to be outdated or give away information about yourself that could be a point of discrimination.

6. Clean up your social media accounts. Take some time to clean up your social networks so that you’re presenting professional online profiles. One tool that can help is Facewash, which scours your Facebook account for naughty language, and lets you search your Facebook account for any terms that you might deem worrisome while job-hunting so that you can edit or delete them. See these other tips on how to clean up Facebook, too. There are many applicants for most open positions, and hiring managers are looking for easy ways to disqualify applicants: don’t give them one.

7. Speak the language of your industry. One huge, but little discussed, reason networking online can be of service is it teaches you to speak in the same language and tone as the people in your industry. Some fields still value professionalism above all else, but in other industries, a more casual conversational tone will get you farther, faster. I used to work as a writer and editor in the video game development industry, where overly formal emails got tossed the moment the words “sir or ma’am” came into view. Using the wrong tone in a cover letter could be what causes your application to go into the pile of rejects. It’s a tough gray area to negotiate, but the more contacts you make in the industry and the more professional communication you have with them, the better you’ll be able to choose your words. The same holds true for dressing appropriately for a job interview. Not all industries want to see a suit and tie anymore. The more contacts you make, the more people you can ask for industry- or company-specific advice.

8. Write down your goals. A beautiful aspect of technology is it makes it easy to review notes, update them, and review your changes and progress along the way. That’s all extremely helpful when your notes are goals, things you want to accomplish. When people write on physical paper, they often toss their notes or forget that they wrote them in the first place. When you write down your goals and how you plan to achieve them in an electronic space, you can set reminders to review your goals, adjust your objectives, and so forth.

9. When employed, document your workflow. Once you have a new job, an excellent way to make a great impression on your boss and also help yourself get ahead is to spend your downtime documenting your workflow and other procedures in the office.

Leave a comment

Article on Firewall Security Advantages and Firewall Functions






The firewall protects an internal network from malicious hackers or software  on an external network. Firewalls filter potentially harmful incoming or  outgoing traffic. Firewalls are used to subdivide internal networks on the  Internet. It also protects individual computers. The five services that  firewalls provide are packet filtering, application filtering, proxy server,  circuit-level, and stateful inspection.

” Packet Filtering: A packet filtering firewall checks each packet crossing  the device. It also inspects the packet headers of all network packets going  through the firewall.

Source IP Address: It identifies the host that is sending the packet.  Attackers can modify this field in an attempt to conduct IP spoofing. Firewalls  are configured to reject packets that arrive at the external interface, that is  either an erroneous host configuration or an attempt at IP spoofing. Destination  IP Address: This is the IP address that the packet is trying to reach.

IP Protocol ID: Each IP header has a protocol ID that follows. For example,  Transmission Control Protocol (TCP) is ID 6, User Datagram Protocol UDP) is ID  17, and Internet Control Message Protocol (ICMP) is ID 1.

Fragmentation Flags: Firewalls examine and forward or reject fragmented  packets. A successful fragmentation attack can allow an attacker to send packets  that could compromise an internal host.

IP Options Setting: This field is used for diagnostics. The firewall is  configured to drop network packets that use this field. Attackers can use this  field in conjunction with IP spoofing to redirect network packets to their  systems.

” Application Filtering: This device will intercept connections and performs  security inspections. The firewall acts as a proxy for connections between the  internal and external network. The firewall enforce access control rules  specific to the application. It is also use to check incoming e-mails for virus  attachments. These firewalls are often called e-mail gateways.

” Proxy Server: A proxy server takes on responsibility for providing services  between the internal  and external network. Proxy server can be used to hide the  addressing scheme of the internal network. It can also be used to filter  requests based on the protocol and address requested.

” Circuit-Level: A circuit-level firewall controls TCP and UDP ports, but  doesn’t watch the data transferred over them. If a connection is established,  the traffic is transferred without any further checking.

” Stateful Inspection: An inspection firewall works at the Network layer. It  assesses the IP header information. It also monitors the state of each  connection. Connections are rejected if they attempt any actions that are not  standard for the given protocol. These listed firewall features can be  implemented in combination by a given firewall implementation. Placing a lot of  firewalls in series is a common practice to increase security at the network  perimeter.

Article Source: http://EzineArticles.com/1710529

Leave a comment

First Batman: Arkham Origins Trailer Revealed

Warner Bros. has taken the wraps off the first official trailer for the upcoming “Batman: Arkham Origins” game. The extended 5-minute-long trailer shows the Dark Knight battling Deathstroke, with intense fight sequences and the use of Batman’s iconic arsenal of gadgets. Interestingly, the trailer ends with a twist, as another villain thwarts Deathstroke’s efforts to defeat the Batman.

While the video does not show any actual gameplay, it does give a pretty interesting look at Warner Bros.’ take on the young Batman. The most obvious indication of this is from the rather unrefined Batsuit, which looks like several pieces of armor patched on together – unlike those seen in the other “Batman: Arkham” series.

The trailer also coincided with the pre-order campaign for the game. However, like most releases, the pre-order is limited to several countries in the North American and European regions only.