Friday, April 17, 2009

USB Flash Memory - Latest News

A USB flash drive consists of a NAND-type flash memory data storage device integrated with a USB (universal serial bus) interface. USB flash drives are typically removable and rewritable, much smaller than a floppy disk (1 to 4 inches or 2.5 to 10 cm), and most USB flash drives weigh less than an ounce (28g). Storage capacities typically range from 64 MB to 128 GB with steady improvements in size and price per gigabyte. Some allow 1 million write or erase cycles and have 10-year data retention, connected by USB 1.1 or USB 2.0. They have a more compact shape, operate faster, hold much more data, have a more durable design, and operate more reliably due to their lack of moving parts.


The latest news concerning USB Flash Memory is of SanDisk offering the most massive memory capacity in a versatile, tiny package. A microSD memory card has a capacity of up to 2GB, a microSDHC card has a capacity of 4, 8 or 16GB. HD means High Capacity. SanDisk MobileMate Reader is a very small, about 1 ¼ inches long, USB 2.0 stand alone card reader designed specifically for the microSD and microSDHC memory cards.



Thursday, April 16, 2009

How To Use Google

Google search is a web search engine owned by Google, Inc., and is the most used search engine on the Web. Google receives several hundred million queries each day through its various services. Google's algorithm uses a patented system called PageRank to help rank web pages that match a given search string. Users can customize the search engine, by setting a default language, using the "SafeSearch" filtering technology and set the number of results shown on each page. Google has been criticized for placing long-term cookies on users' machines to store these preferences, a tactic which also enables them to track a user's search terms and retain the data for more than a year. For any query, up to the first 1000 results can be shown with a maximum of 100 displayed per page.



Google's homepage includes a button labeled "I'm Feeling Lucky". When a user clicks on the button the user will be taken directly to the first search result, bypassing the search engine. Some of its features include a definition link for most searches including dictionary words, a list of how many results you got on your search, links to other searches (e.g. you misspelled something, it gives you a link to the search results had you typed in the correct search), and many more. The search engine can also be used as a calculator, a measurement and currency converter, a dictionary, and as other tools.Some google search basics would be to: phrase search (using double quotes around a set of words, search within a specific website (site:), excluding terms (-), filling in the blanks (*), searching exactly as it is (+), and the OR operater.


Wireless Networking

Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires. Wireless telecommunications networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or "layer" of the network. A wireless network is more vulnerable, because anyone can try to break into a network broadcasting a signal.
For example, a network set up in your home might be accessible by your next-door neighbor.

Use a wireless base station that provides built-in-security. Wireless Security, also known as Wired Equivalent Privacy (WEP), is a wireless security protocol that helps protect your information by using a network key (called a WEP key) to encode, or encrypt, all network traffic before transmitting it over the airwaves. This helps prevent unauthorized users from accessing the data as it is being transmitted. The Microsoft Broadband Networking Wireless Base Station uses WEP wireless security. The Broadband Networking Wireless Base Station provides a firewall to help protect your network against malicious transmissions and unsolicited requests for data. Just as the name implies, a firewall acts as a barrier or buffer zone between your local network and the Internet. It checks data being transmitted and requests for data that are sent to your network and discards any suspicious items.


Some precautions to take: (1) Position wireless components away from windows and toward the center of your home to decrease the strength of the radio signal outside your intended coverage area; (2) Do not give your wireless encryption key to anyone not authorized to use your network; (3) Avoid leaving the key or password information in an obvious place, make sure you are protecting all parts of your network, not just the wireless segment.


Strong Password


Passwords are the keys that are used to access personal information that stored the computer and in online accounts. If criminals or other malicious users steal this information, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. In many cases you would not notice these attacks until it was too late. Fortunately, it is not hard to create strong passwords and keep them well protected. Password strength is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The strength of a password is a function of length, complexity, and randomness.

A strong password should appear to be a random string of characters and should be lengthly since every single character that is added increases protection. A combination of letters, symbols, and numbers is a good combination due to the fact that it has a greater variety as result making it harder to guess. An ideal password combines both length and different types of symbols. Morevoer, usage of the entire keyboard makes the password complex and harder for others to access.


An example of a strong password is J*p2leO4>F.


http://www.microsoft.com/protect/yourself/password/create.mspx
http://en.wikipedia.org/wiki/Password_strength#Human_generated_passwords

Internet Parental Control Software


Internet parental control software’s enable parents to keep a comprehensive track of which sites have been visited by the child, and how long have been spent viewing them. Therefore if the child willingly or unwillingly has been exposed to any unsuitable web site, they will be fully aware of it, and will be able to take immediate steps to prevent it from happening again. Controlling a child's use of the Internet, so that it is used in a positive and beneficial way, can be a constant challenge for caring parents. Fortunately there exist a range of programs that can be of great assistance, one of the most effective of which being iProtectYou. This program will put the parent in control of the Internet; empowering them limits to their child's use in a way specifically tailored to their needs. The application of this program will significantly reduce the dangers associated with the Internet, and enable their children to gain from the many benefits the Internet offers, whilst shielding them from potential harm.

SoftForYou is a software company that offers a wide range of software programs for to assist par
ents in protecting their children from the less desirable aspects of the Internet. Their three parental control and Internet filtering programs iProtectYou, CyberSieve and Chronager have incorporated into them an advanced monitoring system that has a wide range of functions designed to enable parents to keep track of when and how their child is using the home computer.

Internet Monitoring, Blocking, and Tracking

Nowadays computers often play a big role in the lives of even very young children. Many parents are keen to have their young children using the home computer as soon as possible, considering that this will give them a head-start in their education. Children are using computers at a very early age, as young as preschool. Protecting minors from inappropriate material on the Internet is a parental task that still has no perfect solutions, however parental control software programs provide significant assistance to parents who want to keep their children safe. It gives them the ability to prevent their kids from harmful web sites, chat rooms, and programs, whilst still allowing their kids to enjoy the educational and entertaining resources that are available on the web, and accessible though the computer.

Parents and educators should control their young child's computer and only let their young children use the computer/Internet very selectively. People, groups and organizations from all walks of life are creating a cleaner and more selective virtual environment for kids. One of these organizations is SoftForYou, a filtering and monitoring software company, which offers programs that are designed to help parents control their young child's computer; by enabling their young child to use the computer and the Internet, whilst been shielded from its harmful and potentially dangerous effects. Their latest program is called 1stClicks. This program is extremely effective in enabling parents to control their young child's computer use. This parental control technology is suitable exactly for young children, because it blocks all sites and programs that aren’t pre-approved, rather than just filtering out the “bad” sites.

Internet Parental Guidance

The internet is a worldwide phenomenon and acts as a window of information and a means of entertainment for the whole world, and is accessible anytime and almost anywhere. For children, this wealth of information available at their fingertips can be of great benefit, expanding their horizons and exposing them to different cultures and ways of life. Unfortunately, the educational power of the Internet is tempered by the access that it allows children to endless sites containing undesirable articles, pictures and films.



For parents of children that use the Internet, perhaps the most worrying material that can be accessed is pornography. Due to natural curiosity about sexuality and sexually explicit material, children and adolescents sometimes use their on line access to actively seek out such material. They are easily accessible through search engines, simply by typing in any word related to the topic and can expose a child to photos, videos and stories of a highly indecent and often shocking nature.In addition, many people use chat sites to seduce children and adolescents. With unlimited access, a child may be exposed to web sites containing violence, hostility, extremism and hate, in a way that was impossible before the Internet came into common use. Every view that is held in this world is represented on the Internet, and easily accessible. Its interactive nature, as well as the high quality of many of its sites can leave a lasting impression on a child.


http://www.theteachersguide.com/Internetsafety.html
http://www.softforyou.com/articles_tutorials/parental_control_software.html