|
|
E-book Intro to IT
Salam sejahtera,
Saya tau bukan sahaja pelajar INSTEDT yang menjadikan nota-nota daripada laman ini sebagai rujukan, tetapi daripada kolej lain dan universiti lain pun ada (dah jadi 'friend' pon kan?... \(o^o)/ )
Saya ada sediakan modul untuk pelajar di sini. Modul ini mengandungi kandungan pengenalan kepada teknologi maklumat yang merangkumi perisian, perkakasan, rangkaian, sistem, pangkalan data dan hampir mencakupi semua bidang IT tetapi dalam bentuk pengenalan. Dan juga kandungannya adalah yang terbaru setakat ini.
Ada yang berminat tak? Sesiapa yang berminat bolehlah komen pada entry ini atau call saya di 013-731 6647.

Labels: komputer, nota IT, nota pengenalan kepada it, pengenalan kepada teknologi maklumat Thanks for reading :)
Jadik cam budak2 Kejap - create my own doodle
 Hurm... this is my first try wat ddodle ... burok bebeno. Student yang kreatif leh buat lagi cantik yer.
Labels: DTM, komputer, kreatif Thanks for reading :)
Remaja 12 tahun temukan kelemahan firefox, dapat hadiah USD 3,000
 Remaja bernama Alex Miller asal California ini berhasil menemukan sebuah bug yang berhubung dengan isu buffer overflow dan memory corruption di Firefox. Alex menghabiskan waktu 90 minit sehari selama 10 hari untuk menemukan bug dimaksud. Dia memang memiliki skill di bidan pemograman. Bug berkaitan lalu dilaporkan kepada pihak Mozilla. Sejak bulan Juli, Mozilla memang menawarkan wang bagi mereka yang berhasil menemukan cacat di produk Mozilla. Ramai yang meragukan kebolehan Alex mencapai prestasi, terutama teman sebayanya. Namun setelah ia menunjukkan cek dari Mozilla, baru mereka percaya. Sebahagian wang hadiah itu disumbangkan ke lembaga sosial dan untuk membeli hadiah dan selebihnya di simpan. "Hanya sedikit orang yang mampu berbuat demikian," kata Brandon Stone, Security Program Manager Mozilla. Dengan demikian, apa yang dilakukan Alex memang tidak sembarangan dan wajar dia diberi penghargaan wang dari Mozilla. kredit to : itsmesaiful.blogspot.com
Labels: am, komputer Thanks for reading :)
Komputer Kayu - Macam2
Labels: komputer, macam-macam Thanks for reading :)
Privacy and Security Issues in Social Networking
BY: BRENDAN COLLINSOctober 3, 2008Given the rising popularity of social networks, it’s little surprise that there have been several high-profile breaches of security on sites as huge as MySpace and Facebook. With over 350 million members combined, all it takes is one single person to cause a major damage. Learn how the networks are dealing with the breaches -- and how to protect yourself. When it comes to privacy and security issues on social networks, "the sites most likely to suffer from issues are the most popular ones," Graham Cluley, Chief Technology Officer at UK tech security firm Sophos says. But security issues and privacy issues are entirely two different beasts. A security issue occurs when a hacker gains unauthorized access to a site's protected coding or written language. Privacy issues, those involving the unwarranted access of private information, don't necessarily have to involve security breaches. Someone can gain access to confidential information by simply watching you type your password. But both types of breaches are often intertwined on social networks, especially since anyone who breaches a site's security network opens the door to easy access to private information belonging to any user. But the potential harm to an individual user really boils down to how much a user engages in a social networking site, as well as the amount of information they're willing to share. In other words, the Facebook user with 900 friends and 60 group memberships is a lot more likely to be harmed by a breach than someone who barely uses the site. Security lapses on social networks don't necessarily involve the exploitation of a user's private information. Take, for example, the infamous "Samy" MySpace XSS worm that effectively shut the site down for a few days in October 2005. The "Samy" virus (named after the virus' creator) was fairly harmless, and the malware snarkily added the words "Samy Is My Hero" to the top of every affected user's MySpace profile page. A colossal inconvenience, naturally, but nobody's identity was stolen and no private information was leaked. In the end, the problem galvanized the MySpace team to roll up their sleeves and seriously tighten the site's security. Result: no major break-ins since. Unfortunately, these kinds of breaches, purely for sport in "Samy's" case, are rare. The reason social network security and privacy lapses exist results simply from the astronomical amounts of information the sites process each and every day that end up making it that much easier to exploit a single flaw in the system. Features that invite user participation -- messages, invitations, photos, open platform applications, etc. -- are often the avenues used to gain access to private information, especially in the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made small headlines last year when she exposed a potentially devastating hole in the framework of Facebook's third-party application programming interface (API) which allows for easy theft of private information. Felt and her co-researchers found that third-party platform applications for Facebook gave developers access to far more information (addresses, pictures, interests, etc.) than needed to run the app. This potential privacy breach is actually built into the systematic framework of Facebook, and unfortunately the flaw renders the system almost indefensible. "The question for social networks is resolving the difference between mistakes in implementation and what the design of the application platform is intended to allow," David Evans, Assistant Professor of Computer Science at the University of Virginia, says. There's also the question of whom we should hold responsible for the over-sharing of user data? That resolution isn't likely to come anytime soon, says Evans, because a new, more regulated API would require Facebook "to break a lot of applications, and a lot of companies are trying to make money off applications now." Felt agrees, noting that now "there are marketing businesses built on top of the idea that third parties can get access to data on Facebook." The problems plaguing social network security and privacy issues, for now, can only be resolved if users take a more careful approach to what they share and how much. With the growth of social networks, it's becoming harder to effectively monitor and protect site users and their activity because the tasks of security programmers becomes increasingly spread out. Imagine if a prison whose inmate count jumped from a few dozen to 250 million in less than five years only employed 300 guards (in the case of MySpace). In response to the potential threats that users are expose to, most of the major networks now enable users to set privacy controls for who has the ability to view their information. But, considering the application loophole in Facebook, increased privacy settings don't always guarantee privacy. But even when the flawed API was publicly exposed, "Facebook changed the wording of the user agreement a little bit, but nothing technically to solve the problem," says Evans. That means if a nefarious application developer wanted to sell the personal info of people who used his app to advertising companies, he or she could. Sources: http://www.fastcompany.com/articles/2008/10/social-networking-security.html
Labels: artikel, CSC, it, komputer Thanks for reading :)
Katalaluan ...
 Amalan Keselamatan Terbaik: Melindungi Kata laluan
Kata laluan biasanya digunakan untuk mengakses perkhidmatan dan maklumat dalam web. Terdapat banyak kata laluan yang anda perlu ingat, oleh itu, anda mungkin memilih kata laluan yang mudah diingat malah menulisnya di tempat yang boleh dilihat orang. Berikut adalah beberapa tip untuk anda melindungi kata laluan anda dan membina kata laluan yang kuat: + Jangan kongsi kata laluan anda dalam Internet, menerusi e-mel atau dalam telefon. Tiada sesiapa akan meminta untuk menghantar kata laluan anda kepada mereka. Berhati-hati jika ada yang bertanya. + Menggunakan kata laluan yang mempunyai sekurang-kurangnya 8 aksara, yang termasuk kombinasi nombor dan simbol. + Elakkan perkataan atau frasa biasa. Penggodam boleh menggunakan program yang mencuba setiap perkataan dalam kamus. + Jangan gunakan maklumat peribadi anda atau sebarang perkataan atau frasa yang berkaitan dengan anda. + Anda perlu sentiasa menukar kata laluan dengan kerap. Setiap 3 bulan sekurang-kurangnya. + Anda perlu menggunakan kata laluan berlainan pada setiap akaun yang anda akses. + Satu cara mencipta kata laluan yang kuat ialah mendapatkan frasa yang anda boleh ingat dan mengambil huruf pertama bagi setiap perkataan sebagai kata laluan anda, menukar huruf yang anda boleh ingat. Contohnya, “Everyone knows the sun sets at dawn” akan menjadi “e1ktss@d”. sumber artikel : Sumbangan dari KRMY Blog
Labels: berita, it, komputer Thanks for reading :)
Older Post
Le Direct-or
Hello Earthlings! im human just like you~
Basics:
Name: Nur Qistina Known as: Qistina/Qis Age: 16 years youngStat: PenangCountry: MalaysiaFav. Colours: Black, Blue, and Soft PinkLanguage: Malay and EnglishHobby: blogging, Sleeping, Eating Fav Quotes: It's so fluffy i'm gonna die!
Likes:
♥ Eating♥ Blogging♥ One D♥ Chocolates♥ Ice Cream♥ Galaxy Tabby♥ Spongebob Squarepants♥ Black+White♥ Sleeping♥ Natural Beauty
Dislikes
✖ Anons, Haters, Copypasters✖ Liars✖ Snails and all animals that dont have backbones✖ Make up✖ High heels
 E-book Intro to IT
Salam sejahtera,
Saya tau bukan sahaja pelajar INSTEDT yang menjadikan nota-nota daripada laman ini sebagai rujukan, tetapi daripada kolej lain dan universiti lain pun ada (dah jadi 'friend' pon kan?... \(o^o)/ )
Saya ada sediakan modul untuk pelajar di sini. Modul ini mengandungi kandungan pengenalan kepada teknologi maklumat yang merangkumi perisian, perkakasan, rangkaian, sistem, pangkalan data dan hampir mencakupi semua bidang IT tetapi dalam bentuk pengenalan. Dan juga kandungannya adalah yang terbaru setakat ini.
Ada yang berminat tak? Sesiapa yang berminat bolehlah komen pada entry ini atau call saya di 013-731 6647.

Labels: komputer, nota IT, nota pengenalan kepada it, pengenalan kepada teknologi maklumat  Jadik cam budak2 Kejap - create my own doodle
 Hurm... this is my first try wat ddodle ... burok bebeno. Student yang kreatif leh buat lagi cantik yer.
Labels: DTM, komputer, kreatif  Remaja 12 tahun temukan kelemahan firefox, dapat hadiah USD 3,000
 Remaja bernama Alex Miller asal California ini berhasil menemukan sebuah bug yang berhubung dengan isu buffer overflow dan memory corruption di Firefox. Alex menghabiskan waktu 90 minit sehari selama 10 hari untuk menemukan bug dimaksud. Dia memang memiliki skill di bidan pemograman. Bug berkaitan lalu dilaporkan kepada pihak Mozilla. Sejak bulan Juli, Mozilla memang menawarkan wang bagi mereka yang berhasil menemukan cacat di produk Mozilla. Ramai yang meragukan kebolehan Alex mencapai prestasi, terutama teman sebayanya. Namun setelah ia menunjukkan cek dari Mozilla, baru mereka percaya. Sebahagian wang hadiah itu disumbangkan ke lembaga sosial dan untuk membeli hadiah dan selebihnya di simpan. "Hanya sedikit orang yang mampu berbuat demikian," kata Brandon Stone, Security Program Manager Mozilla. Dengan demikian, apa yang dilakukan Alex memang tidak sembarangan dan wajar dia diberi penghargaan wang dari Mozilla. kredit to : itsmesaiful.blogspot.com
Labels: am, komputer  Komputer Kayu - Macam2
Labels: komputer, macam-macam  Privacy and Security Issues in Social Networking
BY: BRENDAN COLLINSOctober 3, 2008Given the rising popularity of social networks, it’s little surprise that there have been several high-profile breaches of security on sites as huge as MySpace and Facebook. With over 350 million members combined, all it takes is one single person to cause a major damage. Learn how the networks are dealing with the breaches -- and how to protect yourself. When it comes to privacy and security issues on social networks, "the sites most likely to suffer from issues are the most popular ones," Graham Cluley, Chief Technology Officer at UK tech security firm Sophos says. But security issues and privacy issues are entirely two different beasts. A security issue occurs when a hacker gains unauthorized access to a site's protected coding or written language. Privacy issues, those involving the unwarranted access of private information, don't necessarily have to involve security breaches. Someone can gain access to confidential information by simply watching you type your password. But both types of breaches are often intertwined on social networks, especially since anyone who breaches a site's security network opens the door to easy access to private information belonging to any user. But the potential harm to an individual user really boils down to how much a user engages in a social networking site, as well as the amount of information they're willing to share. In other words, the Facebook user with 900 friends and 60 group memberships is a lot more likely to be harmed by a breach than someone who barely uses the site. Security lapses on social networks don't necessarily involve the exploitation of a user's private information. Take, for example, the infamous "Samy" MySpace XSS worm that effectively shut the site down for a few days in October 2005. The "Samy" virus (named after the virus' creator) was fairly harmless, and the malware snarkily added the words "Samy Is My Hero" to the top of every affected user's MySpace profile page. A colossal inconvenience, naturally, but nobody's identity was stolen and no private information was leaked. In the end, the problem galvanized the MySpace team to roll up their sleeves and seriously tighten the site's security. Result: no major break-ins since. Unfortunately, these kinds of breaches, purely for sport in "Samy's" case, are rare. The reason social network security and privacy lapses exist results simply from the astronomical amounts of information the sites process each and every day that end up making it that much easier to exploit a single flaw in the system. Features that invite user participation -- messages, invitations, photos, open platform applications, etc. -- are often the avenues used to gain access to private information, especially in the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made small headlines last year when she exposed a potentially devastating hole in the framework of Facebook's third-party application programming interface (API) which allows for easy theft of private information. Felt and her co-researchers found that third-party platform applications for Facebook gave developers access to far more information (addresses, pictures, interests, etc.) than needed to run the app. This potential privacy breach is actually built into the systematic framework of Facebook, and unfortunately the flaw renders the system almost indefensible. "The question for social networks is resolving the difference between mistakes in implementation and what the design of the application platform is intended to allow," David Evans, Assistant Professor of Computer Science at the University of Virginia, says. There's also the question of whom we should hold responsible for the over-sharing of user data? That resolution isn't likely to come anytime soon, says Evans, because a new, more regulated API would require Facebook "to break a lot of applications, and a lot of companies are trying to make money off applications now." Felt agrees, noting that now "there are marketing businesses built on top of the idea that third parties can get access to data on Facebook." The problems plaguing social network security and privacy issues, for now, can only be resolved if users take a more careful approach to what they share and how much. With the growth of social networks, it's becoming harder to effectively monitor and protect site users and their activity because the tasks of security programmers becomes increasingly spread out. Imagine if a prison whose inmate count jumped from a few dozen to 250 million in less than five years only employed 300 guards (in the case of MySpace). In response to the potential threats that users are expose to, most of the major networks now enable users to set privacy controls for who has the ability to view their information. But, considering the application loophole in Facebook, increased privacy settings don't always guarantee privacy. But even when the flawed API was publicly exposed, "Facebook changed the wording of the user agreement a little bit, but nothing technically to solve the problem," says Evans. That means if a nefarious application developer wanted to sell the personal info of people who used his app to advertising companies, he or she could. Sources: http://www.fastcompany.com/articles/2008/10/social-networking-security.html
Labels: artikel, CSC, it, komputer  Katalaluan ...
 Amalan Keselamatan Terbaik: Melindungi Kata laluan
Kata laluan biasanya digunakan untuk mengakses perkhidmatan dan maklumat dalam web. Terdapat banyak kata laluan yang anda perlu ingat, oleh itu, anda mungkin memilih kata laluan yang mudah diingat malah menulisnya di tempat yang boleh dilihat orang. Berikut adalah beberapa tip untuk anda melindungi kata laluan anda dan membina kata laluan yang kuat: + Jangan kongsi kata laluan anda dalam Internet, menerusi e-mel atau dalam telefon. Tiada sesiapa akan meminta untuk menghantar kata laluan anda kepada mereka. Berhati-hati jika ada yang bertanya. + Menggunakan kata laluan yang mempunyai sekurang-kurangnya 8 aksara, yang termasuk kombinasi nombor dan simbol. + Elakkan perkataan atau frasa biasa. Penggodam boleh menggunakan program yang mencuba setiap perkataan dalam kamus. + Jangan gunakan maklumat peribadi anda atau sebarang perkataan atau frasa yang berkaitan dengan anda. + Anda perlu sentiasa menukar kata laluan dengan kerap. Setiap 3 bulan sekurang-kurangnya. + Anda perlu menggunakan kata laluan berlainan pada setiap akaun yang anda akses. + Satu cara mencipta kata laluan yang kuat ialah mendapatkan frasa yang anda boleh ingat dan mengambil huruf pertama bagi setiap perkataan sebagai kata laluan anda, menukar huruf yang anda boleh ingat. Contohnya, “Everyone knows the sun sets at dawn” akan menjadi “e1ktss@d”. sumber artikel : Sumbangan dari KRMY Blog
Labels: berita, it, komputer
Older Post
// Forever Young-One Direction
|