Friday, April 22, 2011

Computer Hacking


Computer hacking is difficult to define, but usually, if not always, involves the breaching of some ones personal privacy or information. Hacking can go anywhere from being annoying or just invasive to straight up illegal depending on what the hacking is accomplishing.



            Someone who usually is a hacker possesses traits similar to the following; good at programming quickly, programming is part of their job, one who enjoys exploring the in’s and out’s of programming and wants to learn more.


Wireless Networking Precautions


Wi-Fi has some serious security issues, issues that can be dealt with by making sure that you have the most recent anti virus program installed on your computer and enabling WEP or WPA which is also known as making a password for your Wi-Fi. Also ensure that the router you chose for your Wi-Fi has a built in firewall to heighten your protection.


           As for making sure that you are safe using public Wi-Fi you need to make sure that you have the proper antivirus software as well as make sure that you do not provide or have any personal information on your computer at those times that you’re using public Wi-Fi.

Strong Password (How to Create and Use Them)


The easiest way to have a strong password is to make a complex chain of letters, numbers and symbols. This wouldn’t be beneficial to you because you may not remember it, so there are a couple tips of how to create a strong password; make it long, 8 characters is good but 14 is better. Most passwords can include a space, making the password a pass sentence, utilize this.

            Make sure that you do not tell these passwords to anyone, make sure where you write them down or have them written down is a safe place to write them. Never write your password to anything in an e-mail and make sure that you change your passwords regularly.


Internet Parental Control Software


The internet parental control software is software that shields kids and anyone who shouldn’t be exposed to the inappropriate things on the internet from those inappropriate things.  
Most softwares cost money to install a toolbar on your browser and with that toolbar one can prevent children from accessing adult websites with inappropriate material.


Internet Filters


Internet filters are usually software that was put in place to prevent access to inappropriate websites and the content of the web. The software does this based on a list of pre-classified websites as well as content that is deemed inappropriate.

Internet filters provide families with the comfort that their children aren’t going to go onto the internet and stumble upon inappropriate content or websites that they should not be on.



Digital Image Steganography


The art of writing hidden messages in such a way that no one, besides the sender and the person who it is intended for, knows about the message. There are several ways to mask or hide these hidden messages, some being; in the lowest bits of a sound file, putting random data in with encrypted data, concealing them in a video played at a slower rate or a faster rate then normal.

            There are several ways to transfer these messages, however, I am going to focus on one called Paranoia. Paranoia allows the sender to place a text message behind a digital image file. To do so, you need a key, to unlock the text message of course but you also need a picture to hide it behind.



Computer Forensics


Computer Forensics is legal evidence found in computers and anything else pertaining to digital storage devices. The subject of computer forensics is to obtain, analyze and recover the facts that pertain to the case at hand. Computer forensics is essentially the figuring out of, “what happened, when it happened, how it happened, and who was involved.” The main reason for Computer Forensics is to find the “root cause” of a computer that is not working properly or has been used to commit a crime.
            
There are typically two types of computer forensics investigations; one being where the computer was used to commit a crime, or was used in the wrong way from its intended use. The other investigation is when the computer is on the receiving end of the crime, and the computer has been hacked or has had something stolen from it.