An Internet service provider (ISP), also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the Internet. The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol packets or frames, such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISP's servers. ISPs may provide services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP.
from: http://en.wikipedia.org/wiki/Internet_service_provider
There are a lot of internet service provider (ISP) in Malaysia.Which of the ISP is best to use?
Streamyx
P1 Wimax
YES 4G
Maxis Broadband
Digi Broadband
Celcom Broadband
Please leave your comment ya ^^
Wednesday, March 9, 2011
Tuesday, March 8, 2011
Internet Security?
Nowadays, there are a lot of people using internet to do a lot of things such as online shopping, online banking, online networking and etc.
Well, are you trust in the internet? internet is the virtual network which you cannot touch and communicating face to face. And seriously, internet is not secure at all. and i believe that a lot of people cheating about themselves in the internet for whatever reasons.
So, how you will trust in the internet stuffs? personally, i do not really trust the internet especially social networking websites and the online shoppings. i always doubt that the information of the social network is true or just being made up. you can just be anyone that you want to be in the internet but in fact you are not the person.
The news always reported that there are some youngster running out from home just because of the friends in the internet. They never met each other before and they are willing to running out from home because of him/her. So, just be rational when you are using internet.
Well, are you trust in the internet? internet is the virtual network which you cannot touch and communicating face to face. And seriously, internet is not secure at all. and i believe that a lot of people cheating about themselves in the internet for whatever reasons.
So, how you will trust in the internet stuffs? personally, i do not really trust the internet especially social networking websites and the online shoppings. i always doubt that the information of the social network is true or just being made up. you can just be anyone that you want to be in the internet but in fact you are not the person.
The news always reported that there are some youngster running out from home just because of the friends in the internet. They never met each other before and they are willing to running out from home because of him/her. So, just be rational when you are using internet.
How Do You Protect Your Network Against Hackers?
Network security is a serious matter. A network allows you to share information and resources, but it also lets computer viruses, human intruders, or even disgruntled employees do far more damage than they could on a single machine. Think about what would happen if every bit of data on your local area network (LAN) vanished, and you'll understand why security is so important.
Here is a brief list of security measures to think about when you're installing a LAN:
- Virtual data still requires physical security. This could mean keeping your server in a locked room, removing disk drives from workstations that don't need them, and installing an alarm system in your office. All the security software in the world won't stop someone from breaking into your office and carting off your computers.
- Beware of bugs. Most computer viruses are just a nuisance, but it takes only one malevolent virus to bring your network to its knees. Install reliable antivirus software, keep it updated, and train your employees to use it. Think about other protective measures, such as installing only shrink-wrapped commercial software on your computers.
- Network security is a daily job. Stay on top of changes that could affect the security of your LAN. Keep your operating system updated with the latest security patches and bug fixes. Assign access to directories and other network resources on a need-to-have basis, and remove a user's account immediately when they leave your company. Use network logging and security tests to check your network for security holes and possible break-ins.
- Pay attention to passwords. One bad password can compromise your entire network. Avoid passwords that contain dictionary words or personal information, and require users to change their passwords regularly. When an employee leaves the company, disable their password immediately as part of the termination process.
- Don't let trouble calling.Take special precautions if you connect your LAN to the outside world through a wireless hotspot at your local café or library. Protect against wireless attacks by using encrypted passwords or firewall, which can be in the form of portable hardware, such as a USB dongle.
- Install a software firewall. If you connect your LAN directly to the Internet, configure a firewall to screen both incoming and outgoing traffic. A software firewall like Zone Labs ZoneAlarm will also protect your network against malicious applications known as Trojan horses that let intruders enter and take over your computer system.
Sunday, March 6, 2011
Internet Privacy
Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
Internet privacy forms a subset of computer privacy. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose." On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
\
Risks to internet privacy
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.
Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use. These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of bugs (software errors) exploitation.
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see.
from: http://en.wikipedia.org/wiki/Internet_privacy
Internet privacy forms a subset of computer privacy. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose." On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
\
Risks to internet privacy
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.
Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use. These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of bugs (software errors) exploitation.
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see.
from: http://en.wikipedia.org/wiki/Internet_privacy
Cloud Computing
What is cloud computing?
It is difficult to come up with a precise definition of cloud computing. In general terms, it’s the idea that your computer’s applications run somewhere on the “cloud”, that is to say, on someone else’s server accessed via the Internet. Instead of running program applications or storing data on your own computer, these functions are performed at remote servers which are connected to your computer through the Internet or other connections.
In telecommunications, a “cloud” is the unpredictable part of any network through which data passes between two end points. In cloud computing the term is used to refer generally to any computer, network or system through which personal information is transmitted, processed and stored, and over which individuals have little direct knowledge, involvement, or control.
With more reliable, affordable broadband access, the Internet no longer functions solely as a communications network. It has become a platform for computing. Rather than running software on your own computer or server, Internet users reach to the “cloud” to combine software applications, data storage, and massive computing power. A September 2008 Pew Internet and American Life Study found that 69% of online Americans have utilized some form of cloud computing.
It’s interesting to note that cloud computing is really nothing new. It's the modern version of the 1960’s-era computer timesharing model. That model was based upon the high cost of computers at that time. With computer and data storage prices plummeting, it seems odd that there would be a return to that sort of model.
from: http://www.pewinternet.org/Reports/2008/Use-of-Cloud-Computing-Applications-and-Services.aspx.
from: http://www.pewinternet.org/Reports/2008/Use-of-Cloud-Computing-Applications-and-Services.aspx.
Network Communications Devices
A network is consists of a larger number of the communication devices. The simplest device that is used in the communication is the NIC adapter which is attached with the every computer in a network. If you want to build a LAN, you will need to have computers, hubs, switches, network adapters, UTP/STP cables, routers, internal/external modems, connectors, cable testers and clipping tool. | |
On the other hand if you need to build WAN, you will need to have routers, switches, dedicated or leased telephone lines such as ISDN lines, frame relay connection and other types of wan communication connections. There are different communication mediums such as Ethernet cables, copper wire, coaxial cable, fiber optic cables, leased telephone lines and ever air is also a communication medium for the satellite communication. The most common networking medium is the LAN is the Ethernet cable (UTP/STP), which is used in the star topology. Hub is a central device of a network and every computer in a network is directly connected with the hub. |
If the hub fails to work, the communication between the computers stops till the hub again starts working. Hub broadcasts the data to its every port, and then finding the destined computer, the data sent toward it. The switch is an advance form of the hub similar in functions but the advanced switches has a switching table in them. A advanced switch stores the MAC address of every attached computer and the data is only sent to the destined computer, unlike the hubs where data is sent to all ports. A router is a key device in the internet communication and wan communication system. A router has software called routing table and the source and destination addresses are stored in the routing table.
A router connects two logically and physically different networks. Router finds the IP address of the next hop (next router) and the data is sent toward it and so on. The well known routers developing companies are Cisco systems, Nortel, DLink and others. Every ISP, banks, corporate offices and multinational companies use routers for LAN and WAN communications and communication in their private networks. A gateway can be device or software in a network.
A gateway device connects the LAN with the internet. A gateway is directly exposed to the internet so it should be securely configured and in and out traffic should be monitored. If you are using DSL connection, you must need a DSL modem in your network. The telephone line is connected with the DSL modem and UTP/STP cable attaches your computer with the DSL modem. Modems are the devices that are used to modulate and demodulate the data. They convert analogue signals to digital and digital signals to analogue so that signals can travel on the telephone lines.
There are certain types of the cables that are used to connect two or more computers in a network. Fiber optic cable acts as a backbone between the ISPs and corporate offices. Data travels at the speed of light on the fiber optic cables. The cost and the installation cost of the fiber optic cable is very high but it is becoming very popular in the home networking and LANs also. In the local area networking, 10baseT/CAT5 cable is most commonly in use.
A server is a computer in network that provides services to the client computers such as logon requests processing, files access and storage, internet access, printing access and many other types of services. Servers are mostly equipped with extra hardware such as plenty of external memory (RAM), more data store capacity (hard disks), high processing speed and other features.
Network Communications
Communication Protocols
It is very interesting to know that how computers send and receive the information across the communication links. Computers do this job by the help of data communication software. It is software that enables computers to communicate with each other. The data transmission software tells the devices and computers how to send information to the other computers. The software that is used for the data transmission is known as protocol. The data transmission software or protocols perform the following basic functions:
1. Data sequencing: A long message is broken up into the smaller packets of fixed size for the error free transmission.
2. Data Routing: In the data routing process the most efficient route is to find to send the data from the source to the destination.
3. Flow control: The flow control regulates the process of sending data between fast sender and slow receiver.
4. Error Control: Error detection and recovery is the most important factor of the data transmission software (protocols). It ensures the error free transmission of the data.
from: http://www.networktutorials.info/communication .html
It is very interesting to know that how computers send and receive the information across the communication links. Computers do this job by the help of data communication software. It is software that enables computers to communicate with each other. The data transmission software tells the devices and computers how to send information to the other computers. The software that is used for the data transmission is known as protocol. The data transmission software or protocols perform the following basic functions:
1. Data sequencing: A long message is broken up into the smaller packets of fixed size for the error free transmission.
2. Data Routing: In the data routing process the most efficient route is to find to send the data from the source to the destination.
3. Flow control: The flow control regulates the process of sending data between fast sender and slow receiver.
4. Error Control: Error detection and recovery is the most important factor of the data transmission software (protocols). It ensures the error free transmission of the data.
from: http://www.networktutorials.info/communication .html
Subscribe to:
Posts (Atom)