Monday, November 30, 2009

Fiber Optic Communication




Fiber optic communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. This light forms an electromagnetic carrier wave that is modulated to carry information. It was first created in the 1970’s. Fiber Optic has largely replaced copper wire because of its advantages over electrical transmission.

Fiber Optic is used by many companies to transmit telephone signals, Internet communication, and cable television signals. Due to much lower attenuation and interference, optical fiber has large advantages over existing copper wire in long distance and high demand applications. An example of a fiber optic network is Verizon Fios.

I found my information here at http://en.wikipedia.org/wiki/Fiber-optic_communication

Wireless Networking Precautions








Wireless security is important at home and in corporations. If you have an unsecured wireless network in your home, anyone close by can spy on your online activities. Depending on how your home network is set up, someone could even gain full access to your computer’s hard drive over an unsecured wireless network. That person could steal files or even give your computer a virus.

Your neighbors could steal your internet connection. This will deprive you of bandwidth that you are paying for. If your neighbor conducted illegal activity while online, it could be traced back to your network. When purchasing a wireless router or if you have a wireless router that has an unsecure network create a password for it. Secure your wireless network because you never know what an intruder might do.

I found my information here at http://www.windowsecurity.com/articles/Wireless-Network-Security-Home.html

Strong Password (how to create and use them)




A strong password is a password that contains characters and symbols that are more difficult for a hacker to guess. Strong passwords should be used especially for online banking, email, eBay, or any website that requires you to fill out personal information.

The easiest way to create a strong password is to come up with a sentence that you will always remember, preferably eight or more words long. Then take the first letter of each word to make a string. With this string replace lower case letters with upper case letters. Replace letters with symbol look-a-likes. Test your new password with a password checker and if it is strong then write down your password and keep it a secret. An example would be: I sold my car five years ago and I was sad. That sentence would turn into: ismcfyaaiws. That string then can turn into I$mc5YaaIw$. The original string was made stronger by adding upper cases and symbols. It checks out to be a strong password.

I found my information here at http://www.microsoft.com/protect/fraud/passwords/create.aspx

Internet Parental Control Software




With the trends of today's online community, keeping your kids safe on the internet has never been more challenging. The best way to keep a child off unwanted or adult sites would be to purchase an internet parental control software. These software’s are designed to be easy to use and to keep children safe.

The top five internet parental control software’s in 2009 are Net Nanny, Safe Eyes, CYBER Sitter, Pure Sight PC, and Cyber Patrol. All of these programs accept Windows XP, 2000, and Vista. Only Net Nanny and Safe Eyes are compatible with Mac. All of these software’s are relatively inexpensive with prices ranging from $28 to $60.

I found my information here at http://internet-filter-review.toptenreviews.com/

Internet Monitoring, Blocking, and Tracking




Internet monitoring is the process of testing or tracking how end users interact with a website or web application. Internet monitoring is used by businesses to make sure that their customers are able to access their online applications. Also to do actions such as searching, online shopping, checking an account balance, or researching.

Internet tracking is an electronic passage left through the internet that can be traced. A user's Internet activity on web sites can also be tracked on the recipient site. Internet tracking can help authorities pursue criminals of illegal internet activity. An example of a tracking device would be a “cookie.”

I found my information here at http://en.wikipedia.org/wiki/Internet_monitoring and http://www.answers.com/topic/internet-tracking-and-tracing

Internet Filters




An internet filter is a hardware or software solution that prevents access to some undesirable areas of the internet. An internet filter can work by various methods. Some compare site requests with a list of previously known bad URLs and preventing viewing if they are listed, others by scanning incoming data and blocking it if it contains unwanted keywords or file types.

An internet filter is not 100 percent effective. An unwanted site may appear to the user. The filter may skip over bad keywords when filtering causing an unwanted site to appear on the user’s computer. Sometimes the parent can control or create the list of keywords or sites filtered but sometimes not.

I found my information here at http://www.internet-filters.net/

Internet Parental Guidance




The internet is a place where a lot of its content can be not suitable for minors. Today's responsible parents must use internet filtering software to protect their children from predators on the internet. Some web sites that include pornographic material and or adult content are not suitable for children. The creation of filters has definitely helped minors stay off adult contented web sites.

Parents are now worried about instant messaging, e-mail, and peer to peer file sharing. There may not be explicit material within these programs but the person on the other end could be someone that children should not be talking to. Children need to be supervised and restricted from accidentally stumbling on to adults only web sites, or being lured there by a predator.

I found my information here at http://www.pcmag.com/article2/0,2817,1134458,00.asp and http://www.resources.safestware.com/privacy-security-for-the-family.htm