kitten

kitten

Wednesday, December 17, 2014

Testing Your Wireless Performance

Testing Your Wireless Performance



     As wireless internet connections become more and more widespread, it has become somewhat of a competitive market. Because of this it is important to test your wireless performance to know that you are getting the best deal.


        Two key components are the Bandwidth and the Throughput. The Bandwidth is a fixed amount of data speed you pay for and receive from your Internet Service Provider. Throughput is a measurement of data speeds within your local home, or small business network.






Information Source:
Picture Sources:

Wireless Networking Precautions

Wireless Networking Precautions 


                                      While the internet has created a wonderful resource for all 
                              who use it, it has also added new ways for people to be robbed 
                              of their personal information, personal files, and even their money.
                              This is why it is incredibly important to take precautions when on 
                              the web.

 
               Some simple tips include: not saving passwords in your 
         browser, watching out for "sniffing" (when someone attaches
                                     themselves to a wireless network and records all traffic), and 
                                     looking for a lock icon in the bottom status bar or the URL field 
                                     which lets you know if the connection is encrypted of not.

Information Source:
Picture Sources:

Cloud Computing


Cloud Computing

     

        Cloud computing is the process of saving data to an internet-based database. This database holds shared resources, software, and information. This data can then be accessed with a password from any computing device. 






          Cloud computing is basically a new delivery model for IT services. When you share an application to a cloud database, users can use the application through their browser as if it was installed on their computer.

Information Source:
http://mashable.com/category/cloud-computing/
Picture Sources:
http://splorg.org/cloud-computing-focusing-canada/
http://mashable.com/category/cloud-computing/

Internet Safety and Parental Control Software

Internet Safety and Parental Control Software

     There are many dangers on the internet, especially for children. Some serious dangers include: stumbling onto or being redirected to a website with pornographic images, making contact with a dangerous person, being tricked to giving out information (such as address or what school they go to), and cyber-bullying.





        Luckily Parental Control software has been created to protect children from these many dangers. Parental Control Software blocks access to websites that the parents determine inappropriate or dangerous. Some software can also limit the number of hours a child spends on line. 




Information Source:
Picture Sources:

RFID

RFID


             


          RFID stands for Radio Frequency Identification. An RFID is comprised of several different parts: the tag, the antenna, and the reader.

The RFID tag has a microchip that stores data. The tag also has an antenna which receives electromagnetic energy from the reader's
antenna. The tag uses power to send radio waves back to the reader. The tag either gets the power from an internal battery or using power harvested from the reader’s electromagnetic field. The reader picks up the tag's radio waves and interprets the data.




Information Source:
http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm
Picture Sources:

Digital Image Steganography

Digital Image Steganography

        The original greek meaning of Steganography is covered writing. Different forms of Steganography has been used throughout history to send secret messages. 





     
  Digital Image Steganography is hidden 
messages in  digital images. It works through adding secret bits, or replacing bits, in a digital image. These new bits have secret information in them that has to be decoded. This process can be done through computer applications like Invisible Secrets 2.1.


Information source:
Picture sources:

Computer Forensics

Computer Forensics
       

                                            Computer Forensics is the process of extracting and
                                 examining data, or evidence, from a computing device in order to 
                                 present it in a court of law. Just like all evidence, there are very 
                                 strict guidelines as to how data has to be presented in court.

  

                                              The overall goal is to figure out what exactly has been done 
                                  on a computing device and who is responsible for doing it. This 
                                  practice is fairly new and continues to progress.

information source:
picture sources: