Cloud Computing
Cloud Computing
Monday, December 2, 2013
Saturday, November 30, 2013
VoIP
Voice over Internet Protocol (VoIP) is one of the easiest ways to communicate now over the internet. One of the main software's that is getting a lot of attention is Skype. Its being used for families to communicate and is being even used for many business companies for meeting. This type of program is getting a lot of attention is on the rise to one of the best programs to be used because of the communication stand point. Being able to communicate face to face over the internet is one of the best perks of having the internet now.

Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone service. Not only is talking to an individual one of the many perks, one can simply now instant message or even voice message to another indivual. The military, as a matter a fact uses VoIP on their phones because of the service down their and it just simply take communication to another level.
Wireless Network Precautions

Having a wireless network in ones own home brings so many advantages along with it. Instead of sitting down next to a desktop or walking around with an Ethernet chord next to your laptop, we now have now have Wi-Fi. But to take some sort of precaution to completely protect yourself, we use Wireless Network Precaution for a security purpose.
The best way to protect our computer when you have Wi-Fi is to make sure that you have an up-to-date antivirus program installed on your computer. Most anti-virus software will automatically scan your computer to check for any possible threats or viruses. By enabling a WEP or WPA (encryptions on your computer) you can help prevent any intruders from accessing your computer and installing a virus or worm on it.
Friday, November 29, 2013
Radio Frequency IDentification (RFID)
Radio-frequency identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic induction). Others use a local power source such as a battery, or else have no battery but collect energy from the interrogating EM field, and then act as a passive transponder to emit microwaves or UHF radio waves (i.e.,electromagnetic radiation at high frequencies). Battery powered tags may operate at hundreds of meters. Unlike a bar code, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object.
RFID tags are used in many industries. An RFID tag attached to an automobile during production can be used to track its progress through the assembly line. Pharmaceuticals can be tracked through warehouses. Livestock and pets may have tags injected, allowing positive identification of the animal. On off-shore oil and gas platforms, RFID tags are worn by personnel as a safety measure, allowing them to be located 24 hours a day and to be quickly found in emergencies.
Digital image Steganography
This is used to protect images and hide its data and prevents other users from viewing it. it often viewed as a digital watermark because of its duty to hide certain data and prevent people from viewing and copying what ever a image may contain. Digital image Steganography is used in images, sound files, videos, HTML and text files as well.
To start off, a person has to add bits onto a file so that their hidden messages could actually appear. An example of a software that could be used to encrypt messages in file is InvisibleSecrets2.1. Before encryption was far more harder to do manually, but now with the computer age, it has become far more easier for a person to encrypt and hide things from others.
To start off, a person has to add bits onto a file so that their hidden messages could actually appear. An example of a software that could be used to encrypt messages in file is InvisibleSecrets2.1. Before encryption was far more harder to do manually, but now with the computer age, it has become far more easier for a person to encrypt and hide things from others.
Thursday, November 28, 2013
Computer Forensics
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media. Once the original media has been copied, it is locked in a safe or other secure facility to maintain its pristine condition. All investigation is done on the digital copy.
Packet Ananlyzer
Packet analyzers also known as network analyzer, protocol analyzer, protocol analyzer, and packet sniffer is used to help transport packets throughout the internet.It shows what a packet values and analyzes everything within the packet, their by giving it the name packet analyzer.This can examine a packets data such as where it came from and where its heading.
Subscribe to:
Comments (Atom)










