Tell about Some Recent Computer News
Yesterday one man was arrested. His name is Hironori Aoki. He kidnapped a girl whose name is Hiromi Yamanaka. This news does not seem like computer news, but this incident was caused by computer’s disadvantage point. They met each other in the web site. What it is called now “On line dating Service”. So this incident is not usual kidnap. Maybe without this type of website, this incident would not be happened. Both of them can use computer, so it was really easy for them to meet. They did a drive, so the man was not going to kill or request the ransom, but it is also kidnap. This incident well shows that the dangerous of Internet. The girl’s parents should have used filtering software, so maybe she would not have the accident.
Saturday, October 28, 2006
Tuesday, October 24, 2006
Bolg Writing Assignment Week 6
What Is "Net Neutrality"?
It is said that this theory was appeared in 1861. Neutrality means that “the state of not supporting either side a disagreement, competition or war” so, Net Neutrality is that the theory that the quality of the accusing to the Internet should be equal. For example, now a day there are many kinds of Internets accuses products, so there are two types one is higher speed than the others. Therefore, there are huge gap between them. There is some one who thinks it is not good. More over the there is some power that gets profit from their high qualities. Goggle or Yahoo are the also same types of the powers. Internet is invisible world, so there are some dangers. That is to say, the Net is not Neutrality now.
It is said that this theory was appeared in 1861. Neutrality means that “the state of not supporting either side a disagreement, competition or war” so, Net Neutrality is that the theory that the quality of the accusing to the Internet should be equal. For example, now a day there are many kinds of Internets accuses products, so there are two types one is higher speed than the others. Therefore, there are huge gap between them. There is some one who thinks it is not good. More over the there is some power that gets profit from their high qualities. Goggle or Yahoo are the also same types of the powers. Internet is invisible world, so there are some dangers. That is to say, the Net is not Neutrality now.
Saturday, October 14, 2006
Blog Writing Assignments Week 5
Introduce 3 Good Web Sites (in English)
Today I am going to introduce about three good web sites that are written by English. First, I chose “Wikipedia”. This web site is like an encyclopedia. When I need to search something, I always use this web site, because it contains too much information. Of cause I can also use encyclopedia, but Wikipedia does not take much time to search the information that I need than using encyclopedia. The reason why Wikipedia is a web page, so there is search area. It is very useful. Second, I want to introduce “Amazon”. It is an Internet bookstore. Amazon sells not only books but it also sells CD, DVD, Computer soft wear, Food and so on. It can sell too much goods. Also it has search area, so it is easy for us to look for something what we need. Third, I suppose that “Cooks.com” is a good web site. With using a search area, we can read the recipe. In short, all these three good web sites have search area. It is a benefit of web site. It is different from book.
Today I am going to introduce about three good web sites that are written by English. First, I chose “Wikipedia”. This web site is like an encyclopedia. When I need to search something, I always use this web site, because it contains too much information. Of cause I can also use encyclopedia, but Wikipedia does not take much time to search the information that I need than using encyclopedia. The reason why Wikipedia is a web page, so there is search area. It is very useful. Second, I want to introduce “Amazon”. It is an Internet bookstore. Amazon sells not only books but it also sells CD, DVD, Computer soft wear, Food and so on. It can sell too much goods. Also it has search area, so it is easy for us to look for something what we need. Third, I suppose that “Cooks.com” is a good web site. With using a search area, we can read the recipe. In short, all these three good web sites have search area. It is a benefit of web site. It is different from book.
Tuesday, October 10, 2006
Blog Writing Assignments Week 4
Computer Gifts I Would Buy for Friends & Family
Now a day, we can do many things with using a computer. Then I chose iPod or some kinds of MP3 players as the computer gift. As I learned in iTunes lecture in last week, now everybody can buy the music so easer than ever. Formerly we had to buy the CD in the music store, but now we can download music from the Internet. Moreover, we can also buy only one or two composition. What’s more, these devices can store extremely too much more music files than MD or CD. When I was high school student, most friends had MD player. On the other hand, by now, my classmates have iPod. I do not have iPod, so I have never felt how it is useful. However many my friends show that these devices are good. Therefore I would like to buy iPod or some kinds of MP3 players as the computer gift
Sunday, October 01, 2006
Blog Writing Assignments Week 3
Computer Terms: What Is "Social Engineering"?
The social Engineering is a computer term and it is a one ways of computer hacking. The purpose of the person who is going to do social engineering is to get information such as Password or ID and then invade a computer network. In this way, they do not break the computer system. They do not do it as a mechanical way but a social way. There are some ways to do social engineering. These are the examples how to do Social Engineering. Peeping somebody’s paper that was about his or her password or hunting for a trash box and find the information and all the like are popular ways. If the password or ID are stolen, it is possible that it would be used as the crime tool. Therefore we should be careful.
The social Engineering is a computer term and it is a one ways of computer hacking. The purpose of the person who is going to do social engineering is to get information such as Password or ID and then invade a computer network. In this way, they do not break the computer system. They do not do it as a mechanical way but a social way. There are some ways to do social engineering. These are the examples how to do Social Engineering. Peeping somebody’s paper that was about his or her password or hunting for a trash box and find the information and all the like are popular ways. If the password or ID are stolen, it is possible that it would be used as the crime tool. Therefore we should be careful.
Subscribe to:
Posts (Atom)