Thursday, January 17, 2013

DO's and DONT's

 

*Don’t Store anything on your Desktop*
       The “Desktop” is typically not backed up, so if the computer crashes then anything on the desktop is lost. If you need easy access to a file or folder from your desktop then store the file/folder in an area that is backed up and Create a Short-cut to it and put the Short-cut on the Desktop, not the actual File

*Don’t Save Passwords|-ja6
        It is better that you input it every time. If you get any SpyWare
on your PC one of the two major things they do is look across your system
for any saved passwords, also means that if someone else is working at your
computer they wont have automatic access.

 
*Don’t Rely on E-mail*
        E-Mail, by its very name is Electronic Mail. Although it is almost
instant, like normal “snail mail” there are numerous reasons why it may not
be delivered to/from you in the time you expect and there is no guarantee
that it will arrive at all. Even if the E- Mail does arrive then there is
also no certainty that the recipient will action it immediately. They may be
out, in a meeting or just not checking, I know of people who don’t check there
e-mails for weeks. Like any letter, if the information on an E- Mail is so
important that you must have it then get the person to Fax or courier, and
in some cases even hand deliver/collect it.
 
*Don’t Install Anything*
           If you don’t know exactly what you are installing, on your computer,
then don’t install it. It may not be what it seems. Especially SpyWare cleaners,
they are more likely to infect you than clean.
   
*Don’t Leave it until its to Late*
            If you have a problem, then let us know, with suitable urgency on  repair.  Don’t wait until you really need the PC/Printer/Report/Email etc then call us and expect us to be there instantly to fix it. It wont  happen.

*Don’t leave your Backup copy with your system*
         Make sure any backups you take of your Data, is
kept somewhere else, in case your PC/Laptop is stolen or the “place burns down”.



 *Do Use Rules for E-mails*
        This will help sort and organise your emails so that you are able to more effectively deal with and file them.


*Do Install Windows and Anti-Virus/Anti SpyWare*
       If you are asked to install any Windows updates or Anti-Virus/SpyWare Updates please install them, so that your computer is protected with the most recent updates.



*Do Backup*
       Make sure that you either save your files in an area that is backed up or that you backup (copy to some other PC/Media) your files regularly, so that if there is a crash, or theft, you have current copies of your documents. For important documents and Photos take multiple copies.





*Do Shutdown properly*
       When you turn off your PC/Laptop please shut it down properly, try not to  just turn the power off. This will ensure that everything is saved and closed properly. Your PC will thank you for it.

*Golden Rule*
      If you don’t expect it, then don’t click it.





PRESENTATION

          
           Kantianism is the philosophy of Immanuel Kant, a German philosopher born in Königsberg, Prussia (now Kaliningrad, Russia). The term Kantianism or Kantian is sometimes also used to describe contemporary positions in philosophy of mind, epistemology, and ethics.
Kantian ethics are deontological, revolving entirely around duty rather than emotions or end goals. All actions are performed in accordance with some underlying maxim or principle, which are deeply different from each other; it is according to this that the moral worth of any action is judged. Kant's ethics are founded on his view of rationality as the ultimate good and his belief that all people are fundamentally rational beings. This led to the most important part of Kant's ethics, the formulation of the Categorical Imperative, which is the criterion for whether a maxim is good or bad.

           Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

           In our presentaion, is about identity theft. Emman was the one who have been cought which he did not commit any crime while Maduro was saved fom his sins. Maduro was the criminal here.

finals

           Copyright is a legal protecttion extended to the owner of the rights in an original work. Original work refers to every production in the lierary scientific and artistic domain.
           Economic rights so called because they enable he creator to obtain remumetion from the exploitation of his works by third parties. Here are some examples public Distribution, Rental, Public Display, Public Performance.
           Moral rights which makes it possible for the creator to undertake measures to maintain and protect the personal connection between himself and the work. Examples of this are Right of attribution, Right of alteration, Right of Integrity, Right of restrain use of his name and Resale right.
           Reservation of rights under current copyright laws, any creative work is automaticaly protected from the moment it is first published  and performed or produced. Term in general, the term of protection of copyright for original and derivative work is the life of the author plus 50 years after his death.

          Trademark a tool used hat differentiates goods and services from each other. It is a veru important marketing tool that makes the public identity goods and services. It can be one word, a group of words, signs, symbol. logos, or a combination of any these.

          Patent is a grant by the government through the Intellectual Property Office of the Philippines (IP Philippines). It is an exclusive right granted for a product, process or an improvement of a product or process which is new, inventive and useful. Has a term of Protection of Protection of 20 years providing an inventor significant commercial gain.

midterm

       Hacking is a thief to get information without asking information, it is also getting out of your limitation. Hacker is a person  who enjoys learning programming languages and computer saystems and can often be considered an expert, popular press cooped the term to refer to individuals who gain unauthorized to computer systems for the purpose of stealing and corrupting data. The correct term for this kind of people is a Cracker. There are Ethical Hackers to know them they are trustworthy, excellent programming and networking skills and security related.
       Modes of Ethical Hacking: Insider Attack, Outsider Attack, Stolent Equipment Attack, Physical Enrty, By passed Authentication Attack and Social Engineering Attacks.
       Kinds of hackers: White Hats they are individuals who hack into a computer systems socialy to see how the computer security work. Black Hats aka "Crackers" complete opposite of white hats steal credit cards numbers vandalized. Red Hats they are agrresive version of a white hat in the employ of a government agency whose purpose is to hack into  the computer mainframe. Grey Hats they are normally ambiguous sometimes acts legally sometimes in good will and sometimes not. Blue Hats they are rouge hacker wh hacks for fun or to get revenge on a certain person. Green Hats they are name for a new hackers, who is just starting to practice hacking "noobs"-newbies. Ghost Hacker they have a hidden identity so well he should never get cought. The Script Kiddie not a hacker, doesn't have the required knowledge about computers, server and networks etc.

       Computer Virus is popularly knowen as the Brain virus was created 1986 by two brothers Amjad and Basit Farooq Alvi. A computer virus is a computer program thet can replicate itself and spread from one computer to another.
      Classifacation of Viruses: Nonresident Viruses and Resident Viruses. Types of computer virus: Resident virus, Overwrite virus, polymorfic virus and Macro Virus.
      Examples of Viruses: Brain Virus is the industry standard name for a computer virus that was released. Trojan Horse having a useful and desired function replicates nor copies itsefl, but causes damage the security. Worms is a program that makes and facilitates the distribution of copies of itself. Bootsector and Macro Virus. Rootkit virus is an undetectable virusm. Logic boobs are programmed to initiate at a specifec date or when a specific event occurs. Time delay virus take a much slower, more disciplined path towads ruining your computer.

Wednesday, January 16, 2013

it 108 prelim

"Computer Systemperforms task and the way they perform task has moral cosequences that effects human interests"
                                                                                                         -JOHNSON AND POWERS(2004)

*Computer Ethics*
          -is the analysis of the huma nature and the social impact of the computer yechnology and the corresponding formulation and justification of policies for the ehical use of such technology.
         There are 3 propeties of computer ethics: one is  LOGICAL MALLEABILITYwhich characterized as input , outputs and connecting logical operaations, second is IMPACT on SOCIETY i sthe extensive impact of computerization on society is clear, and changing workplace and the nature of work and lastly INVISIBILITY FACTOR that has the fact that computer operations are invisible.
        There are 3 kinds of Invisibility Factor: first is the INVISIBLE ABUSE is the intentional use ogf the invisible operations of a computer to engage in unethical conduct, second  INVISIBLE PROGRAMMING (values), these are values, which, according to Moore are embedded into a computer program, and lastly INVISiBLE COMPLEX CALCULATION, computers are capable of enormouse calculations beyond human comprehension.
       Ethics is derived from the Greek word "ethos" and Morality os derived from the Latin word " moralis". According to the Oxford English Dictionary ethics is the science of morals in human conduct.
      Law is a set of rules created by the government. Basis in pursuing an action: Legal and Ethical, Not Legal but Ethical, Not Ethical but Legal, and Not Ethical and Not Legal.
      Aspects of two theories: KANTIANISM it is how we behave ethicaly comes from within us , is also an act only according to that maxim by which you can at the same time will that is should become a universal rule. CONSEQUENTIALISM, deals with consequences of actions rather the actions themselves.