Monday, November 23, 2009

Fiber Optic Communication

Fiber optic communication technology is being used in more and more environmnets such as telecommunications, networking, data communications, industrial communication links, and medical communication links. More places are using fiber optics because of the increased bandwidth and improved length compared to copper networks. Fiber optic transmission devices are also called optoelectronic devices are coupled with optical fibers for data and signal transmission by converting optical signals into electronical signals and vice versa.

Fiber optic communication uses optical transmitters, optical recievers, optical fiber, and other components to transmit light signals through fiber. Fiber optic cables are made up of thin transparent fibers of glass or plastic enclosed by material with a lower index of refraction and transmit light throughout their length by reflections. Also, the fibers within the cables are protected by a polymer jacket. Fiber optics are becoming extremely popular in communications and industries.

Wireless Netwoking Precautions

When using any type of Wi-Fi at home or at the office its best to make sure your connection is secure. Since you are using wireless connection, anyone else who is a wireless user can tap into your network. If your connection is unsecure a hacker can obtain private passwords and information from you on your own computer. Therefore, when setting up a wireless connection make sure to use additional security measures.

A wireless user can take a few easy steps to ensure their connection is secure. These steps are as follows:


  1. Change your default network name to help prevent hackers from breaking into your network.


  2. Disable service set identifier (SSID) because it allows others to access your wireless network.


  3. Enable media access control (MAC) because it will specify exactly what computers have access to your network.


  4. Change default router to prevent hackers from accessing your passwords and changing your security settings.


  5. Enable wired equivalent privacy encryption (WEP), this will ensure a strong password and secure connection.



Strong Password

In an age of advanced technology every one who uses a computer should have strong passwords. Strong passwords will reduce the risk of identity theft, internet fraud, and real physical harm. If someone is to steal your password and obtains your personal information they can create credit card accounts, apply for mortgages, and potentially destroy your life. Therefore, in order for your personal information to stay personal you must create a strong password and check the stregnth of it by using programs like password checker.

There are a few simple steps an individual can take to create a strong password. First, think of a sentence you can remember. Then, turn the sentence into a password by using the first letter of each word. Then, add complexity by mixing upper and lower case letters as well as numbers. Then, add or substitute special characters. For example, if you one the letters in your password is an S you can substitute it with the dollar symbol $. Then, check the strength of your password. Finally, make sure to keep your password secret.



Internet Parental Control Software

There are many different kinds of parental conrol software on the market; however, each on does just about the same job. Parental control software allows parents to do things such as block websites, control internet availability, monitor/block instant messaging or P2P file sharing and recieve mobile alerts or emails when inapropriate sites have been visited. To many this may seem like a vioation of privacy; however, it is the only way to make sure your child is safe and not viewing any inappropriate material while using the internet.

A few examples of parental control software programs are Safe Eyes, CyberPatrol, Net Nanny, and Windows Vista parental controls. These four programs are the most highly rated parental control systems on the market today. Each program has the same functions; however, systems like CyberPatrol have annual subscriptions that the user must pay for. Therefore, make sure to shop around and buy a program that isn't going to cost you money each year and everytime you would like to install the program in another computer.

Friday, November 20, 2009

Internet Monitoring, Blocking and Tracking

Internet monitoring gives you the ability to perform a number of functions such as monitor internet activity, record instant messages/ IM chats, block explicit websites, and other adult content. There are many programs out there that enable an individual to perfom these actions. Some programs are WebWatcher, eBlaster, Spector Pro, SpyAgent, and Content Protect. These products are some of the best on the market; however, their capabilities are limited to monitoring and recording internet activity only.

Internet tracking and blocking are also functions that can be found in the programs listed above; however, internet tracking is used more by major companies or corporations that do most of their work on computers. The employer can install any monitoring or tracking softwae program into his/her computers and they will recieve data informing them of the computers activity and how long the employee spent doing actual work and doing absolutely nothing. These programs aren't only meant for companies, they can be used by parents or any one else who wants to keep an eye on someone else's internet activity.






Internet Filters




Internet filters assure parents that thier children will not see anything that they don't wan tthem to see. The filter allows your child to accomplish the tasks they need to without stumbling across or accessing any unwanted sites. As a parent an internet filter gives you the ability to control your child's intenret use without actually being there with them. These filters give parents peace of mind when thinking about their child using the internet.

Internet filters can schedule internet access, block unwanted websites such as pornography or myspace, prevent inappropriate chat, send mobile alerts and stop illegal file sharing. Ultimately, if your a parent experiencing doubts about your child using the internet i strongly suggest investing in an internet filter. Internet filters are a quick and easy way to monitor your child's internet activity.

http://www.netnanny.com/



Internet Parental Guidance



As a parent in today's world it is vital to monitor what your kids do on the internet. Even though the internet can help your child with school work and things of that nature, it can also cause them harm if they stumble across adult sites and so on. Therefore, as a parent you don't have to restrict your child from using the internet, instead you must supervise them. As a parent you should try and become familiar with using the internet if you are not already.
One effective way to supervise your child's internet use is to spend time using the internet with them; this is the best insurance policy you can have for your child's safety. Also, know where to find and how to use the parental control tools, these tools do change and become more efficient so it's best to stay informed if you want to keep your child out of harms way while interacting on the internet. This is a fairly difficult task becaus eunlike tlevision and radio people can post whatever they want on the internet without having to worry about restrictions for children.

Some tips for parents to protect their children against online predators and explicit material are to share e-mail accounts, speak with your child about who they have met online, set ground rules and contact your service provider about any unwanted mail or other unwanted explicit material.