Monday, November 23, 2009

Fiber Optic Communication

Fiber optic communication technology is being used in more and more environmnets such as telecommunications, networking, data communications, industrial communication links, and medical communication links. More places are using fiber optics because of the increased bandwidth and improved length compared to copper networks. Fiber optic transmission devices are also called optoelectronic devices are coupled with optical fibers for data and signal transmission by converting optical signals into electronical signals and vice versa.

Fiber optic communication uses optical transmitters, optical recievers, optical fiber, and other components to transmit light signals through fiber. Fiber optic cables are made up of thin transparent fibers of glass or plastic enclosed by material with a lower index of refraction and transmit light throughout their length by reflections. Also, the fibers within the cables are protected by a polymer jacket. Fiber optics are becoming extremely popular in communications and industries.

Wireless Netwoking Precautions

When using any type of Wi-Fi at home or at the office its best to make sure your connection is secure. Since you are using wireless connection, anyone else who is a wireless user can tap into your network. If your connection is unsecure a hacker can obtain private passwords and information from you on your own computer. Therefore, when setting up a wireless connection make sure to use additional security measures.

A wireless user can take a few easy steps to ensure their connection is secure. These steps are as follows:


  1. Change your default network name to help prevent hackers from breaking into your network.


  2. Disable service set identifier (SSID) because it allows others to access your wireless network.


  3. Enable media access control (MAC) because it will specify exactly what computers have access to your network.


  4. Change default router to prevent hackers from accessing your passwords and changing your security settings.


  5. Enable wired equivalent privacy encryption (WEP), this will ensure a strong password and secure connection.



Strong Password

In an age of advanced technology every one who uses a computer should have strong passwords. Strong passwords will reduce the risk of identity theft, internet fraud, and real physical harm. If someone is to steal your password and obtains your personal information they can create credit card accounts, apply for mortgages, and potentially destroy your life. Therefore, in order for your personal information to stay personal you must create a strong password and check the stregnth of it by using programs like password checker.

There are a few simple steps an individual can take to create a strong password. First, think of a sentence you can remember. Then, turn the sentence into a password by using the first letter of each word. Then, add complexity by mixing upper and lower case letters as well as numbers. Then, add or substitute special characters. For example, if you one the letters in your password is an S you can substitute it with the dollar symbol $. Then, check the strength of your password. Finally, make sure to keep your password secret.



Internet Parental Control Software

There are many different kinds of parental conrol software on the market; however, each on does just about the same job. Parental control software allows parents to do things such as block websites, control internet availability, monitor/block instant messaging or P2P file sharing and recieve mobile alerts or emails when inapropriate sites have been visited. To many this may seem like a vioation of privacy; however, it is the only way to make sure your child is safe and not viewing any inappropriate material while using the internet.

A few examples of parental control software programs are Safe Eyes, CyberPatrol, Net Nanny, and Windows Vista parental controls. These four programs are the most highly rated parental control systems on the market today. Each program has the same functions; however, systems like CyberPatrol have annual subscriptions that the user must pay for. Therefore, make sure to shop around and buy a program that isn't going to cost you money each year and everytime you would like to install the program in another computer.

Friday, November 20, 2009

Internet Monitoring, Blocking and Tracking

Internet monitoring gives you the ability to perform a number of functions such as monitor internet activity, record instant messages/ IM chats, block explicit websites, and other adult content. There are many programs out there that enable an individual to perfom these actions. Some programs are WebWatcher, eBlaster, Spector Pro, SpyAgent, and Content Protect. These products are some of the best on the market; however, their capabilities are limited to monitoring and recording internet activity only.

Internet tracking and blocking are also functions that can be found in the programs listed above; however, internet tracking is used more by major companies or corporations that do most of their work on computers. The employer can install any monitoring or tracking softwae program into his/her computers and they will recieve data informing them of the computers activity and how long the employee spent doing actual work and doing absolutely nothing. These programs aren't only meant for companies, they can be used by parents or any one else who wants to keep an eye on someone else's internet activity.






Internet Filters




Internet filters assure parents that thier children will not see anything that they don't wan tthem to see. The filter allows your child to accomplish the tasks they need to without stumbling across or accessing any unwanted sites. As a parent an internet filter gives you the ability to control your child's intenret use without actually being there with them. These filters give parents peace of mind when thinking about their child using the internet.

Internet filters can schedule internet access, block unwanted websites such as pornography or myspace, prevent inappropriate chat, send mobile alerts and stop illegal file sharing. Ultimately, if your a parent experiencing doubts about your child using the internet i strongly suggest investing in an internet filter. Internet filters are a quick and easy way to monitor your child's internet activity.

http://www.netnanny.com/



Internet Parental Guidance



As a parent in today's world it is vital to monitor what your kids do on the internet. Even though the internet can help your child with school work and things of that nature, it can also cause them harm if they stumble across adult sites and so on. Therefore, as a parent you don't have to restrict your child from using the internet, instead you must supervise them. As a parent you should try and become familiar with using the internet if you are not already.
One effective way to supervise your child's internet use is to spend time using the internet with them; this is the best insurance policy you can have for your child's safety. Also, know where to find and how to use the parental control tools, these tools do change and become more efficient so it's best to stay informed if you want to keep your child out of harms way while interacting on the internet. This is a fairly difficult task becaus eunlike tlevision and radio people can post whatever they want on the internet without having to worry about restrictions for children.

Some tips for parents to protect their children against online predators and explicit material are to share e-mail accounts, speak with your child about who they have met online, set ground rules and contact your service provider about any unwanted mail or other unwanted explicit material.






Monday, September 28, 2009

Got HTML?



There are many individuals who have never heard of HTML and than there are people who have heard of it but have no clue what it is or how it works. HTML stands for Hyper Text Markup Language and it is a language used to describe web pages. Now don’t be confused HTML is not programming language, it is a markup language which is made up of markup tags used to describe the webpage. These tags are key words usually surrounded by angle brackets such as , the tags normally come in pairs commonly known as opening tags and closing tags. HTML is easily accessible, you don’t need any tools such as an HTML editor, web server or web site. HTML was created in 1989 by a physicist named Tim Berners-Lee and an engineer named Robert Caiilliau, both men collaborated their ideas together to propose an Internet-based hypertext system for CERN. In HTML the elements are the basic components foe markup, the elements have to different properties known as attributes and content. In HTML’s programming there is structural, hypertext and presentational markup, each serves its own purpose. Structural markup describes the purpose of the text and does not denote any specific rendering. On the other hand, presentational markup describes the appearance of the text regardless of its function. Last but not least hypertext markup links parts of the document to other documents.
The majority of attributes in an element are name-value pairs that are by an equal sign usually written within the start tag of an element. Depending upon the value of the attributes they can either be double or single quoted; however, if the attributes contain certain characters they do not have to be quoted at all. The new 4.0 version of HTML provides many new functions and allows for simple markup. One feature is the ability to escape characters and to still have them represented. Characters that are not easily typed or that are not even available in the document’s character encoding to be represented within the element and attribute content. For those of you wondering what character coding is, it is a system consisting of a code that pairs each character from a given repertoire with something else. Character coding is similar to character set, character map and code page. Another unique feature of HTML is that it defines a variety of data types for element content. For example, it defines script data and style sheet data. Also, it will define attribute values such as Ids, names, Urls, numbers, units of length, languages, media descriptors, colors, character encodings, dates and times, etc… . Data types in HTML are sets of values and the operations of those values. An important fact about HTML is that all HTML documents are required to start with Document Type Declaration. These DOCTYPE are instructions that associate particular SGML or XML document with a document type definition. The document type definition also known as DTD is set of markup declarations that define a document type for SGML-family markup languages. Many of you have heard and used the World Wide Web but do you know that it is primarily made up of HTML documents transmitted from web servers to web browsers using the Hypertext Transfer Protocol (HTTP).

Friday, September 18, 2009