Monday, November 30, 2009

Fiber Optic Communication

Fiber-optic communication is a form of data transfer which uses pulses of light through glass or plastic fibers. Fiber-optics allow for less loss of information than copper wires allowing long distances between signal amplifiers or repeaters. They also carry larger amounts of data than copper and unlike copper they experience no crosstalk between adjacent cables. They are used to transmit data from an origin of an electrical signal, to light over the fiber-optics, and then back to electrical when the destination is reached.

While fiber-optic cable is much more efficient, it is usually not used in computers themselves due to the cost and difficulty of splicing the cables and the high cost of transmitters and receivers. It is better used over long distances to connect multiple receivers at different locations. Fiber-optic communication offers transfer rates around 25 Mbps.

Source:

Fiber-optic Communication

Wireless Networking Precautions

Wireless internet networks are very useful to use in public places as well as in homes with several people living in them. The ability to make a wired connection to a computer network is not always possible due to the lack of a wire, the distance between a computer and the router, or the need for mobility. It allows a user to work on their laptop outside or even play video games in another room. But the convenience of a wireless network also puts the user at risk for individuals who may wish to exploit their wireless network zone.

There is a risk for both a home network to be exploited as well as for a laptop to be exploited while on a public wi-fi spot. At home, having updated anti-virus software helps stop malicious attacks. WEP and WPA encryptions help stop unwanted connection by requiring a hexadecimal password to access the network and disabling the SSID link will prevent people from viewing your wireless network. Firewalls on the router also help prevent unwanted connections. In public locations, protection is a bit more difficult and the best advice is to not put sensitive information over the wireless network in these places.

Source:

Security Precautions for Wireless Internet Users

Strong Password (How to Create and Use Them)

When creating a password for any computer-related application, you should take great care in crafting one that won't be apparent or easily guessed. Different programs and websites require different levels of protection to keep data private. Something like a website forum could use a fairly weak password because the information contained in this medium is most likely not very sensitive. The strongest passwords look like random strings of letters.

Microsoft gives six steps to take that will make a strong password. First, think of a sentence you will remember. Second, turn that sentence into a password by using the first letter of each word in that sentence. Thirdly, add complexity to that phrase by mixing and matching uppercase, lowercase, and numbers. Fourth they say to substitute special characters for letters such as using a "$" in place of "S". Fifth, Microsoft offers a password checker to evaluate password strength. And the sixth and most important is to keep your password a secret.

Source:

Strong Passwords

Internet Parental Control Software

Parental control software is a type of software designed to control what the user can and cannot view over the internet. It can occur on a local level such as a parent not wanting a child to view certain topics or on a larger scale whereby nations may block websites for everyone. On the national scale, many people view the use of this software as a form of censorship. The software can be located either on the personal computer or through the server of the ISP, but most of the parental control software is marketed towards the individual.

Publicly, this software is used in the libraries. Use in the library is base on local library board decision. Many were concerned about the constitutionality of parental control software in public places are violating the First Amendment. Several libraries still have the filters in place, but by law must remove the filter if and when an adult patron asks and may not inquire as to why they want the filter turned off.

Source:

Content-control Software

Internet Monitoring, Blocking, and Tracking

Monitoring, blocking, and tracking are all ways in which internet filtering software can act on the information which a user attempts to access via the internet. While a filter alone can stop unwanted materials from being accessed, these are ways used to identify from where the information is trying to be accessed. Monitoring is a type of recording of the information which happens over a network. Parents and employers can use this to see what their children and employees are communicating to others. Depending on the software, they can record instant message conversations, emails sent, and even chat room logs.

Blocking is the actual act of preventing a website from being accessed. They can block things based on category and words contained in the website. Tracking is the act of finding out which specific person/computer made a connection to a website/computer on the network. It can work from both internal and external points. Internally, it can be used to see which employee might be trying to access blocked content. Externally, it can be used to determine the location of someone who may be trying to access a company's files to gain private information.

Source:

InterGuard

Internet Filters

Internet filters are software packages. That is to say they are not a physical thing with which one can purify the data, but rather a set of instructions for the computer. They help monitor what can be viewed through a particular computer or network of computers. They may also be used to set the amount of time which a child can spend on the internet.


Internet filters are capable of doing many things. Foremost, they are used to block inappropriate materials which children might discover otherwise. It can likewise be used by employers to restrict what employees can watch while working. They can be very strict or relatively loose ranging from blocking websites with certain keywords to blocking every website except those that are approved. They are also helpful in the blocking of spam as well as phishing scams.

Source:

What is an Internet Filter?

Internet Parental Guidance

The internet is a great tool for helping children learn. There are many websites for children that educators and parents can use to facilitate the education of their child. Aside from these facts, however, the freedom offered by the internet also makes it a dangerous place for children to explore unmonitored. There are many things which parents do not feel their children should be exposed to at an early age as well as some people who parents would not want their child to communicate with.

Completely ignoring the use of the internet as an educational tool is not a useful way to protect children because of the dependence of the modern world on technology. There are several things which parents can do to help protect their child while they use the internet. If the parent is unfamiliar about the internet, they can read up on how the internet works. As with anything a child does, the parent should be involved with their child's time online and periodically check on what their child is viewing. Parents should be aware of trends occurring on the internet and read about new technology available for the protection of children.


Source:

The Teacher's Guide