an amazing way to learn

Tuesday, November 14, 2006

bob's english class


This year, we have experimented a whole new way to improve our english!
I really like this experience because we both have to talk and to write!
moreover, we have to think and to discuss about subjects that really touch to new technologies, and that will be useful for our knowledge and culture.
I can not really see negative aspects, but i have thought about some thing : maybe we could select videos on youtube, and write an article about it in the blog, or discuss about it in class.
But in generally, i really enjoy working like that!

Monday, November 06, 2006

shttp for dummies


SHTTP means Secure Hypertext Transfer Protocol which is developed by Enterprise Integration Technologies in 1995 to ensure security with commercial transactions on the Internet. A protocol that provides secure transactions over the Web. It is endorsed by a variety of organizations.
SHTTP encrypts data transfers, but does not authenticate the client. The responsibility for authentication remains with the website (i.e. the responsibility for determining whether the visitor should be shown the information in the first place).
S-HTTP is capable of distinguishing the origin of a particular document on any server, thereby protecting property rights. S-HTTP provides a wide variety of mechanisms to provide for confidentiality, authentication, and integrity.

be rss or not to be?


RSS is a simple XML-based system that allows users to subscribe to their favorite websites. Using RSS, webmasters can put their content into a standardized format, which can be viewed and organized through RSS-aware software or automatically conveyed as new content on another website.
RSS solves a problem for people who regularly use the web. It allows you to easily stay informed by retrieving summaries of the latest content from the sites you are interested in. You save time by not needing to visit each site individually. You ensure your privacy, by not needing to join each site's email newsletter.
RSS is just another language of the web, but you can actually completely ignore the code itself, just like you can ignore the source code behind web pages that you visit - you are only interested in the end product that the code is designed to produce for you, the end user.
I have experimented rss for the first time last week on my blog, and i think it can allow nice uses.

a story about cybercrime


Cybercrime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories.Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime. This term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.
There are a lot of examples of cybercrimes :

-data diddling :
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

-salami attacks :
These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.

-virus :
Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. 170 The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was reportedly written by a Filipino undergraduate.
In May 2000, this deadly virus beat the Melissa virus hollow - it became the world's most prevalent virus. It struck one in every five personal computers in the world. When the virus was brought under check the true magnitude of the losses was incomprehensible. Losses incurred during this virus attack were pegged at US $ 10 billion

-trojan attacks:
A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.

When i had a pc, i often, like everyone else, received viruses, i activated one once, and it blocked my computer for days.
After that, i bought an apple computer, and i never had this problem anymore, because there are nearly no viruses on apple.
To protect oneself against cybercrime, it is necessary to have a good antivirus, and to be very careful when opening an email. But hackers are more and more performant, and we have to be aware constantly.

youtube, a star is born!!


YouTube is a popular free video sharing web site which lets users upload, view, and share video clips. Founded in February 2005 by three employees of PayPal, the San Bruno-based service utilizes Adobe Flash technology to display video. The wide variety of site content includes movie and TV clips and music videos, as well as amateur content such as videoblogging. It is staffed by 67 employees. In October 2006, Google, Inc., announced its acquisition of the company for $1.65 billion USD in Google's stock.
At present, YouTube is one of the fastest-growing websites on the World Wide Web, and is ranked as the 10th most popular website on Alexa, far outpacing even MySpace's growth. According to a July 16, 2006 survey, 100 million clips are viewed daily on YouTube, with an additional 65,000 new videos uploaded per 24 hours.
In its short time on the web, YouTube has grown quickly and received much attention. Online word-of-mouth has been primarily responsible for YouTube's growth since its inception, and gave the site its first surge of publicity when it hosted the popular Saturday Night Live short Lazy Sunday.
The success of youtube is the easiness of utilization, and the number of video shared.
I use youtube daily. For me, it is like google. Each time i am looking for a video or a clip, it takes two clicks to find it on youtube.
For me utube is a reflect of the new use of internet, and it will keep developping in the future.
I think that the use will evoluate. : youtube could be an interface for people all over the world.
For instance : we could imagine that people could put a video cv online. It could be easier for recruteers.
I also think of artists : actors, singers, that could put their videos for casting directors.
But like internet, i think youtube will find plenty new uses. This website is a little revolution, and if google wanted so much to buy it (and bought it so much) there are reasons...

be careful with thieves, even on internet!


Identity theft occurs when one person intentionally assumes another person's identity. Identity theft comes in many fashions from in person, to mail, to now the blooming of Internet theft. Thus far, identity thieves have typically gone on shopping sprees at the expense of their victims, but the possibilities for abuse through identity theft will grow as the functionality of the Internet expands. With the Internet, the key goal is to gather information. Some ways to gain information is from credit banks and trying to steal credit card numbers and passwords. Another way of theft is through Internet shops that store credit card numbers for the one step shopping. Another way thieves deceive individuals is to have the victims store his/her credit information on the fraudulent site.
The lowest form of theft is through asking children for key information about their parents (where do you live, what are your parents' names, how long have you lived at that house, what are your grandparents' names, etc.). Through e-mail or chat rooms, unsuspecting children could give away their parents key information - maybe even their credit card numbers. There are many ways that the thieves can get their information - but how are the victims giving it to them unsuspectingly?
One common aspect with all on-line businesses is personal information stored for use of repeat shoppers. The storage of information can save histories of their purchases and can eliminate steps of entering data each time the customer comes back to the site. The hackers look for loopholes in different ISPs to gain necessary information they are looking for. Internet sites not only leave information available each time someone visits a site, but they also sell this information to whoever will buy it.
Here is a list of items that are common among web sites:
web sites may freely gather as much personal data as desirable from consumers.
web sites need not ask permission to gather personal data.
web sites need not inform consumers of their data gathering practices.
web sites may use personal data in any manner they prefer, such as selling or licensing it to third parties.
web sites need not allow consumers access to their data.
web sites need not provide security for personal data in their possession

Protecting your self on-line has become such a key issue that the Federal Trade Commission (FTC) has made a web site available with tips on how to protect yourself. Such issues as how you pay for items on-line, what to look for on web sites, and how to determine if web sites are safe to browse are common issues addressed. Each of these issues separate may seem simple and trivial, but ignoring these issues collectively might leave one's credit open for the taking

As far as i am concerned, i try to protect myself by using logiciels of protection. I also pay very attention when i make transactions on internet. I only use paypal on protected websites.
At this moment, i still had no problems with identity theft.