Tuesday, January 18, 2011

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

*::

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

*::

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

What do the 'listing' and 'let search engines find your blog' settings do? - Blogger Help

*::

Tuesday, September 7, 2010

Pusat perlindungan mangsa pemerdagangan orang beroperasi

MELAKA: Kementerian Dalam Negeri (KDN) sudah mewujudkan pusat perlindungan bagi menempatkan mangsa kes pemerdagangan orang sebelum mereka dihantar pulang ke negara asal, kata Timbalan Menteri Dalam Negeri, Datuk Wira Abu Seman Yusop.">Beliau berkata, tiga pusat bagi mangsa lelaki terletak di Lapangan Terbang Antarabangsa Kuala Lumpur (KLIA) di Sepang, Bekenu di Sarawak dan di Melaka. Beliau berkata demikian selepas majlis penyampaian elaun dan kuih hari raya kepada petugas Pusat Perlindungan Pemerdagangan Orang di Tanjung Keling di sini malam tadi.

Tuesday, October 20, 2009

THE USE OF ICT FUNCTION

Functions Of ICT


The functions of ICT which may be taught or used

The effectiveness of ICT towards achieving teaching and learning objectives

The learning skills which the children develop

Speed/automatic functions

Cut/copy/paste

Word bank/spell check

Sizing/positioning of text/image

Formulae

Graphing


Allows children to work faster, complete more; to concentrate on the learning (i.e. focus on the content); to show understanding concepts.


Critical reading.

Explaining ideas.

Reasoning.

Capacity and range of information.

Knowing where to look, what to use.

Search techniques

Selecting/critical reading


Access to historical, recent or immediate information; requires children to make informed decisions.


Co-operative working.

Awareness of others.

Problem solving.

Provisional nature of information.

Adding/deleting/replacing text or images

Reorganising text or images

Changing font, size, colour

Drafts


Encourages children to think of their audience; to understand the impact of presentation.


Self confidence.

Independent learning.


Interactivity

Moving text/images

Responding to sound, images

Responding to other people's work

(email/internet)

Making choices


Allows the children to engage in the task, explore models; provides a wider audience for children's work; is motivational.


Consideration of audience.

How presentation can affect the way in which others perceive work.

Tuesday, October 13, 2009

INTERNET SECURITY

When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer's internet account and files from intrusion of an unknown user.[1] Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer's data.

Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. Whenever decisions need to be made about how to enhance a system, security will need to be held uppermost among its requirements.

Internet security professionals should be fluent in the four major aspects:

Anti-virus

For more details on this topic, see Malware.

Some apparently useful programs also contain features with hidden malicious intent. Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.

  • Malware is the most general name for any malicious software designed for example to infiltrate, spy on or damage a computer or other programmable device or system of sufficient complexity, such as a home or office computer system, network, mobile phone, PDA, automated device or robot.
  • Viruses are programs which are able to replicate their structure or effect by integrating themselves or references to themselves, etc into existing files or structures on a penetrated computer. They usually also have a malicious or humorous payload designed to threaten or modify the actions or data of the host device or system without consent. For example by deleting, corrupting or otherwise hiding information from its owner.
  • Trojans (Trojan Horses are programs which may pretend to do one thing, but in reality steal information, alter it or cause other problems on a such as a computer or programmable device / system. Trojans can be hard to detect.
  • Spyware includes programs that surreptitiously monitor keystrokes, or other activity on a computer system and report that information to others without consent.
  • Worms are programs which are able to replicate themselves over a (possibly extensive) computer network, and also perform malicious acts that may ultimately affect a whole society / economy.
  • Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.

The above concepts overlap and they can obviously be combined. The terminology is evolving.

Antivirus programs and Internet security programs are useful in protecting a computer or programmable device / system from malware.

Such programs are used to detect and usually eliminate viruses. Anti-virus software can be purchased or downloaded via the internet. Care should be taken in selecting anti-virus software, as some programs are not as effective as others in finding and eliminating viruses or malware. Also, when downloading anti-virus software from the Internet, one should be cautious as some websites say they are providing protection from viruses with their software, but are really trying to install malware on your computer by disguising it as something else.

Anti-spyware

For more details on this topic, see Malware.

There are two major kinds of threats in relation to spyware:

Spyware collects and relays data from the compromised computer to a third-party.

Adware automatically plays, displays, or downloads advertisements. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware often are integrated with other software.

Email Security

A significant part of the Internet, E-mail encryption is an important subset of this topic.

Browser choice

Almost 70% of the browser market is occupied by Internet Explorer[1]

 As a result, malware writers often exploit Internet Explorer. Often malware exploit ActiveX vulnerabilities. Internet Explorer market share is continuously dropping (as of 2009; see list of web browsers for statistics) as users switch to other browsers, most notably Firefox, Opera and Google Chrome.

Buffer overflow attacks

For more details on this topic, see Buffer overflow.

A buffer overflow is an attack that could be used by a hacker to get full system access through various methods. It is similar to "Brute Forcing" a computer in that it sends an immense attack to the victim computer until it cracks. Most internet security solutions today lack sufficient protection against these types of attacks.

Source : Wikipedia

Monday, October 12, 2009

DEFINISI V I R U S

VIRUS


 

Istilah virus komputer bukanlah suatu yang asing apabila kita bercerita tentang teknologi komputer. Ia berkembang pesat seiring dengan kepantasan teknologi komputer itu sendiri. Virus komputer merupakan program ciptaan manusia yang dicipta dengan tujuan untuk melakukan kemusnahan atau kerosakan kepada sistem komputer.Virus diprogramkan untuk melakukan pelbagai perkara seperti memusnahkan fail maklumat atau fail sistem komputer, menyesakkan kandungan cakera keras dengan bertindak membuat salinan yang banyak pada setiap fail yang dijangkiti, memformat cakera keras dan banyak lagi.


 

Untuk dikategorikan sebagai virus, ia mesti memenuhi 2 kriteria. Pertama, ia mesti boleh menjalankan dirinya sendiri dengan menempatkan kodnya dalam program lain. Kedua,  program itu mesti boleh melakukan percambahan sendiri dengan menggantikan fail komputer sedia ada dengan fail yang dijangkiti virus.Terdapat juga virus yang diprogramkan untuk bertindak pada masa atau hari tertentu; yang telah ditetapkan oleh penciptanya. Contohnya ialah virus Michelangelo yang menyebabkan kemusnahaan amat besar pada tahun 1991. Ia diprogramkan untuk aktif pada hari lahir pencipta virus tersebut. Komputer yang telah dijangkiti virus ini akan menyebabkan cakera keras komputer tersebut diformat; apabila komputer tersebut dihidupkan pada tarikh hari lahir penciptanya.


 

Terdapat banyak cara virus boleh merebak atau menjangkiti komputer lain. Contohnya melalui perkongsian penggunaan disket atau pen drive yang telah dijangkiti virus, perkongsian fail dalam rangkaian, melalui emel (biasanya disertakan melalui attachment), dari program @ perisian yang dimuatturun  melalui internet dan tidak terkecuali melalui ruang chat seperti mIRC. Oleh itu, amat penting bagi sesebuah komputer mempunyai perisian antivirus bagi menangkis ancaman virus komputer. Pastikan perisian antivirus itu selalu dikemaskini
secara kerap dan berterusan. Selain itu, pastikan perisian antivirus anda boleh mengimbas emel dan laman web semasa melayari internet.


Tambahkan lagi keselamatan komputer anda dengan memasang perisian Firewall bagi menghalang capaian yang tidak dibenarkan kepada komputer anda.