Monday, April 27, 2009

Final Blog Assignment (Class Reflection)

Overall I enjoyed the class. I think the the biggest thing that I gained out of it was learning more about computer programs like Photoshop and Dreamweaver. Up untill taking this course I have not used either of those programs and this class definitly gave me some experience using both. Another part I thought was helpfull was the blog assignments. I'm not someone who spends much time on computers and I actually learned a lot about what types of software and helpful resources are available online. Giving points for for the assignments was a good idea to because it made me sit down and actually read the book. I would say the only part of the course I didn't enjoy was the comic book project, and not because I thought it was a bad idea I just never big on comic books so I had a hard time coming up with ideas for it. Other than that I enjoed the class and I wouldnt change anything about it.

Monday, April 20, 2009

Reading Response Blog 7

1.) a. Junk Cleaing Programs (Disk Medic)
b. Windows disk cleanup utility
c. Delete uneeded files
d. Delete duplicated files

2.) I do not currently have a computer, but i when i did i used the virus scan and i deleted the cookie file about once or twice a month

3.) Process of removing or writing over files with ones or zeros so the magnetic particles that store the information lose all record of what they once held.... important becuase people cant view whats on your hardrive..

4.) Cookies are text files left on your computer after you visit a commercial website... conveniant because online advertisers can see what kind of websites you visit and show you reccomended products that relate your interests.. cookies are not good because certain advertising networks will track people by name as they visit different websites...

5.)Key loggers are programs that record every keystroke you make and email the file to a hacker... Lavasoft's Ad-Aware Personal and Microsoft Windows Defender...Many of the companies offering free anti-spyware software are actually spyware promulgators.

6.)Phishing- Process of aquiring sensitive information by sending emails directing a user to a fake website...

Pharming- Type of identity theft commited when you land on a phony website.

Monday, April 6, 2009

Reading Response Blog 6:

1.)A inexpensive way to access wireless internet outside your home or office.

2.) a.) You can check the logs of your router, check your computer security software, or download a free or shareware program.
b.) Close your network or encrypt your network.

3.) I think the man watching child porn in the car deserved to be arrested, and the man who he was stealing the internet from probably should have been arrested as well... The porn the man in the car was watching could very well came from the mans home computer.

4.) If your traveling in a secluded area you may have trouble getting broadband internet access so you couldnt use the service. Personally i wouldnt use the service just because i dont travel to places far enough away that my cell phone couldnt just as easily be used... but maybe in the future..

5.)He declared "email bankruptcy," I think if your recieving that many emails a day and you cant keep up with them its definitly a reasonable option.

6.) a.) Dont ever buy anything advertised via spam
b.)Dont ever reply to a spam or click the "unsubscribe " link.
c.)Use a third-party filter.