Sunday, November 29, 2009

Fiber Optic Communication



Fiber Optic Communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. The process of communicating using fiber-optics involves the following basic steps: Creating the optical signal involving the use of a transmitter, relaying the signal along the fiber, ensuring that the signal does not become too distorted or weak, receiving the optical signal, and converting it into an electrical signal.

Modern fiber-optic communication systems generally include an optical transmitter to convert an electrical signal into an optical signal to send into the optical fiber, a cable containing bundles of multiple optical fibers that is routed through underground conduits and buildings, multiple kinds of amplifiers, and an optical receiver to recover the signal as an electrical signal. The information transmitted is typically digital information generated by computers, telephone systems, and cable television companies.



Wireless Networking Precautions



There are many ways to make sure that your computer stays secure when using a wireless network. One way is to use a Wired Equivalent Privacy (WEP). A WEP is a protocol that helps protect the information on your computer with a network key. Another way to protect your computer against any type of hackers is a firewall. A firewall acts as a barrier around your computer and information against unwanted software on the internet.

There are other steps that you may take to secure your computer when using a wireless device. Position wireless components away from windows so that it decreases the radio signal outside your intended coverage area. Do not give the wireless encryption key to anyone and do not keep it in open and obvious spaces, hide it. Also, make sure that the whole network on your computer is being protected, not just the wireless part of the computer.






How to Create and Use a Strong Password




To create a strong password, one must be sure to include, over eight characters, a combination of letters, numbers, and symbols, and make sure that it is easy for you to remember, but difficult for others to guess. A great way to build a strong password is to choose a long phrase and substitute the words with characters. An example of this are the words nothing and we. Instead of nothing substitute a 0 and for the word we substitute a v.


After you make the changes to the phrase that you pick, you can choose the first letter of every word and create a long strong password. There are a few tips and tricks to make sure that you have a strong password. Choose one long complicated password for all of the sites you are on. You could also have a stronger password if you use HotKeys software or reprogram a keyboard key. You should also check your password on google, if it does not come up then you know that it is a strong password.






Internet Parental Control Software




An internet parental control software gives parents the ability to control and monitor their child's use of the internet from any location. By location, this means that any parent can control the way their children surf the net, from their own homes, their workplaces, and even on vacation.



There are many softwares that can help adults prevent their children from being exposed to unwanted and inappropriate images over the internet. One of these softwares is called CyberSieve 2.8.1. There is no annual fee for this software and there is free technical support, as well as free lifetime database updates. This software is ideal for multiple computers. It also has excellent web filtering, customizable program blocking, and customizable time limit controls. This is an excellent way for parents to control what their children are doing on the internet.






Internet Monitoring, Blocking and Tracking



Internet monitoring, blocking and tracking are all ways to regulate what students, workers, children, or family members are able to access while on the internet. Internet monitoring allows organizations and businesses to monitor risk areas, identify problem users, manage user and group privileges, and enforce policies for appropriate use of the internet.






Internet blocking is software that blocks certain websites or all aspects of the internet together. Internet blocking is very helpful for parents with younger children who want to keep them safe from anything inappropriate. Internet tracking is also something that is extremely helpful because it can trace what user was on a particular website. Tracking comes in handy for parents, but especially the authorities when trying to track down a criminal.






Saturday, November 28, 2009

Internet Filters






Internet filters can also be known as, content control software, censorware, or web filtering software. Internet filters are used to limit and control what information is available to a reader over the web. The types of restrictions can be applied on many levels in society. The government, an ISP, an employer, a school, a library, or even a person to their own computer can use filters to limit information from being viewed.



There are many different forms and ways that filters can come in. Filters can come in the form of a software program on a personal computer or even by servers providing internet access. Most of this type of software is marketed to organizations or parents. An internet service provider that blocks objectionable content can really help parents monitor what their children are viewing on the internet. One popular internet filter is called Net Nanny.






Internet Parental Guidance




To protect their children from inappropriate images on the web, parents must begin to take safety precautions. Responsible parents can do this by using internet filtering software. This type of software will help keep them away from unwanted websites as well as online predators. To stop their children from being exposed to these types of dangers, parents also need to limit the time their children are using the internet.




The government has made it a law for all media types that are broadcasting adult content to restrict it's views from minors. This law does help, but unfortunatly cannot possibly be followed on the internet. Because of this parents need to get internet filtering software. Some softwares that parents may use for protection are justlinda.com and kidsafe.com.



Friday, September 25, 2009

HTML: A Fun Programming Language


What is HTML? Many people who are not familiar or interested in the computer world ask themselves this question. Little do they know, they use HTML in their everyday lives. HTML is the hidden language that is used on the websites that people use every day. The proper name for HTML is Hyper Text Markup Language. Although HTML may often be referred to as a programming language, it is not; it is actually a markup language. A markup language is a set of markup tags which are used to describe web pages.
Markup tags are also called HTML tags. HTML tags are keywords that are surrounded by ankle brackets. An example of this would look like: . HTML tags come in pairs like this: and . In HTML tags there are start tags and end tags, which are also referred to as opening and closing tags. The start tag or opening tag is the first tag in the pair and the end tag or closing tag is the second tag in the pair.
popular web pages, where people use these types of HTML tags, is MySpace.
HTML markups contain elements. Elements are made up of two basic properties: content and attributes. The content and attributes of the element have different restrictions that make a document valid. There are different types of elements used in HTML. These elements are called structural, presentational, and hypertext markups. A structural markup tells the purpose of the text. Presentational markup describes the appearance of the text. Hypertext markup attaches part of one document to part of another document.
Attributes are the name value pairs of an element. They are written within the start tag of an element and are separated by “=”. The attributes of an element are usually in quotes but sometimes they are left unquoted. Although they are sometimes left unquoted, this might be dangerous. Leaving them unquoted may affect the element.

Friday, September 18, 2009