Internet Security?
Nowadays, there are a lot of people using internet to do a lot of things such as online shopping, online banking, online networking and etc.
Well, are you trust in the internet? internet is the virtual network which you cannot touch and communicating face to face. And seriously, internet is not secure at all. and i believe that a lot of people cheating about themselves in the internet for whatever reasons.
So, how you will trust in the internet stuffs? personally, i do not really trust the internet especially social networking websites and the online shoppings. i always doubt that the information of the social network is true or just being made up. you can just be anyone that you want to be in the internet but in fact you are not the person.
The news always reported that there are some youngster running out from home just because of the friends in the internet. They never met each other before and they are willing to running out from home because of him/her. So, just be rational when you are using internet.
Well, are you trust in the internet? internet is the virtual network which you cannot touch and communicating face to face. And seriously, internet is not secure at all. and i believe that a lot of people cheating about themselves in the internet for whatever reasons.
So, how you will trust in the internet stuffs? personally, i do not really trust the internet especially social networking websites and the online shoppings. i always doubt that the information of the social network is true or just being made up. you can just be anyone that you want to be in the internet but in fact you are not the person.
The news always reported that there are some youngster running out from home just because of the friends in the internet. They never met each other before and they are willing to running out from home because of him/her. So, just be rational when you are using internet.
Sunday, March 6, 2011
Internet Privacy
Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
Internet privacy forms a subset of computer privacy. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose." On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
\
Risks to internet privacy
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.
Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use. These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of bugs(software errors) exploitation.
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see.
from: http://en.wikipedia.org/wiki/Internet_privacy
Internet privacy forms a subset of computer privacy. A number of experts within the field of Internet security and privacy believe that privacy doesn't exist; "Privacy is dead – get over it" This should be more encouraged according to Steve Rambam, private investigator specializing in Internet privacy cases. In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose." On the other hand, in his essay The Value of Privacy, security expert Bruce Schneier says, "Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance."
\
Risks to internet privacy
In today’s technological world, millions of individuals are subject to privacy threats. Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. People set up accounts for Facebook; enter bank and credit card information to various websites.
Those concerned about Internet privacy often cite a number of privacy risks — events that can compromise privacy — which may be encountered through Internet use. These methods of compromise can range from the gathering of statistics on users, to more malicious acts such as the spreading of spyware and various forms of bugs(software errors) exploitation.
Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
In late 2007 Facebook launched the Beacon program where user rental records were released on the public for friends to see.
from: http://en.wikipedia.org/wiki/Internet_privacy
Cloud Computing
What is cloud computing?
It is difficult to come up with a precise definition of cloud computing. In general terms, it’s the idea that your computer’s applications run somewhere on the “cloud”, that is to say, on someone else’s server accessed via the Internet. Instead of running program applications or storing data on your own computer, these functions are performed at remote servers which are connected to your computer through the Internet or other connections.
In telecommunications, a “cloud” is the unpredictable part of any network through which data passes between two end points. In cloud computing the term is used to refer generally to any computer, network or system through which personal information is transmitted, processed and stored, and over which individuals have little direct knowledge, involvement, or control.
With more reliable, afford able broadband access, the Internet no longer functions solely as a communi cations network. It has become a platform for computing. Rather than running software on your own computer or server, Internet users reach to the “cloud” to combine software applications, data storage, and massive computing power. A September 2008 Pew Internet and American Life Study found that 69% of online Americans have utilized some form of cloud computing.
It’s interesting to note that cloud computing is really nothing new. It's the modern version of the 1960’s-era computer timesharing model. That model was based upon the high cost of computers at that time. With computer and data storage prices plummeting, it seems odd that there would be a return to that sort of model.
No comments:
Post a Comment