Friday, April 16, 2010

Chapters 9&10 quiz

1. 1) For windows use a junk-cleaning program. This keeps your computer free of files that you don't really need. 2) Use windows disk cleanup utility. This gets rid of things that aren't needed if you are running out of space on your hard drive. 3) For Macs you can get rid of unwanted applications. If you only use the application for a little bit just get rid of it if you aren't going to use it anymore. 4) Delete files that are no longer needed. If you are running out of hard disk space delete files that you no longer need. 5) Delete printer drivers that you no longer need. The mac has space for all printer drivers but you can delete the ones you don't need to make more space for the ones you do need.

2. I try not to download things i don't need. I also delete files if they are no longer needed. I haven't tried all his methods but I bet they will help get my computer running faster.

3. Data scrubbing is deleting the files and then writing over them with ones and zeros to get rid of the magnetic particles that store the info so there is no way to find out what was in the files.

4. A cookie file allows websites to know who you are if after being on their web site at an earlier time. The good cookies are for sites like amazon that remember who you are and show you products that you might be interested in. Bad cookies are when advertising companies use them to track what web sites you go to and they keep a record of the sites that belong to the network that they visited.

5. Key logging is when a program records every key stroke you make and then sends it to a hacker who then goes through it looking for your passwords, banking information etc. He recommends you use Ad-Aware Personal and Webroot Spy Sweeper. Some companies offering free spyware are actually spyware promulgators. Before downloading anything that says is a free spyware look it up at symantec.com.

6. People send emails out to people pretending that they are a website trying to get the persons information like the credit card number there drivers license number and other things that would help them steal their money. Pharming is a type of identity theft when you land on a fake website.

Friday, April 9, 2010

Chapter 8 assessment

1. Wi-Fi is a wireless internet connection. Wireless phone headsets can interfere with your Wi-Fi connection and baby monitors and microwaves. Interference happens because some things use the same 2.4 or 5-GHz bands.
2. There is a logging system that lets you see what websites have been used recently. Norton anti virus has a Intrusion Detection Software which tells you if there is someone using your connection. You can also get free shareware programs. Or you could just use your WEP or WPA to lock your connection and keep them out.
3. I agree with the author. I believe it was ridiculous that the man was fined $250 just for using someones wi-fi connection. He wasn't trying to break into their computer system so why should he get in trouble for using their internet? If people can't keep others from using their wi-fi connection then it is their fault.
4. You need to get a separate phone line for your DSL or it wont work. 911 doesn't work on VoIP. If your power goes out or if you lose internet connection then you will not have a phone line. Other communication businesses charge you more than businesses like comcast and they have hidden fees.
5. Delete the email if it is something you know you don't need to read. Answer the email if it is something you can answer fast. Let someone else deal with it if they know how to answer the email better than you. Save the email if it is something you want to keep like a password or a receipt. Tag if for later action if you cant deal with it move it into a different folder and deal with it later.
6. 1. don't let spammers know you exist, don't post your email address online. 2. Never reply to spam or click the link. 3. Don't ever buy anything that is advertised using spam. 4. use you internet providers spam filtering options. 5. Use the spam filtering that comes with your email service. 6. use a third party filter.