Computer Security

on Thursday, August 2, 2018



Computer Security

In Today’s Society, Protecting Your Computer Is A Requirement

Advances in computer technology is a double-edged sword. On one hand, it affords us quick and easy access to numerous conveniences such as bank statements, favorite shopping centers, school and health records, and more. On the other hand, it can also grant the same access to those who aren’t supposed to get it. Although it’s a rare occurrence, hacking has become the biggest criminal nuisance in computer history.

Make no bones about it. There’s nothing innocent or cute about the hacker. Today’s hackers aren’t the pimply-faced teen rebels that you might be thinking of. Instead, this generation of hackers are grown individuals who are more than likely earning a living by stealing the identities of innocent, law abiding individuals and then selling those identities to others who want to slip by the system. And the only protection against these seedy people is prevention.

Computer security couldn’t be more important than it is today and that’s why we’ve taken the time to introduce it to you.  You can reduce the probability of experiencing identity theft by making your computer as hacker-proof as possible. All that’s needed is a little software and a lot of common sense.

1.    Install an anti-virus/anti-spyware program. Anti-virus/anti-spyware software will stop malicious code from downloading and installing onto your computer while you peruse the Internet. Known as viruses, worms, or spyware, this malicious code can destroy important files and render your computer good for only one thing: sending sensitive data back to the server of an identity thief.

2.    Don’t store sensitive data on your computer in the first place. Should your computer get infected with a virus, worm, or piece of spyware, you can thwart the individuals responsible by not storing your personal information on your PC so that when and if your computer does send back data – it won’t be anything valuable. Hackers look for things like full names, social security numbers, phone numbers, home addresses, work-related information, and credit card numbers. If these things aren’t saved onto a computer, there’s nothing critical to worry about other than restoring your computer to a non-virus condition.

3.    Don’t open files without scanning them with an anti-virus/anti-spyware program. In the past, the warning was to avoid opening files from people that you don’t know. Today it’s really not safe to open files from anyone (without scanning the files) because that’s how viruses get spread – through files - even by mistake. So even though your co-worker may have emailed a funny video, it’s no more safe to open than a video downloaded from a complete stranger. Be safe and scan each and every file you download from the Internet or receive through email regardless of where it came from.

4.    Create a barrier between your computer and prying eyes. Anti-virus/anti-spyware programs are only effective after the effect. But you can prevent identity theft from occurring by installing a firewall. A firewall is software that checks all data entering and exiting a computer and it then blocks that which doesn’t meet specified security criteria (user-defined rules).[1]

5.    Don’t click on website links in spam messages. In an effort to obtain personal information, some spammers will send email that asks you to click on a link. The email messages are often disguised as important messages from well-known online establishments, and they often try to scare their readers into clicking links with threats of closing an account of some sort. Sometimes the links are harmless and attempt to con the reader into volunteering personal information (credit card number), but other times the links attempt to download harmful software onto a computer.

Your best protection against computer crimes is your own knowledge. Hopefully the suggestions above will prompt you into taking appropriate action and into protecting your computer with the suggested tools. In doing so, you’ll not only protect yourself, you’ll prevent the spread of these malicious activities and protect others at the same time.

PPPPP

Word count 664


[1] Source: Copyright © 1996-1998 Mecklermedia Corp.

Introduction to Programming



Introduction to Programming


Controlling Your Computer with a Programming Language

In a previous article, we introduced automating some tasks with MS-DOS batch files. In this article, we’re going to introduce programming and describe how it can be used to control the way your computer works. Normally, computer novices aren’t interested in controlling the computer. New computer users are typically interested in learning more about how the thing works. However they may be surprised to learn that programming increases computer knowledge as a whole and it can help to diminish the fear associated with using a new computer.

Programming a computer is creating a sequence of instructions that enable the computer to do something.[1] The people who program computers (called programmers) use a programming language to communicate with a computer. You might have heard of some of these languages in the past such as Visual Basic, C++, or Fortran. There are hundreds of other programming language and neither one is better than the other. Most of them are capable of performing the same tasks and achieving the same goals. A programmer chooses one language by a simple preference.

Each of these languages differ by the way they communicate with a computer however, and the commands that they follow are very specific. Not a single command of one language can be interchanged with the commands or language of another. But all of them can be used to control a computer.

Now it would be impossible to teach you how to program any language in a single article. But we can still introduce you to some of programming’s most basic concepts – starting with the commands we talked about earlier. Commands are the instructions that a computer follows to perform an action. [2] To make them work inside of a program, programmers assign commands to objects like buttons for example.

The commands in a program are pretty useless unless they have some data to act on so programmers either give the programs some data to work with (list of names or numbers for example) or they make the program generate it’s own data. Sometimes, the data comes from an outside source like the Internet or the computer that the program runs on. The data that a program receives is called input and data that the program generates is called output.

Other times, the data is unknown. If the program were working with a simple algebra equation like, “x + 5 = y,” the variables “x” and “y” would be unknown pieces of data. Or if a program were to calculate a date “x” days from now, the variable “x” would be an unknown piece of data until we tell the program what “x” is. In programming, it’s sometimes required to work with unknown pieces of data.

That’s when conditions come in handy. Conditions allow a program to perform an action based on the outcome of a previous command.[3] Using this type of instruction, we could instruct a program to do one thing if the “x” variable in our latter example turned out to be 7 days, and then do different thing if the variable turned out to be 3 days.

Commands, data, variables, and conditions help build the most simple programs and there are certainly many more components of any programming language. But when they’re typed into a programming language and compiled to create a an executable file (a file ending with the .exe extension), they turn into a software application. 

As we mentioned earlier, you can use a programming language to control your computer. By using simple commands, you can program your computer to perform mathematical tasks, fill out web forms, compose an email message and send it off, or any number of other things. If you’re interested, you may find Visual Basic is one of the most easiest programming languages to learn. Visual Basic is an object-oriented programming language and it automatically codes much of a program the minute a programmer drags a button onto a screen.

PPPPP

Word count 664


[1] Source:  WordWeb Pro 4.51
[2] Source: http://www.neobasic.biz/basics.htm
[3] Source: http://www.neobasic.biz/basics.htm

Introduction to Programming



Introduction to Programming


Controlling Your Computer with a Programming Language

In a previous article, we introduced automating some tasks with MS-DOS batch files. In this article, we’re going to introduce programming and describe how it can be used to control the way your computer works. Normally, computer novices aren’t interested in controlling the computer. New computer users are typically interested in learning more about how the thing works. However they may be surprised to learn that programming increases computer knowledge as a whole and it can help to diminish the fear associated with using a new computer.

Programming a computer is creating a sequence of instructions that enable the computer to do something.[1] The people who program computers (called programmers) use a programming language to communicate with a computer. You might have heard of some of these languages in the past such as Visual Basic, C++, or Fortran. There are hundreds of other programming language and neither one is better than the other. Most of them are capable of performing the same tasks and achieving the same goals. A programmer chooses one language by a simple preference.

Each of these languages differ by the way they communicate with a computer however, and the commands that they follow are very specific. Not a single command of one language can be interchanged with the commands or language of another. But all of them can be used to control a computer.

Now it would be impossible to teach you how to program any language in a single article. But we can still introduce you to some of programming’s most basic concepts – starting with the commands we talked about earlier. Commands are the instructions that a computer follows to perform an action. [2] To make them work inside of a program, programmers assign commands to objects like buttons for example.

The commands in a program are pretty useless unless they have some data to act on so programmers either give the programs some data to work with (list of names or numbers for example) or they make the program generate it’s own data. Sometimes, the data comes from an outside source like the Internet or the computer that the program runs on. The data that a program receives is called input and data that the program generates is called output.

Other times, the data is unknown. If the program were working with a simple algebra equation like, “x + 5 = y,” the variables “x” and “y” would be unknown pieces of data. Or if a program were to calculate a date “x” days from now, the variable “x” would be an unknown piece of data until we tell the program what “x” is. In programming, it’s sometimes required to work with unknown pieces of data.

That’s when conditions come in handy. Conditions allow a program to perform an action based on the outcome of a previous command.[3] Using this type of instruction, we could instruct a program to do one thing if the “x” variable in our latter example turned out to be 7 days, and then do different thing if the variable turned out to be 3 days.

Commands, data, variables, and conditions help build the most simple programs and there are certainly many more components of any programming language. But when they’re typed into a programming language and compiled to create a an executable file (a file ending with the .exe extension), they turn into a software application. 

As we mentioned earlier, you can use a programming language to control your computer. By using simple commands, you can program your computer to perform mathematical tasks, fill out web forms, compose an email message and send it off, or any number of other things. If you’re interested, you may find Visual Basic is one of the most easiest programming languages to learn. Visual Basic is an object-oriented programming language and it automatically codes much of a program the minute a programmer drags a button onto a screen.



WHAT MAKES A GREAT GAME




What Makes A Great Game




A Gentle Reminder for Programmers
It’s easy to get lost in all the details of building a great video or computer game – so easy in fact, that we can forget the parts of a game that make them fun to play. The following serves as a gentle reminder of what prompts players to play games in the first place. Refer to this reminder in the event that you get bogged down or distracted with confusing C++ syntax, or lines and lines of Visual Basic statements and DLL structures.
1. Remember the player is the main character. Here’s a secret between you and me: People play games to gain a sense of control. If you can manage to program your game in a way that puts the player in control, then you’ve already won half the battle. This doesn't mean to suggest that the game should be easy. It simply means that when a gamer runs home from school or drives home from work to play a video game, she wants to feel the control that she didn’t have during the hours between nine and five. The outcome of a game – whether it’s a win or a loss - should never be random, but the result of a good, controlled game play instead.
2. KISS. Remember that acronym? It stands for Keep It Simple Stupid. We all know that programming a game is hard business, but believe us when we say we don’t want to be reminded of it. The difficulty of programming a game should never be part of the game play so when possible, make the game easy to start, easy to navigate, and of course, easy to play. We’re not asking for pre-school strategy here, but on the other hand, we don’t want to feel as dumb as a pre-schooler either. Forget the hundred page manual. Nobody except the truly obsessed is going to read it anyway. Build your game for the average Joe and everyone will be your fan.

3. Add plenty of action. And add lots of it too. The more action you add to your game, the more attention players will pay attention to it. And the more that players pay attention to your game, the more addictive your game gets. For every action that a player's character makes, have the game react and then prompt the player for more.
4. Make the story a good one. Nothing is worse than playing a game only to wonder what you’re doing and why. Purpose is and always has been a human obsession. But without it, we’re left wandering... in the darkness... wondering bizarre things like how the house would look in a coat of bright pink paint. Don’t give your players the opportunity to waste time like that. Give them a mission and make sure your game reminds them what the mission is at opportune times and why they must complete it.
5. Give us eye candy. But make it relevant. The graphics in a game shouldn’t be distracting, they should make our eyeballs glaze over with satisfaction upon seeing them, and then salivate for more. Graphics should contain clues and entice us further and further into the game until we’ve beaten the thing.
6. Make it real. Fantasy games are okay, but what makes them cool is the fact that they’re realistic. It’s hard to get into something that isn’t familiar or that there’s no way we could ever experience. But if you can implement some reality into your games, players will appreciate it and relate to it on a whole new respectable level.

Software Piracy

on Friday, July 27, 2018



Software Piracy



It’s Best To Avoid It At All Costs

Like electronic identity theft, computer viruses, and the spread of other computer crimes, software piracy is on the rise. The problem with software piracy is that software costs make this illegal activity appealing to the end user. After all, who is it going to hurt? Rich software companies?? This article investigates software piracy as a whole and the impact that it has on the computer using industry.

The most vulnerable victims of software piracy are software businesses or independent programmers who create and distribute commercial software or shareware. We described shareware in another article, but because both commercial software and shareware require payment, they’re the target of pirates who seek to make these kinds of programs free to use.

Depending on their binding legal agreements, licensing typically allows the use of a single program on a single computer. This set up is usually fine for a user who uses software at home on one computer. But in an environment where there are five, ten, twenty or more computers, buying a license for each computer can be down-right costly. So costly that the temptation to pirate a little software here and there can be pretty tempting.

Co-workers are familiar with this temptation and they’re often the ones who “share” purchased software among those who need it. However the same temptation also prompts others to knowingly or unknowingly buy bootleg copies of commercial software or registered shareware. 

As tempting as it is, it’s still illegal and the punishments/fines for sharing commercial or registered software is too much for one to bear. In recent news, “Yahoo China loses music piracy case (AP via Yahoo! News) A court has ordered Yahoo Inc.'s China subsidiary to pay $27,000 for aiding music piracy, the company and a music industry group said Tuesday.“[1] Additionally, “EU lawmakers approve prison terms, fines for major commercial piracy (International Herald Tribune) EU lawmakers voted Wednesday for legislation that would set prison sentences and fines for large-scale commercial piracy, but exempt patents and copying carried out for personal use.” [2]

Fortunately, there are alternatives. Schools can research student versions of commercial software or ask for a school discount. Just because school rates aren’t advertised, it doesn’t mean that they aren’t available.  Freeware or open source software (also described in another one of our articles) is another alternative to pirating commercial-ware, as well as shareware. And using older versions of programs could additionally reduce the costs associated with commercial versions.

Up until recently, public opinion held little faith in freeware or open source software – often regarding it as low-quality knock-off’s of better known commercial products. But if you take a good look at what’s being offered at no cost, you may be in for a big surprise. The quality of today’s freeware and open source software created a strong rift among the commercial community and it’s literally driving the competition bananas! So much so, that even some well known software development corporations have joined the cause and built a few freeware open source products of their own!

If you can remember that there are hoards of alternatives to costly commercial software (and you make the effort to get it), you’ll discover that you can keep up with the rest of the computer industry at a significantly cheaper cost than if you attempted to pay your way down the software aisle. Software piracy just isn’t the answer.

PPPPP

Word count 572





Using Computer

on Wednesday, July 11, 2018



Using Computers



It’s Not Rocket Science

   These days it’s strange to hear people say, “I’m just not computer literate,” as computers have evolved from archaic scientific calculators to simple point-and-click type machines. We suspect that today’s “computer illiterates” are people who haven’t taken the time to experiment with such a machine. And we strongly believe that spending just twenty minutes with one could turn the most adamant technological caveman into any one of those who have fun wreaking chatroom havoc on the Internet today.

   Today, one only needs to learn how to manipulate a mouse, punch a few buttons on a keyboard, or really just turn the thing on to use a computer. It’s hard for some folks to believe, but the computers of this generation almost run themselves! For fun, let’s investigate just how little knowledge these thousand-dollar machines actually require.

   Can an absolute newbie operate a computer without knowing how to use a mouse or keyboard? Assuming that a computer is set up to operate on voice command – sure! Voice command software allows users to tell a computer what to do and the computer responds by fulfilling the user’s commands. Although it’s pretty new and still under development, voice directed technology has already infiltrated consumer service related systems.

   Think back to the last time that you paid a bill over the phone. Instead of speaking to a human being, chances are that you spoke to a computer that not only responded to what you said and followed the commands that you gave it, it also asked you for more information such as your full name or credit card number. In this case, a person (such as yourself) operated a computer without even knowing it!

   Can an absolute newbie sit down at a computer without knowing how to use one? Assuming that a computer is set up to operate on touch command – the answer is again, yes! Touch command software allows users to literally touch objects on a monitor and tell the computer what to do with a finger. Known as “kiosks,” these programs are already in use world wide at ATM machines, employment centers, and in health monitoring systems.

   Neither a mouse nor a keyboard is required. A computer user only needs to touch various boxes on a screen to control a computer. Sure, the programming behind such technology is extensive and advanced, but to the end user, it makes computer use less intimidating and plain easy.

   Of course when we talk about operating a computer, we envision more involvement than speaking on the phone or touching things on a screen. The above illustrations were just a couple of examples of how far computer technology has grown, and how far we’ve pushed “user-friendliness” to its limit. Eventually, the keyboard and mouse will have to play a role when computer newbies have to work with one as a cash register, as a hotel booking program, or as a library’s catalog system.

   These requirements don’t make computers any less easier to operate, but they don’t make them that much harder either. So much of today’s software is designed to accommodate the experience of a new user that anyone could get connected to the Internet, send an email message, and download an MP3 file within the first five hours of purchasing a personal PC.

Working With Computers

on Sunday, July 8, 2018




Working With Computers

 In Today’s Society, There’s No Escape


Well, we’ve been warned that this time would come – probably from the earlier eighties on. Yes, computers have finally taken over and if you doubt it, we’re here to convince you - but not because we want to or because we can. We want to convince you that if you don’t take the necessary steps to control that reign, you’re going to be left behind further than you could have ever imagined.

Computers are everywhere. Take a moment to try and think of a place a business where you didn’t see a computer in use. From the small local corner store to the largest hospital, computers are in every gas station, grocery store, bank, restaurant, beauty shop, and doctor’s office around. From a consumer’s point of view – you may not think that’s much to worry about. But along with computers, we’ve also been infiltrated with a little thing called “self-service.” Today, there are more self-serviced resources than ever and in an effort to synchronize them with headquarter databases, they’re provided via your inescapable computer.

Here are some examples. Banking is self-serviced through the desktop-clad ATM machine. Gas stations are self-serviced through a menu-clad touch screen kiosk. Most cash registers are Windows XP or Vista machines that send purchase details back to headquarters via the Internet (or a small Intranet). Having your weight, blood pressure, and heart rate measured and recorded is now a digitized process. Even ordering a pizza is now a simple matter of dialing from a wireless cell phone and making a few selections from series of pre-programmed menus!

The important thing to realize here is that this phenomenon isn’t a new convenience – it’s a new requirement. And if you haven't jumped onto the binary wagon, you’re going to face a few problems. For just as this new lifestyle was once predicted, we’re going to predict that “the old ways” will slowly disappear.

We’re going to predict that all paper-based transactions (checks, money orders, etc.) and documentation (think of the old filing cabinet system) will disappear. We’re going to predict that chips will replace everything that was once transported from one location to another through the trusty post office. And we’re going to predict that homes will become less cluttered with stacks of paper and that our natural resources will flourish as a result of it.

This all sounds fine and dandy of course, but if you’re not computer savvy, you’re going to feel a little lost once the choice has past and the revolution is 100% complete. Fortunately, computer systems are designed in a way that even a child can manipulate them. In fact, if you can remember that most systems are designed along the line of menus and the selections of a few options on these menus, you’ll do just fine no matter how many buttons there are to push.

For example, when you’re faced with an electronic system, look for a main menu. Most main menus display themselves as soon as a device is turned on, so chances are that if you’re standing before a device that shows a bunch of choices to do something, you’re looking at a main menu. The buttons on these main menus of course take you to additional menus, which in turn give you even more choices to make. And all of those choices will eventually bring you to the service that you need. One very important choice you’ll want to keep your eye on is the option to return to the main menu. This way, you can return to the beginning of a system and start over in case you get lost among the way.

Another important choice that you want to keep your eye on is the choice to get help! This option may not be available on every device that you encounter, but when it is available, be sure to use it.

There’s just no way around it. Computers and computerized systems are here to stay. There’s no need to fear them – but you surely can’t avoid them. Just remember the menu system and you’ll soon discover that you can approach and use these things as if you designed them yourself.


Word count 703