Copyright © infotec016 . Powered by Blogger.

Thursday, June 28, 2018

www - Tim Berners-Lee



  • Sir Tim Berners-Lee created a paradigm shift by inventing world wide web, the URL naming scheme, HTTP protocol, and the HTML markup language.
  • At that time, he was working at CERN the Europian Organization Nuclear Research center which is in Geneva.
  • He had his undergraduate degree in physics from The Queen's College, Oxford, but had no formal training as a computer scientist, although he had bulit his own computer and written software, and it was that combination of skills CERN needed.
  • There were perhaps 10,000 people working for CERN at the time, but only 3,000 actual campus; others were coming and going there and other institutions.
  • Berners-Lee thought it would be useful to have an online collabarative space where people could share ideas, and where people who came along later could follow the decision-making process by clicking through the links.
  • However, just bringing co-workers together did not seem like enough.
  • By 1989, the internet was beginning to become generally connected.
  • After that Tim Berners-Lee beleived the web should allow anybody anywhere to create information and link to it.
  • He expose his thought to his Boss Mike Sandall. His boss said him to do that as a side project.
  • Because he couldn't justify that it the project has a direct relation to CERN's goals. Instead, he decided it could be a good way of testing the potential of the NeXT machine which belongs to Apple. designed by Steve Jobs.

Sunday, June 24, 2018

Version Names of Operating Systems


Windows

  • Windows 95
  • Windows 2000
  • Windows XP
  • Windows Vista
  • Windows 8
  • Windows 7
  • Windows 10
  • Windows server 2003
  • Windows server 2008
  • Windows server 2012
  • Windows Phone 7
  • Windows Phone 8
  • Windows CE (Satellite Navigation System and some Mobiles)

Apple mac OS

  • Mac OS X Public Beta
  • Mac OS X 10.0 Cheetah
  • Mac OS X 10.1 Puma
  • Mac OS X 10.2 Jaguar
  • Mac OS X 10.3 Panther
  • Mac OS X 10.4 Tiger
  • Mac OS X 10.5 Leopard
  • Mac OS X 10.6 Snow Leopard
  • Mac OS X 10.7 Lion 
  • Mac OS X 10.8 Mountain Lion
  • Mac OS X 10.9 Mavericks
  • Mac OS X 10.10 Yosemite
  • Mac OS X 10.11 EI Capitan
  • Mac OS X 10.12 Sierra
  • Mac OS X 10.13 High Sierra
  • Mac OS X 10.14 Mojave
Apple iOS
  • iPhone OS 1
  • iOS 2
  • iOS 3
  • iOS 4
  • iOS 5
  • iOS 6
  • iOS 7
  • iOS 8
  • iOS 9
  • iOS 10
  • iOS 11
  • iOS 12
Android
  • Android 1.6 Donut
  • Android 2.1 Eclair
  • Android 2.2 Froyo
  • Android 2.3 Gingerbread
  • Android 3.0 Honeycomb
  • Android 4.0 Ice Cream Sandwich
  • Android 4.1 Jelly Bean
  • Android 4.4 KitKat
  • Android 5.0 Lollypop
  • Android 6.0 Marshmallow
  • Android 7.0 Nougat
  • Android 8.1 Oreo
Linux
  • Red Hat Linux
  • Cent OS
  • Fedora
  • Mandrake Linux
  • openSUSE

Wednesday, June 6, 2018

Computer and internet crimes


Why computer incidents are so prevalent

In today's computing environment of increasing complexity, higher user expectations, expanding and changing systems, and changing systems, and growing reliance on software with known vulnerabilities, it is no wonder that the number, variety, and impact of security incidents are increasing dramatically. Computer security incidents occur around the world with personal computer users in developing countries being exposed to the greatest risk of their computers being infected by malware.

  • Increasing complexity increasing vulnerability
  • virtualization
  • higher computer user expectation
  • Expanding and changing systems introducing new risks

Types of Exploits

There are numerous types of attacks, with new varieties being invented all the time.

Viruses

  Computer virus has become an umbrella term for many types of malicious code. Technically, a virus is a piece of programming code, usually disguised as something else, that causes a computer to behave an an unexpected and usually undesirable manner. Often a virus is attached to a file, so that when the infected file is opened, the virus executes.Other viruses sit in a computer's memory and infect files as the computer opens, modifies, or creates them. Most viruses deliver a "play load" or malicious software that causes the computer to perform in an unexpected way.For example, the virus may be programmed to display a certain message on the computer's display screen ,delete, delete or modify a certain document or reformat the hard drive.

A true virus does not spread  itself from computer to computer. A virus is spread to other machines when a computer user opens an infected email attachment, downloads an infected program, or visits infected program, or visits infected web sites.

Macro viruses have become a common and easily created form of virus.Attackers use an application macro language to create programs that infect documents and templates. After an infected document is opened, the virus is executed and infects the user's application templates. Macros can inset unwanted words , numbers, or phrases into document or alter command functions.

Worms

It is a harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from virus in that they can propagate without human intervention, often  sending copies of themselves to other computers by email.
The negative impact of worms

  • Lost data and programs
  • Lost productivity due to workers being unable to use their computers
  • Additional lost productivity as workers attempt to recover  data and programs