Sunday, September 28, 2014

Video Conferencing

    Video Conferencing


 Cloud-based video conferencing can be used without the hardware generally required by other video conferencing systems, and can be designed for use with FaceBook or Google+ as seen below.

This is an example of Google's Hangout's Audio/Video chat software that is completely could based!


Video Conferencing can be used for a wide range of uses like business, education, medicine and media. High speed Internet connectivity has become more widely available at a reasonable cost and the cost of video capture and display technology has decreased. Consequently, personal video conferencing systems based on a webcam, personal computer system, software compression and broadband Internet connectivity have become affordable to the general public. Also, the hardware used for this technology has continued to improve in quality, and prices have dropped dramatically. The availability of freeware has made software based video conferencing accessible to many.

Saturday, September 27, 2014

Web 2.0

Kevin Mitnick
     
     Kevin Mitnick is a long time hacker, now security consultant, and at one time, on the FBI's most wanted list. In 1999, Kevin pleaded guilty to seven felony counts of wire and computer fraud that he committed between 1992 and 1995. Kevin Mitnick became the world’s most notorious black hat hacker, breaking into the networks of companies like IBM, Nokia, Motorola, and other targets. After a stint in prison, he reinvented himself as a white hat hacker, selling his skills as a penetration tester and security consultant. (https://www.mitnicksecurity.com)
    

Here is a list of Web 2.0 tools and apps on his site.


Follow Mitnick on Twitter

Follow Mitnick on FaceBook

Join Mitnick on Linkedin (500+ Connections)

Share his site on ShareThis
                 and
And his "Contact Us" page


     Kevin Mitnick has a large target audience. Services suchs as Ultimate Penetration Testing, Extensive Incident Response, and Vulnerability Assessements target everyone from personal and small business to large corporations. Mitnick Security also has a line of services for law enforcement, private investigators and the federal government such as Full Professional Forensics and the controversial "Absolute Zero-day Exploit Exchange" where his company sells exploits on software without question as to its purpose.
     Web 2.0 is extensively used throughout his web site. Everything from cloud-based apps to simple video.

Thursday, September 18, 2014

Cloud Computing

      I've found cloud computing very useful. Saving school documents online allows me to pull them up from any computer, even my phone. Cloud Computing also comes in handy in the form of Remote Desktop. A Remote Desktop allows me to access my personal computer or server at home and make changes or give others access to a FTP server to download files or download software that I frequently use to fix computers.

   
This link will tell a little about cloud computing:

Cloud Computing - TSS Greensboro -- Joseph Maness

Sunday, September 14, 2014

Popular Uses of the Internet and Web -- Email

Email has not changed much from the early days. Some enhancements such as being able to use HTML in the body of the email or live video.
This unit covered useful tips though such as Cc - Carbon Copy, Bcc -Blind Carbon Copy, and the use of the Signature tool.
Cc will copy the message to others besides the original person it was intended and will allow every one in the Cc including the main recipient who the email was sent to.

Bcc will send a copy of the message with out everyone being able to see who all received the message.
Replying to the message kinda fallows the same rules.
If you click Reply, your reply will only go to the sender of the original message. This is the email address that appears in the From: header line of the message you are replying to.
If you click Reply All, your reply will be addressed to the sender of the original message and all other recipients of that message. Your message will go to the address in the From: header and to all addresses in the To: and Cc: header lines — except for your own address.

If you are the recipient of the email, and the sender used BCC, then you will not see it there for you cannot “reply” or “reply all” to it.
    
       The signature tool allows you to setup a predefined signature that can consist of whatever the user wants, ie; Name, email address, web address, phone number, or some type of sub-message like a privacy statement.




Saturday, September 13, 2014

Popular Uses of the Internet and Web -- Wiki's and Blogs

     A blog is a discussion or informational site found on the internet and is made up of posts or entries usually displayed in reverse chronological order where the newest bit of information or thought appears at the top. Usually the information on a blog is that of a single person or that of many people on one subject. A typical blog combines images, text, and links to other blogs, web sites, or other media related to the topic. Chances are, that no matter your interest, there is a blog out there for it.

     A Wiki is a lot like a blog but its content is created without any defined owner or leader. Wiki's also do not have an implied format allowing the outline or configuration to develop to the needs of the users. The best know wiki is of course Wikipedia but there are many other types and uses for wiki software such as think tanks, a corporation’s intranet, knowledge management or note taking.

     Wiki's are a great way to share information and gain knowledge and the information of others. Anyone can start a wiki and anyone can easily edit their own or other wikis that have not been locked. Obviously the up side of such a web site is the ability to get information on a subject from people all over the world but the down side is that you never know when someone is going to give bad information unknowingly or on purpose.

My opinion of Wiki's have not changed. I have been using the Wikipedia site for years for research and my interests in computers, networking, and tattooing.