Sunday, January 30, 2011

" 2011 GADGET OF THE YEAR"

                                          
                                 ACTIVITY NO.1
                       Motorola‑Xoom‑wins‑Best‑Gadget‑Aw


                             
   ....emmmfff....it help a lot to us to our work easy...he gadget World Cup came to an end. The a great deal hyped Consumer Electronics Show (CES) 2011 in Las Vegas has showcased the new generation electronic gadgets which will rule the world in coming years. The four-day show, which is measured as the biggest technology-related trade show in the world, finished on Sunday, Jan 9.
Motorola won the heart of millions with their latest products. And moreover, its Xoom tablet won the best new gadget at CES. The Xoom tablet, which runs on Google’s latest ‘tablet only OS’ Android 3.0 Honeycomb, gathered much attention at the show.
Motorola Xoom has a 10.1-inch display with a resolution of 1280×800 pixels. It is powered with Nvidia Tegra 2 dual core processor which can deliver up to 2GHz of power. This new tablet has dual cameras, 2 mega pixel cameras at front for video calling and a 5 mega pixel at rear which supports 720p high-definition video capture.
The tablet market, which is subjugated by Apple iPad, is witnessing more and more tablets from diverse manufactures. Motorola Xoom is considered as the new iPad killer. In response to new tablets, the technology giant Apple is planning to revamp the iPad and to add supplementary features like camera, Flash support etc.

                                  
  

                    The G-Man's Convertible Travel Jacket: Waterproof jacket with 40 pockets for all the gadgets you can carry.


                              
        ........it best in any occasion that you want to join because it help a lot to bring a lot of gadget.We all love carrying all our gadgets everywhere -   i Pods, maybe one or two cellphones, a PAD  and may be even USB cables. So, when it comes a jacket that is good enough to carry it all and still look simple, the G-Man's travel jacket does the job very well. Read on and you will know why. 
The G-Man's Convertible Travel Jacket has space for everything that you can carry because it has  40 pockets. Yup, you heard that right, 40 pockets. The 40 pockets include specific compartments for a PDA, MP3 player, cellphone,  sunglasses, pens, and even a watebottle if you want to carry it inside a jacket.
But that's not all, what makes this jacket so special is that many of these pockets are hidden, so all your gadgets are safely tucked away and yet are easy to send through airport security with all items secured inside.  A lining inside jacket threads and organize wires to keep them from tangling, a protective badge holder keeps the badge secure, a magnetic wind flap, and a zipped pocket-in-pocket system that turns one pocket into two make it even more geeky.
Being a travel jacket it's also water and rain proof and has a hood that can be attached or removed and an option of adding a fleece liner for the cold days.  No wonder, why then it's designed for secret agents. We love it! Just a great jacket to have.

  Motorola DROID PRO



                             
      .....it is nice 2 use because it has a lot of  menu you want to use...Droid Pro Video Format,Put/Play Movie on Motorola Droid Pro,Droid X,Droid 2<;/p>; <;p>;<;strong>;Motorola DROID PRO<;/strong>; is a candybar shaped device and features a portrait oriented QWERTY keyboard underneath the model's 3.1 inch capacitive touchscreen display. Under the hood is a 1GHz processor, running the show including the 5MP camera with AF and flash. The Motorola DROID PRO will ship with Android 2.2 on board along with Adobe Flash Player 10.1. It will fit in nicely in between the Motorola DROID X and the DROID 2 and will offer some extra enterprise features the other two handsets lack.And this Motorola Droid Pro can play videos in MP4, and music in MP3, AAC, etc as follow: The easy way to Put and Enjoy Movie, Music on Motorola Droid Pro. Today I could focus on the way to convert and play movies/musics on Motorola Droid Pro. Now we have known that Motorola Droid Pro can play video in MP4, MPEG 4, H.264, H.263, music in MP3, AAC, AAC+, eAAC+, etc.


Porsche Cayman
                          


....what a nice car..it help a lot of in every places that you want to go....The Porsche Cayman is a mid-engined, rear wheel drive 2-seat sports car produced by Porsche AG of Germany. First launched in the 2006 model year, the Cayman is a coupé derived from Porsche's second generation Boxster convertible. Like the Boxster, most Caymans are assembled in Finland for Porsche by Valmet Automotive (the rest are assembled in Zuffenhausen near Stuttgart, Germany). Porsche's Deputy Chairman, Holger P. Haerter confirmed that their contract with Valmet Automotive will end in 2012, and the Cayman's production will be outsourced to Magna Steyr Fahrzeugtechnik of Graz, Austria. (Panorama, 2008) .



               ....it is useful to use because it is a lot of more gadget inside..One good thing, though, is that 24/25p support is being pledged right out of the gate. Hopefully they won’t gimp it — Sony loves them some AVCHD and 24/25p will be H.264/MP4, and there may be quality differences. At any rate, it’s better than the VG10, which from what I understand only shoots interlaced. That’s some weak sauce. No pricing information now, but Sony said the new camcorder would be available in mid-2011..Sony will be showing off a new Handycam tomorrow, the NXCAM. It’s a “for professional” camera that uses E-mount lenses (we’ve seen them in the NEX series and Sony’s last interchangeable lens Handycam, the VG10) and has a Super-35-sized CMOS sensor. Beyond that and some format info, there really wasn’t much announced.



Monday, December 6, 2010

"Fire Wall"

"IT104RalphWarlyCAmualla"

 1.Why has there been a dramatic increase in the number of computer related security incident in recent years?
       *For me as an IT student,it maybe they have a lot of people using computer or those people who are experts in different kinds of including of codes they use that to create a virus that can affect the software and hardware of computer they are call perpetrators.It maybe also increase because they create a virus that can affect the fire wall of a computer and some of them they want to have a money so that they install a virus in a computer or they sell it in a biggest amount. 
2.What are some characteristics of common computer criminals including their objectives?
       *They have a lot of characteristics of common computer criminals some of they want to become known in a computer.They manipulate the system of computer and they destroy the software and hardware.Their objectives  is to have money using the computer and so forth.
     
3.What actions must be taken in response to a security incidents?
      ption.  *The Computer Security Institute, among other industry analysis, reports that computer
security incidents are widespread (2000 CSI/FBI Computer Crime and Security Survey,
Computer Security Institute, March 2000). 90% of respondents detected computer
security breaches in the previous 12 months, and 70% reported serious security
breaches other than the most common ones (viruses, laptop theft, and employee “net
abuse”), such as theft of proprietary information, financial fraud, system penetration by
outsiders, denial of service attacks, and sabotage of data or networks. The survey also
shows that attacks occur frequently, with 35% percent of those acknowledging attacks
reporting between two and five incidents in the last year, and 19% reporting ten or more
incidents. 71% of the survey’s respondents detected instances of unauthorized access
by insiders, demonstrating that even companies whose networks are not connected to
the Internet are at risk.
The computer security industry offers a variety of solutions to this problem, from
firewalls, authentication, and encryption to vulnerability scanning tools and intrusion
detection systems. Consulting firms offer a broad range of security services, including
security assessments, secure network infrastructure design and deployment, policy
development, penetration testing, and so forth. But while all of these products and
services have their place, they take time (often months, sometimes years) and money to
procure and implement correctly. In the meantime, a company has to live with the
security implementation it has – it may not be state-of-the-art, it may not be as strong as
it should be, but the systems and networks that depend on it are critical to the
company’s business, and cannot simply be turned off while waiting for a stronger
security solution to be designed and installed.

   *Computer Security Incident Response Plan (CSIRP) provides guidance and
documentation on computer security incident response handling and communication
efforts. The CSIRP is activated whenever a computer security incident occurs, and
guides the responses to all incidents whose severity is such that they could affect a
company’s ability to do business, or undermine its reputation.
The inevitability that (possibly successful) attempts will be made to compromise system
and network security dictates that every company, from the largest multinationals to the
smallest “dot com” startups, should have a formal CSIRP in place. CSIRP development
should be the top security budget priority in any company – more important than security
services, and more important than security products. When a security incident occurs,
reactions and decisions must be made very quickly (often in a matter of minutes). The
company has to be prepared to deal with these incidents as soon as they occur; waiting
until a new product arrives or a consulting engagement is completed is not an option.



              (source.Ethics in information technology 2nd edition by:GEORGE REYNOLDS p.6




                    

"Fire Wall"

                     
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which inspects each message and blocks those that do not meet the specified security criteria.

                                                        From Wikipedia, the free encyclopedia