lawcyber.blogspot.com
Cyber Law: Windows Vista Review-3
http://lawcyber.blogspot.com/2007/02/windows-vista-review-3.html
Information on Cyber Law. Friday, February 2, 2007. 3 Security and safety. 32 User Account Control. Yes Is it any more annoying than entering your password each time you need to do something admin-related in, say, Ubuntu? If you want to know more about security features in Windows Vista, the related Wikipedia article is a good starting point. Many of the measures are technical changes transparent to the user, which is a good thing. Subscribe to: Post Comments (Atom). View my complete profile.
lawcyber.blogspot.com
Cyber Law: Password cracking
http://lawcyber.blogspot.com/2007/01/password-cracking.html
Information on Cyber Law. Wednesday, January 24, 2007. A password is a type of authentication. It is a secret word or phrase that a user must know in order to gain access. A pass-phrase is a correspondingly larger secret consisting of multiple words. Passwords have been used since Roman times. The Romans were some of the first large armies where people didn't recognize each other by sight. In order to gain entry into the camp, a Roman soldier would have to know the secret password. When the UNIX operatin...
lawcyber.blogspot.com
Cyber Law: Info on cyber crime types
http://lawcyber.blogspot.com/2007/01/info-on-cyber-crime-types.html
Information on Cyber Law. Wednesday, January 17, 2007. Info on cyber crime types. This would include cheating, credit card frauds, money laundering etc. This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). Sale of illegal articles:. Subscribe to: Post Comments (Atom). Http:/ www.jawalamata.blogspot.com. Http:/ www.golfschool-tarsem.blogs...Http:...
lawcyber.blogspot.com
Cyber Law: Email related crime
http://lawcyber.blogspot.com/2007/01/email-related-crime.html
Information on Cyber Law. Monday, January 22, 2007. Email has fast emerged as the world’s most preferred form of communication. Billions of email messages traverse the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity of email has made it a powerful tool for criminals. Some of the major email related crimes are:. 2 Sending malicious codes through email. 4 Sending threatening emails. 5 Defamatory emails 6. Email frauds.
lawcyber.blogspot.com
Cyber Law: February 2007
http://lawcyber.blogspot.com/2007_02_01_archive.html
Information on Cyber Law. Friday, February 2, 2007. 3 Security and safety. 32 User Account Control. Yes Is it any more annoying than entering your password each time you need to do something admin-related in, say, Ubuntu? If you want to know more about security features in Windows Vista, the related Wikipedia article is a good starting point. Many of the measures are technical changes transparent to the user, which is a good thing. Vista's new sidebar is not at all much different from other, similar impl...
lawcyber.blogspot.com
Cyber Law: January 2007
http://lawcyber.blogspot.com/2007_01_01_archive.html
Information on Cyber Law. Wednesday, January 24, 2007. A password is a type of authentication. It is a secret word or phrase that a user must know in order to gain access. A pass-phrase is a correspondingly larger secret consisting of multiple words. Passwords have been used since Roman times. The Romans were some of the first large armies where people didn't recognize each other by sight. In order to gain entry into the camp, a Roman soldier would have to know the secret password. When the UNIX operatin...
lawcyber.blogspot.com
Cyber Law: Windows Vista Review-1
http://lawcyber.blogspot.com/2007/02/windows-vista-review-1.html
Information on Cyber Law. Friday, February 2, 2007. Please note that I will not discuss each of the points presented in that Wikipdia page, therefore my paragraph numbers will be incomplete. Other than that, some sections overlap one another. I will use the page as a guide to, well, guide us through Windows Vista. Let's start. As you will notice, I did not attach any screenshots to this review. There are so many good screenshot galleries out there that I find it rather over done to duplicate all those.
lawcyber.blogspot.com
Cyber Law: Email related crime: part 2nd
http://lawcyber.blogspot.com/2007/01/email-related-crime-part-2nd.html
Information on Cyber Law. Monday, January 22, 2007. Email related crime: part 2nd. 2 Spreading Trojans, viruses and worms. Emails are often the fastest and easiest ways to propagate malicious code over the Internet. The Love Bug virus, for instance, reached millions of computers within 36 hours of its release from the Philippines thanks to email. The simplest email bomb is an ordinary email account. All that one has to do is compose a message, enter the email address of the victim multiple times in t...
lawcyber.blogspot.com
Cyber Law: Windows Vista Review-2
http://lawcyber.blogspot.com/2007/02/windows-vista-review-2.html
Information on Cyber Law. Friday, February 2, 2007. Vista's new sidebar is not at all much different from other, similar implementations in other operating systems. The sidebar can house gadgets (or widgets or applets or replicants or whatever you prefer), but the gadgets can also be dragged onto the desktop. I feel compelled to touch on the originality issue often being referred to on the net. Is Sidebar similar to Dashboard? Yes Is Dashboard similar to Konfabulator? Yes You get the idea.