Wednesday, February 28, 2007

"GUIDE FOR COMPUTER COMMANDS'

If you need some information on how to copy, remove, concatenate files and many other definitions. I found something that may be of your interest and I decided to blogged it. Here are some examples and you can look for more if you click in the link below. It is a cool website!

UNIX a popular operating system (of which there are many, e.g., GNU, Solaris, Linux, AIX, FreeBSD) that runs on many kinds of computers. It is a multi-user, time-sharing operating system more than 30 years old. It has been developed by many programmers in an open-source model of shared source code and cross-platform portability.

URL Uniform Resource Locator a simple extension of the standard filename concept. It can be used to point to files and directories on any machine connected to the network. It can be accessed through several different methods, e.g., ftp, gopher and HTTP.

Click Me for more
http://www.eos.ncsu.edu/guide/files.html

Tuesday, February 27, 2007

What is Forensic Computing?

Is an application in computer technology that is used for the investigation of computer based crimes that has been arising in the field of forensic computing. Furthermore is a process that preserves, analyses, identifies and presents digital evidence in a way that is acceptable by the law. Criminals are using this digital technology to commit crimes and hide their criminal evidence. Everyday this criminals find ways to get digital data and communications that they
think is harmless but in reality they can ruin businesses and commerce. The Federal Government is addressing the computer crimes through a research group called the model criminal code process which is trying to look into the law enforcement and how they can protect the digital commerce against these criminals.

What is Forensic Computing?

Is an application in computer technology that is used for the investigation of computer based crimes that has been arising in the field of forensic computing. Furthermore is a process that preserves, analyses, identifies and presents digital evidence in a way that is acceptable by the
law. Criminals are using this digital technology to commit crimes and hide their criminal evidence. Everyday this criminals find ways to get digital data and communications that they
think is harmless but in reality they can ruin businness and commerce. The Federal Government is addressing the computer crimes through a research group called the model criminal code process which is trying to look into the law enforcement and how they can protect the digital commerce against this criminals.

Tuesday, February 20, 2007

"Internet Crimes against Children and Teenagers"

In todays world children and teenagers are in more danger environments because they are being target by unfamiliar strangers and predators that go online. This predators look for naive, curious, trusting children so they can commit criminal acts. Many children and Teenagers are looking for attention and affection and they want to get that by chatting on the internet. This kind of perpetrators spend a lot of time with the children, this way they win their trust and later around they can harm them . Parents should be aware of what their children are doing in the internet so in the future they do not become victims of this perpetrators.

Wednesday, February 14, 2007

"INTERNET FRAUD"

There are many ways that you can be defrauded by using the internet. Out there there are individuals that make a living out of internet fraud. Some make believe that there are a corporation and they offer you a job, others claimed that you have inherit some money from relatives in Nigeria or another country and further more they even post that you have won some kind of Lottery and that you have to contact them. All this is done by email, I had read some of them and that the stories they tell are very convincing, they even offered you a percentage either to help them to claim the inherit money of people that have die but had not heirs to claim the fortune.
Just wanted to make everyone aware and not to believe this people even if you are in financial distress because you will be in a lot of trouble. Do not email them back or call them. "Be Aware of Internet Fraud" it could ruin your life.

Tuesday, February 13, 2007

Forensic Computing

Did you know about the Melissa virus that can infect files stored on and MacOS based systems. There are many first-hand reports of more than 300 organizations affected, covering more than 100,000 individual hosts.
Melissa was different from other macro viruses because of the speed at which it had spread. The first confirmed reports of Melissa were received on Friday, March 26, 1999. By Monday, March 29, it had reached more than 100,000 computers. Some sites had to take their mail systems off-line. One site reported receiving 32,000 copies of mail messages containing Melissa on their systems within 45 minutes.
Melissa was relatively non-destructive and very easily detected. Variants could be significantly more destructive or stealthy. We strongly encourage you to be aware of the risks posed by viruses and other computer security concerns at all times. There are other variants like Papa
which there have not been many reports about it.
if you fail to clean up the virus correctly and completely (for example, by not cleaning the If you practice antivirus precautions on a regular basis, you can protect yourself against Papa and other variants of Melissa. normal.dot file) you may expose confidential information at a later time. Now this virus Melissa macros is being rename as an .RTF extension. which not affect macros.

Thursday, February 8, 2007

whatever

nothing