me? ow common!!!

My photo
singao kidapawan, 12, Philippines
i am a student of colegio de kidapawan. 17 years old.still single and available!!!jejejeje you want to apply? submit your name at my yahoomail!!!!jajajajaj thats only a joke!!!pwede xad tinud-on....wajajajaja by the way, i'm Neneth. Are you interesting to know me? well!!!if you want, just be my friend. actually, I'm a friendly person but sometimes I'm not.jejejejej.

Monday, December 6, 2010

"Firewall" assignment2

 


"Outpost firewall"


Outpost Firewall Pro is a software-based personal firewall package developed by the Agnitum (founded in 1999 in St. Petersburg, Russia). It is available in both paid and freeware versions. Paid version by default has 5 language packs - English, German, French, Spanish and Russian. Free version has only English interface.[1]

Outpost Firewall Pro (personal firewall) is designed to monitor incoming and outgoing network traffic on Windows machines. Like most advanced PC firewalls (ZoneAlarm, Comodo, etc.), Outpost goes beyond monitoring internet traffic and also monitors application behavior in an attempt to stop malicious software covertly infecting Windows systems.
Agnitum calls this technology "Component Control" and "Anti-Leak Control" (included into HIPS-based "Host Protection" module). The product also includes a spyware scanner and monitor, together with pop-up blocker/spyware filter for Internet Explorer and Mozilla Firefox (Outpost's web surfing security tools include black-lists for IPs and URLs, unwanted web page element filters and ad-blocking. The technology altogether is known as "Web control").

Monday, November 29, 2010

Assignment1

1.) Why has there been a dramatic increase in the number of computer related incident in recent years?(Src.Ethics in Information Technology 2nd edition by George Reynolds p.68)
=> They have a dramatic increase of computer related incident in recent years, it is because as of now, many people use computer, and if it has many users in computer the computer problems also will increase.

2.) What are some characteristics of common computer criminals including their objectives?(Src.Ethics in Information Technology 2nd edition by George Reynolds p.68)
=> The characteristics of common computer criminals is to destroy the computer system units, and to disrupt companies, to capture triads secret and gain competitive advantage problems.

3.) What actions must be taken in response to a security incidents?(Src.Ethics in Information Technology 2nd edition by George Reynolds p.68)
 =>There action is to protect the computer by conducting an on going public awareness campaign and publish the security alert, so that the users know what they do.

Monday, November 22, 2010

cdkian

"hello"

= welcome and enjoy=
   ******====be my friend!!!====you know i'm friendly====****** 
-_-_-just explore my blog's-_-_-