Wednesday, October 21, 2009

ethernet

Your blog is on google as one of the top responses for "How to Build an Ethernet Cord"
(It really isn't, we're playing pretend).
This post needs to have the isntructions on how to build an ethernet cord (you may have changed your directions after creating your own cord!) Give instructions on your blog on how to create an ethernet cord just as though the person reading it had no idea what an ethernet cable was, what to use, or how to assemble it!
First : Explain the purpose of the ethernet cable.
Second: Materials needed
Third: Instructions (INCLUDE COLORS! You may want to change the font color to match for the order.. just an idea.)
Fourth: How to test
Fifth: Give a personal statment about the first time you created an ethernet cable - How hard was it? How many times did you mess up? What would you do differently now that you have a correct cord?
Sixth: Words of encouragement to the new ethernet cable builder :)
Seventh: Include at least one photo of an ethernet cable (one that looks like yours!)

Tuesday, October 20, 2009

Post #3

A network is a lot of computers grouped together. we need networkds for businesses and schools. ss

LAN and WAN benefit in robustness, access and scalability. Makes it so much easier. Three common network topologies are bus, ring, and star.

.Windows 98, the Mac O.S, NOS, and Windows 2000 Server

Describe the difference between a peer-to-peer network has no central server. Each workstation on the network shares its files equally with the others. There’s no central storage or authentication of users. Conversely, there are separate dedicated servers and clients in a client/server network. Through client workstations, users can access most files, which are generally stored on the server. The server will determine which users can access the files on the network.Client/Server Networks and Peer to Peer Networks.

Post #2

International hacker pleads guilty for massive hacks
of U.S. retails networks. Friday, September 11, 2009

.More than 40 million credit and debit card numbers were stolen
from major U.S. retailers as a result of the hacking activity.


.Albert Gonzalez, 28, of Miami, pleaded guilty today to 19 counts of conspiracy, computer
fraud, wire fraud, access device fraud and aggravated identity theft relating to hacks into numerous
major U.S. retailers including TJX Companies, BJ’s Wholesale Club, OfficeMax, Boston Market,
Barnes & Noble and Sports Authority.


. Gonzalez was indicted in August 2008 in the District of
Massachusetts on charges related to these hacks.


. In the past 10 years there
has been a dramatic growth in the transfer and storage of credit and debit card data on computer
networks.


. Gonzalez and his coconspirators
were able to steal more than 40 million credit and debit card numbers from retailers.


. Based on the terms of the Boston plea agreement, Gonzalez faces a minimum of 15 years and
a maximum of 25 years in prison.


. He also faces a fine of up to
twice the pecuniary gain, twice the victims’ pecuniary loss or $250,000, whichever is greatest, per
count for the Boston case and a maximum fine of $250,000 for the New York case.


. Gonzalez also
agreed to an order of restitution for the loss suffered by his victims, and forfeiture of more than $2.7
million as well as multiple items of real estate and personal property, including a condo in Miami, a
2006 BMW 330i, a Tiffany diamond ring and Rolex watches.

Friday, October 9, 2009

1

For people that you would like to know a little more about you and learn certain details of your life. One of the pros in having a blog is meeting new people and checking out other peoples blogs. A con of blogs i think would be somebody learning stuff about you that don't need to be learning about you. I think that blogs are safe, because it doesn't really give out personal information to people. You just need to be smart on what you put on there. The technology of blogs are very high. You can learn a lot about technology and learn that computers can do crazy things.