Friday, August 13, 2010

Firewalls

   When it comes to network security, a firewall is considered as the most well - known security device from threats and attack from the cyber world. By definition, a firewall is simply a system or (can be a) group of systems that creates a what we call an "Access Control Policy" between two or more networks. This means it acts as a barrier to potential attacks and threats to penetrate illegally inside a network system.

     Generally, firewalls fall into three categories. And let me give a basic concept of each three:

a.) Dedicated Firewalls - Mostly, these are hardware appliance - based devices that are available to secure a network. It adds features such as stateful, application-based filtering, dynamic per-user authentication and authorization, defense against network attacks, Java blocking, and real-time alerts. It offers a high - level of network security and these are mainly used by companies that needs to protect their networks (especially there mainframe computers) from serious threats and attacks that may jeopardized its operation within the network.

b.) Server - Based Firewalls - This is basically security solution that runs on network operating system (NOS) such as the Microsoft ISA Server or Novell Border Manager. One of the popular server - based firewall nowadays however is so - called "Endian Firewall".They offer a mid -level network security since they run on general - purpose OS such an NOS.

c.) Personal Firewall - These are firewalls that usually reside on a user's PC. They just protect your computer from threats and attacks that you may acquire via an internet connection. Majority of the anti - virus softwares includes these personal firewalls.

     Hope you have learned something from this topic that I've shared to you once again...Thanks for reading...

Saturday, July 31, 2010

Life After Information Technology Related Courses

Aside from Nursing, I believe that Information Technology related courses are quite in - demand, not only here in the Philippines, but also in other countries as well... One good thing about this course is that student can actually have a specialization... For example, Information Technology (IT) students that are interested in web design may focus on Web Development... Students under this specialization have the potential to build and design quality web sites for several companies... And I know individuals that are in to this specialization... For a more technical interest in IT (like me), they can take Network Administration as their specialization... Others may find this boring... But actually, this specialization in IT are one of the highest paying jobs abroad... Especially if you work in companies like Cisco, and Fluke... So students, you don't have to worry on what you will become after finishing IT - related courses... The important thing is that as much as possible, you should establish a good academic standing while you are studying... Because this will be the edge that you may need to get a better job or work out of Information Technology...

Monday, May 31, 2010

Why did some PCOS machine failed during election day?

Last May 10, 2010, the Philippines had its very first automated elections for both the National and Local positions. And 3 weeks since then, we see numerous comments on the said election.

And one of those comment is the sudden failure of some (if not many) Precinct Count Optical Scan (or PCOS) machine during the day of the election. From the computer technician's point of view, there is quite obvious explanation as to why some PCOS machine fails.

This machine has the similar components of a simple computer system. And we all know that an electronic components' enemy is heat. The election was held in various public schools in which majority (or almost all) of them does not have any ACUs. And in one classroom or voting precinct, it is comprised of several precinct clusters in which there are so many voters in that cluster. Not to mention, with all those people inside a voting precinct, and with the heat accumulated by the machine, it is no wonder that the chances for that machine to fail is more likely. Although during the machine testing, they've performed well, we all know that the ventilation inside that room is very much different compare to the actual election day.

This article only discuss that actual operation loophole of the PCOS machine during the election. And although it actually performs well, we should always consider that these electronic machines need proper ventilation to prevent shutdown and equipment failure. Therefore, in the next automated election, the officer who organize the precincts should ensure that the place is actually well-ventilated. And in the viewpoint of an I.T. hardware expert, we should keep in mind that excessive heat in an electronic component or equipment can greatly deteriorate its performance in the long run.

Thursday, May 13, 2010

Net Send: A primitive instant messaging service?

Nowadays, we use programs such as Yahoo Messenger, MSN Live Messenger, or even Digsby to chat with others online. But what you may not know is that before even these became popular, there was an older utility program that its sole function is to send instant messages anyone inside the network; the NET SEND command. It's major difference to other instant messaging (IM) programs, the NET SEND is purely a text line interface when sending messages, and it has a pop - up window in which messages using this utility are received here.

When using it, you must open your command line prompt or the cmd shell in your Windows OS. There are different variations on how you use this command:

1.) NET SEND {user name} message
     - This command syntax is normally used to send instant message to another computer within the network using its user name.
2.) NET SEND {computer name} message
     - This command syntax is normally used to send instant message to another computer within the network using its computer or PC name.
3.) NET SEND {*} message
     - This command syntax is normally known as a broadcast message to the domain wherein a network is connected.
4.) NET SEND {/USERS} message
    - This command syntax is normally used to send instant message to all users that has a session within the server.
5.) NET SEND {/DOMAIN} message
    - This command syntax is normally used to send instant message to another computer into another domain.

Although majority users do not use this utility as a form of instant messaging service, network geeks are certainly knowledgable with this utility. And maybe once in a while, I think you should try to use this utility. Because this one utility that may be helpful to you, in case you want to become a network administrator someday.

Saturday, May 1, 2010

Updating your anti - virus software

Basically, it is truly safe to say that your computer is protected if it has an anti - virus software installed on it. But how can I be sure with that statement? Regardless to which anti - virus software installed in your computer, in order to make them work efficiently, they must be updated as often as possible. And how will I do it? The most effective way on updating an anti - virus software is updating them over the internet.

As we all know, there are thousands (or even millions) of viruses that are created and generate everyday and is basically passed via internet. Our anti - virus software, if updated, downloads additional features in terms of virus protection in our computer. And they even update the so - called "virus signature database" of most anti - virus software in order for them to be updated on what kind of threats (in the form of a virus for example) that your PC is encountering in every day use. So my advice to all users is that, it is very essential to have an internet connection in order for your anti - virus software to work and perform well. Because if you don't, installing an anti - virus software in your PC is just like implanting a time bomb on it that you have no idea when and where threats will attack in your PC.

Tuesday, April 27, 2010

mp3pile.com - your new music search engine on the net

More than a week ago, when i found an interesting post in Facebook by one of my colleague, I've told myself that I should really try to visit this site. And I was not really disappointed by it. Before visiting mp3pile.com, I've always visit mp3raid.com whenever I want to search new songs on the net. And comparing these two music search engine sites, mp3pile has a more organize and clean home page compare to mp3raid. Another good thing about mp3pile is that whenever you find the songs you want to listen, it has a music player as well and you can download the songs you wanted.

Compare to mp3raid.com however, mp3pile.com does not indicate the playtime of the songs you've searched in their results. And since this is new in the net, I believe that they will improve the site even more.

From a music lover's stand point, mp3pile.com is worth the visit when finding the songs you want to listen and even download. So what are you waiting for?!... Just try to visit http://www.mp3pile.com/ are the visit is all worth it.

Special thanks to Mr. RMV for the permission to this review...

Saturday, April 3, 2010

The ECE Chronicles...Now with PageRank 1 status...

     It has been more than 3 months since I've decided to establish this blog site which its purpose to simple topics in the Information Technology field. And after 8 posts, this site has achieved over 2 million in the alexa ranking. And for its latest achievement, this site has been given with PageRank 1 (PR1) status. I would like to thank all my site visitior and my colleagues as well in the field of blogging (especially Mr. Day Cody).

     With this, I will try to bring each and every one of you quality posts that may contribute in sharing my knowledge in the Information Technology field.

Snapshots courtesy of: prchecker.info & googlepagerankchecker.com