Hacking

Hacking
The process of attempting to gain or successfully gaining unauthorized access to computer resources for the purpose of help or secure system is called hacking. Hacking is the technique in which any one can access and one’s computer without his permission . A hacker knows all about the operating system and different holes in the system. Computer hacking is when files on your computer are view created or edited without your authorization. Hacker can gain complete access to your computer from any were in the world if your computer is turned ON, unprotected and has an internet connection.
1.   White-Hat Hackers
The good guys who identify the security weakness of the system or network and inform the owner about them. A white hat hacker breaks security for no-malicious reason, perhaps to test their own security system or while working in a security company which makes security software. White –hat hacker is also referred to as the ethical hacker.
2.   Black Hat Hacker
A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Black hat hacker is also known as cracker. Black hat hacker break into secure networks to destroy data.
3.   Grey Hat Hackers

Grey hat hacker is the combination of black hat hacker and a white hat hacker .A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. Then they may offer to correct the defect for a fee.

Plagiarism

Plagiarism

Plagiarism is the act of taking another person's writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, or take words, phrases, or sentences from another person's work, it is necessary to indicate the source of the information within your paper using an internal citation.

Copyright

Copyright

The exclusive right given by law for a certain term of years to an author, composer etc.to print, publish and sell copies of his original work. Copyright allows authors, musicians, artists, etc. to make money of their labor.  It also prevents people from altering the work without permission. Copyright law can be protected, Literary Works, Musical Works, Dramatic Works, Choreographic Work, Pictorial, Graphic,  Sculptural Works, Motion Pictures ,AV, Sound Recordings, Architectural Works. It give the copyright holders  to reproduce the work, Right to prepare derivative works, Right to distribute copies for sale, Right to perform AV works publicly, Right to display musical and artistic works publicly.

preventive measures 0f c0mputer virus

preventive measures 0f c0mputer virus(Firewall,antivirus software)
How to prevent computer viruses
·        Install a reliable antivirus program
·        Avoid suspicious websites.
·        Never Open Email Attachments Without Scanning Them First.
·        Set up Automatic Scans
·        Stay Away From Cracked Software.

·        Install a Firewall

Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
Eg: Zone Alarm firewall,Shardaccess ,Mpssvc , Lptables ,Lpcop ,Shorewall ,Clear os ,pfSense
AntiVirus Software
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more. These tools are critical for users to have installed and up-to-date because a computer without anti-virus software installed will be infected within minutes of connecting to the internet. There are several different companies that build and offer anti-virus software and what each offers can vary but all perform some basic functions:
  • Scan specific files or directories for any malware or known malicious patterns
  • Allow you to schedule scans to automatically run for you
  • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
  • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.

 Eg Windows Defender, Norton antivirus McAfee , avast,AVG.

Kalzium

Kalzium is an interactive application which shows information about the periodic table of the elements. Kalzium can be used  as an information database. Kalzium is a program that gives detailed information about elements through the use of an interactive periodic table.
Features
Ø versatile overview of all important data from the elements like melting points, electron affinity, electron negativity, electron configuration, radii, mass, ionisation energy
Ø tool to visualize the spectral lines of each elements
Ø different colored views to the periodic table of the elements: separation of the different blocks, Year simulator, Temperature simulator
Ø Molecular weight calculator
Ø an Isotope table
Ø 3D molecule editor, with a load and save functionality
Ø a equation solver for stoichiometric problems
Ø file type conversion for different types of chemical programs

Ø tool to produce a comprehensive list of all Risk_and Safety_Statements

online forums

online forums

A Web site that provides an online exchange of information between people about a particular topic. It provides avenue for questions and answers and may be monitored to keep the content appropriate. Also called a "discussion board" or "discussiongroup’’.Forums can be entirely anonymous or require registration with username and password. Messages may be displayed in chronological order ofposting or in question answer order where all related answers are displayed under the question. 

GeoGebra

GeoGebra
GeoGebra, the free, open-source mathematics software is designed for math classrooms in secondary schools, but anyone who uses geometry, algebra, or calculus should check it out. It combines a flexible, easy-to-use geometry tool with direct input of equations and coordinates. It can create points, vectors, lines, segments, conic sections, and more using preconfigured tools and handle variables for vectors, numbers, and points. Geogebra is a software package for creating and manipulating geometric objects.  

Some of the features Geogebra provides for its users include:
* Free to use software for learning, teaching and evaluation
* Fully interactive, easy-to-use interface with many powerful features
* Available in many languages
* A fun way to really see and experience mathematics and science
* Adaptable to any curriculum or project
* Used by millions of people around the world
*Geogebra works across different platforms

Tupi: 2D Magic

Tupi: 2D Magic
Tupi: 2D Magic is an open source software that will let you perform Animation tasks. It's free for both personal and commercial use. This mix allows children (from 8 years old) and amateur artists to create funny and beautiful animations like this one
Current Features
- Basic Illustration Tools (Pencil, Polyline, Line, Square, Ellipse, etc)
- Exposure Sheet (with onion skin support)
- Tweening tools (Position, Rotation, Scale, Color, Opacity)
- Preview Player
- Objects Library (JPG, PNG, GIF, SVG)
- Video Exportation Module (AVI, MPEG, MOV, etc)

-  Webcam support for now

Free educational software

Free educational software
The main benefits of using educational software in schools are listed below:
1. Educational software make teaching-learning more interesting and goal oriented.
2. Educational software develops interest and curiosity among the learners.
3. Educational software can save the teaching and learning time of teachers and students.
4. Educational software can save the efforts, time , resources of the schools.
5.Educational software can be used in every school subject areas.
6.Educational software can check the academic performance of the learners.
7. Students records can be maintained

8. It stimulates the thinking and senses of the learners.

Software piracy

Software piracy

Unauthorized copying or distribution of copyrighted software. It is done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers. A term used to describe the act of illegally using, copying or distributing software without ownership or legal rights. The majority of software today is purchased as a one-site license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple licenses is considered software piracy, which is illegal. Under the Indian Copyright Act, a software pirate can be tried under both civil and criminal law. The minimum jail term for software copyright infringement is seven days, and the maximum jail term is three years. Statutory fines range from a minimum of 50,000 to a maximum of 200,000 rupees.

Phishing

Phishing
Phishing is a fraudulent attempt, usually made through email, to steal your personal information. Phishing emails usually appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password.
Prevent Phishing Attacks
  • Do not reply to emails that request financial information, even if it appears to be from a trusted source.
  • Do not reply to emails from unrecognized senders.
·         Do not open any links in suspicious emails, instant messages, or chat-room messages.
·         Only communicate personal information over the phone or through a secure website.
·         Never use email to share personal information.
·         Avoid using email on public computers.
·         Do not click anything in pop-up windows
·         Use security programs to protect your computer.

·         Check your credit report and financial statements regularly

Netiquette

Netiquette
Netiquette stands for internet etiquette. Network etiquette is the golden rules or Do’s or Don’ts of online communication. Netiquette is a set of rules for behaving properly online. There are Ten rules of Netiquette that everyone who goes online should follow.
Rule No. 1: Remember the Human
      You need to remember that you are talking to a real person when you are online.
      Remember this saying when sending an email:  Would I say this to the person’s face.
Rule No.2: Adhere to the same standards online that you follow in real life
      You need to behave the same way online that you do in real life.
Rule no. 3: Know where you are in cyberspace.
      Get a sense of what the discussion group is about before you join it.
Rule no.4: Respect other people’s time
      Keep your post and emails to a minimum by saying what you want to say.
Rule No. 5: Make yourself look good online
      Remember to always check your spelling and grammar before posting.
Rule no. 6: Share expert knowledge
      Ask questions online
      Share what you know online.
Post the answers to your questions online
Rule No.7: Help keep flame wars under control
Rule No. 8: Respect other people’s privacy
      Do not read other people’s mail without their permission.
      Not respecting other people’s privacy is bad Netiquette.
Rule No.9: Don’t abuse your power.
      Do not take advantage of other people just because you have more knowledge or power than them.
Rule No. 10: Be forgiving of other people’s mistakes

      Do not point out mistakes to people online.

Cyber privacy and password protection

Privacy is  our right to control what happens with personal  information about us.
Internet privacy violation risks may be minimized, as follows:
  • Always use preventative software applications, such as anti-virus, anti-malware, anti-spam and firewalls
  • Avoid shopping on unreliable websites
  • Avoid exposing personal data on websites with lower security levels
  • Clear the browser's cache and browsing history on a consistent basis
  • Always use very strong passwords consisting of letters, numerals and special characters
Password protection
  • ·        Never give out your password to anyone
  • ·        Don’t just use one password. 
  • ·        Create passwords that are easy to remember but hard for others to guess
  • ·        Make the password at least 8 characters long. 
  • ·        Include numbers, capital letters and symbols. 
  • ·         Don’t fall for “phishing” attacks. 

Computer virus preventive measures

How to prevent computer viruses
·        Install a reliable antivirus program
·        Avoid suspicious websites.
·        Never Open Email Attachments Without Scanning Them First.
·        Set up Automatic Scans
·        Stay Away From Cracked Software.
·        Install a Firewall
Firewall
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
Eg: Zone Alarm firewall,Shardaccess ,Mpssvc , Lptables ,Lpcop ,Shorewall ,Clear os ,pfSense
AntiVirus Software
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more. These tools are critical for users to have installed and up-to-date because a computer without anti-virus software installed will be infected within minutes of connecting to the internet. There are several different companies that build and offer anti-virus software and what each offers can vary but all perform some basic functions:
  • Scan specific files or directories for any malware or known malicious patterns
  • Allow you to schedule scans to automatically run for you
  • Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
  • Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.

 Eg Windows Defender, Norton antivirus McAfee , avast,AVG.

Computer virus

Computer virus
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data. Computer viruses currently cause billions of dollars worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
Malware (for "malicious software") is any program or file that is harmful to a computer user "Malware" is a term for any software that gets installed on your machine and performs unwanted tasks, often for some third party's benefit. Malware programs can range from being simple pop-up advertising to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Some malware provides no uninstall option, and installs code in unexpected and hidden places (e.g., the Windows registry) or modifies the operating system, thus making it more difficult to remove.
Trojan Horse
A program written to deliver a malicious program that may then cause destruction to your computer.  A Trojan horse is delivered by someone or hidden within another program that may seem harmless.
Spyware
A program written to monitor your actions on a computer.  A common type of spyware is a key-logger program.  This program can record every key stroke and mouse click you make.  Spyware can be delivered via a Trojan horse program.
Adware
Adware is a form of malware.  One word - pop-ups.  Adware is designed to pop up advertisements.  Adware can be very annoying.

online dictionary

online dictionary
An online dictionary is a dictionary that is accessible via the Internet through a web browser. They can be made available in a number of ways: free, free with a paid subscription for extended or more professional content, or a paid-only service.
      www.Dictionary.cambridge.org
      www.olam.in

      www.mashithantu.com/dictionary

E-journals

E-journals
              An electronic journal is a periodical publication which is published in electronic format, usually on the Internet.
  Types or Variant of e-journals
Classic electronic journals: electronic journals are available through internet applications
Parallel electronic journals or Electronic version of print :available both in print and electronically
Database model and software model:articles reside in a centralized database maintained by the publisher and subscribers are given permission to access the database to locate and download articles.
CD-ROM journals
Electronic journals have several advantages over traditional printed journals:
Ø You can search the contents pages and/or the full text of journals to find articles on a certain subject.
Ø You can read journal articles on your desktop, you don't have to be in the Library.
Ø You can e-mail articles to yourself or download them for printing.
Ø The article that you want to read will always be available, even when the Library is closed.
Ø Hypertext links allow you to move to different sections within individual journals or articles and can link you to related resources on the Internet.
Ø Journals can include more images and audio-visual material.
Ø Journals can be interactive - you can e-mail the author or editor with your comments.
Disadvantages
Ø Difficulty in reading computer screens
Ø Lack of equipments
Ø Less permanent

Ø Lower quality 

Chat

Chat
Internet Relay Chat or simply the chat is an Internet wide talk facility which is getting popular now a days. It is an online conversation with another person over the Internet. Chatting has several advantages. It can be a private chat with friends or relatives or a general chat with even unknown person.
          Previously, chatting was purely text-based. People located at different places can just type their conversation through the key board. Text based chatting is faster when compared to graphical systems. Now we have multimedia chat, it is possible to live conversation through the Internet using web cameras and audio equipments. Since image and sound get transferred slowly through the Internet, use of high speed connection is essential.
Advantages of Internet Chats
·        Chat rooms utilized by students provide synchronous communication
·        Students can use chat rooms to develop collaborate projects ,interact with peers, experts etc.

·        There is no long distance charge for chat.

Educational podcast

Educational podcasting
Podcast is a " digital recording of a radio broadcast or similar program, made available on the internet for downloading to a personal audio player." in other words, it is a digital audio file that is created, shared and heard. Podcast can be watched or listened to anywhere and anytime and across different devices.
How to create a podcast
 1.Recording
For this you will need a microphone and an audio recording software
 2.Test your Podcast
Always make sure you listen to your podcasts and redo the parts that you don’t like
 3.Publish your podcast
     You can use online platforms for publishing your podcasts. If you have a blog for your class you can publish it there , you can also submit it to the public podcast directory services such as iTunes Music Store, Podcast.net, OurMedia.org, Podcast Alley, or Podcast Pickle.
·        Educational Uses of Podcasts
Podcasts can be used for several educational purposes. Here are some of them :
  1.     Podcast are great alternatives for delivering research content or lessons to students who need remedial or extended support
  2. ·        Students can create their own podcast to share their learning experiences with each other and also with other students from other schools
  3. ·        Teachers can record audio podcast to provide additional and revision material to students to download and review at a time that fits them the best.
  4. ·        Podcast can hugely benefit auditory learners and help them in their learning.
  5. ·        Creating podcast allows students to develop several important skills such as researching, writing, speaking effectively, solving problems, managing time, grabbing attention and improving their vocabulary