Thursday, June 6, 2013

James Marcic

Blogs the most hip way to share information and express your opinion to the world at large or for your own personal reading.. #james #marcic #jamesmarcic James Marcic

Sunday, April 17, 2011

Tutorial IV: Computer Security Risk



It has come to my attention the importance of computer security. This loosely used term is vital to the computer user. I am going to educate you on the importance of computer security.
First we must understand the computer risks:


Internet and Network Attacks
Unauthorized Users
Information Theft
System Failures
Here above is a list of possible security risks. Lets go through and explain each one.

Internet and Network Attacks:
Internet and Network attacks are the most common form of cyber abuse. Hackers, or crackers, cyberterrorists are computer users committing crimes against other computer users. The definition of cybercrime is "Online Internet based illegal acts". This means any act of hackers violating your computers security to change or steal you personal information is considered a cyber crime. There is many different ways cyberterrorists use the Internet to destroy people personal computer. These terrorists use computer programs such as viruses to infect your computer in negative ways. These viruses are made to destroy or cripple your cyber use. Each one is designed to perform different functions, but ultimately with one major goal "computer destruction". Other forms of Internet abuse is from applications such as worms, rootkits and Trojan horses. These all sound different but are made for the same reason.

Unauthorized Users:
An unauthorized user is a person is using a computer without permission. This would not fall under the cybercrime law. The vulnerability of your computer is a high risk. Without computer passwords or locks enemies or associates can freely access your computer. Which has private information that is now shared with the wrong people. Many business's must be aware of this security risk. Potential clients and employees could cripple a business if an unauthorized user hacks of steals valuable information. Selling company information, secrets, or evidence to accuse large corporations. Financial records are now computer accessible.Which leads me to my next point.

Information Theft:
This is one of the most important security risks. Due to the amount of information stored on computer nowadays; hackers are subject to stealing and personal information. An example: I was on the web and bought a cell phone case. Days later my credit card number were taken off the web and used unauthorized by individuals who I did not know. I lost hundred almost thousands of dollars due to this cybercrime. My point is valuable information such as bank information, SS numbers, credit card numbers, address and even phone numbers are on the computers and even the Internet. This information could put our lives at stake. Identity theft has been a major campaign for the last couple of years. Companies such as ID watchdog and Lifelock are designed to ensure protection of personal information that is access online. Identitytheft.com states over 7.2 million homes affected by identity theft per year. This means watch the information you list, monitor your and your children's websites. Information theft is a huge industry for hackers and cyberterrorists.

System Failure:
Our last point we have is System Failure. Many computers today are destroyed by lightning. This can cause loss of information stored on these computers. Its a loss of money and time. People do not understand the importance of surge protectors. These devices are designed specifically to protect the device plugged into its outlets. Its is estimated 5 million computers are destroyed yearly by lightning strikes. You can buy surge protectors for cheap. $5 dollars could sace you hundreds for insuring your computer with a surge protector. All computer companies do not have lightning stike guarantee's. Above I have posted a screen shot o my search results for screen protectors
Discovering Computers 2010 (Cashman Series)
^^^^^Definitely best article to read^^^^  #james #marcic #jamesmarcic 

Sunday, April 10, 2011

Secure Email Project

I have just completed my secure email project. This project was very interesting. I was never aware of signed and encrypted emails. This was new surfing in new waters for myself. I must admit though, I found this project more direct and understandble than the Access project. This project was smooth. I started early and finished with plenty of time. I am really enjoying learning more and more in the computer world. I have a grasp of terms and phrases I would never of known unless this course. Below is a picture of my Thunderbird inbox. Here are my two email replies from Professor Means. I have highlighted the two with Arrow indicators.




In the article shown above, there is a report on email security. The importance of email security in the expanding computer age has become very prenevolent in the past couple years. The article focuses on how company's can become less vulnerable to data breaches through company emails. Many business are coming into the light of securing employee emails. Internet and data security is important to the survival of a young or old corporation. Leaking of precious information can cause loss of money, profit, and power.
The article states the email market has been steadily growing for the last decade. Between between 2005-2008 over 600 million new mailboxes were established through providers. The biggest loss of email security is through servers. To save email data a company needs a server to store all the data. Mass storage can lead to deleted information that is essential to a business.

Another form of email security loss is from the employees. More and more people are working from home offices or on the road. This requires laptops or portable computers. This means employee have access to offline email messages. So evidently this has a critical risk factor in data security.

The article states "
A large risk to email data within the enterprise is unlawful access to highly sensitive mailbox information". Many offices trust employee's with information. Constantly secure management of these data files is important to its security. Breaking information hackers are less of a problem then mad employees taking there anger out on the company. Data loss from employees selling information, or taking the information to use for themselves.

Tuesday, March 29, 2011

Access Project

I must say this access project has been though. It has taken me a long time to complete this assignment. I had to take 2 extra days just to get the work done. I was unable to complete the project in the projected time due to high school work load and I had the busiest couple of weeks in my business. Which is good news, but it come with a price my school work. Anyways,

This project has thought me how to correctly use access. I have learned to create more queries, forms, and reports. I must say the easiest of the three would have to of been the forms. I enjoyed spending time doing the form; it took no time at all. The reports on the other hand, took me for a loop. I am not even sure I was able to successfully complete the project due to the reports. I thought the wizards were a much needed help through this process. I would have never been able to finish if it wasn’t for the discussion boards and the help button the Access 2007 bar. The project took me forever to import the excel file. I was using 2003 access at first and was not successful in import the data and I couldn’t figure out why. I tried and searched and got aggravated. Then finally it came to me. I had to download the 2007 office, and open every file in 2007. Success.

Finally, I am going to give my two cents on the Microsoft access. I was able to do the entire project very smoothly. I had complaints at the beginning from the reasons above. Except now after I realized my mistake I was able to more smoothly finish the project. I would one of two things to make access more efficient. I would either update the information on past office suites, or try and update all computer systems to the newer software. I know money is the issue, but this way every person will have the best and more reliable and data sufficient sources.

The project itself was great. I ran smoothly through the videos, and was able to complete most tasks without having to rewatch. The one complaint I had about the project is I would have had one other video segment just for troubleshooting. I had so many issues due to stupid little mistake's that could of been prevented. I would like to see in a clip, not long only 5-10 minutes just going through the common problems with this project. As you can see my complaint is not a critical issue, but more of a suggestion to improve the work and learning experience of the student.

Sunday, March 27, 2011

Tutorial 3: Internet and Search Engine's

Internet and Search Engine's

There is one common problem every internet user faces on a daily basis.  That is correctly searching the internet! Everyday millions of people log onto the internet. Google performs more than 2 billion searches worldwide everyday. That equals out to be 83.3 millions hits every hour. That does even add in website such as dogpile, yahoo, bing and so forth. Today I am going to show instruct you searching the world wide web.

There are many different ways to search the worldwide web for information. First we have “search engines”. Webpedia.com defines a search engine as “a computer program that retrieves documents or files or data from a database or from a computer network (especially from the internet)”.  The search engine takes your data being searched and runs each word through a computer database. Then it has a program that sorts out each character/letter, each of these characters returns millions of results. The web application collects the results and lines up the best suited order of the words or phrase. This process sounds very complex, but seach engines are able to do this is a matter of seconds.  Here are some other examples of search engines: yahoo.com, bing.com, google.com, ask.com, yebol.com, blekko.com
                                                  

Screen shot by James Marcic
Copyright 2011

Above I have taken a screen shot of Google. I have searched the word "Money". Here is a list of result generated just from Google. Now compare these to screen shot below of Dogpile.com.

 Second, we have “meta search engine”. Wikipedia states “A meta-search engine is a search tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source.  This is pretty search engine type is very simple to understand. Meta search engines collects all the information from other search engines and compiles the best results from every page. This actions has its  up's and down's. It has all the best results, which if you are certain of the information, you find the information very easily. The bad side is it does not give a broad search return. Meaning, it only compiles the best results and not a variety of possibilities. In this case will not help the user who is just browsing around. Some examples of Meta search engines are: profusion.com, Kartoo.com, dogpile.com, and surfwax.com.



Screen shot by James Marcic
Copyright 2011

The screen shot above is dogpile.com, we are seaching the word "Money". If we compare the different results given to us. Not very many of the possible examples of  the word "Money" is on both web sites. This shows you how vastly different each and every web search engine or meta seach engine could be. I would suggest when searching information on the web always check atleast two seach engines. This will come in very handy. I would go even as far as to suggest searching both Meta and regular search engines.


How does google compile information:
Google for example has these programs called “bots”. You can think of this application as millions of little spiders crawling all over the web domains and collecting data from every URL. These spiders obtains one web address, then that one web address links to two others. Those two link to on continually for millions of web pages. Just think of how complex and long that system of information would be, millions of web pages, billions of articles, trillions of words. The bots then return to Google, where a database copies the information for use. This action is performing 24 hours a day and 7 days a week. These bots never stop working. This gives google the most up to date information on every website.

Here are some articles on these google bots :


Here is a video to you NEED to watch about googlebots:


Tuesday, March 8, 2011

PRESENTATION AND WEB 2.0 PROJECT


Presentation Evaluation Rubric
Name of Presenter: James Marcic
Your Name: James Marcic

Missing or lacking
Meets the minimum but could be improved
Excellent
Is there a logical flow and sequence of content? How could it be improved?


Yes. I presented information very well.
Does the presenter anticipate questions and answer them in the right place? At what points did you have questions that were not answered?

Could of answered the question better. Did go along with the presentation well though.

Did the presenter grab your attention in the first 30-60 seconds?


Yes, good opening line.
Did the presenter ask questions and spark your curiosity?


. Yes. Interesting subject. I enjoyed the presentation.
Did the presenter set the context with a concise explanation? Is it clear what the presenter is trying to share?

Yes. Helping the economy is emportant. Should of elaborated more though.

Did the presenter validate any claims?


Yes. Good sources and information.
Did the presenter avoid inconsistencies and errors, typos and unbelievable claims?


Yes, all were believable and consistent with presentation.
How well did the presenter avoid clutter?


None. Great job with white spaces.
What did the presenter do to ensure readability?


Yes, very few words, and more talking.
Did the presenter say it, and then show it or did he/she read the slides?


Said the information and then showed it. Well informed…


 The Project
My presentation was to pitch an entrepreneurial idea to a venture capital company. This project has helped me to learn how to set up a PowerPoint presentation. This alone was not an easy task. I was unaware of the extent of how in-depth you can customize a PowerPoint presentation. There is timing involved, page entrances and animation. All of these play key roles in developing a fantastic presentation.  I learned how to use web sites such as Authorstream or Jing to transfer PowerPoint presentation into video format. These application websites transferred the PowerPoint into MP4 format, which could be transferred to a Web 2.0 site. I used Youtube to stream my media to the public. Youtube is a great tool for publishing and downloading amateur videos to the web. Youtube has comment boards for people to critique your video to help you become more video proficient. I am a young entrepreneur, and I made a presentation on my small company. This turned out to be a great tool for my company. I am able to get free public advertisement through Youtube, and also I can post link on our website and facebook accounts to hopefully obtain more business. This project also taught me when presenting an idea to an executive board you need to be very clean and clear in your presentation.
Self Critique
My presentation was an idea, an idea that will hopefully turn into an entrepreneurial dream. My presentation was an entrepreneurial pitch to a venture capital company. I pitch a small chicken coop company. The context flow of my presentation was very direct. I answered many question and all before they were asked. I allowed time between the slides to help the listener to compute the information given to him or her. The content was filled with statistics, images, graphs, and information. 
The presentation was well put together. The narrator keep ahead of the PowerPoint slides; he  knew about the topic. This is a key aspect of presentation success. If the presenter is uneducated about his or her topic the presentation will instantly lose any chance of success. This presentation was very thorough in describing the different coops. The Presentation has a whole slide dedicated to the statistics of the chicken industry. This I thought really helped to push the idea of hopefully sparking interest in the investor. All his claims and statistics were very accurate and he used very reliable sources. The graph helped the investor to envision the possible capital.
The presentation topic was rather interesting to learn about. I could have grabbed the reader’s attention more in the first minute. I tried to start with an unusual approach, by starting off with loud and enthusiastic remarks. This would get a reader’s attention but not enough to keep them entertained by the issues present. The readability of the presentation was very helpful, but I feel like I used too many word. I had too many list. I felt this might have been a distraction for the investor. They would be focusing more on the the presentation said, then the presenter.
Critiquing is a very useful tool for people to view the presentation and give feedback. I learned a lot from other classmate's presentation. What I should include, what should be described more, what not to do. I believe I am more satisfied by my presentation after critiquing other classmate’s projects.

Thursday, February 24, 2011

Creating my Avatar

This is my AVATAR. His name is James.Meez 3D avatar avatars games

As you can see I have created myself an Avatar. I have experience creating avatars, I have one on my Yahoo email account. I was not sure if we were aloud to use websites other than ones listed on the CreatinganAvatar document. Anyways, I went to http://www.meez.com/ and created myself an avatar. It did not take me long, I created a profile and began to adjust the avatar. I shopped for clothes, shoes, accesories, got his hair done. Come to find out almost everything actually cost real money. I had to drop all my custom outifts and start fresh. I went to the free section and picked some clothes out. It took me alot longer than expected. But eventually, boom I finished. And there you have it. My avatar.