2015年4月30日星期四

Murder Mountain assignment6

I found the answer by looking at the witness 1 statement, it tells me that she saw either red hair or brown hair, so I searched red hair first or brown hair. Then it tells me that her shoes were size 6 and the person that she is describing, the shoes were bigger than size six, so I searched any size above size 6.
I found the seven answers by then.
And from witness 2, I know that if the car came from New York, the home town search has to be NY, so I filtered NY. Meanwhile, the witness 2 statement told me that the killer's first name begins with an E so I answered in the box *E and the last name’s first letter begins with a S, so I wrote *S. It says that the climb time was the same as the person who was giving the statement. She said that she had been climbing for 7 hours. So therefore the climb time was 7 hours.
I wrote down the four suspects that I got, they were
1) General Willis
2) Jack Spratt
3) Edith Summerson
4) Eleanora Springston
But finally—



I found the killer was Edith Summerson.


2015年4月26日星期日

Mountain Murder - Database

·        i  wrote an explanation for my findings of assignment 3 :1.       I knew it was rick reaper because i used filter by form and i typed in sea* under home town and i typed in *2448 under local phone and clicked filter.
2.      
when I typed in home town sea* and local phone *2448 it came up with rick reaper and home town Seattle, WA and local phone number 984-2448.

2015年4月20日星期一

Hacking-Terms&Techniques

KEYLOGGERS

•What is it?

A Key logger is “a non-destructive surveillance program” that involves the hacker tracking and recording every key that is pressed on a technological device, as well as the exact touchscreen points made by the user of the device. It can also be considered either a “spyware or a software”. The recording that is “collected can then be saved as a file and/or sent to another device”, making it possible for another individual to see every keystroke and touchscreen point that was made by the user. This results in the possibility for a black hat hacker to recreate the user’s login IDs and passwords and put personal information at risk. However, can also be used as a surveillance tool by employers to ensure that their workers are on task.

•How do they do it?

The log file that is created by the Key logger hackers are most commonly buried onto a particular device, network or system using a “Trojan that is delivered by a phishing email” or a text message to a specific or random user. 

 

ADWARE

•What is it?

Adware is a software that is designed to constantly and “automatically generates advertisements” to display on your technological system. Adware is sometimes malicious and will involve frustrating and constant “pop up ads that will often slow down or sometimes even shut down your system and its resources.”” 

•How do they do it?

Adware can be “included within some purchases or downloads” of particular programs, as a genuine and legal method of creating advertising profits for a business or organisation. In addition, “going on an infected website” can led to gaining an illegal installation of Adware.  Your device can also be infected from a certain browser’s vulnerability and also Trojans that are designed for stealthy installation of adware.  

 

VIRUSES

•What is it?

Computer viruses are simple programs or codes that are design by malicious programmers in order to harm and cause problems for the device and the owner of the device. The damage that viruses cause can vary from being just a minor inconvenience and frustrating or being disastrous with erasing data, corrupting files, taking down your whole computer system.  

•How do they do it?

The infection of viruses are most commonly gained from opening  false email attachments. However they can also be gained from the download or purchase of illegal software and infected files. Viruses spread by multiplying itself repeatedly and attaching itself to other files within the device, therefore infect other devices.

 

WORMS

•What is it?

Worms are self replicating malware systems which are able to view files on the system and also cause lag. However, it does not report back to the hacker. A worm is quite similar to a virus as it's a destructive self-contained program that can replicate. However, a worm does not need to be a part of another program and it can copy and transfer itself to other systems. A worm can become dangerous if not isolated and removed. .But it usually doesn't do more than damage or ruin the computers. A worm can replicate out of control can consume system resources, until a system becomes unstable and unusable. 

•How do they do it?

The infection of worms are most commonly gained from opening  false email attachments or accepting internet ads. 

 

TROJANS

•What is it?

A Trojan, or Trojan Horse, is a malicious program disguised as a valid program. This makes it very difficult to distinguish it from real programs that are actually supposed to be there. A Trojan can destroy files, alter info, steal passwords or information etc. On the other hand it may stay dormant until a hacker accesses it and take control of the system. A Trojan is a lot like a virus, but without the ability to replicate.

•How do they do it?

Trojan is similar to adware and spyware, it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability.

 

SPYWARE

•What is it?

Spyware is a malware software designed to gather information about a user’s computer, without them knowing about it. It can just track a user’s Internet habits for advertising purposes or it can scan computer files, keystrokes, create pop-up ads, direct you to websites etc. Most commonly it is used to generate a pop-up ad informing you that your system is infected and force you to a page that has the solution. 

•How do they do it?

Spyware is similar to Trojan and adware where it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability and Trojans.

 

ROGUE SECURITY SOFTWARE

•What is it?

This comes under malware. It is a form of internet fraud that can be based on false positives. It is when a hacker deceives the computer user that there is something good happening, where it is actually the opposite of something harming your computer or doing nothing at all. A common example of this is when a software you are paying for to protect your computer but it just ends up doing nothing which is a scam. 

•How do they do it?

They mislead a computer user into paying money for false systems that are said to will remove a malware that your computer has. Therefore it is included in the purchase of false software. 

 





 



Introduction to Databases




Introduction to Databases (watch the introduction part of the video)


1.    What is the difference between raw data and information?
·         Row data need to be structured in meaningful ways to becom useful information.
2.    Provide a definition of what a database is?
·         A database is a collection of data.
3.    Give examples of what a database can do?
·         Sorted searched analysed Make data into useful information.
4.    Information is very valuable to organisations, what might an organisation use a database for?
·         To store students’ contact details .
5.    Give examples of how Brentwood uses databases to store your information.
·         To track information about the students’ address and phone numbers .
6.    What does DBMS stand for?
·         Databases management system.
7.    Give three examples of names for DBMS software
·         ORACLE DB2 MICROSOFT ACCESS
8.    What type of websites have databases at their back end?
·         E-commerce social-website you-tube

9.    Databases can store not only text but also other media files such as….
·         Photo, music and radio
10. How might an individual use a database –

·         To manage a CD library , cooking recipe , or tax information .

2015年4月16日星期四

Hacking

what did you learn?
I learnt about what's hacking , the different sort of hacking , some definitions of hacking terms like virus , computer worms and Trojan horses . I

what did you find interesting ?
I think the research on hackers is interesting , I get to know the stories of the hackers .

did you learn anything from other presentations ?
Yes . I learnt other new hacking words and other hackers .

after finishing the hacking activities , did you find it hard ? was it harder than you  thought it would be ?
I think it't a little hard for me to understand what's required to do form the questions , and that's the first time i see Harvard Style Citation . But it's easier than i thought .

hacking and hacker

During the holiday , I did a PPT about hacking and hacker . I learn the definitions of hacking and some terms from that , and I know the good and bad outcomes ,and I also did a hacker .