Thursday, January 24, 2008

United we stand, digitally divided we fall

The digital divide, to some it means nothing, the most likely of these candidates being Jack Thompson. To others, it represents the growing hole between those who have a computer and Internet access and those who don’t. In a world that is continuously growing more reliant on the Internet and its abilities to transmit data from thousands of miles away in the blink of an eye, it is quickly becoming necessity for modern humans to have access to the Internet. And yet even with the costs of the materials that are needed to obtain Internet are going down, Surveys and Censuses dictate that the number of people who have Internet access is actually going down. This is especially worrisome for School students, who often require large amounts of time on the Internet in order to complete their work, more then a standard school class can provide. Without Internet, a student is unable to work on assignments in a timely matter. For example, if a student had to do research about World War II, he or she would have to look up the information in massive elaborate textbooks. With so much information to sift through it could take hours for them to even get started, assuming that they even do when faced with the daunting task of looking through a textbook. The beauty of utilizing the Internet is that it provides quick and short summerizations of historical events and other matters of concern. One can often get all the information needed within an hour, or at least when it comes to a standard students work. There’s also the lack of quick and easy communication between students or teachers. When a student is able to email work or information between themselves, it allows them to more easily collaborate their work, therefore increasing efficiency and productivity. Without this boon, a student who is doing something like a group project is unable to readily discuss their ideas or work to their partners, which can lead to confusion and a disjointed effort. This is especially troublesome for those who don’t live near each other, which can make it even more difficult since they may only be able to see each other at school.

Monday, January 14, 2008

Searching for love in all the wrong places (And with google, no less)

There are literally dozens, nay, hundreds, of different search engines out there. There are many well-known first-party search engines, such as Google and Yahoo, and tons of lesser-known ones like Ask, dog pile and hot bot. Then there are the search engines that are hosted on a website, however most these are "powered" by the afore-mentioned first-party search engines. For this report, I will be covering Google, Yahoo, and the Dog Pile search engines.
The Google engine is clean and reliable, theres very little in the way of flash and pizzazz except at the home page in which the Google logo sometimes has a little bit of a makeover. This is the search engine that one wants when they don’t have time to mess around. When a search is made, it shows the site’s domain name in large, bold blue print with a small description of the page’s contents underneath. If there are other links or other main pages it will either list them in small blue hyperlinks or in a indented space that houses the original link. Advertising is kept to a minimum usually and the site looks that much better for it. Most of the advertisements (Known as "Sponsored results") are on the right side of the page and don’t usually get in the way of looking for an actual search result.
Next is Yahoo. Its main page, while it certainly has much more on it then Google’s minimalist approach, is still somewhat dreary with little colour other then the few pages that are underneath the search bar. The main page is choked with sponsored links and news, with alot of said "news" just being Tabloid-esque. A basic search turns up not only the search results, but also a bus-load of adverts, located at the top, right-hand side, and the bottom of the page.
Lastly, theres Dog Pile, which is instead of a stand-alone search engine, is actually a collection of multiple search engines, including Windows Live search, Google, Yahoo! Search, and Ask. The Main page is cheerful and bright while still not getting over-elaborate and usually features a group of dogs together. The search is similar to Googles, It collects searches from all of the selected engines (They can be shut off separately if need be) and profiles them on the page. When it finds a link that is shared among multiple engines it lists their names under the hyperlink and site description. On the right side is a small list of related searches that can be selected for a quick reappraisal of the current search.
Personally I find Google to be the best search engine, it gets the job done fast and it does it right, which is what counts. It lacks the multitude of adverts that Yahoo throws at you and is easier to navigate then dog pile.

Thursday, January 10, 2008

LEOs,MEOs, and GEOs, oh my!

While there are a large number of different satellite orbits, the most commonly used ones for man-made satellites are the LEO, MEO and GEO.
The LEO is a satellite that orbits around the earth in relatively close proximity to the earth. The definition of a LEO states that any area between 160 KM and 200 KM above sea level is a LEO orbit, for example, the international space station operates at an area that changes from 319.6 KM to 346.9 KM above sea level. A LEO satellite moves at roughly 27,400 KM/hr, or 8 KM/s, which is ridiculously fast. In fact, it’s so fast that the LEO may become impassable due to a cause-and-effect known as the "Kessler Syndrome", which states that space-born objects that are orbiting the earth will slowly build up.
Eventually there will be such a build-up of space debris that it will become nigh impossible to pass it without your ship becoming Swiss cheese. Due to the fact that’s there almost nothing to slow down an object in space, (It’s been theorized that theres a few hydrogen and helium atoms per square inch in space) the Earth’s gravity will keep the material in orbit for a few thousand years. Until it naturally slows down by coming in contact with the thin atmosphere up at 300 KM and goes into a "graveyard orbit", the debris will remain up in space. It’s been theorized that it will take a few thousand years for any debris to slow down that much.
A LEO is generally used for communications that require near-instantaneous communication, such as Internet games. Since they’re too close to the earth to broadcast over large areas, there has to be networks of them set up, therefore allowing them to bounce a signal from one satellite to the next until it reaches its destination.
A MEO is an orbit that is located above a LEO (2000 KM) and below a GEO (35786 KM), and are used for GPS tracking and other navigational instruments. An orbital period of one will usually last about 2-12 hours. One of the most well known MEO’s would be Telstar, which was a forerunner in MEO experimental satellites.
Finally, theres the GEOs, which operate at 42,164 km and stay in synch with the Earths rotation almost perfectly. (Each revolution takes about 23.9421 hours) GEOs are normally used for communication purposes, however, since they’re so far away from the Earth, the power requirements go up. Not only that, but there is a noticeable delay in communications, as much as half a second of lag can occur when a GEO satellite is used for real-time communications.

Friday, December 14, 2007

Lab log #5

Part A:

Ethernet adapter Local Area Connection:Connection-specific DNS Suffix: bc.hsia.telus.net

IP Address: 192.160.0.130

Subnet Mask: 255.255.255.0

Default Gateway: 192.160.0.1

Connection-specific DNS suffix: ???

IP Address: All computers that are connected to the Internet have an easily identifiable numerical address, known as the IP Address; these allow computers to find each other, not unlike street addresses, as a matter of fact.

Subnet Mask: A “mask” that hides parts of an IP address that are used by all the computers hooked up the network. In essence, it determines where the IP address ends and the node number of an IP address begins.

Default Gateway: A gateway that is utilized in the case that there isn’t a gateway that’s specified for a given use.

Part B:

Interface: 192.168.0.103 --- 0x2

Internet Address: 192.168.0.1

Physical Address: -15-e9-76-7f-14

Type: Dynamic

Internet Address: A number that’s assigned in order to identify a network host on the Internet, it’s made up of three different parts, optional subnet number, the network number, and the host number.

Physical address: The “real” address given to a network card, it has to be put onto an address bus in order to access the physical memory bank or device.

Type: A descriptor of the operations and data that are able to be executed on/by the data.

Dynamic: (Specific dynamic unknown, so I’ll use the one at the top of my search) One of the sub-groups of RAM, DRAM need to be constantly “refreshed” in order to hold its data.

Bibliography – Google Define searches (Various sources)http://www.wikipedia.com/

Thursday, December 13, 2007

WLAN and you (And everyone else in range of the signal)

WLANs (Wireless Local Area Network) are an easy way for Internet users to connect to the Internet without the need of physically connecting their computer into a network. While certainly a useful feature, especially in areas that have many Internet users who need to go do their business while staying connected to the Internet, there are a number of offsets that can make this technology troublesome. Not only is it taxing on an Internet server, (Wireless Internet takes up more bandwidth for less uploading and downloading speed) but also dangerous. Most WLANs are easy for a experienced hacker to hijack, allowing them to download illegal programs etc., copy credit card information that’s sent across the wireless, and send viruses to other users, all while remaining just another anonymous user on the wireless. It’s nearly impossible to track a hacker who’s using someone else’s wireless Internet, and many innocent people have been prosecuted for the illegal acquirement of programs when in reality it was a hacker who was “piggybacking” the wireless signal. However, there are a number of ways to protect your wireless Internet (Or from going on a dangerous wireless Internet). Here are four different problems, each with they’re own solution, or at least a way of minimizing the damage.

1) Illegitimate wireless access points- An extremely effective form of scamming, a skilled black hat (A hacker who does hacking for the sake of causing damage. There are also other categories of hackers known as white hats are known as hackers for the benefit of others, such as drivers that boost a computer’s power, and grey hats, who just generally mess around with program codes.) hijacks a computer network and then, using special software, routes it through his (Or her) computer. This creates a wireless Internet access point that originates from his computer. Usually set up in an area where there is normally pay-for-wireless-internet, the hacker creates his own payment form for any hapless Internet users who connect to his server. In order to access the Internet, the user enters their credit card information onto the form so that they can be billed, meanwhile obliviously sending it to the hacker as well. In a matter of minutes a black hat can spend thousands of dollars using the pirated credit card information. The only true way to avoid this is by never entering your credit card information on an unknown network. If you MUST get on the Internet, make sure to ask an employee who would know about their wireless Internet network and what the specifics of it are, so as to avoid any confusion in which are the legitimate Internet providers.

2) The spread spectrum – Many 802.11 wireless LAN protocol standards utilize the spread spectrum. This special modulation technique was created back in World War 2 in order to prevent the jamming of radio signals. Later (Much later technology wise) LANs began to appear, roughly around and in the 1990’s. Back then the Internet companies declared that the spread spectrum was top-of-the-line security for early adopters of wireless networks. The spread spectrum operates by “spreading” connection codes in a discreet way, technically making it impossible for an illegitimate user to access the wireless Internet if they didn’t know the access codes. The flaw with this supposedly flawless system was that 802.11 standards force the code to be displayed publicly so that different companies would be able to communicate with each other. Because of this a any hacker with a 802.11-compliant radio NIC to be able to connect to the Internet, and because of this the spread spectrum is rendered nearly useless. While it is possible to disable the public code distribution, it isn’t particularly effective since every time you wanted the Internet to allow a new user to work on it, you have to give them the codes. This is not only a hassle, but also means one more mouth for the spectrum codes to be spread by.

3) WEP (Wireless Encryption Protection) – This old security fix encrypts each file that is sent through the wi-fi. This allows the user to send private e-mails, passwords, usernames, credit card numbers etc. without worrying about it getting into the wrong hands. Unfortunately, people place too much trust in it. A flawed system, it’s only able to make a code up to 40 characters, and due to government policies is not allowed to use special code characters. A half-decent hacker can find out the WEP code in a matter of minutes with the right software (For example, AirSnort). There are a number of ways to increase its reliability, such as randomizing the code (Hackers usually use “dictionary” searches, randomly testing codes from words from the dictionary to see if they unlock the system) and using certain types of software that will occasionally change the WEP code. However, the best way to solve the problem is to simply upgrade to WEP2/WAP2. So far its code has proven to be nigh-unbreakable.

4) SSIDs (Service Set Identifier) – The only security setting necessary for a LAN to be set up, it works by making it a requirement for the computer that’s trying to access the Internet to have the same SSID password as the LAN network. The problem with this is that most access points literally hand out their SSID code every broadcast (Not even second apart). Older computer hackers would have had to use a program such as AiroPeek to get the code, but now Windows XP has an automatic “sniffer” and can usually get the job done by itself. While the broadcaster can manually shut off the SSID from broadcasting its code, it can still be gleaned by a hacker if they use a technique known as “framing”. By tracking the frames sent to a receiver, they can copy the code from the receiver. Not only that, but most users of SSID don’t even bother to change the code from its manufacturer’s standard. A few hours of “war driving” (Driving around and actively hacking into Wi-fi enabled areas, then marking them down for later use and abuse) and you’ll have sets of the same SSID code. There isn’t much one can do to increase the security of SSID codes other then shutting off it’s broadcast. The best way to avoid such a problem is to use any of the other security features.



Bibliography –
http://en.wikipedia.org/wiki/WLAN
http://compnetworking.about.com/cs/wirelessproducts/g/bldef_wlan.htm
http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html
http://www.wi-fiplanet.com/tutorials/article.php/1457211

Monday, November 26, 2007

Electromagnetic Interference

What is EMI? : Electromagnetic interference is a common problem for those who use wireless signals, such as wi-fi Internet and/or radio signals. Also known as RFI (Radio frequency Interference), it’s usually caused by an external device that is releasing electromagnetic radiation. There are a variety of devices that can cause EMI, among them include:
Cell phones: The device for the working man on the go, it allows the user to receive a phone call while they are in range of a cellular network. The mild radiation it releases will sometimes cause some static and signal problems, the radiation has also been linked to causing a noticeable drop in a humans ability to suppress his or hers allergies, as well as causing what was previously known as "Tennis Elbow". (Due to the elbow holding the hand in an upright position for prolonged periods of time) It can be reduced in a workplace by having a no cell phone policy, any other way would require either electronic jamming, (which is illegal) or by using special signal-trapping paint (Which is not illegal). However, these both obviously also stop you from using your wireless device, so it’s really a double-edged sword.
Microwaves: One of the more notorious ones. While certainly annoying, it lacks the power to fully cripple a wireless signal. However, due to it’s common use many know of its annoying tendency to create static, especially among wireless home phone users. Keeping a wireless phone receiver in a different room then where the microwave is will definitely help, as a microwaves emissions aren’t nearly powerful to penetrate a wall.
EMPs (Electromagnetic Pulses): A very rare form of EMI, these are usually created when a nuclear bomb is set off. They are also created by what are known as "Pinches", a device that was made to re-create the effects (Usually for studying purposes) of an EMP released with the denotation of a nuke, while avoiding all of the messy destruction and environmental activists complaints. There isn’t much one can do about this, other then make sure they don’t live near a government testing facility, as it is more then powerful enough to thwart most standard EMI protection. In more sensitive electronics, it can even completely fry/destroy the internal parts of the device.
Magnetrons: An extremely powerful magnet, they can completely shut down a small area of sensitive electronic devices. However, they require a current to be running through them in order to create the interference. The more power, the larger and more potent of the electromagnets interference. Depending on the quality of the material, it will be able to create a larger area of interference with less power. They’re usually made of Ferro-magnetic elements such as Iron. By cutting off a magnetrons power supply, you eliminate it’s potential to cause EMI.
Generally, Electromagnetic Interference can be minimized (Or possibly eliminated) by a number of different methods. The most obvious one being just simply not using a EMI causing device near a susceptible wireless signal device. There are also materials and devices that help to reduce EMI emissions, or protect your device from EMI.

Friday, October 26, 2007

Assignment 1: Module B- Operating system reveiw

There are many different kinds of operating systems floating around out there, but theres one that stands out, it creates the most controversy, it has more ups and downs then a rollar coaster, and has one sexy interface. It’s goes by the name of Windows Vista, and it’s here to show us just what 5 years of "innovative" (Cough) research and programming can offer. Created by Microsoft, it was originally known by it’s code name "Longhorn". The upgrade was made for a number of reasons, and came with literally hundreds of reworked, updated and new features. Among the updated programs was an improved search engine (Named "Instant-Search" for it’s ability to search while typing), better peer-to-peer file sharing, (Mostly in the context of cameras, Xbox 360’s etc) and signifigantly increased internet security (Which was one of the largest flaws in Windows XP). New features include the completely redesigned graphic interface, dubbed "Aero" (Authentic, energetic, reflective, open), and Windows DVD Maker. Windows Vista allows the user to run Windows Vista only games and programs, increase the old 16GB of RAM maximum for Windows XP to a blistering fast 64GB RAM (Not that anyone could afford that much RAM, or need it, for that matter. Also, a number of hacks and custom retrofitting allowed a Windows XP to run up to 64GB of RAM), and with the upgraded OS graphics, the user is also able to pan out all of his or her current open windows, allowing them to see a small part of each page. Not particularly useful, but it does look nice. However, all of this eyecandy comes at a high price, the Windows Vista Ultimate’s Aero interface is incredibly taxing on a computers processes, and requires a minimum of 1GB of RAM to run, among other requirements. Not only that, but, excluding the ability to run Vista-only applications, any Windows XP user can download (For free) an Aero-esque look for their computer, including the semi-transparent page and the sidebar (Which holds a number of features, such as current weather and sport scores ect). It has also been criticized for it’s attempt at blocking the copying (AKA bootlegging) of digital media and it’s lack of drivers that are compatible with old peripherals. Not only that, but Apples new program "Parallel Interface" allows any Mac to run a Windows OS while simultaneously running the Mac’s OS too, this will soon be followed by a Windows-compatible version of Parallel Interface, allowing a Mac OS to be run on a normally Windows OS computer. However, there is a silver lining in this for Microsoft, Steve Jobs obsession for keeping everything about Apple exclusive to Mac’s means that the Mac OS that works with Parallel Interface will be purposfully crippled in order to keep Mac users from completely switching to standar Microsoft computers. While this OS is certainly a step up from previous versions (Windows ME coming to mind), it doesn’t really seem like a large enough jump for five years of programming, and the features that make it "unique" are available free off the internet, or, alternatively, will set you back $400 for Windows Vista Ultimate, the cheapest version of the Vista OS that is equipped with Aero. For the billions of dollars they probably invested in this, it just really doesn’t match up to Mac’s OSX Tiger, which is cheaper, more reliable, and had many of the "new" features that Vista now has years ago. By the time the new Mac OS comes out, (OSX Leapord) will probably have a decent following, however, I can honestly say the Leapord will probably trump Vista in most, if not all, areas.