Here's a little song I wrote you might want to sing it note for note don't worry, be happy in every life we have some trouble when you worry you make it double don't worry, be happy don't worry be happy now don't worry be happy don't worry be happy don't worry be happy don't worry be happy ain't got no place to lay your head somebody came and took your bed don't worry, be happy the landlord say your rent is late he may have to litigate don't worry be happy look at me I'm happy don't worry, be happy I give you my phone number when your worried, call me I make you happy don't worry, be happy ain't got no cash, ain't got no style ain't got no gal to make you smile but don't worry, be happy cos when you worry, your face will frown and that will bring everybody down so don't worry, be happy don't worry, be happy now don't worry, be happy don't worry, be happy don't worry, be happy don't worry, be happy now there this song I wrote I hope you you learned it note for note like good little children don't worry be happy listen to what I say in your life expect some trouble when you worry you make it double don't worry be happy be happy now don't worry, be happy don't worry, be happy don't worry, be happy don't worry, be happy don't worry don't worry be happy don't worry, don't worry, don't do it be happy,put a smile on your face, don't bring everybody down like this don't worry, it will soon pass whatever it is don't worry, be happy I'm not worried
Monday, 29 March 2010
Monday, 22 March 2010
What is ICT?
Information and Communications Technology - or technologies (ICT) is an umbrella term that includes all technologies for the manipulation and communication of information. The term is sometimes used in preference to Information Technology (IT), particularly in two communities: education and government. In the common usage it is often assumed that ICT is synonymous with IT; ICT in fact encompasses any medium to record information (magnetic disk/tape, optical disks (CD/DVD), flash memory etc. and arguably also paper records); technology for broadcasting information - radio, television; and technology for communicating through voice and sound or images - microphone, camera, loudspeaker, telephone to cellular phones. It includes the wide variety of computing hardware (PCs, servers, mainframes, networked storage), the rapidly developing personal hardware market comprising mobile phones, personal devices, MP3 players, and much more; the full gamut of application software from the smallest home-developed spreadsheet to the largest enterprise packages and online software services; and the hardware and software needed to operate networks for transmission of information, again ranging from a home network to the largest global private networks operated by major commercial enterprises and, of course, the Internet. Thus, "ICT" makes more explicit that technologies such as broadcasting and wireless mobile telecommunications are included.
Posted by Chee Yin at 19:18 0 comments
hacking
Hacking (English verb to hack, singular noun a hack) refers to the re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer. The term(s) have several related meanings in the technology and computer science fields, wherein a "hack" may refer to a clever or quick fix to a computer program problem, or to what may be perceived to be a clumsy or inelegant (but usually relatively quick) solution to a problem (see also "kludge").
The terms "hack" and "hacking" are also used to refer to a modification of a program or device to give the user access to features that were otherwise unavailable, such as DIY circuit bending. It is from this usage that the term "hacking" is often incorrectly used to refer to more nefarious criminal uses such as identity theft, credit card fraud or other actions categorized as computer crime; there being a distinction between security breaking and hacking, a better term for security breaking would be "cracking".[
Posted by Chee Yin at 19:14 0 comments
trojan house
Trojan horse attacks pose one of the most serious threats to computer security. If you were referred here, you may have not only been attacked but may also be attacking others unknowingly. This page will teach you how to avoid falling prey to them, and how to repair the damage if you already did. According to legend, the Greeks won the Trojan war by hiding in a huge, hollow wooden horse to sneak into the fortified city of Troy. In today's computer world, a Trojan horse is defined as a "malicious, security-breaking program that is disguised as something benign". For example, you download what appears to be a movie or music file, but when you click on it, you unleash a dangerous program that erases your disk, sends your credit card numbers and passwords to a stranger, or lets that stranger hijack your computer to commit illegal denial of service attacks like those that have virtually crippled the DALnet IRC network for months on end.
The following general information applies to all operating systems, but by far most of the damage is done to/with Windows users due to its vast popularity and many weaknesses.
(Note: Many people use terms like Trojan horse, virus, worm, hacking and cracking all interchangeably, but they really don't mean the same thing. If you're curious, here's a quick primer defining and distinguishing them. Let's just say that once you are "infected", trojans are just as dangerous as viruses and can spread to hurt others just as easily!)
Posted by Chee Yin at 19:13 0 comments