Sunday, April 17, 2011

Tutorial Blog 4: Computer Security and Privacy

Many of us use the internet and store files in our computers on a daily basis. With such a high Internet use, it is inevitable to be exposed to dangerous websites, files, and software. However, we can all protect our computer files from being damaged or stolen by being informed about possible risks that lurk throughout the Internet. By becoming aware of some Internet dangers, you can take all the right steps to assure your computer is safe from malicious users. This blog will discuss some of the most common types of Internet attacks--such as viruses, worms, Trojan horses, and rootkits. It will also give you tips on how to protect your computer.

I'm sure you've heard of the term Malware. But what exactly is it?
Malware is a short name for "Malicious Software" which is a group of programs that purposely modify how computers operate without the user's knowledge. Malware can take over your Internet browser, deviate your search attempts, spit out many pop-up ads, and even keep track of what websites you visit. Sounds annoying and frustrating doesn't it? You're not alone, malware affects an immense number of users every year. Let me introduce you to a few types of malware:

Viruses
Computer viruses are one of the most infamous types of malware. It is a malicious program that infects a computer system without the user's consent. Once it is in the system, it will replicate itself, infect different system files, and then try to spread onto other systems. Many people get such viruses from E-mails and flash drives--which are commonly used mediums. Viruses will eventually slow down your system significantly and may require you to erase all the files on the computer.

Worms
Worms are self-replicating programs (usually on memory or a network) that use up resources and damage many files at a time. A worm is very similar to a virus, however, a worm tends to attach itself to a network and therefore affects thousands of files in a very short period of time. Usually, worms will delete files, or allow its creators to access and control the computer systems--which of course, can be tragic to corporations holding sensitive files on dozens of computers on a single network.

Trojan Horses
Trojan horses are programs that hide themselves within a legitimate program or pretends to be a safe program. The name is derived from the Greek myth of a wooden horse used to invade Troy. The program pretends to be harmless to the user, and can deliver many harmful attacks such as viruses, worms, and the like. A few source examples include friendly email attachments, and useful programs on a website. Unlike viruses and worms, trojan horses cannot replicate themselves; nevertheless, they can be extremely damaging. They can give a hacker control of your computer, delete files, infect files with viruses, and many other malicious features.

Rootkits
Rootkits are programs that hide in your computer and allow hackers to control it completely from a far location. Once installed, it gives hackers administrative control like changing settings, executing programs, accessing files, etc. Rootkits are very complex and sophisticated, thereby making it difficult to locate the hacker. Many times, hackers use rootkits to control a computer and launch other Internet attacks from that computer so its harder to find the malicious hacker.

If you believe your computer may be infected with some type of malware, please check for a few common symptoms, such as:

  • Slow Operating System
  • Corrupted files
  • Less available memory than expected
  • The Operating System does not start
  • ...and many more! 

Now I know all these different types of threats can be overwhelming and very intimidating, however, you can protect yourself from these attacks as much as possible by downloading anti-viruses and setting up a firewall. These two safeguards are essential for protecting your computer, nonetheless, you must make sure to update them as the number of malware programs sharply increase monthly.

Anti-Viruses
Anti-viruses protect computers against malware by identifying "signatures" that viruses have. It scans for programs that try to alter the boot program, the OS, or any other programs. Once identified, it will remove it and give the user a report of the virus being removed. Anti-viruses have the option of running on "real-time" or "on-access" (meaning its constantly scanning). There are many different anti-viruses on the web, some are free and some require a fee. As a matter of fact, UF students can download the popular program McAfee for FREE from the Software Licensing Services.

Here's a snapshot of the Norton Symantec Anti-Virus I have installed on my MacBook:
Image provided by Albert Lopez, 2011.

Firewalls
A firewall is a utility program that protects a computer and its files from unauthorized intrusions by constantly monitoring all transmissions between the computer and the Internet. It specifically monitors everything going in and out of your PC's network card; it will block unauthorized access while hiding your PC from view on the Internet. It is very important that users set up a firewall even if its for personal use because hackers can access important data stored in a system. Moreover, many businesses use firewalls to keep their networks safe from outside intruders, and to protect sensitive information from their own employees. Both operating systems, Windows and Macintosh, include personal firewalls in their new computers. However, some users feel that they need more complex firewalls and go ahead and purchase such firewall programs from the market. My computer came equipped with a Mac OS X Firewall, as you can see in the snapshot below:
Image provided by Albert Lopez, 2011.
As you may know by now, the Internet can be a very risky place if you do not take the right steps to protect yourself and your computer files from cyber attacks. Becoming aware of such threats, downloading anti-malware programs, and keeping an eye out for the websites you visit, will certainly help you "surf the web" with minimal risks. I really hope this tutorial blog informed you about the different types of malware and what you can do to keep your computer safe from intruders.
-----------------------------------------------

Useful References/Resources:
-http://www.software.ufl.edu/alphabetical_student.html
-http://www.opensec.org/internet-security/top-5-internet-security-threats
-http://www.microsoft.com/security/pc-security/protect-pc.aspx
-Shelly, Gary & Vemaat, Misty. Discovering Computers 2010. Boston, MA: Cengage Learning, 2010. Pp556-561.

Sunday, April 10, 2011

Secure Email Project

Before starting the project, I really thought it was going to be more difficult--especially since I had no clue how to encrypt messages. However, the instructions helped a lot and I was able to complete it without many obstacles.

Here are the screenshots of my Thunderbird Inbox and Dr. Means' replies:
Images taken by Albert Lopez.

Article Summary:
Email security should be a main concern for most businesses—especially financial institutions holding sensitive information. Wells Fargo & Company has certainly made security a priority. An article published by Security Magazine talks about how the company has deployed Voltage Security’s SecureMail. When Wells Fargo began to look for a new security system, user experience was really important because not all customers are technology savvy. One of the benefits of SecureMail is that users do not need to download anything to access it; however, it does require users to use another server to identify information (such as an email address) that will unlock the message.

SecureMail has saved Wells Fargo time and money in sending confidential documents to customers and employees. As a matter of fact, about 20,000 employees and customers were using the program in 2009—this number has only increased since then.  Furthermore, It is believed that Wells Fargo will significantly broaden its deployment to approximately 175,000 users! Overall, I believe that Wells Fargo has taken an important step that will surely attract customers concerned with confidentiality and email security. It is vital that many other businesses do the same, especially since identity theft has become a growing issue. 

Wednesday, March 30, 2011

Extra Credit: Creating an Avatar


Creating my avatar fun and a lot easier than I thought. To make it, I used the website Doppelme. However, this was the 3rd website I tried to use. I first used Meez and IMVU, but I found them to be fairly difficult to use and did not have as many avatar options as Doppelme. I really enjoyed the Doppelme website because it was relatively quick to make an avatar and the site was very user-friendly.

Doppelme offered a variety of skin tones, expressions, hair style/color, eyewear, hats, clothes, shoes, and accessories. By having such a wide variety of options, the user can explore many different combinations and choose the one that best resembles them. It was very easy for me to find the right features that best portray me, such as the black hair, brown eyes, tan skin, and clothing style. Overall, I really enjoyed creating my avatar and learned about many of these websites in the process. I will sure use the website for different avatars I will make in the future.

Friday, March 25, 2011

Tutorial 3: Types of Multimedia on the Web

With more one billion users of the Internet today, the Web has expanded a long way since the formation of it in 1969.  In addition to its size increase, the Internet has also changed in the way websites present their information.  Once limited to only text, the Internet has expanded to also include graphics, animation, audio, video and/or video reality. The use of two or more types of this media is referred to as multimedia.  Most Web pages today include the use of multimedia as often it enhances the information provided on the page.  In this blog, I will introduce the many types of multimedia including: graphics, animation, audio, video and virtual reality.

Graphics
This digital photo was taken by Albert Lopez.
Like most digital photos the graphic was saved in the file
form JPEG.
Graphical images are popular to use on websites as they display non-text information such as images, graphs, drawings and photos in a digital format.  Often accompanying text, the use of graphics is a way to provide additional messages not included in the text. If you chose to upload graphics to your Blog or Social Networking page, you would notice that you're images have some scrambled letters following the title of your image.  This is the code for the type of format the image was saved as.  The Web contains a wide array of graphics in many different formats, but most often, graphics will be in JPEG, GIF, or PNG format. Different formats allow for a graphic to vary in size and image quality but often there is a trade-off between the two.  JPEG is one of the most popular because although it compresses the image to reduce it's file size, the image quality is not compromised in the process. A JPEG format is often best used for digital photos. Other graphic formats found on the web includes; BMP and TIFF.  Specific graphics are easily searchable on the web through search engines such a Yahoo! and Google. Searches for images appear as 'thumbnails' or icons of the image, but when clicked on can be brought to it's original size.

Animation
Another way to make a Web page more appealing to the eye is through the addition of animation.  Animation is often a display of concurrent still images to create the illusion of motion.  Much like a flip-book the images move quickly to appear as if there is movement on the screen. Such movement can be used to draw attention to a region of the page such as an animated title or a ticker to show a countdown.    Animation is usually seen in Web-based games.

This animation was created by Albert Lopez using www.crazyprofile.com/text_animation/





Audio
The multimedia listed above can also be used in conjunction with audio. Web based audio includes but is not limited to music, voice-overs or any other type of sounds in digital format.  Audio files can be added to Web pages through simple download of individual files to the site.  After the media file is downloaded, a software player such as iTunes, RealPlayer or Windows Media Player is needed to play the file.  Audio files also come in different formats to adjust file size and/or sound quality and again a trade-off exists between the two. Some common audio web formats are AAC, WAV, WMA and MP3. Audio files have become very popular on Web sites and can help to create an ambiance for a website when playing in the background.  For example, if a hotel wanted to create a calm setting for it's website to reflect the peaceful feel of the hotel, it could play serene music in the background. Sites that just play audio tracks for listening entertainment have also become very popular recently such as Pandora and Grooveshark.  These websites use streaming audio or an audio file that can be played as it is being downloaded to it's distribute music in the form of online radio. Here's an example of online audio files.
Cymbals:

This audio file was created by Albert Lopez.  This is an example of a MP3 formatted file using a Public Domain audio file of cymbals playing.

Video
Another type of multimedia available is video in the form of video clips or live video.  Video uploading sites such as YouTube allow for video distribution, sharing and viewing of videos across the Internet.  Videos can be seen either through a link on a website, through a video distributing site such as YouTube or can be embedded directly on the website.  Video clips can enhance a site as it provides information in a much different way and somewhat interactively. Clips can vary from movies, TV shows, video diaries, tutorials, advertisements etc. As the internet has increased  the number of it's audience over the past few decades, more businesses have taken advantage of the Internet as an outlet for advertisements.  As more of these advertisements come in video format, video will be seen in more and more websites that originally only included text. Because these files are often very large and therefore like images and audio they need to be compressed for less download time. Here's an example of an online video.

This is a video created by Albert Lopez.  It is uploaded through blogger.com and recorded through my Macbook. 

Virtual Reality
Lastly, Virtual Reality or VR is a type of media that allows for virtual activity in a computer-simulated environment that seems like a 3-D space.  Users can use the space interactively in the VR world by moving through a display of 3-D images.  Applications of the VR world can be used for entertainment (games), education (models of molecules, organisms), or as a way to showcase any structure (as in architecture etc). The website, www.secondlife.com is a great example of a VR for entertainment.


This image was printscreened by Albert Lopez.
Second Life as shown above, is an example of a Virtual Reality.














The Web has come a long way from when text was its only type of media.  Today, websites include a multitude of media. In this blog, I have showed you five types of media; graphics, animation, audio, video and virtual reality.  I hope that you have learned a lot about the many types of media available on the Web today!


Works Cited
"Cymbals." Public domain: free downloading & streaming. Web. 25 Mar 2011. <http://www.archive.org/details/cymbals_360>.

Lopez, Albert, Dir. Video Example. Blogger: 2011, Film.

Lopez, Albert, Photographer. Beach graphic example. 2011. Digital Photo.


Shelly, Gary. Discovering Computers 2010. Boston, MA: Course Technology Cengage Learning, 2010. 92-96. Print.

"Text Animation." Myspace text animation, piczo text animation, html code. Web. 25 Mar 2011. <http://www.crazyprofile.com/text_animation/>.

"Virtual Reality Example." Second Life. Web. 26 Mar 2011. <http://secondlife.com/whatis/?lang=en-US#Meet_People>. Printscreened by Albert Lopez

Sunday, March 20, 2011

Database Project: Using MS Access


Before working on this project, I had never used Microsoft Access. I have heard so many great things about it in the past, but never actually used it. After watching the Access videos, practicing activities, and completing this project, I now see why so many businesses and people give it such great reviews!

One of the most important features I learned about Access was creating reports. I find this feature to be very helpful when presenting co-workers with data at meetings. Thanks to reports Access creates, data can easily be analyzed when grouping and sorting out data. When working on the project, I was able to quickly look at all the customers in a specific city, and see the most recently departed first. Another really important element that I learned to use was queries. Queries can be extremely helpful when you want to limit the amount of data in a table (like we did in the project). Moreover, queries allow the user to do so many different things including create, retrieve, update, and delete large amounts of records.  I found it very useful using queries to filter data through different fields. In turn, using queries are very advantageous when wanting to create a report with limited data later on.  
Overall, I learned so many other features—especially since I had never used the program—but it would take many more paragraphs to talk about them all. Most importantly, I learned how great the program is, its features, and how I would apply them in the business world and my future career.

I believe that adding payment information in the “New Members Form” can be useful when members fill out their forms. A text box can be integrated that will tell the gym owner what type of fitness plan they would like to sign up for. The form will copy this information and update it on the “members” table. Another way to enhance the functionality of the database is to add a field that shows the next payment due dates for each member. This can be useful to owners when sending reminders to their members, and can be useful when creating reports for finance meetings.

Sunday, March 6, 2011

Web 2.0 Presentation: Keep America Beautiful

Link to Web 2.0 Presentation: http://www.youtube.com/watch?v=e8XBxhUyNcs



Creating this Web 2.0 Presentation taught me a lot about very useful technology and resources that I have not used before--such as Camtasia and a few PowerPoint features. Critiquing my own presentation was both interesting and useful. I learned a lot about my presentation and myself as a presenter. In regards to my presentation, I strongly believe it had logical flow and sequence of content. I first set up environmental problems that led up to non-profit organization I wanted to focus on, which was "Keep America Beautiful". However, I do think I could have added more details on a few slides--however, I did not want to put too much information and bore my audience. In addition, I believe I anticipated questions and answered them in the right place. I provided useful information, referred to a few questions that the audience probably had, and I answered them right after that.

In my presentation, the attention grabber was the shocking fact provided by a reliable website discussing Recycling and Waste. The attention grabber was the fact that the US is the #1 trash-producing country in the world, in other words, about 5% of the world's population makes up 40% of the world's garbage. In my opinion, that is a eye-opening fact that has made me more conscientious about the amount of waste I produce. I certainly asked a few questions that probably go the audience thinking more about the topic, such as "who does this affect?", and "How can I help this organization?". I feel that such questions allow the audience to reflect on the topic's issues, and thereby be persuaded to donate to the organization. On the other hand, I do believe I could have asked more profound questions that sparked the audience's curiosity a little more. Moreover, I made sure to set the context with a concise explanation and to be clear about the presentation's purpose. Although what I was trying to share was pretty clear, I think I should have done a better job at validating some claims.

Furthermore, I stayed away from errors and inconsistencies, as well as typos within my slides. Unfortunately though, there were a couple of small speech errors in the narration; I tried to avoid them as much as possible, but I had a hard time editing parts of the audio. In regards to the slides design, I tried to keep my slides simple to avoid clutter and ensure readability. I made sure my font was large enough to read and I used good font colors that stand out such as black, orange, and blue. Apart from reading a few facts from the slides, I explained a few pictures, and provided additional information relevant to what I wanted to show. I thought this was important because I did not want to put too much information in each slide and I tried to avoid signal-to-noise ratio from bullets and pictures. After completing my project, I criticized another student's presentation to help me realize how I could improve my presentations in the future. I ended up learning a lot about my peers, their designs, narrations, as well as the different types of media they used. I also learned about very interesting organizations, and great techniques on how to persuade someone to donate.  

Overall, I found this project to be highly interesting and useful for my career in the future. I became a bit more familiar with Youtube and some of their features as I uploaded the presentation. Most importantly, I learned how to use Camtasia for macs. Before this project, I was not familiar with any programs that recorded presentations from the computer screen; I learned a significant amount about how to use Camtasia, its features—and in general, how to improve my presentations. I strongly believe that learning how to use such programs will improve the quality of the business plans I will present throughout my career. This knowledge will also be very useful in the marketing aspect of business. Marketing companies can use these powerful resources to persuade the consumer more efficiently and effectively. I will certainly use what I’ve learned from this project in the future when I start my own business. Finally, I think learning how to use such resources is essential in this very competitive business environment. Globalization and information technology are becoming significant factors in the continued progression of economic marketing schemes. Therefore, by applying these new skills and using such resources, I will definitely have a competitive advantage in my career.  

Sunday, February 20, 2011

Tutorial 2: Excel Trend-lines and Charts

Becoming proficient in Excel has become almost mandatory to enter the business arena.  Excel is an excellent tool to create and analyze spreadsheets, charts and graphs.  In a growing and fast-paced technological world, it has become fundamental to be able to utilize this program in your professional life and should be a key element in your resume. I believe it is both important and useful to learn how to create charts and graphs, so in my second tutorial I will introduce the concepts of Excel graphs and trend-lines, and show you how create a graph, in particular a Scatter Plot graph.

Trend-Lines
The linear trend line in Excel is nothing more than the regression line you've learned in school. This trend line approximates how the expected value for y changes at different values of x. Here's an example of a regression line:    y = a +bx

In a scatterplot, a residual is the vertical distance between the data point and the trend line. The smaller the distance, the better the prediction. The trend line has a smaller sum of squared residuals than any other line, that is why it is also known as the least squares line.

One of the most important skills you can have in the business world is being able to create a graph and show its trend line. I will now show you how to create a graph, and add its trend-line.
------------------------------------------------------------------------------------------------------------
To begin creating your first chart, first open a new workbook and enter your desired data.  The data used in the example will graph fictional monthly utility costs of an apartment.  The data is fake and the images will be a compilation of my own 'print-screens.' Keep in mind I used Excel 2004 for Mac, so these instructions may differ for a more recent version.

1.  Enter your desired data (Entered below are the months beginning with when I began collecting fake data and it's corresponding utility charge.)  I have entered my data in the form of 'Month 1, Month 2' etc.

Also when filling in this information be sure to add in your data correctly, if not the data presented in the graph may not be representative.  Notice in the image above I have matched each utility charge to its correct numerical month.

2.  Highlight the information you wish to include in the chart.  I have highlighted the month and then that month's utility charge.  Do this by holding down on the first-most left cell of which you wish to include, and drag this down to include all the data you wish to include.
Notice that I have not included the headers 'Month' and 'Utility charge' because I do not wish this to be in my data set.

3.  Click on Insert. A menu will drop-down, and follow it down until you find Chart.


4.  Chart Wizard will bring up a list of charts that may be suitable for your data.  Scroll down each type of chart and find one that best fits your data.  I believe a scatter plot will best represent my data so I clicked on XY (Scatter.)  To select, click on the Chart Type's title and highlight it, than click the Next button.


5.  The Next button should bring up the Chart Source Data dialog box which will tell the Excel program which data to use.  At the top of this box there should be two tabs Data Range tab and Series tab.  Click on the ladder, Series tab.  You may feel free to explore the Data Range tab but listed below will only include the Series Guidelines.


6.  Check that the data match your X and Y values.  

Excel will automatically assume which values to be on your X and Y.  To make sure this is correct look to see that the information in the X Values box correspond to that on your spreadsheet.  For example: In my data set, my X values will have the code:

The letters A in this code correspond to the information in column A.  Notice that also in the code is 2 and 13.  This will tell the program that you wish to include data points from cells 2-13.  This code altogether tells the program to include all cells from column A and from cell rows 2-13.  Make sure this 'code' corresponds you're X and Y values to the data in your spreadsheet.

7. Click Next to continue to your dialog box Chart Options.  Give your graph a Title, and be sure to label your X and Y axis's and include the units to each. Above this are tabs to customize your graphs.  Feel free to play around with these tabs but descriptions for other variations will not be provided in the scope of this guildelines.

8. Click Next once you are happy with the specifications of your graph and it will lead you to a new dialog box.  If you wish to include your graph with your spread sheet click As object in bubble.  This will include your graph in the spread sheet you created.  You can also create this graph to appear in a new sheet.  I will include it with my spread sheet.  Click Finish to complete your graph.

9. Your chart should now appear on your spreadsheet.

10. If you are discontent with the appearance of your graph you may change it by clicking on one of the points.  All of the points should now be highlighted.  A dialog box Format Data Series box should appear.  Edit the preferences of your graph here such as the Background, Foreground and Bullet Preferences.  Once you have finish this, again click OK to finish.



11.  Finally to add a trend line, right click any point on the graph.  A drop down menu will appear, scroll down to Add Trend line.

12. A dialog box will appear and a list of types of trend lines will appear. There are two tabs, Type and Options.  Under the Type tab choose which graph type you would like.  Feel free to explore the options tab as well.  For this graph I chose to include a Linear trend line.  Click OK to finish.


This tutorial was created to help you excel at Excel Charts.  I hope you have learned a lot and that these diagrams have helped you.


Source: All images were created by me. Copyright 2011 Albert Lopez.