• Category Archives internet
  • Responsibility over violence in video games

        Who is responsible for the violence in today’s video game and protecting our children from mental harm? Is it the video game makers or is it the governments responsibility, or should we just let the parents do their job in raising their kids and determine what is right or wrong? In the following paper I will try to put to you what I thing is right and wrong and who is responsible party in protecting the minds of young children.

     

    Continue reading  Post ID 116

    Share

  • Protect your Data in the Event of a Disaster

                Is your company’s data safe from disaster ether man made or by nature?  It is not a question of if disaster will strike, but when will it strike.  Most businesses cannot afford nowadays to go without their data with their heavy reliance on customer databases and financial transaction systems.  So how can a company’s data, information and knowledge be protected in the event of a disaster? 

      Continue reading  Post ID 116

    Share

  • The Best Netowrk Security Practices

                Everyone has their opinion as to what are the best security practices.  At work, we have at least 20 booklets on network security specifying in detail how to secure our network from attack.  I am not going to lie the books are very good and the information in them is sound for our network implementation, but what we consider our best security practices may not work for someone else.  Here are some of my best practices. Continue reading  Post ID 116

    Share

  • Trusted Third Party in Enhancing Electronic Commerce

                What is a trusted third party and how does it enhance electronic commerce?  In cryptography, a trusted third party (TTP) is an entity that facilitates interactions between two parties who both trust the third party (Wikipedia, 2013).  This is similar to a notary public who acts as a trusted third party when it comes to duplicating legal documents.  Both Verisign and TRUSTe act as trusted third parties by building trust relationships between customers and venders like Amazon and Newegg.  So how do Verisign and TRUSTe build the trust environment? Continue reading  Post ID 116

    Share

  • Web Security Issues and Solutions

                The primary face of the internet is the World Wide Web (WWW), which since its invention has been transforming the world around us.  Websites deliver us all sorts of information from healthcare advice, to websites dedicated to cat photos.  We even trust websites to our most personal communications and our financial lives.  However, everything is not all rainbows and unicorns on the internet’s World Wide Web.  There is a darker side to the internet, people who trade in your personal information and steal your identity for profit and fun.  Large criminal hacker organizations exist on the internet today, pillaging the World Wide Web like modern day pirates.  Sadly though, many websites today do not take the most basic precautions to protect themselves properly form the darker side of the internet. Continue reading  Post ID 116

    Share

  • My opinions on the Healthcare.gov rollout

    My first experience with healthcare.gov
    My first experience with healthcare.gov

                So, by now I think everyone in the USA and the rest of the world has heard about the epic failure of a website healthcare.gov was at launch.  To be fair I do admit that I understand the complexity of it as it has to tie into several government databases, all of which use different software and formatting.  From what I heard, they had to have the website reach into more than 100 of these government databases all over the United States.  Furthermore, in true government fashion none of these databases are located in the same data center. Continue reading  Post ID 116

    Share