Wednesday, November 18, 2009
Dreamweaver Lesson Eight 11 November
The class continued to talk about frames in web pages. The fial two weeks are work weeks to finish the assignments four and five.
Dreamweaver Lesson Seven, 04 November
In this class, the student worked with framed web pages, which is a single page devided up into sevral web pages on the screen. The fourth assignment is a five or more page web site on the subject of your own choosing.
Dreamweaver Lesson Six 28 October
In this class talks more about layering and CSS. The third assignment was a;sp handed out. Ypi can find the site for Assignment 3 at http://shawnt3100.tripod.com/aqssignment3/
Saturday, October 17, 2009
Dreamweaver Lesson Four 14 October
In this lesson,the class learned a bit more on tables and we went into talking a bit about forms. Forms are how a website is interactive. The second assignment was also handed out, a minimum four page website on the topic of your choice, for example I chose my business site. The assignment files are located at the Assignment 2 site
Thursday, October 8, 2009
Dreamweaver Lesson Three 07 October
In this lesson, the class learned a bit more on Cascading Style Sheets (CSS) and mving CSS rules into their own file. They also went on to discuss tables and their importance in web design
Thursday, October 1, 2009
Dreamweaver Lesson Two 30 September
In this lesson the class gets an introduction to cascading style sheets (Css) and an introduction on placing tables into documents.
Thursday, September 24, 2009
Dreamweaver Lesson One, 23 September
In this lesson, the class talked about HTML and the birth of the Internet and its protocols, like TCP, HTTP, and FTP. Also I created a folder in my G drive on my student account called Week 1 and built a page that contained named anchors ane links.
Tuesday, June 23, 2009
Internet Security Lesson Eight, 22 June
In this lesson, the class learned about backdoors, rootkits and other tools that hackers might use to get into systems. The class looked at the Windows XP Event Log Viewer.
Tuesday, June 16, 2009
Internet Security Lesson Seven 15 June
In this lesson the class read over chapters Eight and Nine. The discussion was around how hackers would have access to computer systems via network attakcks.
http://www.ethereal.com/
Tuesday, June 2, 2009
Internet Security Lesson Six 01 June
In this lesson, the class read, Chapter Seven "Phase 3:Graining Access Using Applications and Operating System Attacks". We learned about more tools on how hackers could have access to our computer systems and servers.
http://www.frsirt.com/exploiots/
http://securityfocus.com/
http://www.metaspoloit.com/download/
http://www.frsirt.com/exploiots/
http://securityfocus.com/
http://www.metaspoloit.com/download/
Tuesday, May 12, 2009
Internet Security Lesson Five 11 May
In this lesson, the class learned about different tools and software applications that hackers would use to hack into people's computer systerms if they were using Microsoft Windows operating systems.
NetStumbler
http://www.netstumbler.com/
Nmap
http://www.insecure.org/nmap/
Wellenreiter
http://www.sourceforge.net/projects/wellenreiter/index.jsp
NetStumbler
http://www.netstumbler.com/
Nmap
http://www.insecure.org/nmap/
Wellenreiter
http://www.sourceforge.net/projects/wellenreiter/index.jsp
Friday, May 8, 2009
Internet Secutiry Lesson Three 04 May
May 4, 2009
UNIX and Linux:
Grandfather of all operating systems
Command based operating system
Security is pretty tight
Due to command driven, require less power to operate
Root user/super user: God of computer operating system
Shadow directory: place passwords there are only those on computer have access to shadow
Every operating has a kernel: the heart of an operating system, the engine that runs everything
In order for an application to work it needs to access the kernel
Look at page 99.
INIT>>>INETD
>>>XINETD
You can manually process by simply running them in command box
ROT 13- Take the letter and go 13 letters down
Give groups permission, not individuals
IN networking world you need to audit…the only way you can do criminal charges for somebody who has cracked into files.
Hackers will log in and change files, and logs
Windows:
1975 when IBM was the superpower they had a competition for an operating system
Bill Gates was at Harvard and entered
Created DOS
Bill Gates would not sell his system but wanted the rights to it, and IBM said ok and then he became who he is today
In 1987 IBM and DOS separated and IBM created its own operating system
Windows 3.11, designed around networks
Windows NT was next…New Technology or by hackers NICE TRY
Windows 95 was next
Windows 98, also created was ME…ME was created to beat the millennium bug
Windows 2000- Almost a decade has passed since Windows created a new operating system. All others were updates
Aligned with better security features, still problems as the gap between work and personal systems were getting larger, commands were different, everything was different
Microsoft wanted bring all together so they created windows XP and Windows 2003
Windows 7 and Vista
Greatest feat was backwards compatibility-ability to run older operating systems on new windows…i.e. games for windows 2000 can run on XP
Software now runs the world not hardware running things
Due to wanting backwards capability, it leads to huge security problems and risks
PDC-Primary domain Controller
BDC- Backup domain Controller
Win2000-Every domain controller ran Active directory
When updating you computer you had option of going into Native or Mixed Control
If you went to Native mode you never went back…will not allow any Windows NT in its network
Mixed mode allowed you to run both 2000 and windows NT together
KNOW DIFFERENCE between native and Mixed
Hash- The more encrypted version of passwords, harder to crack
Patch, and test patches before upgrading all systems.
FAT: File allocation Table
Reconnaissance phase:
The first stage at which hackers look at
Make or break as a security person
Hackers look at companies or business and decide if it is worth it to try and hack in
1st thing in this stage is social engineering
Dumpster Dive: Gather as much info on competition, or person you want to hac
UNIX and Linux:
Grandfather of all operating systems
Command based operating system
Security is pretty tight
Due to command driven, require less power to operate
Root user/super user: God of computer operating system
Shadow directory: place passwords there are only those on computer have access to shadow
Every operating has a kernel: the heart of an operating system, the engine that runs everything
In order for an application to work it needs to access the kernel
Look at page 99.
INIT>>>INETD
>>>XINETD
You can manually process by simply running them in command box
ROT 13- Take the letter and go 13 letters down
Give groups permission, not individuals
IN networking world you need to audit…the only way you can do criminal charges for somebody who has cracked into files.
Hackers will log in and change files, and logs
Windows:
1975 when IBM was the superpower they had a competition for an operating system
Bill Gates was at Harvard and entered
Created DOS
Bill Gates would not sell his system but wanted the rights to it, and IBM said ok and then he became who he is today
In 1987 IBM and DOS separated and IBM created its own operating system
Windows 3.11, designed around networks
Windows NT was next…New Technology or by hackers NICE TRY
Windows 95 was next
Windows 98, also created was ME…ME was created to beat the millennium bug
Windows 2000- Almost a decade has passed since Windows created a new operating system. All others were updates
Aligned with better security features, still problems as the gap between work and personal systems were getting larger, commands were different, everything was different
Microsoft wanted bring all together so they created windows XP and Windows 2003
Windows 7 and Vista
Greatest feat was backwards compatibility-ability to run older operating systems on new windows…i.e. games for windows 2000 can run on XP
Software now runs the world not hardware running things
Due to wanting backwards capability, it leads to huge security problems and risks
PDC-Primary domain Controller
BDC- Backup domain Controller
Win2000-Every domain controller ran Active directory
When updating you computer you had option of going into Native or Mixed Control
If you went to Native mode you never went back…will not allow any Windows NT in its network
Mixed mode allowed you to run both 2000 and windows NT together
KNOW DIFFERENCE between native and Mixed
Hash- The more encrypted version of passwords, harder to crack
Patch, and test patches before upgrading all systems.
FAT: File allocation Table
Reconnaissance phase:
The first stage at which hackers look at
Make or break as a security person
Hackers look at companies or business and decide if it is worth it to try and hack in
1st thing in this stage is social engineering
Dumpster Dive: Gather as much info on competition, or person you want to hac
Thursday, May 7, 2009
Internet Secutiry Lesson Four 04 May
In this lesson, the class first went over how to use Angel, a WebCT product of the College. Then we went overr Chapters three through five. Next week we will work though chapter six and a bit of chapter seven.
http://www.counterhack.net/
http://www.counterhack.net/
Friday, May 1, 2009
Internet Secutiry Lesson Three 27 April
In this lesson the class continued to work on the Open Systems Interconnect (OSI) model and its seven layers. This model was created by the International Standards Organization (ISO). The class also looked at Domain Name System servers and DHCP servers and what they do.
http://www.iana.org/
http://www.iana.org/
Tuesday, April 21, 2009
Internet Security Lesson Two, 20 April
April 20th, 2009
Packet:
1st 3 numbers are all the same in classroom 142.156.121.
Subnet mask determines network address
Because of subnet mask that allows you to be on certain network
Number can go from 0-255
32bit IP address, IPV4=32bit
Computers use binary language, 2 possible combinations, 0 or 1
How to convert binary to Decimal:
Create the chart
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
Add the 1’s not the 0’s
How to Convert Decimal to binary
Use the Chart
Example number **200
Find the last number that 200 is larger than, and start there…128
Take 200 and minus 128=72
If the next number is smaller than 72 open it=1
Then subtract 72 from 64-8 all numbers till 8 is closed then
8-8=0 so all numbers after 8 are closed
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
1 1 0 0 1 0 0 0
Use this to practice: 142, 65, 256, 33
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
How to Change IP Address:
Go to my network places
Go to view network connections
Right click local Area Connections and go to properties
You will see protocol stack
Highlight TCP/IP and right click and go to properties
Network ID on the same network, needs to have the same Network ID
If you do not have the same ID you do not belong to the ID
DHCP: server that assigns IP address
DHCP= Dynamic Host Configuration Protocol
Broadcast message, every computer will receive message
Multicast: Certain people will receive message
Unicast: just yourself or 1 computer
Routing Tables: list of routers each know…almost like a favourites list
Every time a message goes from one router to the other it’s called a hop
2 types of networks at any given time: Classful or Classless
5 classes if classfull
A: 1-126--------255.0.0.0
B 128-191------255.255.0.0
C 192-223------255.255.255.0
D 224-239------Does not exist
E 240-255-------Does not exist
Determined by 1st octet
127 is reserved for loopback address
If its classful you can determine what the subnet mask is
Class D and E do not have subnet masks as Class D is used for multitask and E is for Government use
In textbook pg 46/47
Need to know how Classfull and Classless work
OSI Model: Open Systems interconnect
7 A-Application—programs, email, network print etc
6 P-Presentation---- data compression and encryption
5 S-Session----dialog of communication, actual communication happens
4 T- Transport----End to end layout of conversation, packets are formed
3 N- Network----determines what network ID is
2 D- Data link----MAC-Media access control
LLC- Logical Link Control
1 P- Physical---- responsible for converting packets into binary form
Packet:
1st 3 numbers are all the same in classroom 142.156.121.
Subnet mask determines network address
Because of subnet mask that allows you to be on certain network
Number can go from 0-255
32bit IP address, IPV4=32bit
Computers use binary language, 2 possible combinations, 0 or 1
How to convert binary to Decimal:
Create the chart
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
Add the 1’s not the 0’s
How to Convert Decimal to binary
Use the Chart
Example number **200
Find the last number that 200 is larger than, and start there…128
Take 200 and minus 128=72
If the next number is smaller than 72 open it=1
Then subtract 72 from 64-8 all numbers till 8 is closed then
8-8=0 so all numbers after 8 are closed
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
1 1 0 0 1 0 0 0
Use this to practice: 142, 65, 256, 33
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
How to Change IP Address:
Go to my network places
Go to view network connections
Right click local Area Connections and go to properties
You will see protocol stack
Highlight TCP/IP and right click and go to properties
Network ID on the same network, needs to have the same Network ID
If you do not have the same ID you do not belong to the ID
DHCP: server that assigns IP address
DHCP= Dynamic Host Configuration Protocol
Broadcast message, every computer will receive message
Multicast: Certain people will receive message
Unicast: just yourself or 1 computer
Routing Tables: list of routers each know…almost like a favourites list
Every time a message goes from one router to the other it’s called a hop
2 types of networks at any given time: Classful or Classless
5 classes if classfull
A: 1-126--------255.0.0.0
B 128-191------255.255.0.0
C 192-223------255.255.255.0
D 224-239------Does not exist
E 240-255-------Does not exist
Determined by 1st octet
127 is reserved for loopback address
If its classful you can determine what the subnet mask is
Class D and E do not have subnet masks as Class D is used for multitask and E is for Government use
In textbook pg 46/47
Need to know how Classfull and Classless work
OSI Model: Open Systems interconnect
7 A-Application—programs, email, network print etc
6 P-Presentation---- data compression and encryption
5 S-Session----dialog of communication, actual communication happens
4 T- Transport----End to end layout of conversation, packets are formed
3 N- Network----determines what network ID is
2 D- Data link----MAC-Media access control
LLC- Logical Link Control
1 P- Physical---- responsible for converting packets into binary form
Tuesday, April 14, 2009
Internet Security Lesson One, 13 April
April 13, 2009
Network:
A Network is 2 or more computers connected together to share data, resources (printers)
The benefits are reduced costs, to max. productivity, save time by communicating (protocols)
Internet:
A combination of many networks working together
Protocol:
Transmission control protocol, internet protocol, (TCP/IP) largest protocol in the world
Every operating system by default uses TCP/IP
The more popular an item is the more at risk it is for a hacker.
You can have a computer with a multi protocol.
Data flows to and from, from the network card
Protocol stack:
Where multiple protocols appear in order (1.TCP/IP 2.Gopher)
TCP/IP has a predictable response just by saying “hi” a hacker can tell there is a computer, what operating system etc.
Customer oriented means less security, and therefore more at risk, hackers get the reward
LAN: Local area network- anything less than 2km in size
CAN: Campus area network- designed for campuses
WAN: Wide Area Network, 2 or more LAN’s-Larger than 2km
MAN: Metropolitan area network- City’s
Intranet: internal internet- private use only
Extranet: External intranet- access through intranet externally
Type of network relationship:
2 styles of networks:
1st Peer to Peer network:
All workstations, no longer ask questions to be done, able to do them on own.
Still able to share info. Based on security levels…example Windows XP
Physically plugged into individual workstation
2nd Client server network:
Client servers have to ask permission, and server asks for codes
Requires NOS-Network operating system… example windows server, Linux
Host: is a Node on a TCI/IP network
NODE: Any device that communicates on a network is known as a Node (router etc.)
Backbone: Will be a high speed connection that connects all together
Segment: the Distance on the network…branch of a network..2 communicating devices linked together
Scalability: the ability for your network to grow
Transmission Media: the devices on the network (physical) example: Ethernet cable
Subnet mask: combined with the IP= net work ID and Host ID—very important to where packet goes
sdhanapala@rogers.com
sdhanapala@conestogac.on.ca
Network:
A Network is 2 or more computers connected together to share data, resources (printers)
The benefits are reduced costs, to max. productivity, save time by communicating (protocols)
Internet:
A combination of many networks working together
Protocol:
Transmission control protocol, internet protocol, (TCP/IP) largest protocol in the world
Every operating system by default uses TCP/IP
The more popular an item is the more at risk it is for a hacker.
You can have a computer with a multi protocol.
Data flows to and from, from the network card
Protocol stack:
Where multiple protocols appear in order (1.TCP/IP 2.Gopher)
TCP/IP has a predictable response just by saying “hi” a hacker can tell there is a computer, what operating system etc.
Customer oriented means less security, and therefore more at risk, hackers get the reward
LAN: Local area network- anything less than 2km in size
CAN: Campus area network- designed for campuses
WAN: Wide Area Network, 2 or more LAN’s-Larger than 2km
MAN: Metropolitan area network- City’s
Intranet: internal internet- private use only
Extranet: External intranet- access through intranet externally
Type of network relationship:
2 styles of networks:
1st Peer to Peer network:
All workstations, no longer ask questions to be done, able to do them on own.
Still able to share info. Based on security levels…example Windows XP
Physically plugged into individual workstation
2nd Client server network:
Client servers have to ask permission, and server asks for codes
Requires NOS-Network operating system… example windows server, Linux
Host: is a Node on a TCI/IP network
NODE: Any device that communicates on a network is known as a Node (router etc.)
Backbone: Will be a high speed connection that connects all together
Segment: the Distance on the network…branch of a network..2 communicating devices linked together
Scalability: the ability for your network to grow
Transmission Media: the devices on the network (physical) example: Ethernet cable
Subnet mask: combined with the IP= net work ID and Host ID—very important to where packet goes
sdhanapala@rogers.com
sdhanapala@conestogac.on.ca
Tuesday, February 3, 2009
Problem Solving and Programming Concepts Lesson Four 02 February
Since I was not able to go to that class, I read the remainder of Chapter Seven and all of Chapter Four. I just handed in the review questions to the instructor, because Chris is away.
Next week. the class will do chapter five.
Next week. the class will do chapter five.
Wednesday, January 28, 2009
Problem Solving and Programming Concepts lesson 3 26 january
In this lesson, the class went through the rest of Chapter Three and the first part of Chapter Seven. I had to do another flowchart and write some more pseudocode for a pet store. Next week, I will not be attending the College for week four, but will read Chapters one through four and read the entirety of chapter seven and hand in the review questions for both chapter four and seven.
Wednesday, January 21, 2009
Problem Solving and Programming Concepts Lesson 2 19 January
In this lesson, the class read Chapter Two of the textbook. The above flowchart is part of the assignment. We learned more about understanding structure and about structured programs. As part of the assignment, I did the above flowchart and wrote some pseudocode.
http://www.quepublishing.com/
Wednesday, January 14, 2009
Problem Solving and Programming Concepts Lesson One 12 January
In this lesson, the class is introduced to the course outline and the general principles of the course. Tje c;ass ;earned about flowcharts and pseudocode to set up programs. The course is instructed by Ron Bradley rbradley@conestogac.on.ca
http://www.conestogac.on.ca/
http://www.conestogac.on.ca/
Subscribe to:
Comments (Atom)

My calendars