LET'S GET SERIOUS

For Your Info

Know Your Viruses


And The Legend Lives On.....





For Your Info :

Y2K

YEAR 2000 COUNTDOWN

The Year 2000 or Y2K issue is really a 2-digit-year representation problem. It is a consequence of the process of saving the storage space in computer memory during the early days of computing. Computer manufacturers adopted a date system for their machines which represented each of the day, month and year as a two-fields digit.
Example "1 January 1996" is represented as "1/1/96". Therefore when 1999 flips over to 2000, the systems will behave as if they have been zapped back in time to 1900, i.e where "1 January 2000" is treated as "1 January 1900" due to the system's default interpretation of the date, taking only the last two digits of the year.

Y2K ALERT PERIOD



Firewalls

What is a firewall ?
A collection of components placed between two computer networks that collectively have the following properties:
All network traffic from inside to outside and vice-versa, must pass through the firewall.
Only authorised traffic, as defined by the local security policy, will be allowed to pass.
The firewall itself is immune to penetration.

When do we require a firewall ?
A firewall is required when a traffic between two networks need to be controlled. This is usually the case when one network does not trust the other. For example, Company A require to be connected to Company B due to some business reasons, thus firewalls could be implemented between the two companies' networks to ensure only authorised traffic is allowed and both companies' computer security policies are enforced.
Some firewalls provide a data protection facility against eavesdropping. This facility is required if confidential information is transported via untrusted electronic media e.g. internet or untrusted telecommunication company from/to remote offices.

Does a firewall do its job ?
Eventhough you have a strong firewall system, it very much depends on the implementor. The implementor or administrator must have a strong security policy, ensure the policy is being enforced, test the control in-place and do this continously. Firewall cannot protect very well against viruses. It cannot replace security consciousness on the part of the staff.

As a conclusion, firewalls are security tools necessary for your network connections and with its proper implementation, they could give you a business edge.



MP3
What is MP3?
MP3 stands for MPEG 1 layer 3, which is a way to store music files on a computer disk in such a way that the file size is relatively small, but the song sounds near perfect. You can identify MP3 files because they will end in .MP3.
Click
here for more details and downloading.

MP3 ( MPEG 1 Layer 3 ), ialah cara penyetoran fail muzik ke dalam cakera komputer dengan menyimpan saiz fail sekecil yang boleh, tetapi dengan bunyi lagu yang hampir sempurna. Untuk mengenal fail MP3, failnya akan berakhir dengan sambungan .MP3.


ICQ

What is ICQ?
And why is everyone talking about it?
ICQ ("I Seek You") is a program that lets you find your friends and associates online in real time. You can create a Contact List containing only people you want to have there, you can send them messages, chat with them, send files, configure ICQ to work with external applications and more.

Click here for more details and downloading.

ICQ ( "I Seek You" atau Saya Mencari Anda ) ialah satu aturcara komputer yang memungkinkan anda untuk mencari online kawan dan kenalan. Anda boleh menyediakan 'Contact List' yang mengandungi senarai mereka yang anda kehendaki sahaja. Anda juga boleh menghantar mesej pada mereka, berborak dengan mereka, menghantar fail ( seperti *.gif, *.jpg,*.html, ataupun URL ), serta mengubahsuai ICQ untuk saling bekerja dengan aplikasi luaran dan lain lagi.





Know Your Viruses :

  • Lewinsky Virus
    Sucks all the memory out of your computer, then e-mails everyone about it
  • Mike Tyson virus
    Quits after one byte
  • Titanic Virus
    Your whole computer goes down
  • Disney Virus
    Everything in your computer goes Goofy
  • Viagra Virus
    Turns your software into hardware, and in some cases, the computer might go dead.






And The Legend Lives On..... :
Rethinking Jebat - an excerpt from Harakah



[Lyrics Index] [Sajak Index] [Pantun Index] [Doa Index]

[Main Index] [Sign Guestbook] [View Guestbook]

Hosted by www.Geocities.ws

1