paulinshelamie.blogspot.com
IT 104 PRESENTATION IN IT: ""KEy prOvision of the USA Patriot Act""
http://paulinshelamie.blogspot.com/2010/02/key-provision-of-usa-patriot-act.html
IT 104 PRESENTATION IN IT. Makilala, Nortn Cotabato, Philippines. ChubYY,friendly,toinks" ". View my complete profile. Monday, February 15, 2010. KEy prOvision of the USA Patriot Act". How do FISA and the USA PATRIOT Act affect journalists? For journalists, the big question is whether the provision for secret court orders will allow a newsroom search for "any tangible thing" related to a terrorism investigation. Could a government agent use the law to gain access to a reporter's notes and confidentia...
cerenocharlotte.blogspot.com
CerenoCharlotte: November 2009
http://cerenocharlotte.blogspot.com/2009_11_01_archive.html
Monday, November 23, 2009. Are IT workers professional? Monday, November 16, 2009. IT 104 Activity #1. Subscribe to: Posts (Atom). View my complete profile. My IT 104 Classmates. Cuyno, Alyn Joy. Dazo, John Roye. Estrera, Rhea Franz. Luzon, Maynard Jake. Palawod, Alvin Jay. Sambas, Cherry Jean. Taculad, April Love Joy. Tagapia, Cris Knuryx. Are IT workers professional? IT 104 Activity #1.
cerenocharlotte.blogspot.com
CerenoCharlotte: January 2010
http://cerenocharlotte.blogspot.com/2010_01_01_archive.html
Monday, January 25, 2010. What is privacy protection and the Law? In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. This approach advocates greater government definition and enforcement of privacy standards. Http:/ en.wikipedia.org. Http:/ en.wikipedia.org. Monday, January 11, 2010. Who are the computer criminals and what are their objectives? Takes advantage o...
cerenocharlotte.blogspot.com
CerenoCharlotte: What would you do?
http://cerenocharlotte.blogspot.com/2010/01/what-would-you-do_04.html
Monday, January 4, 2010. What would you do? If ever my friend had told me that he is developing a worm which will attack the administrative systems at our college, I'll definitely tell him to stop what he had planned because although it is harmless, in a way it will still cause disturbance as it will cause a message saying "Let's Party! Subscribe to: Post Comments (Atom). View my complete profile. My IT 104 Classmates. Cuyno, Alyn Joy. Dazo, John Roye. Estrera, Rhea Franz. Luzon, Maynard Jake.
paulinshelamie.blogspot.com
IT 104 PRESENTATION IN IT: ☺What would I do"?☺
http://paulinshelamie.blogspot.com/2010/01/what-would-i-do.html
IT 104 PRESENTATION IN IT. Makilala, Nortn Cotabato, Philippines. ChubYY,friendly,toinks" ". View my complete profile. Monday, January 4, 2010. 9786;What would I do"? 1 Ahmm.for me,If I have a situation like that it was my fault,and my IT security was hacked,. And I had giving a 90 days to fixed the problem 1 million dollars, I will talk first to my boss and. To my co-worker that it was accedentally happen, not a trator. And do my time brachet. Subscribe to: Post Comments (Atom). MY IT 104 CLASSMATES.
paulinshelamie.blogspot.com
IT 104 PRESENTATION IN IT
http://paulinshelamie.blogspot.com/2010/03/healing-poison-long-time-ago-girl-named.html
IT 104 PRESENTATION IN IT. Makilala, Nortn Cotabato, Philippines. ChubYY,friendly,toinks" ". View my complete profile. Tuesday, March 16, 2010. All the anger and unhappiness in the house was causing the poor husband great distress. Finally, Li-Li could not stand her mother-in-law’s bad temper and dictatorship any longer, and she decided to do something about it. 8220;Yes, Mr Huang, I will do whatever you tell me to do.”. One day, Li-Li came to see Mr. Huang and asked for his help again. She said,. Mr Hua...
paulinshelamie.blogspot.com
IT 104 PRESENTATION IN IT: Who are Computer criminals and their objectives?
http://paulinshelamie.blogspot.com/2010/01/who-are-computer-criminals-and-their_11.html
IT 104 PRESENTATION IN IT. Makilala, Nortn Cotabato, Philippines. ChubYY,friendly,toinks" ". View my complete profile. Monday, January 11, 2010. Who are Computer criminals and their objectives? Computer criminals are people who are ambitious with impressive educational credential ,and want destroy the data of the computer or computer networks" .the person doing this crime was so expert in the technology" .and they don't have ashamed in their self. Subscribe to: Post Comments (Atom). MY IT 104 CLASSMATES.
cerenocharlotte.blogspot.com
CerenoCharlotte: Key Provisions of the USA Patriot Act
http://cerenocharlotte.blogspot.com/2010/02/key-provisions-of-usa-patriot-act.html
Monday, February 15, 2010. Key Provisions of the USA Patriot Act. Gives federal officials the authority to. Intercept wire, spoken and electronic communications. Gives federal officials the authority to. Intercept wire, spoken and electronic communications. Relating to computer fraud and abuse offenses. Permits the sharing of grand jury. Information that involves foreign intelligence or. Counterintelligence with federal law enforcement,. Intelligence, protective,immigration, national. Allows use of a pen...
cerenocharlotte.blogspot.com
CerenoCharlotte: Zero-day attack
http://cerenocharlotte.blogspot.com/2010/01/zero-day-attack.html
Monday, January 11, 2010. Also known as a zero hour. Takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch — another piece of software meant to fix the original issue. A zero day. Will take advantage of that problem before a patch has been created. It is named. Because it occurs before the first day the vulnerability is known. Cuyno, Alyn Joy.