Pages

Ads 468x60px

Sunday, March 31, 2013

SMTP



Simple Mail Transfer Protocol is the web standard for email transmission using port 25 or 587 (MSA). It conducts secured connections via SSL (SMTPS).
This is a text-based protocol wherein a mail sender communicates with its receiver through giving its instructions over TCP connection. However, it only defines the message transfer and not its content (i.e. like the physical mail envelope and not the body of the letter).

Tuesday, March 26, 2013

IMAP/POP3

Internet Message Access Protocol is a message retrieval system common in most mail servers and email clients. It supports both offline and online operation modes and functions by transferring messages from a server to a client. IMAP does not automatically deletes messages from the server even after downloading them, unless manually done by the user.

READ MORE:

Monday, March 25, 2013

FTP


File Transfer Protocol is the standard network scheme in transfering files from one server (host) to another via TCP network or Internet.

Login requires username/password system in order to grant access. Data is received by the server and once it is verified[...]

Friday, March 22, 2013

HTTP


Hypertext Transfer Protocol is the basis of data communication for the Internet and defines the standards in exchange of hypertext. It is developed to enable intermediate network components to communicate on behalf of servers and clients. HTTP is the application layer protocol within the IP suite.

Wednesday, March 20, 2013

PC Speak: An Abney and Associates Internet and Technology Research Lab Presents the IPv6

Internet Protocol version 6 is the most recent update of the IP, the main communications protocol that holds the whole Internet. It is created to supplant the older Internet Protocol version 4 that is still in use on most of the web traffic until today. IPv6 was formed by the IETF (Internet Engineering Task Force) as a solution for the IPv4′s imminent address shortage.


For every device that connects to the Internet, it needs an IP address — a binary number assigned to it to enable communication with other devices. And with the quick turnout of Internet-capable devices today, the current IPv4 protocol is running out of addresses that we could use.

READ MORE:

Monday, March 18, 2013

Android befall iOS in popularity in Singapore, HK

When it comes to Smartphones, It is clearly a battle between Android and iOS.  But signs are emerging that Apple might be loosing grip in the two Asian markets.

Conforming to Reuters report, most of the well-off smartphone users in Singapore and Hong Kong are turning to Android handsets, mostly Samsung, rather than iOS of Apple.  The trouble that iPhone is their desire to be different that causing them as weakness and in turn an advantage to competing device.

Continue Reading

Friday, March 15, 2013

Cyber-Threat Trends of 2013


Experts forecast a rise in computer and cellphone scams
It takes no expert to predict that there will be for sure an increase of sophisticated methods and updates of old scams to try to take control of our computers and cellphones to get identities and money. Yet another year, here comes 2013, scammers are busy or maybe had already developed new ways to swindle us in the coming months.
Sign up for the AARP Money Newsletter.
This comes as a general rule and everyone must know even without asking tips from the experts, to stay safe one must know the basic vigilance. Now the question is how. This is how: Keep your security software updated and run it regularly. Click only on links from trusted sources; the same goes for buying cellphone apps. Be smart about where and how you navigate in cyberspace.

Tuesday, March 12, 2013

Computer scientist looks for ways of fraud prevention

Jeremy Wendt, Sandia National Laboratories computer science researcher, focuses on working on a program to uncover probable preys of nefarious emails.
The weakest link in many computer networks is a gullible human. With that in mind, Sandia National Laboratories computer science researcher Jeremy Wendt wants to figure out how to recognize potential targets of nefarious emails and put them on their guard. – Phys. Org
He aims to trim down the figure of visitors that cyber analysts have to check as possible bad guys among thousands who search Sandia websites each day.

Monday, March 11, 2013

Net providers begin warning of illegal downloads


In the first decade of the 21st century, technology made it possible to download music, movies or televisions shows from the Internet to your computer. Before this, you had to go to a music store physically and purchase an album or CD if you wanted to hear the latest from your favorite artists. With this new technology, the entire scope of how you obtain your music has changed.

But as the technology advances rapidly, unlawful downloading sites also places on a huge number. And with these, internet users who illegally download online could soon receive warning notices from the nation’s five major internet service providers. Consumers who are using peer-to-peer software are the number one target this week of the Copyright Alert System.

Saturday, March 9, 2013

TCP/IP

Transmission Control Protocol and Internet Protocol are the core of internet protocol suite as the they work together in supporting web functions.


TCP is used in email, FTP, file sharing, media streaming and the Internet in general. Because of traffic load, network congestion and other network behavior, IP packets could not be delivered properly so TCP detects possible problems to achieve successful data transmission.

READ MORE:

PROTOCOLS


PC Speak: An Abney and Associates Internet and Technology Research Lab talks about TCP / IP and other related protocols:

TCP/IP
HTTP
FTP
IMAP/POP3
SMTP
ENCRYPTION

Abney and Associates Internet and Technology Research Lab illustrated the importance of IP addresses. IP has the responsibility of addressing packets to be transmitted across a network or across the Internet.

READ FULL ARTICLE:

Sunday, March 3, 2013

List


A complete and definitive list of programming languages ever made, with no distinction of their being high- or low-level. (Classification of PLs as low- or high-level changes over time and is highly relative to time. What is considered high-level today could be seen as low-level in the future just as assembly language was deemed high-level before.) So instead[...]

Friday, March 1, 2013

High level


High-level languages are easier for programmers to use for its closer resembalnce with human language, making it more understandable and less time-consuming compared to assembly language. Instead of assembly codes that need to be remembered or looked up each time, high-level utilizes boolean, functions, loops, arrays, objects, threads and arithmetic for maximum efficiency.


READ MORE: