Monday, January 30, 2012

PSIT Night

Every school has representative on the night..
and I was enjoy the show at the brokenshire college..
Together with my classmate,friends from holy child and instructor..
I was amazing in their talents in each student from different school..
All school have a course of IT,ComSci and etc..that related to computer technology...

Monday, January 16, 2012

Case Study 5

Give at least three scenarios in the real world wherein HASH COLLISION can happen. Include an image.
software/program/application.

Case Study 4

1. What is hash collision?
2. What really happens during a hash collision? Include an image
3. What are the ways and methods to resolve hash collision? Explain Each

Answer:
1. Collisions are unavoidable whenever members of a very large set (such as all possible person names, or all possible computer files) are mapped to a relatively short bit string. This is merely an instance of the pigeonhole principle.
2.  The impact of collisions depends on the application. When hash functions and fingerprints are used to identify similar data, such as homologous DNA sequences or similar audio files, the functions are designed so as to maximize the probability of collision between distinct but similar data.





3. open addressing, all entry records are stored in the bucket array itself. When a new entry has to be inserted, the buckets are examined, starting with the hashed-to slot and proceeding in some probe sequence, until an unoccupied slot is found. When searching for an entry, the buckets are scanned in the same sequence, until either the target record is found, or an unused array slot is found, which indicates that there is no such key in the table. The name "open addressing" refers to the fact that the location ("address") of the item is not determined by its hash value.

Tuesday, January 10, 2012

Case Study 2

I read the article in other website.
Victor Faur is young Romanian, who hack the computer system of NASA.
According the article, he is the leader of WhiteHat team. But Faur argued in his defense that he only hacked into those systems in order to prove taht they were vulnerable, and that he did not cause any damage to them.
And according to him,he only targeted those servers because their group held regular contest to determine who was more skilled, and could hack into the most secure systems.
Romanian law, if he had been found guity on all accounts, Faur would have risked a maximum sentence of 12 years in prison, compared to the 54 years of prison time he might have received if judged in the U.S.
One of the hacker's defense attorneys, Mircea Borza, said that they would appeal to a higher court because "we did not expect this sentence. "He claims that Faur was only guilty of unauthorized access to the systems, which he also admitted, but not of deleting, intercepting or altering any data.
So for me,I agree.
Because of hacking in the computer system. We all know this computer are inventions by those people who inventors. To create a fast information , communication and etc. and not hacking to a computer system, information or websites. What would happen to world, if all computer system are hacking?. So the data in the computer that should send or share will be interrupted, because of hacking.
Even the outside world like spacecraft, it no longer to communicate them or will be loss.
So if their is a Law for hackers in the other country and its for good who using the computer. And to those who hackers people will be punished or prison in the jail. Hackers people use your skill in how to create a program for java or dev c++.





Monday, January 9, 2012

Reflection of Case Study 1

 We just  have a antivirus software to installed in the computer,laptop and touch screen or touch pad.
Because of the virus or conficker worm. Many virus has develop at it can effect in the computer.
Even use a bluetooth for cellphone to send the picture or share a files.
And we can update, if their is a virus or not through the scan a computer,laptop,touch screen or any devices that related to computer.
Now the latest of virus is worm or computer worm known as Conficker.
Conficker is a computer worm targeting the Microsoft Windows operating system. And it was first detected in November 2008.
Any Microsoft Windows have been infected by the conficker. Even the latest of Windows 7.
A second variant of the virus, discovered in December 2008, added the ability to propagate over LANs through removable media and network shares.
So the conficker has ablility to spread the virus in the network.
Advice to those people who can buy the computer,laptop, touch screen or touch pad. Make sure the antivirus software has been installed in the computer.
And you can update through the antivirus software, if their is a virus or not in the computer.
Scanning in your computer everyday.