Core Networking

Core Networking

Social Network Services

Social network services allow people to come together online around shared interests, hobbies, or causes. For example, some sites provide dating services where users post personal profiles, locations, ages, gender, etc, and are able to search for a partner. Other services enable business networking (Ryze, XING, and LinkedIn) and social event meetups (Meetup).

Some large wikis effectively become social network services by encouraging user pages and portals.

Anyone can create their own social networking service using hosted offerings like Ning or rSitez, or more flexible, installable software like Elgg.



Social network search engines::

Social network search engines are a class of search engines that use social networks to organize, prioritize, or filter search results. There are two subclasses of social network search engines: those that use explicit social networks, and those that use implicit social networks:
Explicit social network search engines allow people to find each other according to explicitly stated social relationships such as XFN social relationships. XHTML Friends Network, for example, allows people to share their relationships on their own sites, thus forming a decentralized/distributed online social network, in contrast to centralized social network services listed in the previous section.
Implicit social network search engines allow people to filter search results based upon classes of social networks they trust, such as a shared political viewpoint. This was called an epistemic filter in a United Nations University report from 1993 which predicted that this would become the dominant means of search for most users.

Lacking trustworthy explicit information about such viewpoints, this type of social network search engine mines the web to infer the topology of online social networks. For example, the NewsTrove search engine infers social networks from content - sites, blogs, pods, and feeds - by examining, among other things, subject matter, link relationships, and grammatical features to infer social networks.



Deliberative social networks

Deliberative social networks are webs of discussion and debate for decision-making purposes. They are built for the purpose of establishing sustained relationships between individuals and their government. They rely upon informed opinion and advice that is given with a clear expectation of outcomes.


Commercial social networks

Commercial social networks are designed to support business transaction and to build a trust between an individual and a brand, which relies on opinion of product, ideas to make the product better, enabling customers to participate with the brands in promoting development, service delivery, and a better customer experience.[citation needed]. an example of these networks is Dell IdeaStorm.


Social guides

A social guide recommending places to visit or contains information about places in the real world such as coffee shops, restaurants, and wifi hotspots, etc. One such application is WikiTravel.


Social bookmarking
Main article: Social bookmarking

Some Web sites allow users to post their list of bookmarks or favorites websites for others to search and view them. These sites can also be used to meet others sharing common interests. Examples include digg, del.icio.us, StumbleUpon, reddit, Netvouz, and furl.


Social cataloging

In Social cataloging much like social bookmarking, this software is aimed towards academics, and allows the user to post a citation for an article found on the internet or a website, online database like Academic Search Premier or LexisNexis Academic University, a book found in a library catalog, and so on. These citations can be organized into predefined categories or a new category defined by the user through the use of tags. This allows academics researching or interested in similar areas to connect and share resources. Examples for those services include CiteULike, Connotea, BibSonomy and refbase.


Social libraries

This applications allows visitors to keep track of their collectibles, books, records, and DVDs. Users can share their collections. Recommendations can be generated based on user ratings, using statistical computation and network theory. Some sites offer a buddy system, as well as virtual "check outs" of items for borrowing among friends. Folksonomy or tagging is implemented on most of these sites. Examples include discogs.com, imdb.com and LibraryThing.


Virtual worlds
Main article: Virtual world

Virtual Worlds are services where it is possible to meet and interact with other people in a virtual environment reminiscent of the real world. Thus the term virtual reality. Typically, the user manipulates an avatar through the world, interacting with others using chat or voice chat.


Massively Multiplayer Online Games (MMOGs)
Main article: Massively Multiplayer Online Games

MMOGs are virtual worlds that add various sorts of point systems, levels, competition, and winners and losers to virtual world simulation. Commercial MMOGs (or, more accurately, massively multiplayer online role-playing games or MMORPGs,) include Everquest and World of Warcraft. The Dotsoul Cyberpark is one of the more innovative non-commercial worlds, with the look and feel of Second Life and Active Worlds, but an adamantly anti-corporate stance. Other open-source and experimental examples include Planeshift, Croquet project, VOS and Solipsis.


Non-game worlds

Another development are the worlds that are less game-like, or not games at all. Games have points, winners, and losers. Instead, some virtual worlds are more like social networking services like MySpace and Facebook, but with 3D simulation features. Examples include Second Life, ActiveWorlds, The Sims Online, and There.


Economies

Very often a real economy emerges in these worlds, extending the non-physical service economy within the world to service providers in the real world. Experts can design dresses or hairstyles for characters, go on routine missions for them, and so on, and be paid in game money to do so. This emergence has resulted in expanding social possibility and also in increased incentives to cheat. In the case of Second Life, the in-world economy is one of the primary features of the world.


Other specialized social applications

There are many other applications with social software characteristics that facilitate human connection and collaboration in specific contexts. Project management and e-learning applications are among these.




Emerging technologies

Emerging technological capabilities to more widely distribute hosting and support much higher bandwidth in real time are bypassing central content arbiters in some cases.


Peer-to-peer social networks

A hybrid of web-based social networks, instant messaging technologies and peer-to-peer connectivity and file sharing, peer-to-peer social networks generally allow users to share blogs, files (especially photographs) and instant messages. Some examples are imeem, SpinXpress, Bouillon, Wirehog, and Soulseek. Also, Groove, WiredReach and Kerika have similar functionality, but with more of a work-based, collaboration bias.


Virtual presence

Widely viewed, virtual presence means being present via intermediate technologies, usually radio, telephone, television, or the internet. In addition, it can denote apparent physical appearance, such as voice, face, and body language.

More narrowly, the term virtual presence denotes presence on World Wide Web locations which identified by URLs. People who are browsing a web site are considered to be virtually present at web locations. Virtual presence is a social software in the sense that people meet on the web by chance or intentionally. The ubiquitous(in the web space) communication transfers behavior patterns from the real world and virtual worlds to the web. Research has demonstrated effects of online indicators
READ MORE - Social Network Services

CCTV IP camera

IP cameras are Closed-circuit television (CCTV) cameras that utilize Internet Protocol to transmit image data and control signals over an Fast Ethernet link. As such, IP cameras are also commonly referred to as network cameras. IP cameras are primarily used for surveillance in the same manner as analog closed-circuit_television. A number of IP cameras are normally deployed together with a digital video recorder (DVR) or a network video recorder (NVR) to form a video surveillance system.

The terms IP camera and network camera are most commonly used to refer to surveillance cameras with a Fast Ethernet interface. In this context, the term IP camera does not include GigE_Vision camera, which is a machine vision camera with a Gigabit Ethernet interface.
READ MORE - CCTV IP camera

Is Your Networking Caught A Virus?

Caught A Virus?

If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.


Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.

You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.

It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.

For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."

Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.

Is Your PC "Owned?"

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:

* An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.

I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an Infection

There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.

To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.

If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.

Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.

If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next

Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.

* If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.
* If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.

A Microgram of Prevention

Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.

Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.
READ MORE - Is Your Networking Caught A Virus?

Apple 3G iPhone Improving Networking


General

2G Network GSM 850 / 900 / 1800 / 1900
3G Network HSDPA 850 / 1900 / 2100
Announced 2008, June
Status Available. Released 2008, July

Size

Dimensions 115.5 x 62.1 x 12.3 mm
Weight 133 g
Display Type Capacitive touchscreen, 16M colors
Size 320 x 480 pixels, 3.5 inches
- Multi-touch input method
- Accelerometer sensor for auto-rotate
- Proximity sensor for auto turn-off
- Scratch-resistant surface
- Ambient light sensor

Ringtones

Type Polyphonic, MP3
Customization Download
Vibration Yes
- 3.5 mm headset jack

Memory

Phonebook Practically unlimited entries and fields, Photocall
Call records 100 received, dialed and missed calls
Internal 8 GB/ 16 GB
Card slot No

Data

GPRS Yes
HSCSD No
EDGE Yes
3G HSDPA
WLAN Wi-Fi 802.11b/g
Bluetooth Yes, v2.0, headset support only
Infrared port No
USB Yes, v2.0


Camera

Primary 2 MP, 1600x1200 pixels
Video No
Secondary No

Features

OS Mac OS X v10.4.10
Messaging SMS (threaded view), Email
Browser HTML (Safari)
Radio No
Games Downloadable
Colors Black(8/16 GB), White (16 GB)
GPS Yes, with A-GPS support
Java No
- Google Maps
- Audio/video player
- TV-out
- Photo browser
- Voice memo
- Integrated handsfree


Battery Standard battery, Li-Ion

Stand-by Up to 300 h

Talk time Up to 10 h
READ MORE - Apple 3G iPhone Improving Networking

Analysis (Insertion and deletion operation)

The best possible case in insertion operation is when the item is inserted at the last position. In this case, no movement of elements is required. The worst case occurs when the element has to be inserted at the beginning of the list. In this case, we have to move all the elements down the list. Therefore, the while loop executes n times, each moving one element down. Thus complexity of insertin operation is O(n), i.e linear time.

.The best case in deletion occurs when the element to be deleted is the last element of the array. In this case, no element is moved up. The worst case occurs when element is deleted from the first position. In this case, all (n-1) elements are moved up. The while loop executes n-1 times, each time moving one element down. Thus complexity of deletion operation is also O(n) i.e linear time.
READ MORE - Analysis (Insertion and deletion operation)

Spyware affecting Networking

There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k
READ MORE - Spyware affecting Networking

CTT6800+ -JPEG 2000 Compressed Transport Transceiver

The CTT6800+ is ideal for applications requiring compressed transport of video, audio and data signals. Utilizing an advanced JPEG 2000 compression codec, the CTT6800+ can encode and decode baseband media to/from a 270 Mb/s DVB ASI transport stream. The CTT6800+ supports the following signal formats:

# SDI (270 Mb/S SMPTE 259M or 1.5 Gb/s SMPTE 292M)
# Four AES audio pairs
# LTC
# GPI
# Dolby Metadata
-->
FEATURES

* The CTT6800+ is configurable as either a JPEG2000 encoder or decoder. This allows switching of two CTT6800+s, operating as an encode/decode pair, to transport content in either direction
* Compression of baseband media utilizing advanced JPEG2000 codec, including 270 Mb/s or 1.5 Mb/s SDI, AES and embedded audio, LTC, GPI and serial Dolby metadata with encoding onto a 270 Mb/s DVB-ASI Transport stream
* Encoding and decoding of up to four lines of user-selectable ancilliary data
* Automatic or user-selectable video compression data rates of up to 200 Mb/s
* On-screen display for simplified setup and configuration
* Supports QSEE thumbnail and alarm monitoring
* Remote control and monitoring via CCS or SNMP
READ MORE - CTT6800+ -JPEG 2000 Compressed Transport Transceiver

Subscribe Core Networking