Thursday, 26 May 2016

KELAS MINGGU KETIGA BELAS


Minggu yang ketiga belas iaitu minggu yang terakhir kelas Telekomunikasi & Rangkaian bersama dengan Dr. Johari, kami semua diterangkan mengenai Bab Ethical, Social and Legal Issues. Bab yang terakhir ini adalah amat penting sekali dalam kehidupan kita iaitu berkaitan dengan Etika, Sosial dan Isu Undang-Undang. Apa yang telah diajar oleh Dr. Johari adalah amat jelas sekali dan mudah difahami.

Intellectual Property Rights :

• Refers to creations of the mind, original creative works from the creator– software,
  applications, systems, websites, etc.
• IP is protected in law by, for example, patents, copyright and trademarks, which
  enable people to earn recognition or financial benefit from what they invent or
  create.
• Copyright is the exclusive right given to the owner of a copyright for a specific
  period. Copyright protection in Malaysia is governed by the Copyright Act 1987.

Copyrights : 

• Permission must be obtained to use a copyrighted material from the copyright
   holder (and pay any required fee)
• Exception: concept of fair use which permits limited duplication and use of a portion
  of copyrighted material for special purposes , such as teaching, research, news
  reporting, commentary, criticism.



Trademarks :

• A trade mark is a sign which distinguishes the goods and services of one trader  
  from those of another.
• A mark includes words, logos, pictures, names, letters, numbers or a combination of
  these.
• A trade mark is used as a marketing tool to enable customers in recognizing the
  product of a particular trader.



Patents :

- A patent is an exclusive right granted for an invention, which is a product or a 
  process that provides a new way of doing something, or offers a new technical  
  solution to a problem.

- A patent or utility innovation protection gives the owner of the patent/utility
  innovation the exclusive right to stop others from manufacturing, using and/or selling
  the owner's invention in Malaysia without the owner's consent or permission.




Wednesday, 18 May 2016

KELAS MINGGU KEDUA BELAS


Pada minggu yang kedua belas kelas Dr. Johari, topik yang dibincangkan adalah mengenai Network & Computer Security. Apa yang saya fahami dari topik ini adalah ianya terdiri daripada peruntukan dan dasar yang diguna pakai oleh pentadbir rangkaian untuk mencegah dan memantau akses yang tidak dibenarkan, penyalahgunaan, pengubahsuaian, atau penafian rangkaian komputer dan rangkaian sumber diakses. Tujuannya adalah untuk mengelakkan daripada sebarang kecurian data, maklumat peribadi dan sebagainya.

SSL or Secure Socket Layer certificates :

• small data files that digitally bind a cryptographic key to an organization’s details.
• allows secure connections from a web server to a browser.
• when installed on a web server, it activates the padlock and the https protocol .
• Typically, SSL is used to secure credit card transactions, data transfer and logins.

Phishing and Web Spoofing :
1) Phishing

– Attacks are performed with the intention to acquire personal information like credit
   card  numbers, bank account, etc.
– One common approach of performing phishing attack – send e-mails to stem from
   an official representative of a well-known company.
– The recipients are encouraged to enter personal identification data. 


2) Web Spoofing

– Mocking the web presences of trusted corporations with the intention to trick  
   customers.
– Also employed for phishing attacks.
– Typically relies on the following factors:
    •Convincing website and email design
    •Use of convincing URLs
    •Pretending “secure” connections. 


Desktop Security Issues :

• End users’ security can be endangered through threats like adware, spyware,
  viruses and worms.
• It is up to the clients computers to counteract these security threats by using internet
  services thoughtfully, updating OS, updating browser software, and using additional
  security software like firewalls and virus scanners.




Tuesday, 10 May 2016

KELAS MINGGU KESEBELAS


Pada minggu kesebelas kelas Dr. Johari, sebelum memulakan sesi Pengajaran & Pembelajaran (P&P), Dr. Johari telah melakukan MID-TEST mengenai kesemua Bab yang telah dipelajari sebelumnya daripada minggu pertama hingga minggu kelapan yang telah diajar oleh pensyarah Dr. Norasyikin. Ujian telah mengambil masa selama 1jam. Kemudiannya, barulah Dr. Johari memulakan kuliah yang bertajuk Internet Infrastructure.

What is internet....?????
• A global collection of network
• Interconnected computers work by transmitting data through a special type of packet
   switching which is known as the IP (internet protocol).
• When you connect to the Internet, your computer becomes part of a network.




Internet VS WWW...?????

- The Internet is not synonymous with World Wide Web
- The Internet is a massive network of networks, a networking infrastructure. It connects
   millions of computers together globally, forming a network in which any computer can
   communicate with any other computer as long as they are both connected to the Internet. 
- The World Wide Web, or simply Web, is a way of accessing information over the medium
   of the Internet. It is an information-sharing model that is built on top of the Internet.

A Hierarchy of Networks :
From a single computer to LAN
From LAN to ISP
ISP to WWW


Internet service provider (ISP) :
ISP Also called IAP (Internet Access Provider).
Company that provides access to the internet.
Usually ISP provide software package, username, password and access phone number and modem
ISP are connected to one another through Network Access Points (NAPs)

Example of ISP : TM


Internet Protocol :
Every machine on the Internet has a unique identifying number, called an IP Address.
The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet.

A protocol is the pre-defined way that someone who wants to use a service talks with that service. The "someone" could be a person, but more often it is a computer program like a Web browser. 


An IP address consist of 32 bits, often shown as 4 octets of numbers from 0-255
161.139.52.254
161  : Area or location of network (eg. UTM)
139  : Server no
52  : Division/unit no (FP, FKM etc)
254  : Computer no 


HTTP :
Hyper Text Transfer Protocol
HTTP defines how messages are formatted and transmitted and what actions Web servers and browsers should take in response to various command
For example, when you enter a URL in browser, this actually send an HTTP command to the web server directing it to fetch and transmit the requested page. 


6 type of internet connection and access :
1. Dial Connection
2. Cable
3. Satellite internet access
4. Fixed wireless
5. Broadband
6. Mobile wireless





Thursday, 5 May 2016

KELAS MINGGU KESEPULUH

SELEPAS CUTI PERTENGAHAN SEMESTER...................

Pada minggu kesepuluh selepas cuti semester selama seminggu, pensyarah kelas Telekomunikasi & Rangkaian telah ditukar kepada Dr. Johari. Pada permulaannya macam biasa lah sesi pengenalan dengan pensyarah...HEHEHE...Dr.Johari pun baik orangnya...sporting gak....selepas sesi pengenalan kelas pun berjalan seperti biasa. Pada minggu ini Dr. Johari telah mengajar kami semua berkenaan dengan tajuk EMAIL..........

What is Email...?????




A mail, but is sent electronically across the Internet.

Quickly delivered in seconds or minutes.

PAdvantages
–   Convenience, Fast speed, Inexpensive, Printable, Reliable, Global, Generality (not limited to text, but graphics, programs, even sounds)
ODisadvantages
–   Misdirection, Interception, Forgery, overload, Funk (Spamming), No response (from the receiver).

Email Address :
- The E-mail address of the recipient.
- user@host
- Example : fir_kelate87@yahoo.com
- “yahoo.com" is the domain name of the mail server
  
   which handles the recipient's mail. 

- “fir_kelate87" is the user name of the recipient.

- User name and hostname are separated by "@".


Email Client and Server :

  • Email client – software / program that can transfer e-mail from                        a local host to a local e-mail server.
  • Email server – software/program that can send/receive e-mail                           from/to other email servers.
  • Mailbox – An electronic mailbox is a disk file which holds                         email messages.




SPAM Mail :



  • Email spam, also known as junk email sending messages to numerous recipients by email. 
  • The messages may contain disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware. 
  • Spam email may also include malware as scripts or other executable file attachments