Saturday, February 15, 2014

Tutorial Assignment #5 - Curate

For this module, I had to curate information using Twitter searches and hash tags instead of using Google. I find that the process of searching for Internet privacy/security and Cloud Computing was quite difficult. It was harder to find relevant information, but once I did, it got easier. The information that I got from using Twitter is more complex than the first page on Google search. For example, the first link that appeared on Google search for Cloud Computing was Wikipedia. We all know that Wikipedia isn't a reliable source because anyone has access to it. 



I believe that with having the skills to curate information using Twitter search and hash tags will overall be better than Google search because the information that Twitter provides is more in-depth and reliable. 


Wednesday, February 5, 2014

Tutorial Assignment #4 - Firefox Lightbeam



The graph that lightbeam provided shows that I visited 17 sites and within those 17 sites, there were 247 third party sites. Third party websites are websites that are not owned by that site. For example, I visited lonelyplanet.com and it says that there are 33 sites connected to lonelyplanet.com. The number of third party websites required to render a primary site means that there are more opportunities for intruders to introduce malicious content. This is not good because we want to have less third party websites to prevent our computers from getting viruses, Trojan horses and worms. 


This picture is very true. We don’t know what goes on under the websites or where the information came from. What we see on the website is just a small piece of it. If it wasn’t for Firefox Lightbeam, I wouldn’t have known that there were 33 sites connected to lonetplanet. Lonelyplanet is a very popular and highly used site to help people plan their vacation and look for information on a particular place. If it was a site like this, there will be even more third party sites connected to it. 

As of 2010, there are 54 million malware pieces on PCs, macs, smartphones and tablets. With technology emerging, the number will just continue to increase. To prevent these, we need protection! Every device should have an anti-virus software to help protect viruses from coming and some is also used as internet security. For example, McAfee, AVG, AVAST. These are just a few examples. We can also create a password with two words combined together. Most people tend to just use one word. The best passwords include capitals, lower case and numbers. For example, G0rt3x. And of course, don't open any emails from someone you don't know. 

Saturday, February 1, 2014

Tutorial Assignment #3 - Final Project Proposal

Google syntax is important in everyday lives. Whether it is for a student who is doing a research essay or just a regular day to day person trying to look for something on Google, learning how to search effectively and efficiently is important. It can save you lots of time because key words are the key when doing a Google search. When you use the right words, you will be able to find the information much faster.


By: Derrick Wee & Fionn Luk