Project 3 Word Document - Department of Engineering Technology

advertisement
Task #1
I.
Lab Exercises
SVG Viewer
From the Adobe website we downloaded the plugin to enable the viewing of
.SVG files. We then found a website which had links to various CAD files which were
converted to .SVG files. A converter we found is called CAD2SVG Converter and it can
be found at the following site www.aftercad.com/cad2svg-examples.html. Figure 1
displays a schematic drawn in the CAD program Protel and viewed using the SVG
plugin. Figure 2 shows how we can zoom in on the schematic while in the browser.
Figure 1: Viewing a .svg file
Figure 2: Zoomed in on .svg file
II.
Apple’s Quicktime
We downloaded Apple’s Quicktime and viewed a couple of Quicktime pictures.
This allowed us to rotate the picture in 3D. Figure 3 shows a picture of Apple’s G4
Powerbook. We were able to rotate and see all the dimensions of the hardware. We also
viewed a couple of panoramas at the following site www.virtualparks.org. Quicktime is
needed in order to view these panoramas of different scenic views. Once the panoramic
is loaded into the browser, with control of the mouse one can control the view and
observe the scenery like physically being there. Figure 4 displays a panoramic view of a
green pasture.
Figure 3: Quicktime picture
Figure 4: Panoramic view displayed in Quicktime
The website www.panomundo.com/panos/howto/index.html was very helpful in
understanding how to make these beautiful images. They provided a tutorial for taking
an amateur hobbyist through the steps and the equipment needed to produce a panorama.
The tutorial given is from the ground up so it is especially made for beginners. Click on
the link above to get a full description in detail. The person that wrote the tutorial warns
this is a very patient procedure and it might seem overwhelming at first, but the more
practice one gets the more efficient one will become.
III.
Animation Factory
The animation factory will bring life to your emails, presentations, web pages,
and videos. The website www.animationfactory.com provides 3D clip art, PowerPoint
templates, video backgrounds, backdrops, etc. They provide animated characters for all
occasions along with templates for various projects. We wanted to try an animated
character but we would have had to buy a membership. However, we sampled a free
PowerPoint template. Figure 5 shows the PowerPoint template sample from the
animation factory.
Figure 5: PowerPoint template from animation factory
IV.
Gimp
Gimp is an open source graphics creation and manipulation application similar to
Adobe Photoshop. Gimp is used for such tasks as photo retouching, image composition
and image authoring. We downloaded Gimp and the GTK +2 Runtime Environment.
The first thing we did with Gimp was crop, resize, and lighten up the background in our
Group 3 picture. Figure 6 displays our group picture in the Gimp editor window. Figure
7 shows a picture of an individual member of our group about to be edited using Gimp.
The final results of our edited pictures can be seen on our individual and group website.
Figure 6: Editing group picture using Gimp
Figure 7: Individual picture edited using Gimp
Figure 8 displays a picture of a stained glass window from a group member’s father’s
business. This was originally taken for a website. We used Gimp to at first scale it down
to size we could display in our report. Notice the original pixel size of 2576x1932; we
scaled it down to 500x400. Next we cropped the picture to just display the stain glass
window. With a little color adjustment the final picture can be seen in Figure 9.
Figure 8: Picture of stain glass window
Figure 9: Final picture
V.
Inkscape
Inkscape is an open source vector graphics editor, with capabilities similar to
Illustrator, Freehand, etc. Some of the supported SVG features include shapes, text,
paths, markers, clones, alpha bending, transforms, gradients, patterns, and grouping.
Inkscape also supports Creative Commons (nonprofit organization that offers flexible
copyright licenses for creative works) meta data, node editing, layers, complex path
operations, bitmap tracing, text-to-path, flowed text, direct XML editing, etc. Inkscape’s
main goal is to create a powerful and convenient drawing tool fully compliant with XML,
SVG, and CSS standards. Figure 10 shows the group logo we designed using Inkscape.
Our logo is of an integrated circuit IC chip containing a CPU and other various
components.
Figure 10: Group 3’s logo for website
VI.
Yahoo Group Photo Album
This part of the lab we were to make a photo album of our group is Yahoo’s
photo album option. We took pictures of the members of our group while we were
working on different projects in the RF lab. Figure 11 shows our group album we made
using the Yahoo Group photo album feature. We found this very easy to use because all
a person has to do is attached the saved pictures to the site.
Figure 11: Yahoo Group photo album
VII.
Jalbum
Jalbum is a free program used for web photo album generation. Jalbum
allows a user to generate an HTML album from a collection of digital photos.
The person has the option to publish on the internet or they can burn to a portable
storage medium such as CD, DVD, and flash drives. The software includes pre
made templates and users are encouraged to make and distribute their own.
Figure 12 displays our photo album web page created by Jalbum. Jalbum was
actually quicker than Yahoo Groups in creating the album, with one click and
drag the album can be uploaded to the software.
Figure 12: Group photo album created by Jalbum
VIII. Sothink Glanda
Sothink Glanda is a flash animation program for both novice and intermediate
users. A person can create an attention-grabbing ad banner, text animation, eye catching
Flash album and greeting card. This is program was very ease to use also and is equipped
with lots of features to create an interesting photo album. Figure 13 shows a preview to
the photo album we created using this software.
Figure 13: Photo album creating using Glanda
IX.
Windows Media Encoder 9
Windows media encoder is a powerful tool for content producers who to want to
capture audio and video content using the many innovations in Windows Media,
including high-quality multi-channel sound, high-definition video quality, and support for
mixed-mode voice and music content. We use Media Encoder 9 to capture a moving
screen in the windows environment. During the moving screen capture we gave a
demonstration on how to do a FTP using FileZilla. The resulting screen shot segment
was saved as .wmv file. This .wmv file can be accessed through each of our individual
website pages. Figure 14 shows a screen shot of the Media Encoder Environment.
Figure 14: Windows Media Encoder 9
X.
Wink
Wink is a tutorial and presentation creation software, primarily aimed at creating
tutorials on how to use a specific software tool. We used Wink to show a moving
panoramic view of St. Peter’s Basilica. Wink captures images one by one during the time
capture mode. After the person has the desired amount of screen shots, the screen shots
are rendered to produce a moving image. Wink outputs this image as a .htm file. Our
group page has a link demonstrating the moving screen shot we created using Wink.
Figure 15 shows a screen shot of St. Peter’s Basilica in the Wink environment. Notice all
the screen captures at the bottom, those are all rendered together with the green arrow.
Figure 15: Screen shot of Wink
XI.
Crazy Talk
With Crazy Talk a person can create and control a virtual cast of live talking
characters. These characters can then be used for your video, web, mobile or messaging
projects. Besides creating animated characters with Crazy Talk, the person has the option
of uploading a realistic photo. This photo can be further processing using image
processing techniques included in the software. The photo can then be brought to life
using a Text-To-Speech plugin which is separately downloaded and then integrated into
Crazy Talk. Figure 16 shows the animated character we created in Crazy Talk. This
character can be seen in action by accessing the group’s web page.
Figure 16: Our animated character we designed using Crazy Talk
Task #2
Weblog update
See Group 3 individual weblogs found on each individual member’s website.
Task #3
Update Project #2
We provided the descriptions of personal and engineering related interests
missing from each individual’s webpage. Original Project 1’s MS word link was updated
and the revised Project 1 can be found in the section called “Project 1 Revision” in
Project 2. In Project 2 we added a table which included the cost comparison of the group
collaboration tools.
Task #4
Update Group Webpage with Project 3 files
We updated the group page to provide a link to the final project report in MS
word and html and we provided a link for the final PowerPoint presentation.
Task #5
I.I.
Project Topic Paper
Introduction
The beginning of the Information Age saw a new tool set which paved the way
for the Digital Era. These tools transmit, receive, operate on and store data in digital
form. Thus, information services and information products were designed setting the
beginning stages of a completely new era or a digital revolution. A key concept behind
the Digital Era is information can be represented in binary form. Whether it is data
scanned from a clerk or fingerprints, the data is encoded into digital form. In order to
process this information, new digital equipment had to be implemented in order to realize
this new way of manipulating data.
Digital equipment involves both software and hardware. Software consists of
written programs, consisting of instructions and procedures, which tell the hardware how
to execute the data. Hardware, which processes the software instructions, has evolved a
long way since the early days of the vacuum tube. Now days, there are millions of
transistors which make up an integrated circuit fabricated on a silicon wafer. These
advancements in hardware allowed for the design of data networks, which interlink
processing nodes in individual computers to create a network of networks.
In the beginning there were few issues related to this network of networks called
the internet. Presently, there are more issues and controversies surrounding the Digital
Era that wide spread debate is very common amongst peers, colleagues and the
government. This paper focuses on three main issues surrounding this era: privacy,
security, and copyright.
I.II.
Privacy Defined
Privacy is the right a person has to retain personal or confidential information
about oneself from anyone, unless he or she willingly shares the information. One can
relate privacy to anonymity, although it is often most highly valued by famous people
whom always seem to be in the public eye. With the advent of the Digital Age, we as
individuals have to become more aware of how our privacy is constantly under attack.
Not only do we have to concern ourselves with the criminal-minded individual trying to
tap into our privacy via the net, but also there is an ever-growing debate between the
tradeoff of our individual privacy and the security methods practiced by our government.
Other issues raised of late are whether popular information tech companies, like Google,
can be entrusted in maintaining the individual’s privacy. These issues are due to the
major advancements in digital technology.
I.III.
Privacy in the Digital Era
The biggest advance in digital circuitry is the speed at which they operate. This
allows more information to be processed at a time giving rise to applications that were
once to computationally intensive. These applications are becoming a part of our
everyday lives and are under debate whether or not they infringe on to much of our
privacy. Due to the increased technological advances in the Digital Era, various new
technologies have raised question whether or not they are a hindrance to our privacy,
even though they may have good intentions for the well-being of society. Current
privacy issues because of advanced technology are biometrics, location tracking,
electronic communications, etc.
Biometrics
Every American is familiar with the Super Bowl. However, most Americans do
not know that at Super Bowl XXXV in Tampa Bay, Florida a new kind of identification
system was employed as a security measure. This identification method known as facial
recognition is a form of biometrics. Here a computer system is designed to identify a
person based on their biometric characteristics. The facial recognition system obtains
biometric samples of the person it wishes to identify and compares the samples to
biometric data stored in a database. If there is a match, the system is able to identify the
person at hand. Referred to as a "one-to-many" match, this type of facial recognition is
used by the police to identify criminals, as well as by government officials to identify
suspected terrorists on the wanted list. Most people would not object to using this
technology to catch criminals or terrorists.
Several issues arise from other uses of biometric data. Government agencies are
starting to use facial recognition as an authentication device to identify qualified
recipients for benefit-entitlement programs and registration systems such as driver's
licenses, voting and other applications. Here the individual’s biometric data is stored on
a smart card and used to verify the user is who he or she claims to be. Privacy issues
arise because some people object to the idea of submitting to an examination to obtain the
required data to form a biometric model. Whether it is an eye machine for retinal data,
DNA samples, or handing over their fingerprints, most people are not willing just to give
up personal information like this. All this information can then be stored in different
databases, which are linked together, and organizations will have access and can share
the data amongst themselves without any knowledge and control from the individual.
Location Tracking
The Digital Era has brought huge advancements in the cell phone industry. At
one time all cell phones were analog. Today’s digital cell phones are smaller, produce
better signal quality, and most even have cameras embedded in them. However, almost
every American carries a cell phone without realizing government agencies can track
their movements through signals radiating from their mobile handset. Cell phones act
like low-power radio transmitters. Cell phone providers can find out the location of that
phone with an accuracy of about 300 yards using multiple cell towers to measure a signal
transmitted by the phone. The past few years have seen an increase in law enforcement
agencies using this technology as a tool for secretly observing the movements of
suspects.
Newer cell phones are also equipped with on-demand tracking, or the “alwayson” feature. These provide emergency location reporting for the elderly or disabled.
These types of phones come with a large red “Alarm” button on top that automatically
places the call the service provider. This service was marketed for people needing quick
access to emergency services, such as the elderly and disabled as well as professionals
like doctors, security staffs, and taxi drivers. By having an “always-on” GPS receiver the
user’s location is reported as soon as the call is placed and help can be directed very
quickly.
What about people who buy this phone for other reasons than emergency
purposes. The question of privacy once again is brought to attention. Do we really want
the cell phone provider and government to be able to determine our location at any given
time? GPS receivers have been used for sometime now and offer many advantages to the
traveling person. Navigation software is based on knowing your own location with a
high degree of accuracy. When the person asks the navigator to locate a place, i.e.
restaurant, gas station, etc., the navigator system is tracking the person at hand.
Essentially the person is tracking himself and is quite different than being tracked by a
third party.
Other new technologies such as RFID tags, implanted radio chips, and license
plate cameras have come under the same scrutiny. One main push for these new tracking
devices is the idea of finding your children when they are lost. However, most skeptics
agree these things do a lot more than just find lost children. They give the tracker, the
person trying to find someone, an enormous amount of information about where the
person goes, with whom they associate, what they do, what they buy, and the list goes on.
That gives the tracker a lot of power he or she can potentially abuse.
Electronic Communications
One of the main concerns of individual privacy involves a type of electronics
communication every person in the world is familiar with and uses regularly, the internet.
A key issue in recent year is the anonymity of the user when he or she is browsing the
information superhighway. Does the user really want his or her every step to be tracked
while they browse? Just that information alone can tell a lot about a person whether good
or bad. When the beginning user surfs the web he or she might think they are
anonymous, but there are various ways that information about ones activities can be
collected without your knowledge and consent. Some privacy threats on the web are
cookies, browsers, search engines, email, spam, etc.
A. Cookies
Cookies are pieces of information that an internet website sends to your browser
when information is accessed from that site. When your computer receives the
information the browser saves the information on the hard drive. Now each time the
same computer is used to access the same website, the data which was previously
received is sent back to the site by the browser. One might ask why cookies are used. In
general, when an internet site is accessed through a public Internet Service Provider
(ISP), each request made to the website cannot be linked to a previous request. This is
because each request does not contain a permanent unique identifier. Cookies allow
website operators to assign a unique permanent identifier to a computer which can be
used to associate the requests made to the website from that computer.
Many internet surfers strongly object to cookies as they feel they’re invading their
hard drive without their permission. Cookies indicate to a website the person has been
there before and they can be used to record what parts of the site was visited. Because of
this a profile of a person’s buying habits and what he or she is interested can be created
through the use of cookies.
B. Browsers
The most widely used browsers are the versions of Netscape Navigator and
Microsoft’s Internet Explorer. There have been many reports of security flaws in both of
these browsers. These security bugs allow hackers and websites to access a person’s
personal information while surfing the web. In an article in March’s issue of PCWORLD
Magazine they found 79 security vulnerabilities in the Internet Explorer browser.
Mozilla Firefox was the least vulnerable with only 21 security threats. Most browsers
offer security updates to fix security issues when a known bug is found. These can be
downloaded from their site.
C. Search Engines
Thanks to Google, search engines have been brought to question on how much
they compromise our privacy. There has been recent speculation into how Google treats
the data they collect. A group of people called Google Watch has raised nine interesting
privacy issues involving Google. These issues were raised in conjunction with
nominating Google for the Big Brother award in 2003. Here are the nine points taken
directly from their site www.google-watch.org/bigbro.html:
1. Google’s immortal cookie:
Google was the first search engine to use a cookie that expires in 2038.
This was at a time when federal websites were prohibited from using
persistent cookies altogether. Now it’s years later, and immortal cookies
are commonplace among search engines; Google set the standard because
no one bothered to challenge them. This cookie places a unique ID
number on your hard disk. Anytime you land on a Google page, you get a
Google cookie if you don’t already have one. If you have one, they read
and record your unique ID number.
2. Google records everything they can:
For all searches they record the cookie ID, your internet IP address, the
time and date, your search terms, and your browser configuration.
Increasingly, Google is customizing results based on your IP number.
This is referred to in the industry as “IP delivery based on geolocation.”
3. Google retains all data indefinitely:
Google has no data retention policies. There is evidence that they are able
to easily access all the user information they collect and save.
4. Google won’t say why they need this data:
Inquiries to Google about their privacy policies are ignored. When the
New York Times (2002-11-28) asked Sergey Brin about whether Google
ever gets subpoenaed for this information, he had no comment.
5. Google hires spooks:
Matt Cutts, a key Google engineer, used to work for the National Security
Agency. Google wants to hire more people with security clearances, so
that they can peddle their corporate assets to the spooks in Washington.
6. Google’s toolbar is spyware:
With the advanced features enabled, Google’s free toolbar for Explorer
phones home with every page you surf, and yes, it reads your cookies too.
Their privacy policy confesses this, but that’s only because Alexa lost a
class-action lawsuit when their toolbar did the same thing, and their
privacy policy failed to explain this. Worse yet, Google’s toolbar updates
to new versions quietly, and without asking. This means that if you have
the toolbar installed, Google essentially has complete access to your hard
disk every time you connect to Google (which is many times a day). Most
software vendors, and even Microsoft, ask if you’d like an updated
version. But not Google. Any software that updates automatically
presents a massive security risk.
7. Google’s cache copy is illegal:
Judging from Ninth Circuit precedent on the application of U.S. copyright
laws to the Internet, Google’s cache copy appears to be illegal. The only
way a webmaster can avoid having his site cached on Google is to put a
“noarchive” meta in the header of every page on his site. Surfers like the
cache, but webmasters don’t. Many webmasters have deleted
questionable material from their sites, only to discover later that the
problem pages live merrily on in Google’s cache. The cache copy should
be “opt-in” for webmaster, not “opt-out.”
8. Google is not your friend:
By now Google enjoys a 75 percent monopoly for all external referrals to
most websites. Webmasters cannot avoid seeking Google’s approval these
days, assuming they want to increase traffic to their site. If they try to take
advantage of some of the known weaknesses in Google’s semi-secret
algorithms, they may find themselves penalized by Google, and their
traffic disappears. There are no detailed, published standards issued by
Google, and there is no appeal process for penalized sites. Google is
completely unaccountable. Most of the time Google doesn’t even answer
email from webmasters.
9. Google is a privacy time bomb:
With 200 million searches per day, most from outside the U.S., Google
amounts to a privacy disaster waiting to happen. Those newlycommissioned data-mining bureaucrats in Washington can only dream
about the sort of slick efficiency that Google has already achieved.
D. Email
How a person sets up their email address may affect his or her privacy. In
comparing it to a street address it is ideally a locator, except the person is located in
cyberspace instead of a real physical space. The format of an email is W@X.Y.Z, where
W is the person’s handle, X is usually the ISP or the organization the person works for,
and Y and Z are domains. If a person is concerned with their privacy they might create a
handle which does not give any clue about their name. They also might use a stand alone
email application like hotmail, which gives no reference to their work or what country
they live in and so on. The advantage of this is the person can only reveal their identity
to who they wish. If the person wishes to be kept anonymous it is important to use an
ISP which has disabled the Finger utility. The reason for this is someone can still use
their email address to find out their name and other information about them.
E. Spam
Spam is junk email. It may come from purchases which people have made
through various companies online, being apart of newsgroup or mailing lists,
subscribing to a news service, etc. This is due to the fact these public sources can
be harvested for email addresses. Even some ISPs and other internet businesses
have solicited lists of their customer’s email addresses to spammers. This
practice is looked down upon greatly and should be illegal. Spammers have been
known to use computer programs which randomly generate email addresses.
Spam has become so common it can slow down the whole network. There is now
a big anti-spam movement which the government has even gotten involved in to
determine the legality of it. Spam is now illegal in Australia. Legislation was
passed there, the Spam Act, 2003, making it illegal to send, or cause to be sent,
‘unsolicited commercial electronic messages’.
F. Anonymity
For those of us who wish to stay anonymous on the WWW this might see
like an impossible task. Although a person can not be completely anonymous
because someone is always tracking information, there are a few tools out there
which help tremendously in our quest to attain a self-assured level of privacy.
Remember, even with an internet tool which assures us privacy, someone else
created it and someone is monitoring the network. So it boils down to whether or
not the user trusts the third party.
“Anonymizer” is a typical example of a web anonymity tool. Here there is
a third-party website which acts as a middle layer between the user and the
internet site visited. Instead of the user establishing a direct link to the requested
site, his or her request goes through the Anonymizer website which forwards the
information to the requested site. Once the connection is made, the Anonymizer
forwards the information received from the requested site back to the user. The
requested website has no idea where the packets of information are being
requested and sent back to originally. The Anonymizer server can monitor all the
websites visited by the user, thus collecting information about his or her behavior.
It comes down to whether or not the user can trust the provider of the Anonymizer
service.
I.IV
Privacy and the Government
All the new technological advances can be used for the good of mankind.
The question of debate is how much do we let the government pry into our
everyday lives in order to defend the country. Biometrics, location tracking, and
electronic communications can all be used to provide a safer way of life.
However, each one can provide a powerful means of secretly spying on an
individual. These new technologies allow access to information that was once
unattainable. Private conversations, private meetings, the whereabouts of certain
individuals were all at one time just what they state, private. On the other hand,
where do most sinister plots take place, in private. So if the government has the
means to spy on potential terrorists, why not.
The main problem with this is they sift through a lot of irrelevant data that
belongs to an innocent individual. While they scan emails for terrorist
buzzwords, how many irrelevant emails do they come across? Where is the line
drawn between doing random searches and specifically tracing a potential
suspect’s internet history? These questions only get harder when one considers
the passing of the Patriot Act which gives the government full resources in the
digital domain to do basically whatever is necessary to track down suspected
terrorists.
For example, under Section 206 of the Patriot Act the FBI can conduct
roving surveillance on an individual suspect. With a single warrant the FBI could
raid every single house or office the individual suspect has visited over a year. It
doesn’t even matter whether or not the place belonged to the suspect; any one
place associated with the subject is fair game. In the communications context of
this section the FBI doesn’t even really have to identify the suspect in question.
They can conduct roving surveillance; meaning the FBI can wiretap every single
phone line, mobile communications device or internet connection that a suspect
might be using, without having to identify the suspect by name. Some people
believe this gives the FBI a “blank check” to violate the communications privacy
of countless Americans.
Americans must realize we live in a different world with far more
threatening organizations than in the past. Desperate times call for desperate
measures. Most Americans are happy to give up some of their privacy to ensure
there is not another 9/11. From then to now there have been plots dismantled due
to the government intelligence gathered from various digital technologies. There
is just a real fine line on how far we should let them invade our privacy.
References
http://www.google-watch.org/bigbro.html
http://www.privacy.gov.au/internet/internet_privacy/
http://www.infosyncworld.com/news/n/5267.html
http://www.mindfully.org/Technology/2005/Cellphone-Tracking-Privacy10dec05.htm
http://www.eff.org/patriot/sunset/206.php
http://gnunet.org/papers/p255.pdf
II.
Security
Internet security is the process of putting up barriers between a computer and the
internet. This can be done through different forms of software and hardware, such as
router usage and anti-spyware software.
Router Security
The use of a router can greatly reduce the risk of computer hacking. The router
must use NAT (Network Address Translation), which is re-writing the source and/or
destination addresses of IP packets as they pass through a router or firewall. Most
systems using NAT do so in order to enable multiple hosts on a private network to access
the Internet using a single public IP address. According to specifications, routers should
not act in this way, but many network administrators find NAT a convenient technique
and use it widely. Nonetheless, NAT can introduce complications in communication
between hosts.
NAT enables multiple computers to access to the Internet over a single high-speed
link. NAT also typically has the effect of preventing connections from being established
inbound into your computer, whilst permitting connections out. Getting a router in your
home improves the security of a home LAN; some people consider that they don't need a
firewall if they have a router. Typically, a router acts as a junction between two or more
networks to transfer data packets among them. A router is different from a switch. A
switch connects devices to form a Local Area Network (LAN).
One easy illustration for the different functions of routers and switches is to think
of switches as neighborhood streets, and the router as the intersections with the street
signs. Each house on the street has an address within a range on the block. In the same
way, a switch connects various devices each with their own IP address on a LAN.
However, the switch knows nothing about IP addresses except its own management
address. Routers connect networks together the way that on-ramps or major intersections
connect streets to both highways and freeways, etc. The street signs at the intersection
(routing table) show which way the packets need to flow. For example, a router at home
connects the Internet Service Provider's (ISP) network (usually on an Internet address)
together with the LAN in the home (typically using a range of private IP addresses) and a
single broadcast domain. The switch connects devices together to form the LAN.
Sometimes the switch and the router are combined together in one single package sold as
a multiple port router. The following picture depicts the differences:
In order to route packets, a router communicates with other routers using routing
protocols and using this information creates and maintains a routing table. The routing
table stores the best routes to certain network destinations, known as the "routing
metrics" associated with those routes, and the path to the next hop router. Routing is
most commonly associated with the Internet Protocol, but other types of protocols can be
used.
Firewall Security
A firewall is a possible solution to someone with only one computer in their
home. What it can do for you is block traffic to all unauthenticated ports on your
computer, thus restricting access. A stateful firewall is even more cautious about what it
permits through, and the most cautious system administrators often combine a proxy
firewall with a packet-filtering firewall to create defense in depth. Most home users
would use a software firewall, while some high risk servers and computers might need a
hardware firewall. A firewall is a piece of hardware and/or software which functions in a
networked environment to prevent some communications forbidden by the security
policy.
Firewalls use one or more of three methods to control traffic flowing in and out of the
network:

Packet filtering - Packets (small chunks of data) are analyzed against a set of
filters. Packets that make it through the filters are sent to the requesting system
and all others are discarded.

Proxy service - Information from the Internet is retrieved by the firewall and then
sent to the requesting system and vice versa.

Stateful inspection - A newer method that doesn't examine the contents of each
packet but instead compares certain key parts of the packet to a database of
trusted information. Information traveling from inside the firewall to the outside
is monitored for specific defining characteristics, then incoming information is
compared to these characteristics. If the comparison yields a reasonable match,
the information is allowed through. Otherwise it is discarded.
A firewall is also called a Border Protection Device (BPD), especially in NATO
contexts, or packet filter in BSD contexts. A firewall has the basic task of controlling
traffic between different zones of trust. Typical zones of trust include the Internet (a zone
with no trust) and an internal network (a zone with high trust). The ultimate goal is to
provide controlled connectivity between zones of differing trust levels through the
enforcement of a security policy and connectivity model based on the least privilege
principle. Network layer firewalls operate at a (relatively) low level of the TCP/IP
protocol stack as IP-packet filters, not allowing packets to pass through the firewall
unless they match the rules.
The firewall administrator may define the rules; or default built-in rules may
apply (as in some inflexible firewall systems). A more permissive setup could allow any
packet to pass the filter as long as it does not match one or more "negative-rules", or
"deny rules". Today network firewalls are built into most computer operating systems
and network appliances. Modern firewalls can filter traffic based on many packet
attributes like source IP address, source port, destination IP address or port, destination
service like WWW or FTP. They can filter based on protocols, TTL values, netblock of
originator, domain name of the source, and many other attributes.
Application-layer firewalls work on the application level of the TCP/IP stack (i.e.,
all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or
from an application. They block other packets (usually dropping them without
acknowledgement to the sender). In principle, application firewalls can prevent all
unwanted outside traffic from reaching protected machines. By inspecting all packets for
improper content, firewalls can even prevent the spread of the likes of viruses. In
practice, however, this becomes so complex and so difficult to attempt (given the variety
of applications and the diversity of content each may allow in its packet traffic) that
comprehensive firewall design does not generally attempt this approach.
The XML firewall exemplifies a more recent kind of application-layer firewall. A
proxy device (running either on dedicated hardware or as software on a general-purpose
machine) may act as a firewall by responding to input packets (connection requests, for
example) in the manner of an application, whilst blocking other packets. Proxies make
tampering with an internal system from the external network more difficult and misuse of
one internal system would not necessarily cause a security breach exploitable from
outside the firewall (as long as the application proxy remains intact and properly
configured). Conversely, intruders may hijack a publicly-reachable system and use it as a
proxy for their own purposes; the proxy then masquerades as that system to other internal
machines. While use of internal address spaces enhances security, crackers may still
employ methods such as IP spoofing to attempt to pass packets to a target network.
Security against Viruses, Worms, Trojan Horses, & Spyware
Hackers write programs called computer viruses, worms, trojan horses and
spyware. These programs are all characterized as being unwanted software that installs
itself on your computer through deception. Trojan horses are simply programs that
conceal their true purpose or include a hidden functionality that a user would not want.
Worms are characterized by having the ability to replicate themselves and viruses are
similar except that they achieve this by adding their code onto third party software. Once
a virus or worm has infected a computer, it would typically infect other programs (in the
case of viruses) and other computers. Viruses also slow down system performance and
cause strange system behavior and in many cases do serious harm to computers, either as
deliberate, malicious damage or as unintentional side effects.
In order to prevent damage by viruses and worms, you need either to completely
isolate your computer from dangers (impractical for many people or networks) or install
anti-virus software, which typically runs in the background on your computer, detecting
any suspicious software and preventing it from running. Generally, anti-virus software
may be also be used to scan all of the files on a computer occasionally. Because of the
continuing increase in the number of viruses and worms being identified, all good antivirus software include a facility to regularly update the data that is used to identify
viruses. As well as the commercial antivirus programs, which generally require an
annual subscription, there are free antivirus programs available, but the best commercial
programs appear to be a little more reliable at present. Here are some statistics of virus
trafficking from the past week:
Past 7
days
#
Virus Name
1
2
3
4
5
6
Exploit-WMF
JS/Wonka
Exploit-ByteVerify
Exploit-ANIfile
Adware-Url.gen
Downloader-ZQ
Generic
Downloader.z
Adware-Boarim
Adware-Cometsys
JV/Shinwow
7
8
9
10
Infected
Computers
Scanned
Computers
% Infected
43,451
40,810
34,966
31,114
29,956
27,797
955,481
955,481
955,481
955,481
955,481
955,481
4.55
4.27
3.66
3.26
3.14
2.91
27,545
20,991
17,779
15,491
955,481
955,481
955,481
955,481
2.88
2.2
1.86
1.62
Several companies provide a comparison of the performance of different antivirus
programs which should be useful in making a decision as to which to use. Some malware
programs that can be classified as trojans with a limited payload are not detected by most
antivirus software and may require the use of other software designed to detect other
classes of malware, including spyware.
Many users install anti-virus software that can detect and eliminate known viruses
after the computer downloads or runs the executable. They work by examining the
contents of the computer's memory (its RAM, and boot sector) and the files stored on
fixed or removable drives (hard drives, floppy drives), and comparing those files against
a database of known virus "signatures". Some anti-virus programs are able to scan
opened files in addition to sent and received emails 'on the fly' in a similar manner. This
practice is known as "on-access scanning."
Anti-virus software does not change the underlying capability of host software to
transmit viruses. There have been attempts to do this but adoption of such anti-virus
solutions can void the warranty for the host software. Users must therefore update their
software regularly to patch security holes. Anti-virus software also needs to be regularly
updated in order to gain knowledge about the latest threats and hoaxes.
Here is an example of McAfee’s virus detecting software:
Another widely used virus detecting software is made by Norton, but users should
beware of both these famous programs as viruses are now constructed to specifically
attack them, so in some cases it may be better to use a lesser known program. Virus
writers can have various reasons for creating and spreading malware. Viruses have been
written as research projects, pranks, vandalism, to attack the products of specific
companies, to distribute political messages, and financial gain from identity theft,
spyware, and cryptoviral extortion.
Some virus writers consider their creations to be works of art, and see virus
writing as a creative hobby. Additionally, many virus writers oppose deliberately
destructive payload routines. Some viruses were intended as "good viruses". They spread
improvements to the programs they infect, or delete other viruses. These viruses are,
however, quite rare, still consume system resources, may accidentally damage systems
they infect, and, on occasion, have become infected and acted as vectors for malicious
viruses. Moreover, they normally operate without asking for permission of the owner of
the computer. Since self-replicating code causes many complications, it is questionable if
a well-intentioned virus can ever solve a problem in a way which is superior to a regular
program that does not replicate itself.
Spyware refers to a broad category of malicious software designed to intercept or take
partial control of a computer's operation without the informed consent of that machine's
owner or legitimate user. While the term taken literally suggests software that
surreptitiously monitors the user, it has come to refer more broadly to software that
subverts the computer's operation for the benefit of a third party. Spyware differs from
viruses and worms in that it does not usually self-replicate. Like many recent viruses,
however, spyware – by design – exploits infected computers for commercial gain.
Typical tactics furthering this goal include delivery of unsolicited pop-up
advertisements; theft of personal information (including financial information such as
credit card numbers); monitoring of Web-browsing activity for marketing purposes; or
routing of HTTP requests to advertising sites. As of 2005, spyware has become one of
the pre-eminent security threats to computer-systems running Microsoft Windows
operating-systems (and especially to users of Internet Explorer because of that browser's
collaboration with the Windows operating system). Some malware on the Linux and
Mac OS X platforms has behavior similar to Windows spyware, but to date has not
become anywhere near as widespread. An example of how spyware infiltrates a pc is
depicted in the following figure:
Malicious websites may attempt to install spyware on readers' computers. In this screenshot a spamblog has
triggered a pop-up that offers spyware in the guise of a security upgrade.
The most direct route by which spyware can infect a computer involves the user installing
it. However, users tend not to install software if they know that it will disrupt their
working environment and compromise their privacy.
So many spyware programs deceive the users, either by piggybacking on a piece
of desirable software, or by tricking the users to do something that installs the software
without them realizing. Recently, spyware has come to include "rogue anti-spyware"
programs, which masquerade as security software while actually doing damage.
Classically, a Trojan horse, by definition, smuggles in something dangerous in the guise
of something desirable. Some spyware programs get spread in just this manner. The
distributor of spyware presents the program as a useful utility — for instance as a "Web
accelerator" or as a helpful software agent. Users download and install the software
without immediately suspecting that it could cause harm. An example of some software
that can be downloaded and installed into an internet browser is as follows:
Many Internet Explorer add-on toolbars monitor the user's activity. When installed and run without the
user's consent, such add-ons count as spyware. Here multiple toolbars (including both spyware and
innocuous ones) overwhelm an Internet Explorer session.
Phishing
Phishing is a form of criminal activity using social engineering techniques. It is
characterized by attempts to fraudulently acquire sensitive information, such as
passwords and credit card details, by masquerading as a trustworthy person or business in
an apparently official electronic communication. Phishing is typically done using email
or an instant message, and it has more recently also been done via fax.



13,776 phishing attacks linked to 5,259 Web sites took place in August of 2005.
They targeted 84 different businesses, but three businesses received 80 percent of the
attacks.
85 percent of the attacks targeted banks and other financial institutions.
Here is a screenshot example from www.howstuffworks.com of a typical phishing
email:
Some more phishing statistics from www.wikipedia.org:
A chart showing the increase in phishing reports from October 2004 to June 2005.
References:
http://www.mcafee.com
http://www.symantec.com
http://www.wikipedia.org
http://www.howstuffworks.com
III.
Copyright and Copyright Infringement
What is copyright and copyright infringement? This section will answer that
question and will explain copyright, copyright infringement, and the tools used for each
of them. “Copyright is a set of exclusive rights granted by governments to regulate the
use of a particular expression of an idea or information. At its most general, it is literally
"the right to copy" an original creation. In most cases, these rights are of limited duration
(http://en.wikipedia.org/wiki/Copyright)i.” “Copyright infringement is the unauthorized
use of copyrighted material in a manner that violates one of the copyright owner's
exclusive rights, such as the right to reproduce or perform the copyrighted work, or to
make derivative works that build upon it. The slang term bootleg (derived from the use
of the shank of a boot for the purposes of smuggling) is often used to describe illicitly
copied material (http://en.wikipedia.org/wiki/Copyright_infringement)ii.”
Copyright protection has been in place in the US since the Copyright Act of 1790.
“The object of the act was the "encouragement of learning," and it achieved this by
securing authors the "sole right and liberty of printing, reprinting, publishing and
vending" the copies of their "maps, charts, and books" for a term of 14 years, with the
right to renew for one additional 14 year term should the copyright holder still be alive
(http://en.wikipedia.org/wiki/Copyright_Act_of_1790iii.” Since then many changes have
been made to copyright laws the two most important and recent ones include the
Copyright Act of 1976 and the Digital Millennium Copyright Act, DMCA.
The
Copyright Act of 1976 remains today the primary basis of copyright law in America. The
primary purpose of this act was to provide what is know as a fair use policy for copyright
holders.
The term fair use defines conditions under which individuals may use
copyrighted material without permission. Therefore anything that is not defined in the
fair use doctrine is considered copyright infringement. Also defined by this act what was
the copyright of expression.
“The Copyright Act of 1976 states that the items of
expression can include literary, dramatic, and musical works; pantomimes and
choreography; pictorial, graphic and sculptural works; audio-visual works; sound
recordings; and architectural works. An original expression is eligible for copyright
protection as soon as it is fixed in a tangible form
(http://www.benedict.com/Info/Law/LawWhat.aspx)iv.”
Since the Copyright Act of 1976 the most important copyright laws were defined
by the DMCA. “The act criminalizes production and dissemination of technology that
can circumvent measures taken to protect copyright, not merely infringement of
copyright itself, and heightens the penalties for copyright infringement on the Internet.
Passed on May 14, 1998 by a unanimous vote in the United States Senate and signed into
law by President Bill Clinton on October 28, 1998, the DMCA amended title 17 of the
US Code to extend the reach of copyright, while limiting the liability of Online Providers
from copyright infringement by their users
(http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act)v.”
Synonymous with copyright are the MPAA, Motion Picture Association of
America, and the RIAA, Recording Industry Association of America. “The MPAA's
mission is to protect member interests through political lobbying for changes in copyright
and criminal law. It seeks to promote digital rights management technologies, seen by
some as infringing on user rights and others as balancing user rights with artist
protection. The motion-picture equivalent of the RIAA, the MPAA has taken strong steps
to reduce the number of file-sharing sites online where copyrighted films are available for
download (http://en.wikipedia.org/wiki/Mpaa)vi.”
The RIAA has been primarily
responsible for setting recording standards for music artists and administering standards
for music recording and reproduction. The RIAA still today is responsible for the
collection of music licenses and royalties.
The MPAA and RIAA are also responsible for the continuing effort to protect
copyright and the fair use doctrine. Part of this ongoing effort includes the introduction
Digital Rights Management, DRM, tools. Digital Rights Management refers to
technologies used to enforce pre-defined fair use policies controlling access to software,
music, movies, or any other digital data. “To date, all DRM systems have failed to meet
the challenge of protecting the rights of the copyright owner while also respecting the
rights of the purchaser of a copy. And none has yet succeeded in preventing criminal
copyright infringement by organized, unlicensed, commercial pirates.
Flaws of some well known systems include:

Physical protection: Uses separate hardware to ensure protection. Examples
include hardware dongles that had to be attached to the computer prior to using
the content, and USB and smart card devices working in a similar fashion.
Physical protection methods consistently failed in consumer markets due to
compatibility problems and extra level of complexity in content use; however,
they did enjoy limited success with enterprise software.

DIVX: Required a phone line, inhibiting mobile use. To take a work for which
unlimited plays had been purchased (called DIVX Silver) to a friend's home, it
was necessary to carry a 14 kg (30 lb) DVD player as well as the light and
compact disc; or to telephone the DIVX service and have the player of the friend
transferred to the account of the purchaser of the work, and then call again to have
it switched back. The system prevented certain legal uses such as the creation of
compilations, by the purchaser. Under copyright law, the owner of a legallyobtained copy of a work may create compilations, or re-sell the copy in the
secondary (used goods) market. By using these technical measures, the DIVX
system was able to thwart the buyer's right of first sale and other fair use rights.
DIVX is a form of physical protection of the content (see above).

CSS – Content-scrambling system: Restricts fair use and first purchaser rights,
such as the creation of compilations or full quality reproductions for the use of
children or in cars. It also prevents the user from playing CSS-encrypted DVDs
on any computer platform (although this restriction can be easily circumvented).
Recently, the advent of DeCSS and cryptographic analysis of the CSS algorithm
have demonstrated flaws in this system which can be exploited to allow users to
recover some of their fair-use rights. Full quality digital copies can now be easily
made, making fair use by normal consumers easier. Although it has been argued
that programs like DeCSS make copyright infringement easier, this system has
never been effective in preventing illegal mass copying of DVDs by criminal
gangs, even before the system was found to be flawed. CSS is an example of
certificate-based encryption.

Product activation: Invalidates or severely restricts a product's functionality until
the product is registered with a publisher by means of a special identification
(activation) code. The process often uses information about the specific
configuration of the hardware on which the software runs, hashing it with the
identification number specific to the product's license. Microsoft was the first
company to use this method in its Microsoft Reader product. Activation was later
used with Windows XP and then with Office XP. Ultimately, workarounds which
bypassed the product activation system have been developed. In 2003, Intuit's use
of a flawed product activation scheme angered thousands of customers who were
denied legitimate use of the product, resulting in a formal apology by Intuit and
discontinuation of the use of the mechanism.

Digital watermarking: Allows hidden data, such as a unique disc ID, to be
placed on the media. Then, the name and address of the purchaser would be taken
at the location of sale, and entered into a database along with the unique media
ID. This does not prevent copying, but it ensures that any copies made of the
media will bear the same hidden information—so if the content appeared on (for
example) P2P networks, the ID number could be easily extracted and the
purchaser prosecuted. This scheme is flawed primarily because authenticating the
buyer as the infringing party is nearly impossible: The buyer may give a false
name and address or present false identification at purchase, the infringing party
may be someone who purchased or otherwise obtained the media second hand,
the media may have been borrowed or stolen from the original purchaser before
the
infringement
occurred,
etc.
(http://en.wikipedia.org/wiki/Digital_rights_management)vii”
Copyright Infringement historically has been around just as long as there have been
copyrights. Even though the penalties for copyright infringement are higher today than
they have ever been piracy is at the highest it has ever been. What has caused this
increase in piracy, well the MPAA and RIAA would say that the internet would be to
blame. However all the internet has done is shown haw easy it is to access whatever type
of media content you could imagine. Near limitless access to information does not seem
like something negative. It seems that who is to blame for copyright infringement should
be the MPAA and the RIAA for being behind in the technological race and not foreseeing
the possibilities that exist for marketing their products. Before internet file sharing
people hardly knew what constituted copyright infringement and even those who did
rarely were punished for it. As a matter of fact equipment such as dual cassette recorders
were marketed for the purpose of such things as recording mix tapes which is now
considered a breach of the fair use doctrine.
In 2005 during MGM vs.Grokster, Don Verrilli said to the Supreme Court "The
record companies, my clients, have said, for some time now, and it's been on their
website for some time now, that it's perfectly lawful to take a CD that you've purchased,
upload it onto your computer, put it onto your iPod."viii However later on that same year
“as part of the on-going DMCA rule-making proceedings, the RIAA and other copyright
industry associations submitted a filing that included this as part of their argument that
space-shifting and format-shifting do not count as noninfringing uses, even when you are
talking about making copies of your own CDs: Nor does the fact that permission to make
a copy in particular circumstances is often or even routinely granted, necessarily establish
that the copying is a fair use when the copyright owner withholds that authorization. In
this regard, the statement attributed to counsel for copyright owners in the MGM v.
Grokster case is simply a statement about authorization, not about fair use.
(http://www.eff.org/deeplinks/archives/004409.php)"ix
Why has the internet made copyright infringement so popular? With all the new
technologies available staying connected to digital content has become extremely
popular. With portable devices like MP3 players, media players, and DVD players,
society wants to be able to bring their media content with them. Even though the internet
may have enabled the access for copyright infringement it also opened the eyes of the
providers of this information to new business opportunities. Although programs like
Napster which was the first notable large internet file sharing community allowed users
to download free music and movies, without it there wouldn’t be programs like ITunes
and the legal version of Napster.
One of the main focuses of the MPAA and the RIAA lately has been with the
BitTorrent protocol. “BitTorrent is both the name of a peer-to-peer (P2P) file distribution
client application and also the name of the file sharing protocol itself, both of which were
created by programmer Bram Cohen. BitTorrent is designed to widely distribute large
amounts of data without incurring the corresponding consumption in costly server and
bandwidth resources. CacheLogic suggests that BitTorrent traffic accounts for ~35% of
all traffic on the Internet The BitTorrent protocol breaks the file(s) down into smaller
fragments, typically a quarter of a megabyte (256 KB) in size, though the larger the file,
the larger the piece size is by default—a 4.37 GB file will often have a piece size of 4
MB (4096 KB). Peers download missing fragments from each other and upload those that
they already have to peers that request them. The protocol is 'smart' enough to choose the
peer with the best network connections for the fragments that it is requesting. To increase
the overall efficiency of the swarm (the ad-hoc P2P network temporarily created to
distribute a particular file), the BitTorrent clients request from their peers the fragments
that are most rare; in other words, the fragments that are available on the fewest peers,
making most fragments available widely across many machines and avoiding
bottlenecks. The file fragments are not usually downloaded in sequential order and need
to be reassembled by the receiving machine. It is important to note that clients start
uploading fragments to their peers before the entire file is downloaded. Everyone can
eventually get the complete file as long as all the pieces are available somewhere in the
swarm, even if no one peer has the complete file (a complete copy of the file is called a
"seed").(http://en.wikipedia.org/wiki/Bittorent)x.” Below is a screen capture of a popular
bittorrent client known as UTorrent.
Bittorrent has been responsible for the sharing of TV shows, Movies, and CD’s.
The MPAA and RIAA have shut down and brought litigation against hundreds of top
bittorrent indexing sites. However the popularity of what these sites provide have kept
them multiplying. For every site that gets shut down at least 5 more take over in its
place. Due to this the licensing is now available to download and purchase entire movies
online. Just this past week Warner Brothers has signed a deal to distribute full feature
movies using the bittorrent protocol because of its ability to distribute media to
consumers.
In conclusion copyright and copyright infringement is an ongoing battle between
producers and consumers. However it is from advancements in copyright infringement
which have brought legal means for distributing the same media to consumers willing to
pay for legal content. Although piracy will always exist if the MPAA and RIAA can
conform to the needs of their consumers, more of society will convert too legally
obtaining copyrighted material.
i
http://en.wikipedia.org/wiki/Copyright
http://en.wikipedia.org/wiki/Copyright_infringement
iii
http://en.wikipedia.org/wiki/Copyright_Act_of_1790
iv
http://www.benedict.com/Info/Law/LawWhat.aspx
v
http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act
vi
http://en.wikipedia.org/wiki/Mpaa
vii
http://en.wikipedia.org/wiki/Digital_rights_management
viii
Verrilli, Don. (3/29/2005). “MGM v. Grokster In the Supreme Court of the United
States.” http://www.supremecourtus.gov/oral_arguments/argument_transcripts/04480.pdf
ix
http://www.eff.org/deeplinks/archives/004409.php
x
http://en.wikipedia.org/wiki/Bittorent
ii
Download