Pages

Clockwise..

Wednesday 7 December 2011


FLOW CHART DEFINED

A typical definition of "Flow Chart" usually reads something like ...
A flow chart is a graphical or symbolic representation of a process. Each step in the process is represented by a different symbol and contains a short description of the process step. The flow chart symbols are linked together with arrows showing the process flow direction.

AS-IS FLOWCHART

The first cool thing about flow charts is that they let you see the process flow at a glance, so my first alternate definition of "Flow Chart" is a Snap Shot of your Business Processes. This is commonly called an As-Is Flowchart. You can tell a lot about the complexity (and often over-complexity) of many business processes just by looking at an as-is flow chart of them - without even reading the text in the symbols. You can easily see the flow of information and materials, branches in the process, opportunities for infinite loops, the number of process steps, inter-departmental operations, and more.

A Note on Flowchart Symbols

Different flow chart symbols have different meanings. The most common flow chart symbols are:
·         Terminator: An oval flow chart shape indicating the start or end of the process.
·         Process: A rectangular flow chart shape indicating a normal process flow step.
·         Decision: A diamond flow chart shape indication a branch in the process flow.
·         Connector: A small, labeled, circular flow chart shape used to indicate a jump in the process flow.
·         Data: A parallelogram that indicates data input or output (I/O) for a process.
·         Document: used to indicate a document or report .

What is Hacker??

Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.

We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses. 

Examples of weaknesses include poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. (In nearly all the cases, the Information Syhstems department is not informed of these planned attacks.) Then we work with the customer to address the issues we've discovered.

The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.

From the interview with Dr. Charles C. Palmer, IBM. 

Monday 5 December 2011

News: Indulging rocket launcher technology


COUNTRIES of the world at this very optimistic in the development of space industry sectors in which Malaysia is no exception with the active development of the sector which is considered extreme.

This is evidenced by the launch of the country's first remote sensing satellite is successfully launched into TiungSAT low-earth orbit Low Earth Orbit (LEO) in 2000 and followed RazakSAT in 2009.
The two satellites involved was built using local expertise of Astronautic Technology Sdn. Ltd.(ATSB) through the National Space Agency (Space), agency of the Ministry of Science, Technology and Innovation (MOSTI).
Construction of satellites that marks the entrance to the space age Malaysia.
Looking back four years ago, when Malaysia celebrated the success of seconds the country's first astronaut, Datuk Dr. Sheikh Mustafa Shukor Sheikh Muszafar selected through the Russian Space Agency Astronaut Selection (Roscosmos), he has made it to the International Space Station (ISS) through the mission.
What I am connected is through both the achievements and success is the importance of launchers or rocket launcher technology to a country in enhancing the economic, social, political, and security.
Please note that the basic construction of satellites and astronaut missions depend on the ability to launch from Earth into orbit or beyond the layer of the earth's atmosphere.
If you look at the launch of RazakSAT TiungSAT and both require the services of renting commercial launchers from foreign countries.
Rocket launcher is owned by Russia and Zenit II rocket launcher Falcon 1 owned company Space Exploration Technologies (SpaceX) of the United States (U.S.).
Similarly, the mission's first astronauts to the ISS on board Soyuz TMA-11 rocket, which is owned by Russia.
Rental of commercial launcher-launcher requires a very high cost as well as country risk to be borne.
Among them, the cost of launching space rental increases from time to time, including the high logistics costs and do not have much control over the space launch program.
Malaysia could emulate the development of launcher technology development in the U.S. which is one of the main pioneers of the field.
The development of rocket technology in the U.S., which took more than 70 years is not a simple matter but face a difficult process.
It begins with a group of students from Caltech came to Arroyo Seco north of Pasadena Rose Bowl in which lies the Jet Propulsion Laboratory (JPL) today.
Their arrival was to test a small rocket motor.
The group consists of a combination of students with diverse interests and expertise of Frank Malina and later became the second director of JPL, a chemist Jack Parsons and Ed Forman a talented machine operator.
Their actions to make a rocket experiment is considered to be very brave and were driven by their intense interest in the field of rocket.
Based on an interview with Malina in 1968, he says, the first trial conducted in October 1936 in which there are no provisions available only to use their capital.
However, so-called good fortune as the rocketmen because getting strong support from the Theodore von Karman, who was a professor and Caltech aerodynamicist at the time.
However, their interest is not supported by the public at the time.
In fact, they were used as an object of ridicule and laughter is associated with the fantasy of children at the time.
Through experimentation and testing has been done on the rocket motor, it has improved a better launch in November 1936.
On January 16, 1937 they have successfully launched a rocket.
From the early moments of the experiment at Arroyo and the military work, to the space exploration, an experiment conducted 70 years ago opened the way for JPL as a place where extraordinary ideas into reality.
JPL will continue to operate to this day the U.S. government's huge investment results to see the great transformation to the development of rocket technology development. 
The hard work of the people and governments involved in developing rocket technology should be the lesson for the people and government of Malaysia.
Source: www.utusan.com (Published:05/12/11)

News: Flying robots build this tower at the FRAC Centre

by Mark R - on December 5th, 2011
What you are seeing here is a 20-foot tall, 1,500 block structure at the FRAC Centre in Orleans, and I think it’s pretty FRAC-ing amazing.
The reason why is because this structure is made by robots. Not just any robots, but flying robots. There are about four flying robots who serve as construction workers, and they have the quadrocopter construction of Parrot’s AR.Drone. There is a video of it after the jump showing a camera on one of these robots putting a block into place, and it is surprisingly precise.
I’m not certain how confident I would be just standing around a tower built by robots, but if you look on the video, it appears that there are a whole group of people standing around like they are at a party. Granted, the blocks are made of polystyrene foam, but I don’t feel comfortable in any room with a giant card house in it.
By the way, the tower is supposed to be a model of a futuristic city that is meant to house 30,000 people. Man, I wonder if one day, real flying robots will construct such a city.
For now, you can see this “Flight Assembled Architecture” at the FRAC center through February 19. This project is the work of architects Fabio Gramazio and Matthias Kohler, with the help of ETH Zurich roboticist Raffaello D’Andrea.
Source: www.coolest-gadgets.com

News: Nanotechnology expert added

WORLD is to focus exclusively on nanotechnology industry in which the sector could provide a significant positive impact in people's lives.
Malaysia also has started to move in parallel with the development of the industry.
According to the Minister of Science, Technology and Innovation (MOSTI) Datuk Seri Dr. Johnity Maximus Ongkili, Prime Minister Datuk Seri Najib Tun Razak has identified nanotechnology as an engine of growth for New Economic Model.
"The mission of government is to make the development of nanotechnology as a platform for science, technology, industry and the economy.
"Even the government is also aware that nanotechnology plays an important role in developing the country's industrial sector," he said in the NanoMalaysia 2011 Conference and Expo at Putra World Trade Centre (PWTC), Kuala Lumpur recently.
Clearly, the development and expansion that began in many areas of research with significant impact in daily life, it is difficult for the country rejected the potential and benefits of the technology.
However, the technology must be developed based on the guidance and control so that it does not cause any damage or harm.
To realize the government's intention in developing these technologies, a body known as the Establishment of the National Nanotechnology Directorate (NND) was approved by Cabinet in 2010.
Armed with a fund of RM2.63 million, NND began operating under MOSTI to implement the nanotechnology initiative.
NND functions as driver of the national nanotechnology initiative, develop strategies, coordinate the research and development (R & D).
In addition, it is also responsible for strengthening the existing nanotechnology research center with supporters recent research facilities.
Further enhance human capital development in nanoscience and technology, thus creating a network with the industry.
In fact, the government also provides suggestions NanoMalaysia program by making nanotechnology as a science of innovative and integrated.
Among others is the design direction and implementation strategies and monitoring programs and activities in the development, commercialization and industrialization of nanotechnology in Malaysia.
In addition, the government also continued to boost research activities, development, commercialization (R & D & C) in the field of nanotechnology in the country.
Through all of the planned program, expected to produce a positive output on the development of the country.
It includes the establishment of the National Nanotechnology Policy, Industrialization and Commercialization Framework and Technology Nanotechnology National Nanotechnology Road Map for 2011 to 2020.
The program will enhance human capital (RSE) trained with skills in science and technology.
It is expected that the addition involves the addition of PhD graduates in the field of nanotechnology to 250 people in 2015.
In fact, the development and expansion of these technologies will also enhance career opportunities for highly skilled personnel.
Source: ww.utusan.com.my

Saturday 3 December 2011

B2B, B2C, & C2C

B2B e-commerce offers direct links between a manufacturer, its supplier and its customer, and it supports business transactions, processes and information exchange. It enables a manufacturer to bypass other middlemen and shorten the length of distribution channel. Another prominent feature of B2B e-commerce is to provide a channel to develop new products and services for both existing and new customers. It offers a manufacturer the ability to dominate the electronic channel and therefore controls the access to customers and set terms of trade. The impact of e-commerce on the B2B sector has been already manifesting itself in a number of different ways. However, the future will bring more discussion between manufacturing company and its business partners on a number of levels within the supply chain that will result in an even greater need to harness the benefits of B2B e-commerce can bring (Walters and Lancaster, 1999; Fraser and Fraser, 2000).
Business to Customer (B2C), sometimes referred to as Business to Consumer, describes the activities of businesses in selling products and/or services. For example, someone buying a television set from an electronics retailer would be a B2C transaction. The transaction preceding this, eg, the purchase of components, screens, plastics etc. by the manufacturer, and the sale of the set from the manufacturer to the retailer would be B2B transactions. Many B2C transactions now take place online, eg, the purchase of books from amazon.co.uk, CDs/DVDs fromplay.com, or even doing the weekly shopping online at Tesco.

Customer to Customer (C2C), sometimes known as Consumer to Consumer, E-Commerce involves electronically-facilitated transactions between individuals, often through a third party. One common example is online auctions, such as Ebay, where an individual can list an item for sale and other individuals can bid to purchase it. Auction sites normally charge commission to the sellers using them. They act purely as intermediaries who match buyers with sellers and they have little control over the quality of the products being offered, although they do try to prevent the sale of illegal goods, such as pirate CDs or DVDs. Another popular area for customer to customer transactions is online classified advertising sites, such as Craigslist and Gumtree. Major online retailers like Amazon also allow individuals to sell products via their sites. C2C is expected to increase in the future because it minimizes the costs of using third parties. However, it does suffer from some problems, such as lack of quality control or payment guarantees and there can sometimes be difficulties in making credit-card payments.

Home Security and Internet

Some people live with the illusion that they have protected their home networks from internet attacks by purchasing a firewall.  Manufacturers even promote this by identifying their products as firewalls. Sadly, most users are not protected by a firewall, but by the simple router.  
What’s the difference between a router and a firewall?  Without complicating it too much, a router acts as a junction point between the computer (or computers) in your home and the internet.  It has the ability to route your computers requests to the internet and route the responses back to your computer.  A firewall has this ability as well, but also offers another level of security by actually inspecting all the information and making some decisions about if it should allow it or not.    Since most routers are relatively simple devices, they act as a firewall because they are not capable of complex tasks, like routing internet requests back to your computer without some assistance. 
A very common attack on the internet is called a DOS (Denial of service) attack.  A hacker floods a website with requests for information that don’t exist and the website becomes overrun with requests, and service degrades.  Hackers have been known to exploit this attack to gain access to a site. How is it done? Usually a hacker will gain control of unsuspecting computers around the world, and use them to launch these attacks.  Your home computer could be infected and used as a pawn.  A router would simply pass your computer’s requests on but a sophisticated firewall could identify the traffic as suspicious and notify you.
So, how concerned should you be? It really comes down to your personal comfort level.  A basic router provides adequate protection.  Make sure if you have wireless access on your router, that you encrypt this as well.  Keep your computer’s antivirus updated and run a regular scan.  When you do have problems, deal with it promptly. The old saying “locked doors keep honest people out” is pretty a good analogy.  You leave in the morning and lock your front door, as you head to work.  If someone wants access to your house, it’s fairly easy for a professional to gain access.  The same is true with the internet, if someone wants access, they will get it.  With millions of computers on the internet, and thousands of unprotected machines available, your chances of attracting attention are pretty slim.
Source: Northern Computer

Malware, Viruses, Worms, Adware, Spyware, Trojans...

In IT, we hear many different terms. One of the most confusing scenarios is when a computer becomes infected with malware since the infection can be referred to as viruses, malware, adware, spyware, rootkits, etc. Some of these terms have the same meaning, some are sub-categories, and some are even just simply network tools. Some of the different forms of malware can be trojans, worms, hacktools, password revealers, etc. depending on the purpose of the program. To clarify things a bit, here is a list of common “infection” terms and their definitions: 

Malware: Short for malicious software, (sometimes referred to as pestware) designed to harm or secretly access a computer system without the owner's consent. The expression is a general term used to define a variety of forms of hostile, intrusive, or annoying software or program code. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, and other malicious and unwanted software or program. Essentially, it is the broadest term to cover all forms of infections.

Virus: A computer program that can copy itself and infect another computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, carried it on an external drive, or unintentionally spread it through email. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Worm: A self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network), and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Spyware: A type of malware that can be installed on computers which collects small pieces of information about users without their knowledge. Spyware is typically hidden from the user and can be used to observe and collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs.

Adware: Advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as key loggers and other privacy-invasive software.

Rootkit: Software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenationof "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkits are considered to be one of the most difficult forms of malware to detect and clean as one of their main functions is to remain undetected, sometimes by residing in the kernel; reinstallation of the operating system is sometimes the only alternative.

Trojan: Software that appears to perform a desirable function for the user prior to run or install, but (perhaps in addition to the expected function) steals information or harms the system. The term is derived from the Trojan Horse story inGreek mythology.

HackTool: Can be malware used by hackers for various purposes. It can include port scanners , and sniffers , keystroke loggers and tools for sending spam. Many types of legitimate network utilities that administrators use are falsely identified as hacktools as they can be used by the administrator to obtain important information about a network they are responsible for. For example, a password revealer can be used to record a user’s password for their email prior to reformatting their system. This can be quite handy since the user may not be available to ask or may have forgotten it since it is cached. Other tools can be used to scan networks to obtain information about the computers on the network such as IP addresses, hostnames, and variousther details that are necessary to properly manage a network.

Some people live with the illusion that they have protected their home networks from internet attacks by purchasing a firewall.  Manufacturers even promote this by identifying their products as firewalls. Sadly, most users are not protected by a firewall, but by the simple router.  
Source: Northern Computer

Difference between LAN and WAN

•LAN is restricted to limited geographical area of few kilometers. But WAN covers great distance and operate nationwide or even worldwide.
•In LAN, the computer terminals and peripheral devices are connected with wires and coaxial cables. In WAN there is no physical connection. Communication is done through telephone lines and satellite links.
•Cost of data transmission in LAN is less because the transmission medium is owned by a single organization. In case of WAN the cost of data transmission is very high because the transmission medium used is hired either telephone lines or satellite links.
•The speed of data transmission is much higher in LAN than in WAN. The transmission speed in LAN varies from 0.1 to 100 megabits per second. In case of WAN the speed ranges from 1800 to 9600 bits per second (bps).
•Few data transmission errors occur in LAN compared to WAN. It is because in LAN the distance covered is negligible.


Source: Northern Computer

Diserang Malware???

SEKIRANYA komputer saya telah diserang oleh Malware, apakah yang perlu saya lakukan?
Apabila berlakunya masalah jangkitan atau serangan Malware terhadap sesebuah komputer, sudah tentulah ia perlu dipulihkan kembali dengan memelihara keselamatan dan keadaan data yang ada di dalamnya.
Namun begitu, ada beberapa cara yang baik dalam mengendalikan masalah ini supaya proses baik pulih akan berjalan dengan lancar dan jayanya. Berikut adalah cara-cara yang boleh diguna pakai dalam mengendalikan masalah ini.
1. Kenal pasti tahap ancaman Malware tersebut sama ada ia dikategorikan sebagai ancaman pada tahap rendah, sederhana atau tinggi.
Pada tahap ancaman yang rendah, kesan buruknya adalah jelas tetapi mudah untuk dibersihkan. Pada tahap ancaman yang sederhana, kesan buruknya juga adalah jelas tetapi memerlukan usaha yang lebih untuk membersihkannya.
Pada tahap ancaman tinggi, kesannya agak sukar untuk dilihat atau dikesan tetapi ia akan mencuri data yang terdapat dalam komputer tersebut.
Jadi, fokus haruslah diberikan kepada tanda-tanda ancaman Malware tersebut dan bagaimana langkah yang seterusnya perlu diambil untuk menanganinya.
2. Lakukan analisis terhadap fail-fail log bagi kesemua perisian keselamatan yang ada seperti Firewall, antivirus dan sebagainya.
Ini adalah untuk melihat sama ada berlaku perkaitan masalah Malware sedia ada dengan masalah-masalah Malware yang lepas.
3. Buat soal selidik kepada pengguna komputer tersebut atau kepada diri sendiri berkenaan dengan aktiviti-aktiviti yang telah dilakukan terhadap komputer tersebut sebelum terjadinya masalah jangkitan Malware ini.
Sila catit kesemuanya jika perlu. Ini penting untuk melihat perkaitannya dengan masalah Malware yang dihadapi. Boleh juga melihat fail log komputer sekiranya ada.
4. Laksanakan baik pulih komputer yang dijangkiti dengan program-program tertentu dan sekiranya tidak boleh mencapainya, gunakanlah media lain seperti pemacu storan USB, CD, disket atau DVD.
Antara program komputer yang penting untuk buat baik pulih ini adalah seperti USB Dummy Protect (fungsi write protect), Super Anti-Spyware (Buang Malware) Malware Bytes AntiMalware(Buang Malware), SysInternals (Masalah Malware), EXEFIX_XP (Pulihkan masalah fail .exe dan shortcut), Sophos Rootkit Revealer (Masalah Malware), aswMBR (Masalah Malware), Kaspersky Rescue CD (Pakej lengkap untuk masalah Malware) dan lain-lain tools atau program baik pulih.
Perkara yang paling penting setelah itu adalah kemas kini perisian-perisian yang sedia ada dalam komputer itu termasuk sistem pengoperasian.
5. Buat pengrekodan terhadap semua dapatan yang telah diperolehi sama ada ia datang daripada soal selidik atau perlarian program komputer seperti masalah virus atau Malware, masalah vulnerability atau kelemahan pada sistem komputer, risiko-risiko yang berpotensi berlaku, perimeter-perimeter ancaman dan lain-lain.
Bagi melengkapkan pengrekodan ini, boleh rujuk kepada buku-buku panduan atau laman-laman web keselamatan seperti Microsoft Malware Protection Center, McAfee Threat Intelligence dan lain-lain. Biasanya laman web perisian anti virus yang utama ada menyediakan maklumat-maklumat ini.
6. Akhir sekali, bolehlah dirangkakan atau membuat tambahan kepada panduan keselamatan dan polisi keselamatan terhadap penggunaan komputer bagi mencegah berlakunya masalah jangkitan Malware ini sekali lagi di masa hadapan. Ini dapat mendidik sesiapa sahaja untuk penggunaan komputer yang selamat dan betul.
Proses pencegahan perlu dibuat tetapi ia tidak dapat menghalang secara total masalah jangkitan Malware ini. Perkara yang penting adalah persediaan perlu ada untuk menangani masalah ini dan ia perlu dikongsi untuk pertahanan di masa akan datang.
Berlakunya masalah ini membolehkan beberapa kajian dapat dibuat terhadap tahap rangka keselamatan digital sedia ada dengan membuat profil risiko-risiko jangkaan, menganaliasa fail-fail log, kecerdikan sistem dalam menangani ancaman dan lain-lain.


rujukan:www.utusan.com.my

Teknologi Sepadan

TERUS merancakkan pembanguan jenama Xperia, syarikat pencipta telefon bimbit pintar itu, Sony Ericsson baru-baru ini memperkenalkan pula model Xperia arc S.
Model yang dinaik taraf daripada portfolio Xperia arc sebelum ini menawarkan pengalaman hiburan lebih pantas menerusi pengenalan sokongan pemproses berkuasa 1.4 Ghz dan teknologi panorama Sony 3D.
Tidak cukup dengan itu, ia turut hadir bersama ciri aplikasi media dan kamera 25 peratus lebih pantas serta 20 peratus kelancaran capaian laman web berbanding model sebelum ini.
Menurut Pengurus Besar Sony Ericsson Singapura dan Malaysia, Peter Ang, Xperia arc S yang menggabungkan teknologi Sony dan Android merupakan model telefon bimbit pintar dengan fungsi hiburan terbaik.
''Ia merupakan model telefon pintar paling lengkap dalam kelasnya dengan tawaran akses unik kepada laman web rangkaian sosial serta capaian lebih 250,000 aplikasi,'' katanya.
Melihat keistimewaannya, gajet berkenaan dilengkapi teknologi panorama 3D Sony yang membolehkan sesuatu imej dirakam dan dipaparkan secara terus ke televisyen 3D menerusi sambungan kabel HDMI.
Kelebihan spesifikasi multimedianya pula disempurnakan bersama skrin 4.2 inci, sokongan enjin mobile BRAVIA, kamera 8.1 megapiksel, rakaman video definisi tinggi (HD) dan sensor Exmor R untuk sokongan rakaman dalam pencahayaan rendah.
Daripada sudut teknikal, Xperia arc S di pacu oleh pemproses berkelajuan tinggi dan sistem operasi Android Gingerbread 2.3.
Sony Ericsson Xperia arc S bakal memasuki pasaran negara menjelang awal Oktober depan.
Rujukan: www.utusan.com.my

Monday 28 November 2011

What are intranets & extranets?


An intranet is a private network, operated by a large company or other organisation, which uses internet technologies, but is insulated from the global internet.
An extranet is an intranet that is accessible to some people from outside the company, or possibly shared by more than one organisation.
For decades, many organisations have used in-house networks to connect their computers and make applications available to their staff. These networks were often expensive and could be hard to use. When the internet became popular, its networking software became widely available and, usually, free. It therefore made sense for organisations to adopt the same software for internal use.
What Intranets do?

Intranets typically start by publishing web pages about company events, health and safety policies, and staff newsletters. Popular applications follow, such as forms to reclaim expenses or request holidays. All these help eliminate paperwork and speed up workflows.
As more features are added, an intranet can become essential to the operation of an organisation. It becomes a portal that provides access to all the things workers need.
The intranet is protected from the global internet by firewalls and by the need to log on with a secure password. Staff working outside the organisation may be able to access the intranet by using a VPN (virtual private network). This means all communications between the intranet and the user’s personal computer are encrypted.
What Extranets do?                                           
Extranets take this process a step further, by providing access to people who work for different organizations. For example, a company could provide access to a supplier for online ordering, order tracking and inventory management. Instead of sending information to suppliers, it lets them fetch it on a self-service basis. Another example would be a hospital providing local GPs with access to a booking system so they can make appointments for their patients.
An extranet should be more efficient because everyone has access to the same data in the same format. Because all extranet communications can be encrypted over a VPN, it should also be more secure than sending data over the public internet.

Effects of Internet on Our Daily Lives

The maximum effect of the internet is actually on the daily life of the individuals because indeed there is no aspect of life which is not influenced by the internet and its uses.
Life has become drastically smooth and easy over the internet, while in the previous years seeking for a job required several visits to the offices and companies and interviews, these days all what is required is you detail resume emailed to the company's analysis division which assures you of any possibilities for getting the job instead of waiting and getting rejected in the end.
Even in the minor daily life activities like traveling and planning is also related to the internet in some way or the other. Internet can now be used to inquire about the flight timings and delays which make it easier to plan for the departure time.
Any piece of information regarding anything at all in our daily lives, may it be a cosmetic technique for the ladies or the men health problems, the cooking recipes for trying the new dishes or the home decoration tips, the information on the latest appliance or product you are going to buy or the search for the new house, it is all there ready for you on the internet.
The most interesting aspect of the internet influencing our daily lives is the factor of entertainment. Entertainment no longer demands your money or expense, today you can just log on the internet in your free time and get involved talking to people of similar interests, or watch movies or play games, its all there in the internet.
Because of the so many opportunities on the internet it is also said to have become an addiction for some people, which makes them more lazy and inconsistent in much more important works in life.

What is Internet?

iThe internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.
Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web.
It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet.
The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP.

What is ISP?


In simple words an Internet service provider (ISP), is a company that offers its customers access to the world of  Internet. The ISP connects to its customers to the internet or WWW WORLD WIDE WEB  using Various data transmission technology such as dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects. Whenever we need an internet connection we need an ISP .ISPs may provide services such as
·                     Internet e-mail accounts to users
·                     remotely storing data Files etc

Dial-up - Dial-up Internet access is a Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a dialed connection to an Internet service provider (ISP) with the help of  telephone lines. The computer or router of the internet user uses an attached modem to encode and decode Internet Protocol packets and control the information which is coming in and going out from the system.
DSL- DSL Digital Subscriber Line is a family of technologies that provides digital data transmission over the wires of a local telephone network.
Cable Modem- cable modem is a type of Network Bridge and modem that provides bi-directional data communication with the help of radio frequency channels on a HFC and RFoG infrastructure. Cable modems are primarily used to deliver broadband Internet access in the form of cable Internet. They are mostly used in following countries  in Australia, Europe, and America.
Wireless-Wireless communication is the transfer of information without the use of wires.The distance can be few meters as in television remote control or long as much as thousands or millions of kilometers for radio communications.Other stuffs  which use wireless technology include GPS(Global Positioning System),wireless mouse keybord headphone etc.
How to choose your ISP?
Many  ISP provides  services which is unique to each particular ISP. First step is to choose what type of service you want, then you can check Google for various reviews about the particular ISP whom service you want to use, Then you can do deals for  your ISP  according to your need and which best fit to you...
 .