Thursday, September 22, 2005

NikON cOOLpIX S 1

.........helllo mahasiswa ftsm especially to sains komputer student,macam mane kabar korang semua baik x?saya nak tanya pasal kesiapan korang semua menghadapi final exam,ok tak atau belum ada persiapan sama sekali....!!!!by the way cerita tentang exam kita berpindah tentang assignment IT,disini saya ambil tajuk tentang kamera digital ne,korang semua kan suka sangat dengan benda satu ne yang boleh ambil gambar korang sebanyak mungkin tanpa perlu banyak habiskan uang untuk beli kodak (film) .....iyekan::::::::::;;;;;)))))
sekarang kita mulai cerita ye.............................................

Kamera digital dengan jenama Nikon Coolpix S I ini telah beredar di pasaran,ia merupakan kamera digital ultra _slim yang pertama dey'all keluarkan.kelebihan-kelebihan kamera ini antara lain :
a. mempunyai 5 mega piksel CCD
b. kanta zum optik yang boleh dilipat sebanyak 3x (pertama kali dalam keluarga Coolpix) dan 2,5" LCD monitor (juga yang pertama dalam keluarga coolpix)
c. ia juga memberikan teknologi Coolpix seperti face priority AF, in camera Red-eye fix,D-lighting dan beberapa fungsi lagi yang lebih kurang sama dengan kamera digital lainnya.

kamera ini di edarkan dalam 3 warna sahaja antara lain hitam.......,silver...........,dan putih..............
klu korang nak tahu juga tentang harga nya ne saya senaraikan harga terbaru nya RM 1,445.00.....mahalnye...........???????????????

Wednesday, September 21, 2005

Spoofing Attack

What Is a Spoofing Attack?

A spoofing attack involves nothing more than forging one's source address. It is the act of using one machine to impersonate another. To understand how this occurs, you must know a bit about authenticities.

The better portion of authentication routines known to the average user occurs at the application level. That is, these methods of authentication are entirely visible to the user.
The typical example is when a user is confronted with a password prompt on FTP or Telnet. The user enters a username and a password; these are authenticated, and the user gains access to the resource.

On the Internet, application-level authentication routines are the minority. Each second, authentication routines that are totally invisible to the user occur. The difference between these routines and application-level authentication routines is fundamental. In application-level authentication, a machine challenges the user; a machine requests that the user identify himself. In contrast, non-application-level authentication routines occur between machines. One machine demands some form of identification from another. Until this identification is produced and validated, no transactions occur between the machines engaged in the challenge-response dialog. Such machine-to-machine dialogs always occur automatically (that is, they occur without human intervention).

In the IP spoofing attack, the cracker attempts to capitalize on the automated nature of the dialog between machines. Thus, the IP spoofing attack is an extraordinary method of gaining access because in it, the cracker never uses a username or password. This, for many people, is difficult to grasp. Consequently, reports of IP spoofing have needlessly caused much fear and paranoia on the Internet.

Disediakan Oleh: Wong How Ling (A108917)