CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS »

Monday, February 16, 2009

The Ten Commandments of Computer Ethics


1) You shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.

2) You shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.

3) You shalt not snoop around in other people's files:
Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.

4) You shalt not use a computer to steal: Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it.

5) You shalt not use a computer to bear false witness: The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong.

6) You shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format.

7) You shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical.

8) You shalt not appropriate other people's intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

9) You shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country's constitution. The discussion, of course, is going on.

10) You shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.


In general I agree with the Ten Commandments of Computer Ethics mentioned.The things I would suggest to cover on the Ten Commandments of Computer Ethics could be, like considering the disable people to access the computers without breaching their human rights or discriminating them. Software or hardware which is not designed to be accessible by the disable people to access the computer is unethical.


Even though number 10 Commandment says "You Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans". The commandments have not mentioned anything about making the computer totally accessible to disabled people who have hearing or sight problems. I believe that they should definiately consider adding that point to the Commandments. As it is only fair on disabled people.


Nevertheless, as I had been bombarded by spam mails recently I would like to include one or more to it.

1. You shalt not misuse other e-mail addresses.

2. You shalt not pass e-mail addresses to a third party without getting permission from the individuals.


Sunday, January 18, 2009

Speed up ur FIREFOX!!!5x faster

try this!!!

1.Type "about:config" into the address bar and hit return. Scroll
down and look for the following entries:

network.http.pipelining network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to number 44.

3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before it acts on information it
receives.

If you're using a broadband connection you'll load pages MUCH faster now!

100 Keyboard Shortcuts for Windows


Smile 100 Keyboard Shortcuts for Windows

Just to share the knowledge..

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)


Dialog Box Keyboard Shortcuts

CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)


Microsoft Natural Keyboard Shortcuts

Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)


Accessibility Keyboard Shortcuts

Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)


Windows Explorer Keyboard Shortcuts

END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)


Shortcut Keys for Character Map

After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)


Microsoft Management Console (MMC) Main Window Keyboard Shortcuts

CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)


MMC Console Window Keyboard Shortcuts

CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)


Remote Desktop Connection Navigation

CTRL+ALT+END (Open the m*cro$oft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Placea snapshot of the active window in the client on the Terminal serverclipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal serverclipboard and provide the same functionality as pressing ALT+PRINTSCREEN on a local computer.)


Microsoft Internet Explorer Navigation

CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)

just sharing...

Thursday, January 15, 2009

My Latest Assignment..

1. Example of cybersquatting site.





2. OPAC IIUM

a) Law

Title : International humanitarian law - the regulation of armed conflict
Call number : d67 KZ6471M113I
ISBN numbers : 1855210401

Title : The Common law of obligations
Call number : d17 KD685C6C773C
ISBN numbers : 0406519005

Title : Modern business law
Call number : d20 KF889M689D
ISBN numbers : 0394328884

b) Human Science

Title : SOCIAL change and the life course
Call number : HQ799.97G7S678
ISBN numbers : 00000035690

Title : Human rights and development - international views
Call number : JC571H76H918
ISBN numbers : 0333459873

Title : The Political economy of human service programs
Call number : HV91A935
ISBN numbers : 0892329580

c) Technology

Title : Information technology - agent of change
Call number : HC79I55L399
ISBN numbers : 0521350352

Title : Information technology - design and applications
Call number : Z678.9I43L
ISBN numbers : 0816119082

Title : Information and information systems
Call number : Z699B924
ISBN numbers : 00000075627

3. Bro. Asmady blog review....



  • well-written, well-designed blogs that are created and maintained with passion and personality.
  • have interesting information that comes in a well-written package.
  • enjoyable, interesting, and read-worthy

4. URL for Kulliyah of ICT.


5.10 books that categorized under Red spot collections at CFS IIUM Library...
  • Engineering Problem Solving With C
  • Freedom Of Expression in Islam
  • A First Book Of ANSI C
  • Family life in Islam
  • Cunningham’s manual of practical anatomy
  • Binocular Vision : foundations and applications
  • The Qur’anic foundations and structure of Muslim Society
  • Game theory and economic modelling
  • Economic decisions under inflation
  • Managing information systems & technologies

Wednesday, December 24, 2008

Alif - Akan Tiba (Official Music Video)

Love this cool song.i would like to dedicate this song to all my blog readers..he3..for those who want to see this music video.please pause first my jukebox at below of this bloG..enjoy





ALIF(oiam) - AKAN TIBA

Hey hati ku..
Selalu
mendambakan cinta namun tak kunjung tiba

Hatimu itu
Seperti apa yg ku mahu selama ini

Am Em
Ertikanlah pagi ku yg kaku tanpa kamu

C/o
Kau ku cinta
Engkaulah yg ku puja
Tertunggu selama ini takku jumpa
Dgn mu ku di lamun indah
Ku harap cinta akan tiba di hati kita..

Lihat kamu
Tak ku sedari
Waktu dh mulai tinggalkan ku

Kau kau kau
Buatku lupa mengapa ku disini pada mulanya..

Ertikanlah malam ku yg sayu dingin tanpamu

Setiap hari bersama mu
Ku ingin selalu dekatmu
Ku hitung saat dan waktu
Hingga hari esok kembali lagi

Written By: Amylea
Lyrics By: Amylea

A GPS in your pocket

There is an ever-increasing number of mobile devices (phones and PDAs) being launched on the Malaysia market that include global positioning system (GPS) receivers as a standard feature.

However, these devices rarely come bundled with accurate, high-quality GPS and mapping software - a deficiency that often makes the GPS feature an underutilised mobile option.

So from my experience using phone which having this kind of technology..i would like to share with all of you one of the greatest software that i already try and use it for almost a year starting from my phone NOKIA N95 follow by NOKIA N82 and now HTC TYTN II..

The product that i mean is Garmin Mobile XT version 5.0...this software is a new product Garmin are launching in 2009 specifically for cellphones with GPS receivers. The product is installed on an SD card and transforms GPS-enabled mobile phones or PDAs into full-featured navigation devices, with all the functionality of conventional GPS devices (such as turn-by-turn voice prompts).

By using this kind of technology for very little cost users can take full advantage of having a “go-anywhere” navigation device in their pockets, which is as convenient and beneficial to use as it is easy to set up.Garmin Mobile XT gives users the ability to check weather forecasts for their destinations, access flight details for many major airlines, and call a point of interest (such as a nearest restaurant , bank , hospital , pump station , coffee shop and etc) using the phone feature.

This new version also include with a safety features which being able to find someone also plays a huge role in safety and security. Mobile XT includes a “panic button”, which automatically fires off an urgent location message to three emergency contacts whenever the # key is depressed for more than 3 seconds in certain Samsung and Nokia handsets.

Compatible handsets include:

  • HTC: Touch Diamond, Touch Cruise, Touch Pro, P3300, X7500, TyTNII, P3470, X7500
  • Sony Ericsson: Xperia X1
  • Nokia: E90, E71, E66, N96, N95 8GB, N95, N85, N82, N79, N78, 6220 Classic, 6210 Navigator, 6110 Navigator
  • Samsung: i560, G810, i8510, i780, i900



GLOBAL POSITIONING SYSTEM


Assalamualaikum and a good morning i wish to all visitors of my blogspots..on my last post..i did mention you all about the new technology which i really into that is GLOBAL POSITIONING SYSTEM or also known as GPS..so in my new post today i will give a brief explanation on GPS technology and advantages using it nowadays..

GPS is a program that been used in any GPS receiver..A GPS receiver calculates its position by carefully timing the signals sent by the GPS satellites high above the Earth..When the GPS receiver lock all the satellites signal..the receiver will displayed the image of your current location perhaps with a moving map display or latitude and longitude; elevation information may be included. Many GPS units also show derived information such as direction and speed, calculated from position changes..As the summary , GPS device could be a guide for us when we lost of direction any where that we go as long we could get a satellites signal..