Monday, 21 March 2016

How to access your email account on your mobile

Step 1: Open up your email client and enter your email and password.





















Step 2: When it asks you what type of account you want, select Microsoft Exchange ActiveSync.





















Step 3: The phone will then check for incoming server settings and a screen will appear like this. Select OK to continue.





















Step 4: The account options will then appear, you can adjust to your liking but if you are not bothered just select next.




















Step 5: On the next page you can name your email account if you wish, select done to continue.






















Step 6: On the next page select Activate.






















Step 7: After that you should be brought a page that displays your emails and next we are going to encrypt your email account to increase the security on your phone. On the top left you should see what you named your email account, Select this tab and it will bring you to another page.






















Step 8: On this page select and hold your email account and it will bring up a menu. Select account settings.


 

Step 9: In the Account settings select Security options.























Step 10: Select Encryption algorithm and then select 3DES.

 

Step 11: After this step you are finished and you can enjoy using your email account on your phone on the go.

Monday, 14 March 2016

Mahara Privacy Settings

1. You can make changes through the settings so that friend requests must be authorised before people can add you to their friends list.












2.a. You can create a page that can only be view by certain people (example) your lecturer.







b. You can keep comments on your page private until you have approved them.








c. You can set dates for when the page is available.




3. Secret URLs are a URL that you can customise to something only you will know.








4. One further change to enhance the security of your profile would be to only allow friends to send you messages.

Monday, 29 February 2016

Security Software Types

Anti – Virus
Antivirus software was developed to detect and remove computer viruses however with the creation of other kinds of malware, antivirus software started to provide protection from other threats such as keyloggers, backdoors, Trojan horses, worms and spyware.

Firewall
A firewall is a network security system that controls incoming and outgoing network traffic. A firewall establishes a barrier between a trusted and secure internal network and another outside network that is assume to not be secured or trusted.

Emergency Security Software

Not every antivirus program and firewall is foolproof. It’s inevitable that virus will slip through the cracks. It might even disable your main security software. Emergency Security software is there if something like this is to happen, for example something like Malwarebytes is a free download that you can use to scan for anything the antivirus might miss and it won’t conflict with your existing antivirus software.

Kevin Crawford

Networking Hardware

Networking Hardware
Networking hardware may also be known as network equipment or computer networking devices. Units which are the last receiver or generate data are called hosts or data terminal equipment. All these terms refer to devices facilitating the use of a computer network. Specifically, they mediate data in a computer network.

Gateway
A gateway is a network point that acts as an entrance to another network. On the internet, a node or stopping point can be either a gateway node or a host (end-point) node. Both the computer of Internet users and the computers that serve page to users are host nodes.

Router
A router is a device that forwards data packets along networks. A router is a connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect.

Switch
A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network, by using packet switching to receive, process and forward data to the destination device.

Bridge
A network bridge is software or hardware that connects two or more networks so that they can communicate. People with home or small office networks generally use a bridge when they have different types of networks but they want to exchange information or chare files among all of the computers on those networks.

Hub
An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment.

Repeater
A network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to regenerate analog or digital signals distorted by transmission loss. Analog repeaters frequently can only amplify the signal while digital repeaters can reconstruct a signal to near its original quality.

Hybrid Network Devices

Multilayer Switch
A switch which, in addition to switching on OSI layer 2, provides functionality at higher protocol layers.

Protocol Converter
A hardware device that converts between two different types of transmission, for interoperation.

Bridge Router (Brouter)

A device that works as a bridge and as a router. The brouter routes packets for known protocols and simply forwards all other packets as a bridge would.

Kevin Crawford