Saturday, 12 September 2009

Introduction About Picasa Web Album



From my own opinion, i think that this video quite interesting, so i would like to share with you guy.
Picasa is a software application for organizing and editing digital photos, originally created by Idealab and owned by Google since 2004.For organizing photos, Picasa has file importing and tracking features, as well as tags and collections for further sorting. It also offers several basic photo editing functions, including color enhancement, red eye reduction and cropping. Other features include slide shows, printing and image timelines. Images can also be prepared for external use, such as for e-mailing or printing, by reducing file size and setting up page layouts. There is also integration with online photo printing services.

This video is teach us how to use this web album and how to edit and crap pictures. From this video i learn how to edit pictures and some knowledge about wed album. Hope all of you can enjoy it...thx

Basic HTML and CSS Tutorial



This video is a video that teach people the basic knowledge about HTML and CSS.
HTML
HTML, which stands for Hyper Text Markup Language, is the predominant markup language for web pages. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms.
HTML, which stands for Hyper Text Markup Language, is the predominant markup language for web pages. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms.
An HTML Application (HTA; file extension ".hta") is a Microsoft Windows application that uses HTML and Dynamic HTML in a browser to provide the application's graphical interface.
Structural markup describes the purpose of text. For example,Golf establishes "Golf" as a second-level heading, which would be rendered in a browser in a manner similar to the "HTML markup" title at the start of this section. Structural markup does not denote any specific rendering, but most Web browsers have standardized default styles for element formatting. Text may be further styled with Cascading Style Sheets (CSS).
Presentational markup describes the appearance of the text, regardless of its function. For example boldface indicates that visual output devices should render "boldface" in bold text, but gives no indication what devices which are unable to do this (such as aural devices that read the text aloud) should do. In the case of both bold and italic, there are elements which usually have an equivalent visual rendering but are more semantic in nature, namely strong emphasis and emphasis respectively.

CSS
Cascading Style Sheets (CSS) is a style sheet language used to describe the presentation semantics (that is, the look and formatting) of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML, but the language can be applied to any kind of XML document, including SVG and XUL.
CSS information can be provided by various sources. CSS style information can be either attached as a separate document or embedded in the HTML document. Multiple style sheets can be imported. Different styles can be applied depending on the output device being used; for example, the screen version can be quite different from the printed version, so that authors can tailor the presentation appropriately for each medium.
LIMITATION
-Poor Layout Controls for Flexible Layouts -While new additions to CSS3 provide a stronger, more robust layout feature-set, CSS is still very much rooted as a styling language, not a layout language.
-Selectors are unable to ascend-CSS offers no way to select a parent or ancestor of an element that satisfies certain criteria.
-Vertical control limitations-While horizontal placement of elements is generally easy to control, vertical placement is frequently unintuitive, convoluted, or impossible.
ADVANTAGES
Flexibility-CSS with the functionality of a Content Management System, a considerable amount of flexibility can be programmed into content submission forms. This allows a contributor, who may not be familiar or able to understand or edit CSS or HTML code to select the layout of an article or other page they are submitting on-the-fly, in the same form.
Separation of Content from Presentation-CSS facilitates publication of content in multiple presentation formats based on nominal parameters.
Site-wide consistency-When CSS is used effectively, in terms of inheritance and "cascading," a global style sheet can be used to affect and style elements site-wide.

For those who was no really know well about the HTML, can jz turn on this video to learn about it. Hope all of user can get something and give me some feedback after watch about it.

Friday, 11 September 2009

Internet technology




Security Technologies
With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern.Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration.
Protecting Confidential Information
Confidential information can reside in two states on a network. It can reside on physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for attacks from users on your internal network, as well as those users on the Internet. We are primarily concerned with the second state, which involves network security issues. The following are five common methods of attack that present opportunities to compromise the information on your network:

• Network packet sniffers

• IP spoofing

• Password attacks

• Distribution of sensitive internal information to external sources

• Man-in-the-middle attacks


Developing Your Security Design
-Knowing your enemy means knowing attackers or intruders.
-Security measures usually reduce convenience, especially for sophisticated users.
-Most security is based on secrets. Passwords and encryption keys, for example, are secrets.
-Every security system has vulnerabilities. You should understand your system's weak points and know how they could be exploited.
-Almost any change that you make in your system may have security effects.