Facebook – A surprisingly effective tool for Web Marketing

Facebook is becoming one of the largest social networks on the web. The company said that now Microsoft has chosen Google to provide a $ 240 million minority stake in an agreement to expand the advertising services on the network. This ideally increase the revenue for Facebook and strengthen the position of online advertising for Microsoft. The Microsoft-Facebook deal will also expand the business further, that help companies online to reach more people and promote themselvesthrough new forms of media.

It 'was founded in 2004 as a network of college students and has grown into an international network for all people. Although born as a network of universities, the fastest growing demographic of Facebook is in the age group 35 +. The network is close to 49 million users by 59% outside the U.S. and has about 250,000 new recording on a daily basis, making it one of the fastest growing social networks on the web and is passed on Myspacelightening speed.

Facebook has recently been shown to be an effective marketing tool, providing a free and simple way to promote products and services. Facebook users can add tools such as Digg and Stumble Upon to vote and bookmark favorite sites. Posted Elements enables users to send business or customer blogs and links to drive traffic to your homepage. Page events, companies can promote teleseminars, webinars, workshops and a series of other events to friends andnetworkers.

Combining this and other social networking sites, a company can increase their audience and potential customers around the world. Why Facebook is a platform of identity and a closed network, many limitations of search engines (Yahoo, MSN, Google). Therefore, combining this social network allows companies to access new information on potential customers. This should be used for the benefit of online marketing since the company has statistics on what usersare doing. You can also send a survey to find more about your target demographic on the advertising page on the site. Facebook has also classified ad space on the left side and in other areas of the site for online commerce to promote products and services.

In this modern age, people tend to move away from the home page business. So companies need to find new and innovative ways to drive traffic to their sites. Social networks are one of the many techniques of direct response marketingcan help your business flourish.

June 22, 2011. Tags: , , , . network tools. Leave a comment.

Technology and Computer Science Degree Grads See Jobs Boom


Image : http://www.flickr.com

For students working on degrees technology, the future looks brighter job prospects. The Bureau of Labor Statistics expects rapid growth in employment in the sector. Some jobs technology could offer more opportunities than others.

The Bureau of Labor Statistics (BLS) includes 12 broad categories of occupations for the technology, the Association for Computing Machinery notes. Within these categories may be several different careers for which students work fordegrees technology could train. Some of the largest employment growth may be enjoyed by computer software engineers, network systems and data communications analysts, computer systems administrators and those involved with computer systems and software applications, information displays from the Bureau.

Choosing a student of technology at bachelor degrees can include anything from computer science to art and design of the game. Mt SierraCollege in Monrovia, California, offers only bachelor's degree programs in media arts and design with a choice of concentrations in graphic design, art and game design, visual effects and digital video, or multimedia arts and design. Mt Sierra also offers Information Technology degree with concentration in telecommunications technology, computer security, computer and information technology.

Westwood College, which has offices in California, Colorado, Georgia, Illinois, Texas andVirginia offers graduate degrees in game software development, network management and more important. Because the institution is considered a Cisco Networking Academy, students can acquire skills that they ready to become Cisco certified professionals.

An article in the March 2009 Network World reported that the debate on business or computer science skills were more important as regards the country's competitiveness. Studentssome schools can get the best of both worlds. At Newport Business Institute Lower Burrell, Pennsylvania, for example, students can work toward a degree in business administration emphasizing microcomputer applications or accounting and computer application. The Newport Business Institute also offers a degree in business information and application software and programming technology. Microcomputer applications where the program is designed to prepare studentscareer specialists and software, system operators, consultants, software, data entry, computer sales, and more, accounting and application of information technology can prepare students for careers that include account managers, internal auditors, specialists payroll accounting, public costs and accountants, according to the Newport Business Institute Web site.

Students from other institutions may instead opt for smaller technology rather than technologydegrees. Institutions such as the West Virginia Wesleyan College in Buckhannon, W. Go., Offer the possibility to major in computer science or computer information, as well as choose a computer science minor. Northwestern College in St. Paul, Minnesota, provides computer information systems and management information systems minor.

Nova Southeastern University in Fort Lauderdale, Fla., also offers the children of technology. Nova Southeastern information technologyless according to the institute, can be combined with almost all the major exception of those such as computer information systems, computer science. With majors in these areas, students may find employment in in-demand fields such as network administrators and system, computer engineers, and more information from Nova Southeastern University Web site shows.

The technology is considered one of the STEM (science, technology, engineering and mathematics) areas of study,that educators and government officials have been encouraging. Students working on degrees technology can find a number of scholarships that can help offset the cost of their college and university studies and reduce the amount of debt they assume.

June 21, 2011. Tags: , , , . computer network. Leave a comment.

Wireless Network Security – The Basics of Securing a Wireless LAN

Network Authentication Process

The process of association and a client to authenticate an access point is standard. If shared key authentication is selected to be the customer, there are additional packets sent confirming the authenticity of keys.

The following describes EAP network.

1. The client sends probe to all access points

2. Access point sends frame information with data transmission rates, etc.

3. Client selects the nearestthe point of access

4. Client access point scans in order of 802.11a, 802.11b and 802.11g then

5. Data transmission rate is selected

6. Membership client to access point with SSID

7. With network authentication EAP client authenticates with the RADIUS server

Open Authentication

This type of security assigns a string to an access point or entry points defining a logical network known as segmented wireless service set identifier(SSID). The client can not associate with an access point unless it is configured with the SSID. Association with the network is as simple as determining the SSID from any client on the network. The access point can be configured to not broadcast the SSID to improve a little 'security. Most companies implement static or dynamic keys to integrate the security of SSID.

Static WEP keys

Configure your client adapter with a static wired equivalent private(WEP) key to improving the security of wireless transmissions. The access point is configured with the same 40-bit or 128-bit key WEP and association during the cryptographic keys are compared. The problem is hackers can intercept the wireless packets and decode the WEP key.

Dynamic WEP keys (WPA)

The deployment of dynamic WEP keys for encrypted session strengthens security with a hashing algorithm that generates new key pairs at specific intervals to make spoofing moredifficult. The standard protocol includes methods of authentication 802.1x with TKIP and MIC. Authentication between the wireless client and RADIUS server authentication allows the administration security dynamic. It should be noted that each type of authentication to specify the support of the Windows platform. An example is PEAP requires Windows XP with Service Pack 2, Windows 2000 with SP4 or Windows 2003 to every customer.

802.1x is an authentication standard withper user and session encryption for these EAP types supported: EAP-TLS, LEAP, PEAP, EAP-FAST, EAP-TTLS and EAP-SIM. Credentials to authenticate network users have nothing to do with the configuration of the client computer. Any loss of computer equipment does not affect safety. The TKIP encryption process is run with an Advanced Encryption Standard to improve the package hashed WEP key (PPK), the message integrity check (MIC) and broadcast key rotation.The protocol uses 128-bit keys for encryption of data and 64-bit keys for authentication. The transmitter adds a few bytes or MIC for a packet before encrypting it and the receiver decrypts and verifies the MIC. Broadcast key rotation will rotate unicast and broadcast keys at specific intervals. WPA Fast Reconnect is a feature that is available allowing employees to move around without having to re-authenticate with the RADIUS server would have to change rooms or floors. The user name and password of the client iscache with the RADIUS server for a specified period.

EAP-FAST

• Implements symmetric key algorithm to build secure tunnel

• RADIUS client and server mutual authentication

• The client sends user credentials and password in the secure tunnel

EAP-TLS

• SSL v3 builds an encrypted tunnel

• RADIUS client side and server-side PKI certificates granted with mutual authentication

• Clients for Dynamicsession keys used to encrypt data

PEAP (Protected EAP)

• Implement a Windows client with any EAP authentication method

• Server side RADIUS authentication server with the root CA digital certificate

• client-side authentication with the RADIUS server from Microsoft MS-CHAP v2 client with your username and password encrypted credentials

Wireless Client Network EAP authentication process

1. Associate clients with accesspoint

2. Access point allows traffic 802.1x

3. Client authenticates the RADIUS server certificate

4. RADIUS server sends username password encrypted request to the customer

5. The client sends the password encrypted username with a RADIUS server

6. RADIUS server and client to derive the WEP key. RADIUS server sends the WEP key to access point

7. Access point encrypts 128-bit key with the session key transmitted dynamic. Send to the customer.

8. Client and access point use sessionkey to encrypt / decrypt packets

WPA-PSK

WPA pre-shared keys use some features of static and dynamic WEP key protocols. Each client and access point is configured with a specific code static. The security code that generates keys to encrypt data using TKIP per session. The access code must be at least 27 characters to defend against dictionary attacks.

WPA2

WPA2 implements the WPA authentication methods with AdvancedEncryption Standard (AES). This method of encryption is distributed with the government etc. implementations where security must be implemented more stringent.

Passcode Application Layer

SSG uses an access code at the application level. Client can not authenticate unless you know the access code. SSG is implemented in public places like hotels where the customer pays for the password that allows access to the network.

VLAN assignment

As notedcompanies deploy access points with SSID assignments that define logical wireless networks. The SSID access point will be associated with a VLAN on the wired network that segments of traffic to specific groups as they would with conventional wired network. Wireless deployments with multiple VLANs will then configure 802.1Q trunking ISL between access point and Ethernet switch.

Miscellaneous Settings

Turn file sharing of MicrosoftOFF
Implement anti-virus software and firewalls
Install the VPN client business
Turn off automatically connect to any wireless network
Never use AdHoc mode – this allows you to connect portable computers Unknown
Avoid signal invaded by a good survey site
Using a minimum transmission power setting

Anti Theft option

Some access points have an option available with anti-theft lock and safe wiring of equipment during the mission in public places. This is a key publicimplementations where access points can be stolen or is there some reason that must be mounted below the ceiling.

Security attacks

• Wireless packet sniffer packet capture, decode and analyze the computer sent between client and AP. The aim is to decode the information security.

• Dictionary attacks attempt to determine the decryption key configured on the wireless network using a list or a dictionary with thousands of localaccess code phrases. The attacker acquires information from the authentication process and scans each word in the dictionary against the password until a match is found.

• The mode assigned to each wireless client specific Safety affects. The Ad Hoc mode is the least secure option AP without authentication. Every computer on the network can send information to a nearby ad-hoc computer. Select Infrastructure mode, if available.

• IP spoofing is a common networkfalsify or attempt to replace the source IP address of each packet. The network device thinks its communication with a computer approved.

• SNMP is sometimes a source of security compromised. Implement SNMP v3 with complex community strings.

June 19, 2011. Tags: , , , , . computer network. Leave a comment.

Next Page »