Friday, March 19, 2010

How Internet Search Engines Work

Search Engines Work

Internet search engines are special sites on the Web that are designed to help people find information stored on other sites. There are differences in the ways various search engines work, but they all perform three basic tasks:

•They search the Internet -- or select pieces of the Internet -- based on important words.
•They keep an index of the words they find, and where they find them.
•They allow users to look for words or combinations of words found in that index.
Early search engines held an index of a few hundred thousand pages and documents, and received maybe one or two thousand inquiries each day. Today, a top search engine will index hundreds of millions of pages, and respond to tens of millions of queries per day. In this article, we'll tell you how these major tasks are performed, and how Internet search engines put the pieces together in order to let you find the information you need on the Web.

Before a search engine can tell you where a file or document is, it must be found. To find information on the hundreds of millions of Web pages that exist, a search engine employs special software robots, called spiders, to build lists of the words found on Web sites. When a spider is building its lists, the process is called Web crawlingHow does any spider start its travels over the Web? The usual starting points are lists of heavily used servers and very popular pages. The spider will begin with a popular site, indexing the words on its pages and following every link found within the site. In this way, the spidering system quickly begins to travel, spreading out across the most widely used portions of the Web.


"Spiders" take a Web page's content and create key search words that enable online users to find pages they're looking for.

Monday, March 8, 2010


Jonathan Joseph James

The first juvenile sentenced federally to a term of confinement for computer hacking

Operating under the handle C0mrade, James hacked into NASA and Defense Department computers for fun. Among other trophies, he penetrated the Marshall Space Flight Center in Huntsville, Alabama, and downloaded the proprietary environmental control software for the International Space Station — the programming that controlled the temperature and humidity in the station’s living space. James was sentenced to six months of house arrest — a sentence applauded by then-Attorney General Janet Reno — followed by probation.
“I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.”

James’ major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee user names and passwords.

“The government didn’t take too many measures for security on most of their computers,” James told PBS’s Frontline at the time. “They lack some serious computer security, and the hard part is learning it. I know Unix and C like the back of my hand, because I studied all these books, and I was on the computer for so long. But the hard part isn’t getting in. It’s learning to know what it is that you’re doing.”

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, “The code itself was crappy . . . certainly not worth $1.7 million like they claimed.”

On May 18, 2008, C0mrade took his own lifeafter Secret Service agents accused him of being part of the conspiracy responsible for the largest identity theft in U.S. history. He was found dead of a self-inflicted gunshot wound in his home on May 18, 2008, less than two weeks after agents raided his house in connection with a hacking ring that penetrated TJX, DSW and OfficeMax, among others. In a five page suicide note, James wrote that he was innocent, but was certain federal officials would make him a scapegoat.

“I have no faith in the ‘justice’ system,” he wrote. “Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

James’ father remembers his son as a passionate computer geek, who started playing with the family PC at the age of 6, and switched his own computer from Windows to Linux in middle school. Prior to the NASA raid in January 2000, Robert James and his wife would frequently battle their son over his computer use, which would stretch late into the night.

At one point, the senior James took away his son’s computer; the boy, then 13, promptly ran away from home, and phoned his mother to declare he wouldn’t return unless he got his PC back. His parents tracked him to the Borders Books down the street.

Robert James chuckles when he recalls the story. “So, yeah, he kind of liked computers.”

Network Engineer Salaries Paysacle

Friday, March 5, 2010

NETWORK ENGINEERS


Common Responsibilities for Network Engineer



  1. Install all new hardware, systems, and software for networks.

  2. Install, configure, maintain network services, equipment and devices.

  3. Supports administration of servers and server clusters.

  4. Manages all system back-up and restore protocol.

  5. Plans and supports network and computing infrastructure.

  6. Perform troubleshooting analysis of servers, workstations and associated systems.

  7. Documents network problems and resolution for future reference.

  8. Monitors system performance and implements performance tuning.

  9. Manage user accounts, permissions, email, anti-virus, anti-spam.

  10. Requires a thorough knowledge of networking essentials.

  11. Oversee software and network security.

  12. Strong analytical abilities and professional office experience needed.

Sunday, February 28, 2010

Problem with my computer

This weekend I fixed my computer by myself. My very first troubleshooting.
The problem was the computer keep 
cutting off so I tested the outlet it ok,
An checked the power supply it ok, checked all the connect that was good.
So I ran a test and it gave an error problem Signature  #7 Bad driver.
I pulled the hard drive and had it tested at a repair shop it was bad.
I replaced still had same problem I pulled CD Drive and DVD Drive had them
Tested at the repair shop and the DVD
Drive was bad replaced now it works.
The repair shop owener Carlos try to sell me Solftware. I told the him no because I will buy it from my school.
So he ask what school I said Florida Career College he LOL and said that
He just Graduate from Florida Career
College.  

  

Wednesday, February 24, 2010

LUV2MAMBO

My Name is Norman, I Love too dance salsa,bachata, Teaching New York Style Salsa beginner and Intermediate levels and provides a road map to the vibrant salsa.