Thursday, November 09, 2006

What SHTTP means.


SHTTP means Secure Hypertext Transfer Protocol which is developed by Enterprise Integration Technologies in 1995 to ensure security with commercial transactions on the Internet. A protocol that provides secure transactions over the Web. It is endorsed by a variety of organizations. An extension to the HTTP protocol to support sending data securely over the World Wide Web. Not all Web browsers and servers support S-HTTP. Another technology for transmitting secure communications over the World Wide Web -- Secure Sockets Layer (SSL) -- is more prevalent. However, SSL and S-HTTP have very different designs and goals so it is possible to use the two protocols together. Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely. Both protocols have been submitted to the Internet Engineering Task Force (IETF) for approval as a standard.

RSS

What is RSS?
The Internet today contains a wealth of information. Avid Internet users visit many interesting websites and read many articles. Information and web pages make their way in to the favorite folder for later viewing. Over the course of time, re-visiting these bookmarks becomes a major task for users especially as the number of bookmarks grows. A better technique for users is to automatically receive information about updates to their favorite websites.
Internet users can employ special software, like newsreaders and RSS-aggregators, to organize RSS feeds and get automatic updates. Products like Active Web Reader allow you to read RSS files. Such types of programs go beyond simply reading. They also organize RSS feeds, manage updates, monitor website changes and search for information online. They can keep you automatically updated on the latest changes by checking RSS feeds and displaying items from them.

Let's talk about cybercrime.





According to Wikipedia, cybercrime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories. Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime. This term is also used to include traditional crimes in which computers or networks are used to enalbe the illicit activity. Examples of cybercrime in which the computer or network is a tool of the criminal activity include spamming and certain intellectual property and criminal copyright crimes, particularly those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls), malicious code, and denial-of-service attacks.
Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds. Finally, examples of traditional crimes facilitated through the use of computers or networks include Nigerian 419 or other gullibility or social engineering frauds (e.g., "phishing"), identity theft, child pornography, online gambling, securities fraud, etc.
Cyberstalking is an example of a traditionl crime -- harrassment -- that has taken a new form when facilitated through computer networks. Additionally, certain other information crimes, including trade secret theft and economic espionage, are sometimes considered cybercrimes when computers or networks are involved.
Cybercrime in the context of national security may involve hacktivism (online activity intended to influence policy), traditional espionage, or information warfare and related activities. Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

Here a the principal hackers of the time.

Apart from Tsutomu Shimomura, the other three hackers mentioned here were criminals at some point of time and for various reasons. They have all repented for their actions and are currently contributing in positive ways to the burgeoning cyber realm. It is interesting in retrospect to take note of when, why and how they turned to crime. Tsutomu, however, is recognized for bringing down Kevin Mitnick, arguably the most notorious hacker ever. The I-Love-You virus and the Sasser worm had caused so much damage without apparent human intervention that they too deserve due recognition.

Kevin Poulsen

Probably one of the most talented hackers of all time, Kevin Poulsen wanted more than what his high paid job could offer him. His crimes ranged from stealing classified military data to hacking into a radio station’s telephone lines in order to “win” a Porsche. He did not call himself the “Dark Dante” for nothing.

Kevin Mitnick

Well-known in the annals of the FBI, he was one of the most slippery crooks the bureau ever tried to apprehend. As proficient at actually committing the crime as he was at deceiving the authorities, he left a remarkable trail of crime as long as he was on the run. He had delved so deep into cybercrime that he was barred from using a computer for a long time after he was caught.

Adrian Lamo

This is the classic case of a white hacker who went too far. Adrian was a good friend of both Kevin Mitnick and Poulsen but he did not go to the extent that they went in the realm of cybercrime. His life, however, serves to remind all of us how easy it is to be seduced by the dark side even when one is actually working for the “good” side.

Tsutomu Shimomura

A high profile researcher at San Diego Supercomputer Center, Tsutomu has also worked with the likes of Richard Feynman. His other talent, hacking, was brought forth, however, when he had a run-in with Kevin Mitnick. Kevin had deliberately hacked into Tsutomu’s computer to steal some files and Tsutomu took it as a personal challenge to stop him as well as bring him to justice.

I love you Virus

This virus is notorious throughout the world. A highly effective self-replicating algorithm coupled with an instantly provocative message like “ Kindly check the attached LOVELETTER from me. ” has made this one of the most widely spread virus in history. It is believed that this virus alone caused over $10 billion in damages all over the world.

Sasser Worm

This malware does not even need a provocative message to have people loading it onto their computers – it comes and goes as it pleases. Being connected to the Internet is enough to get it loaded onto one’s computer and though it did not directly cause damage, it caused severe network disruptions worldwide leading to millions lost due to loss of productivity. Imagine the impact this had on hospitals and banks.

I would like to finish this presentation by one of the most important cybercrime story of the 20th. The american government called it "electronic Pearl Harbor".
For two days in January 1999, hackers repeatedly tapped into military computers at Kelly Air Force Base in San Antonio -- the center for the most sensitive Air Force intelligence, the kind of information critical to American troops now on patrol over Iraq and in Bosnia.
NBC News has learned the attack was a sophisticated, coordinated assault through computer networks in Canada, Norway and Thailand.
The hackers didn't receive top secrets but the Pentagon's No. 2 man, Deputy Secretary of Defense John Hamre, says the United States is essentially engaged in an all-out cyberwar.
For the past several months, so-called cyberterrorists,
operating from as many as 15 locations worldwide, have launched a series of coordinated attacks on Pentagon computers -- as many as 100 per day.
The attackers remain unidentified and since anyone with a computer is a potential enemy, experts warn the United States military is vulnerable to a sneak attack.
At Kelly, the hackers were trying to enter a server that controls a number of sensitive computers at the base and other bases in the San Antonio area.
Among the computers targeted were those of the Air Intelligence Agency, the Air Force Information Warfare Center and a Joint Chiefs of Staff command-and-control operation. Officials said it was the most sophisticated attack yet on Pentagon computers.

The attack so worried the Pentagon that it called in the FBI, which has launched a criminal investigation. But the military is making some progress. New technology developed by the Navy did detect the attacks on Kelly Air Force Base, but failed to find the hackers themselves.

Several experts said such an attack wouldn't have even been detected at all a few months ago but the government has been quietly setting up cyberwar early-warning operations at the Pentagon, CIA and the National Security Agency over the past year.

Without falling down the paranoïa, we all have to be careful. I have never been a victim of cybercrime but I am a possible target as all Internet users. In fact, as soon as we pay something on internet ,our bank code can be stolen.

However, the protection is making progress. Some sure systems are applied as Paypal for example, and work well.


Tuesday, November 07, 2006

Why Youtube is so great.

Today, nearly all Internet users know or have heard about Youtube. It is the symbol of the last innovation of the NTIC, the Web 2.0.
What is you Tube?
YouTube is a popular free video sharing web site which lets users upload, view, and sharevideo clips. Founded in February 2005 by three employees of PayPal, the San Bruno-based service utilizes Adobe Flash technology to display video. The wide variety of site content includes movie and TV clips and music videos, as well as amateur content such as videoblogging. It is staffed by 67 employees. In October 2006, Google, Inc., announced that it had reached a deal to acquire the company for $1.65 billion USD in Google's stock. The acquisition is expected to close in the fourth quarter of 2006.
The company's humble beginnings in a garage and commitment to offering free services necessitated outside financial backing. In November of 2005, venture capital firm Sequoia Capital invested an initial $3.5 million; additionally, Roelof Botha, partner of the firm and former CFO of PayPal, joined the YouTube board of directors. In April 2006, Sequoia put an additional $8 million into the company, which had experienced a boom of popularity and growth in just its first few months.
At present, YouTube is one of the fastest-growing websites on the World Wide Web, and is ranked as the 10th most popular website on Alexa, far outpacing even MySpace's growth. According to a July 16, 2006 survey, 100 million clips are viewed daily on YouTube, with an additional 65,000 new videos uploaded per 24 hours. The site has almost 20 million visitors each month, according to Nielsen/NetRatings, where around 44% are female, 56% male, and the 12- to 17-year-old age group is dominant. Youtube's pre-eminence in the online video market is staggering. According to the website Hitswise.com, Youtube commands up to 64% of the UK online video market.
The key of this success is, in my opinion, the speed of download and the fact it is free. Everyone can use it, even if he or she's not a king of the internet. We can explain this success by the buzz it had created when it started.
Youtube has revealed people, who are famous in the website
community. As an example, I will present the lonelygirl15 phenomenon.

Lonelygirl15 is a fictional video blog that came to international attention via YouTube, a popular video sharing website. The central character is a YouTube user of the same name, although she is commonly known as Bree. The character achieved massive popularity with her series of videos, which acquired over 15 million cumulative views. But after viewers grew suspicious, lonelygirl15 was exposed as a fictitious character played by New Zealand actress Jessica Rose. An interview with The New York Times then revealed the series creators, Ramesh Flinders, a screenwriter and filmmaker from Marin County, California, and Miles Beckett, a surgical residency dropout turned filmmaker.
The series, which began June 16, 2006 is still running, with new videos appearing regularly.The series, which began June 16, 2006 is still running, with new videos appearing regularly.

As far as I am concerned, I use Youtube everyday. I only watch videos, like musical clips and series. I don't donwload movies, that it why I don't share what I watch. I don't like to download because when I do it I feel like robbing something. I don't feel at ease. One of the reason why I like Youtube is that it is now allowed. Must of all, it is not necessary to download because we can see what we want, when we want and wherever there is an internet access. It is so much faster and safer that download sites like Emule or Napster, that it would be silly to not use it.

Thinking about the possible uses of Youtube in the future, we can all imagine. The best like the worst.
We can plan that people suffering of censorship will find here a way to get out of their silence. They have the public to read their message. We can also dream that some friendships and love stories will born. I think that it is already the case but I am sure that this movement will grow.
But stop dreaming, and let think about professional uses. Managers now have the possibility to edit methodology, secret of success or informations they want to transmit to their employees. When we see that the White House uses Youtube in her campaign against drugs, we can easily apply this to the company system. Youtube is as all the medias a way of pressure. Here comes the bad aspect. We know that all the files coming to Youtube are checked. But if the company, now forming part Google, is on lobbying, the game will be ended.


Thursday, October 26, 2006

comprehension of each others


Comprehension exists when people have the choice of the subject they are going to speak about. Internet permits that because we don't have to connect us.
We can find a lot of sites on Internet where we can find people who understand our questions, especially when there are "secrete" ones. As the success of women solidarity shows, we can always find someone who is in the same situation. There are some relevant examples concerning the comportement problems. When you have a problem, you go on a forum and there so many people in the same situation in the world that you are sure to find a help.

Insight, outside


Insigth is the human quality which can be helpfull to avoid mistakes. However, it is sometimes necessary to express its feelings and fears. For example, Internet, with solidarity forums, has saved a lot of women in oppressing situations, in particular in arabean countries. They had no rights and they couldn't express their pain. Internet permitted them to feel less loneliness and to keep the hope to see an arrangement of their situation.

Patience is the key word of the succes


Patience is necessary in all life and especially with technologies. When your computer is too slow, your washing machine is going crazy during your husband is asking what you will do for dinner, you have to be patient to stay in good tems with your nerves. A good example of patience on Internet is the web assistance. There are some forums where people is here to answer to your questions. They never let you down even if you ask silly questions.

Discipline on Internet


A good example of discipline on the Internet that we all have to respect concerns the online classes. There are a lot of today and they work really well. We have to focus on the subject and accept the rules as like as a traditional class. Interent is one of the worst place of temptation today because we can find all we want. So we need discipline to follow one objective. None is there, next to us, to say what we have to do; we have to find the solutions on our own. I really like the aspect of Internet which responsabilize people and make them more independant.

Internet: a place for the development of human qualities.


The six qualities of good professional and, more generally, social activity are generosity, patience, discipline, perseverance, insight and comprehension.
A perfect example of generosity on the e-culture today is the websites of peer to peer as You Tube and Daily Motion. When someone gets a video on Internet, quite long to download, he immediately puts it on the website. There are some people who became famous in the “download” word because they put the videos very early and they traduce it. I think it is a good state of mind which strengthens the links between people.

Wednesday, October 25, 2006

social networks



After having seen one the juridical dimension of the Internet, I will observe one its social aspects through social networks. A social network is a social structure made of nodes which are generally individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familial bonds. The term was first coined in 1954 by J.A.Barnes (in: Class and Committees in a Norwegian Island Parish, "Human Relations"). The maximum size of social networks tends to be around 150 people and the average size around 124 (Hill and Dunbar, 2002). Social networking also refers to a category of Internet applications to help connect friends, business partners, or other individuals together using a variety of tools. Social network theory views social relationships in terms of nodes and ties. Nodes are the individual actors within the networks, and ties are the relationships between the actors. There can be many kinds of ties between the nodes. In its most simple form, a social network is a map of all of the relevant ties between the nodes being studied. Msn Messenger is an online social network and it is really popular.

Rage against DRM

What is DRM?


What is DRM?

DRM vendors and publishers coined the term digital rights management to refer to the types of technical measures discussed here, applying it only to digital media (and analog media that has been released in digital form). There is a long history of objection on the part of copyright holders (often music distributors or broadcasting companies) to copying technology of any kind. Examples have included player piano rolls (early in the 20th century), audio tape recording (after WWII), video tape recording (eg, in the famous Betamax case in the US), etc. Digital copying raised concerns to a higher pitch. While analog media loses quality with each copy generation, and often even during normal use, digital media files may be copied an unlimited number of times without degradation in the quality of subsequent copies. Many online music stores, such as Apple’s iTune' Store, as well as certain e-book producers, have adopted various DRM schemes in recent times. In recent years, a number of television producers have begun demanding implementation of DRM measures to control access to the content of their shows in connection with the popular TiVo system, and its equivalents.

In order to complete this definition, I am going to present the digital Millennium Copyright Act, its actors and its implications.The Digital Millennium Copyright Act (DMCA) is a United States copiright law passed unanimously on May 14, 1998, that criminalizes the production and dissemination of technology that allows users to circumvent copyright protection methods, rendering all forms of DRM-stripping and circumvention software illegal.

The arrest of Russian programmer Dimitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use in preventing the further development of anti-DRM measures. While working for Elcomsoft, he developed The Advanced eBook Processor, an application that allowed authorized users to strip usage restriction information from protected e-books. Sklyarov was arrested in the United States after presenting a speech at DEF CON, and subsequently spent several months in jail.

The DRM has a certain influence in recordings and video.

Several DRM schemes have been implemented. Many see them as "abuse" of copyright (often called eSlavery in Europe); DRM proponents have seen them as a "reasonable balance of consumer concerns and artist rights." This is the first known instance where a publisher has enforced DRM on private data, rather than just data copyrighted by the publisher.The PlayStation 2 CD-ROM format games are protected and cannot be copied with normal copy software. Curiously, the DVD-ROM format games doesn't have this type of protection. The Xbox 360 games has advanced security code which prevents copying of the games. The problem is that DRM affect most legitimate purchasers.

web neutrality

What I want to debate now is the emergence of web neutrality. The expression « Web neutrality » involves the influence of lobbying companies in the success of some websites. The issues which are discussed to save the internet are the abolition of the Internet’s first amendment. This amendment created in 2003 was based on what site pays the most. I think it is unfair of course, as all the monopoles. It shows that the time of the utopia of the Internet as the most democratic media, like Mac Luhan described in the last seventies is finished. It is a market like the others with its lobbies and its own regulations. That is why the project of web neutrality is a good on. It have to be a priority on these days because we all have to protect the freedom of information and communication.

Poscasting God...



I will focus on one exemple: the godcasting. The main godcast networks linked on Wikipedia are: Disciples with microphones, God's iPod, The godcast Network.

This example shows that this new technology affects all social activities, entering in our life. The web is forming part of our society and it is built like a state, with politic and economical laws.

Thursday, October 19, 2006

News about podcast


The first subject I want to discuss on this blog dedicated to the NTIC is the podcast phenomenon.

First of all, I will try to give you a complete definition of the podcasting, its uses and its influence.

Podcasting, according to Wikipedia, is “the practice of making audio files available online in a way that allows software to automatically detect new files and download them.” Technically this is accomplished using RSS feeds to provide information about a collection of audio files in MP3 format. Podcasting lets anybody with a microphone; a computer and an Internet connection publish audio broadcasts that can be listened to by people anywhere in the world. Because the barriers to entry are very low, podcasting is rapidly becoming a popular way for people share audio broadcasts. Podcasts are free and can be automatically downloaded to portable media players, so they can be listened to whenever it’s convenient.


There are already many types of podcast available including:

-Audio books with chapters broadcast in installments.

-Music shows for all the latest new music directly to your PC.

-News broadcasts to ensure you keep up to date with what’s happening.

-Entertainment broadcasts automatically delivered on a regular basis.

-Businesses keeping customers informed about latest products and developments.

-Sports news - keeping fans updated with their team’s progress and achievements. -Religious leaders can even provide a service to their local community with important messages, sermons and pastoral news.


The term podcasting is often used to refer to one off audio broadcasts that can be downloaded from the Internet although this is not, strictly speaking, a true podcast which should be a ‘series’ of broadcasts. It is not a streaming to listen music or to watch a video like Youtube or Daily motion.

The word is a “portmanteau” of Apple’s “Ipod” and broadcasting.

It seems to be the most important development in e-communications in the last six months. There are so many activities using it, like radio, Politics, Education and Religion. We heard of it more than Web 2.0 because of it’s simple use and it’s low cost.