Welcome to my website.

Hi! My name is Ali Abbas and this is my website for Freshman Immigration.

Assignment 4

Lorem ipsum dolor sit amet, ea eum labitur scripserit, illum complectitur deterruisset at pro. Odio quaeque reformidans est eu, expetendis intellegebat has ut, viderer invenire ut his. Has molestie percipit an. Falli volumus efficiantur sed id, ad vel noster propriae. Ius ut etiam vivendo, graeci iudicabit constituto at mea. No soleat fabulas prodesset vel, ut quo solum dicunt. Nec et amet vidisse mentitum. Cibo mutat nulla ei eam.

Theory of computation

  • Always

Links:

Questions to ask:

  • How can I create a virus and use it "responsibly"?
  • What does "phishing" mean (simply) and how to avoid it?
  • What is the concept behind "hacking" a server/program and how?

 

Computer Security

In a single sentence, computer security means protecting computers, laptops, etc as well as the information contained in them.

The security of systems can be accessed without authorisation from two different ways. One obvious way is to access the data/information physically, and the other way is to access the data virtually/ over a network.

A computer system's security depends on how responsible its user is. Someone can access your data physically, for example, if you forget to logout of your andrew account on a computer in one of the CMU clusters, that way they have access to your files without knowing your username or password and can do whatever they want with it. Another way is if they are watching you enter your passwords or you just have really easy to guess password like abbas123.

Some threats to your computer security through the virtual world consist of computer viruses, spyware, hackers and phishing. Viruses are the most common threat that everyone can probably relate to. Viruses work by copying and replicating themselves on your computer and then altering the way the computer operates, all without your knowledge or permission. Spywares are any programs that monitor your online activity or install programs on your computer without your permission to store your personal information - this is a serious threat. Hackers are the people behind the creation of such threatening programs.

How to prevent unauthorised access to your data:

  • - Log out of your account on a shared computer
  • - Leave your office/room door locked
  • - Always have a firewall on your computing device (a firewall is basically a software or device that prevents unauthorised access coming from the networks available to the general public to your local netowrk that connects your computing device)
  • -Install an anti-virus/ anti-spyware software software

Links:

Questions to ask:

  • How can I create a virus and use it "responsibly"?
  • What does "phishing" mean (simply) and how to avoid it?
  • What is the concept behind "hacking" a server/program and how?

 

 

 

 

Randy Pausch - Time Managment Lecture

Summary

Randolph Frederick (Randy) Pausch was a professor of computer science at Carnegie Mellon University. He was from the United States of America and had a wife and three children. Born in 1960, he died in 2008 (aged 47) after being diagnosed with pancreatic cancer.

Randy Pausch was well known for many things, some of which are:
  • The creator of the Alice software project- which is basically a computer program that helps create 3D models and animations
  • Cofounder of CMU's Entertainment Technology Centre
  • Working with Disney imagineers and Electronic Arts
  • Giving inspirational speeches on life
  • Co-author of the #1 best selling book "The Last Lecture"
  • What I liked about his Time Management Talk:

  • His humour, especially even after he knows he's going to die soon
  • The 80/20 rule,Itend to be a perfectionist and this made me realise that if I am going to perfect something then it better be the thing i plan to do for the rest of my life or else i shouldn't waste my time on it and should move on to advancing in other things
  • Not treating my email inbox as a to-do list, because sometimes i purposely mark some emails as unread so i can come back and deal with them later
  • How to be a leader and roles of a leader, i have been a leader in various organisations before but sometimes overlooked what my duty as a leader actually was. Like i shouldn't be focusing on my success as a leader, i should be focusing on the success of my followers in the task i have lead them through.
  • While making a to-do list i must take the time to sort my tasks properly, starting with the important tasks first. Also the fact that how important time is in life, and how time should be the commodity we deal in and not money

  • Some Useful links:

    Pricing Tables.

    Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt.

    Starter

    FREE per month

    • 1GB Storage
    • 5GB Bandwidth
    • 2 Domains
    • 3 Databases
    • 1 FTP Account
    • 25 Email Accounts

    Standard

    $9.99 per month

    • 3GB Storage
    • 10GB Bandwidth
    • 3 Domains
    • 5 Databases
    • 3 FTP Account
    • 30 Email Accounts

    Premium

    $19.99 per month

    • 10GB Storage
    • 25GB Bandwidth
    • 5 Domains
    • 10 Databases
    • 10 FTP Account
    • 50 Email Accounts

    Ultimate

    $29.99 per month

    • 30 Storage
    • Unlimited Bandwidth
    • 10 Domains
    • 15 Databases
    • 10 FTP Account
    • 50 Email Accounts

    Get Hosting.

    Host This Template on Dreamhost.

    Looking for an awesome and reliable webhosting? Try DreamHost. Get $50 off when you sign up with the promocode STYLESHOUT.

    Product Screenshots.

    Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit.

    What People Are Saying.

    • The heart is in the work...

      Andrew Carnegie
    • Your work is going to fill a large part of your life, and the only way to be truly satisfied is to do what you believe is great work. And the only way to do great work is to love what you do. If you haven't found it yet, keep looking. Don't settle. As with all matters of the heart, you'll know when you find it.

      Steve Jobs

    MailChimp signup form.

    Adding your own MailChimp powered email sign-up is easy. Grab the super slim code from your MailChimp account and drop the code here. Lastly, remove the link and style tags that comes with the embedded code and your good to go. All styling is within our stylesheet.

    We never share your information or use it to spam you.