Wednesday, November 02, 2011

Final Blog!!! - Patches

Visit the Web site of a major operating system vendor and identify the patches that were issued in the last 12 months. For each patch, find its criticality and size. Then, as if you wer assigned the task of installing these patches, decide the timing for their installation.  How many would you install immeditely and which ones could wait for the next patch cycle.  Cite your sources, write your opinion, and include your name.

For the last time, Blog on!

Chapter 11: Key Logging

What is key logging?  Why is it considered both good and bad in network security?  Post your opinion, cite with a relevant URL, and include your name.

Blog on!

Catching up and moving ahead

I have been late in posting the blog topics for the last few chapters, so here they are in separate threads.

Chapter 10:  Query Processing in Distributed Systems

Using the description from the textbook chapter, explaing query processing in distributed systems.  Is it a necessary tool?  Does query processing increase network processing speed?  What effect does the size of the network have on query processing speed?  Cite your sources and include your name.

Blog on!