Saturday, March 12, 2011

Student Ethical Standards


1. DO use the Internet to help with schoolwork. The Internet is a source of great volumes of information. It's like having the world's largest library at your fingertips! Some good sites to check out:

A. B.J. Pinchbeck's Homework Helper.

B. To e-mail questions to experts, click on NJNIE Project:
Ask An Expert Page
.

C. PITSCO's Ask An Expert.

2. DO use the Internet to "visit" museums in far away places. Some examples are:

A. The Louvre, Paris, France.

B. The Exploratorium, San Francisco, California.

C. The Smithsonian Institution.

3. DO use the Internet to meet children in other countries or to keep in touch with pen pals who live far away in this country or other countries.

Some on-line services host chat rooms especially for children, and monitor them periodically for safety. You can safely establish an international mail pen pal through an existing program sponsored by your school, and then expand your pen pal communications to the Internet if your pen pal has access to Internet e-mail at his or her school or a nearby university.


4. DO be careful about talking to "strangers" on a computer network. Who are these people anyway? Some people say and do things which are NOT NICE.

5. DO use the Internet to learn more about universities and colleges that you may be interested in attending. Almost all colleges post some information on the Internet. Many colleges let you take a "virtual tour" of the campus, or submit applications for admission or financial aid applications on line. To find a college web site click on the Alphabetical Listing of College and University Home Pages.
6. DO respect the privacy of other users on the Internet, just as you expect your privacy to be respected. How would you feel if someone read your private e-mail or your grades?
7. DO be careful when you "download" (copy) programs from the Internet. Use a virus scan program before loading it on your computer. Some programs on the Internet contain viruses that can harm your computer.
Red light DON'T:
1. DON'T give your password to anyone. Passwords are intended to protect your computer and your files. It's like giving the key to your house away!

2. DON'T answer messages that make you feel uncomfortable because they seem improper, indecent, or threatening. TELL A GROWN-UP RIGHT AWAY.

3. DON'T give any personal information, such as your family's address, phone number, credit card or calling card numbers, your school's name, or your picture to anyone on a computer network that you don't personally know.

4. DON'T arrange to meet anyone you've met on the Internet without telling your parents. Some people on the Internet lie about who they are, how old they are, and why they want to meet you.

5. DON'T try to break into computers. It's not a game. It's a crime and it's an invasion of privacy. Computers often contain sensitive information. How would you feel if someone broke into a computer and changed your grades? Deleted your term paper? Cut off your telephone?


6. DON'T steal copyrighted computer programs ("software") by copying it from the Internet. This is the same as stealing it from a store. People work hard to develop new programs and deserve to be paid for them. If software designers don't get paid for their work, they can't continue creating new software, such as new educational games or tools that help with schoolwork.
7. DON'T make copies of any copyrighted material, like books, magazines, or music without the permission of the author, publisher or artist. Copyrighted works are available (usually illegally) on the Internet. You are committing a crime if you copy and distribute them.

8. DON'T copy material that you find on the Internet and pretend that it's your own work. It's the same as copying a book or magazine article and pretending that you wrote it. It's easy to get caught. Remember, your teacher and thousands of other students have access to the same material.



COPIED FROM: http://www.justice.gov/criminal/cybercrime/rules/rules.htm

Encrypt and Decrypt password

I've made a function in PHP and MySql How to encrypt and decrypt a password easily using DECODE and ENCODE function in MySql, here is the link to where the file may be downloaded

Download SOURCE FILE .
Password for the source file is: "passwordpassword" without the qoutes

Software Piracy unethical or not

Piracy is a crime, Generation techno is here, a generation of technical and technological advancement have multiplied and grown. but where are morals leading us, on the internet we are plagued with pirates, viruses and other malicious things. Is the advancement of the technology leading our morals backward. What is happening with our conduct.

Piracy now in the internet is rampant, hundreds of movies, music, and even softwares are aired and downloaded everyday, without knowledge from the publisher or author, to name a few of the worlds most hacked and pirated softwares.

Number one on the list:

A photo editing software that many seemed to be fund of using, adobe's Photoshop Used mostly by people to design their photos, either for business or just for casual fun.
My advice use opensource softwares:
Photoscape - free fun photo editing software
Gimp - GIMP is the GNU Image Manipulation Program. It is a freely distributed piece of software for such tasks as photo retouching,
image composition and image authoring.It works on many operating systems, in many languagesware for such task.
Paint.net - .Net based photo editing software


My second rated pirated software is Microsofts Word


Microsoft word why is this my second rated pirated ,cracked software???? you will learn later, My advice Use opensource word editing software like:

OpenOffice.org- my second option to Microsoft's Microsoft World

Now the top rated, most cracked, most pirated software of all is :
tada:
Microsoft's Operating Systems, whether it maybe 1997,2003,XP,Vista or Windows7
Microsft's microsoft word only runs in Microsoft OS so if a cracked OS also has a cracked office=)

My Advice OpenSource Operating systems, one of the best on the market is:

1 .Quebes 4. Plan9

7. Linux
a. Ubuntu


Conclusion: Pirated and cracked software may offer you short term pleasure,
but beware Cracks, keygen maker and serial downloads may contain virus that
may destroy your computers and corrupt your files, it is better to buy licensed ones
and be free from viruses and other malicious scripts.
and second our respect on the authors and publishers who by sweat and blood made
this softwares, so let us not put their work in vain. =)