Wednesday, February 18, 2009



Visit http://www.junkbusters.com/ and learn how to prohibit unsolicited email (spam). Describe how your privacy is protected.

How to prohibit unsolicited email (spam) ?
>> Read carefully when filling out online forms requesting your e-mail address, and exercise your choice.
>> Use firewall softwares e.g .. Barracuda spam filter
>> Use spam filtering service e.g.. Outlook 2003 Junk e-mail filter
>> Use multiple e-mail addresses. Short e-mail addresses are easy to guess, and may receive more spam. A common user name such as jsmith will typically get more spam than a weird unique name such as jsm93x98.

How your privacy is protected?
>> To stop junk and to protect your privacy you need to control the information stored about you in these junk databases. Sometimes call cookies!
>> Do not purchase something over the Internet by using your mail with full name or do not publish your e-mail address on a website or do not subscribe to a news service and do not participate in news groups or mailing lists.

References....
http://www.junkbusters.com/
Information literacy page 99 Web activities No 2..

Thursday, January 15, 2009

1.Cyber squatting

It is a derogatory term used to describe the practice of registering and claiming rights over Internet domain names that are, arguably, not for the taking. For example microsoftofficehome.info , is not maintained by Microsoft, but by professional domain name holding operations that illegally profit through the misuse of Microsoft’s intellectual property.

2. Go to OPAC IIUM, find three books from Law, Human Science and Technology. Get the call numbers and ISBN numbers....

LAW

Title Local Remedies in International Law by C.F.Amerasinghe( ISBN 0949009792 , Call no d61k2315A94l )
Title Statistics for Lawyers by Michael O. Finkelstein ( ISBN 03879136X , Call no QA276. 12F499 )
Title Mass Media Law by Dan R. Pember ( ISBN 0697030199 , Call no D18 KD53P394 )

HUMAN SCIENCE

Title The Human Polity by Kay Lawson ( ISBN 0395824532 , Call no JA66L425H )
Title Human Resource Management Review [Serials] ( Greenwich , ISSN 1053-4822 , Call no j HF5549 2U5H918J )
Title Fundamental Laws of Human Behavior by Meyer ( ISBN 0415101654 , Call no BF199M613F )

TECHNOLOGY

Title Network Management Strategies by Stefano Robotti ( ISBN 092769553 , Call no TK5101 1R660N )
Title Informal Technology by Nancy D. Lane & Margaret E. Chisholm ( ISBN 0816119082 , Call no Z678. 9143L )
Title Libraries/ Technology and Information Market by Richard De Gennoro ( ISBN 0816118558 , Call no Z674.4D278 )

3. Explore Bro. Asmady blog and tell me at least three things you like about his blog....

First, his blog is very useful for the students because we can download notes and we can see our results.
Second, the color of the blog is very attractive and there is also “shout session”. You must log in to shout.
Third, the tabs are also attractive and there are lots of photos.

4. Name the URL for Kulliyah of ICT.
http:// www.kict.iiu.edu.my

5.Go to CFS library, find 10 books that categorized under red spot collections..
1) Principles of Genetics (3rd edition) by D. Peter Sanustad & Michael J. Simmons
2) Experimental Organic Chemistry by Daniel R. Palleras
3) Fundamentals of College Algebra (11th edition) by Earl W. Swokowski & Jeffery A. Cole
4) Precalculus (7th edition) by Michanel Sullivan
5) Biology Concepts and Connections ( 3rd edition) by Neil A. Campell & Jane B.Reece
& Lawrence G. Mitchell
6) Introduction to Internet (7th edition)
7) Physical Chemistry by Thomas Engel & Philip Reid
8) Physics Contemporary College (3rd edition) by Dr. Edwin Janes & Dr. Richard Childers
9) Calculus (4th edition) by James Stewart
10) Introduction Statistics (5th edition) by Perm S. Mann