Well, I still have some questions that I missed to ask in the class. The 1st one is how to remove underline from the words when we made a link by html. I have seen many web sites that don’t have underlines on links. I think it is easy to notice where links are if they have them, but sometime it is stylish without underline. Next, I want to know how to make various kinds of tables. In the class, we learned only one table, but I am sure there is more! I think tables are very useful and helpful when we organize or see things on web pages. The other thing that I want to learn is, I already wrote this before though, how to fix computers when it is broken. For example, my father is crazy about computers and there are seven desktops and laptops in my house. He studied how to make computers from scratch and also how to fix them when they have difficult problems. I don’t really want to be like my father, but I want to be able to fix my desktops and laptops when I need to.
Saturday, November 18, 2006
:::: What Do I Want to Learn More About PC? ::::
Saturday, November 11, 2006
:::: Viral Video is... ::::
The proliferation of camera phones is making consumers to take many video shots by using them these days. They can buy cheap video editing and publishing tools, such as FORscene (an integrated internet video platform, covering non linear editing and publishing for broadcast, web and mobile), and consumers can edit videos on their mobile phones, and videos are distributed virtually by e-mails and between phones by Bluetooth. These videos are usually not for comercial but for enjoying viewing with friends or family.
Saturday, November 04, 2006
:::: Computers in the Future ::::
Saturday, October 28, 2006
:::: Recent Computer News ::::
Early Holiday Gifts from Microsoft!!Microsoft Corp. announced low-cost program to upgrades to Windows Vista and the 2007 Microsoft Office release with the purchase of a new Windows Vista Capable personal computer. According to MikeSievert, corporate vice president of Windows Client Marketing at Microsoft, the Express Upgrade to Windows Vista and Office Technology Guarantee programs will make their customers shop a new PC with confidence, and they will have a great experience with Windows XP-based PCs today, and even one when Vista and the 2007 Microsoft Office release become available.
Hacker Unlocks Apple Music Download Protection!!!
Jon Lech Johansen, a 22-year-old Norway native who lives in San Francisco, cracked Apple's FairPlay copy-protection technology. Monique Farantzon, managing director at DoubleTwist, said that Jon basically reverse-engineer FairPlay, and it allows other computers to offer content for the iPod. Apple allows only music that were bought from iTune online store to work on Apple products, but music from other online store are not available for iPods. However, his new technology could change Apple's domination. Johansen's achievement could help companies such as Microsoft Corp., Nokia, Sony Ericsson and Samsung Electronics Co. Ltd., which have all announced plans over the past few months for musiownload services combined with new devices to challenge Apple.
Monday, October 23, 2006
:::: Network Neutrality ::::
Network Neutrality, or Net Neutrality, is the leading rule which makes the Internet open and free.
It makes sure every user can accesses the content or uses the programs and devices that they want to. Then, with Network Neutrality, moving data is the only thing that the network has to do. It stops the companies that use the wires from distinguishing against content by source or ownership.
Network Neutrality helps economic innovation, democratic participation on the Internet. And it also made the Internet an outstanding environment for open communications, public participation and free speech.
But, there are some companies that don’t like Network Neutrality. The biggest telephone and cable companies want to be “Internet gatekeepers” that decide which web sites are good or not to access. They want to tell that their own search engines or other services are better.
Sunday, October 15, 2006
:::: Three Web Sites ::::
Saturday, October 07, 2006
:::: Computer Gifts to My Family ::::
Well, well, well. I would like to give one of the newest mice to my nanny because she has the worst mouse in the world. It is a mouse that have a small ball in it, and it doesn’t work well even I clean inside! So, I think she needs a Bluetooth or IR mouse.
To my mother, I would like to give software that contains various kinds of pictures for background of desktop. She likes to set pictures of flowers as background, so I think it would be a good present for her birthday that is in this month.
In my father’s case, I have no idea. He is a computer-otaku like my computer teacher, so he gets everything he needs for his computers. In my house, there are four desktop computers and one laptop and he uses all of them. How crazy! So, I really have no idea what he wants!
Saturday, September 30, 2006
:::: Social Engineering ::::

Examples of methods;
1. Pretend as system manager and ask passwords.
2. Flicker displays or keyboards when one operates machines (ATM etc.)
3. Steal the paper that passwords are written.
Not only passwords, these methods are used by stealing credit card numbers or making people put money in bank accounts by pretending one of family members (Ore-Ore Swindle) these days.
These ways are also used to pump private information. For example, these people call one’s house pretending as an old classmate and ask one’s or others’ current addresses or telephone numbers, or pretending as home-delivery and ask addresses saying “I don’t know the exact address.” (By the way, I think this is so stupid ;-p)