Categories
Computer Security Internet

new TLD

So over the weekend I watched General Conference.  I saw a commercial for www.lds.travel
Yes that is right the .com is raplaced by a .travel
I had never seen that before.  I knew ICANN was coming out with new top level domains but I didn’t seem to remember .travel being one of them.  So as I did some digging, new.net came up.  I read this article for one of my grad school classes.  Very interesting material.  So these guys are providing new TLD’s.
ICANN is not sanctioning this though.  This company is completely doing this on their own.  The only way it works is if the person installs a browser plugin to actually recognize the TLD or if the ISP has partnered with them to recognize it in their own DNS.
I have not tried this out and I hesitate to do so until I see more exposure about it and I can get confirmation it really works.

Categories
Computer Security Computers Internet

Blogs

This is the first post of a series I will do on blogging to explain my viewpoint.  I did some research on the subject for my undergraduate degree.  Most of this information will come from that with some update info.

Blogs: Healthy Journal Outlet or Potential Danger from Internet Predators

Blogging has become increasingly popular over the past ten years, especially in the Latter-day Saint culture. It is an easy and effective tool to share photos and stories about family members. However, hackers and internet predators are using it as an easy source to “enter” into your personal life in more ways than one. Blogging can still be a very efficient tool of communication; as long as bloggers become educated on how to properly and safely blog. Guard the information that you do include. Make sure the entries you have written will not come back to haunt you. Past information that has already been written, which may be intrusive to your life is very hard to simply erase. Password protected blogs are a much safer method if you chose to divulge personal information. The most important note to remember is: in order to keep you and your family safe and protected it is vital to become educated and take the proper precautions.

Categories
Apple iPhone

AT&T Spam

So I have never had spam before on my phone, but today I got two.  I haven’t signed up for anything and I don’t have text messaging as a part of my general plan, so I get charged $0.20 per message (either incomming or outgoing).  I don’t text anyway, I use email for any kind of messaging.  All the people who have my contact info know that anyway.  So I searched some forumns and here is what I found.
Go to this site and read what I read and how to:
http://www.wireless.att.com/answer-center/main.jsp?solutionId=KB92121&t=solutionTab
So if you register at: mymessages.wireless.att.com , then you can customize how your phone text are received from any kind of email and such.  I just blocked everything.  Once again, I use my email.
This pdf link was also helpful: http://www.wireless.att.com/support_static_files/KB/svc/documents/1220912515172.Anti-spam%20FAQ%20080707%20Consumer.pdf

Categories
Apple iPhone

quicktime turned off?

I recently ran into a little problem with my iphone.  Ever seen this?

I have been using google voice on the mobile web through mobile safari. When I do this, I can listen to voicemails through the web. Well, I recently ran into a slight problem that when I go to view a voicemail, my screen comes up with a bunch of code or something (ASCII maybe).  Well the problem is that I had the plugins turned off for some odd reason.  See the picture:

Categories
Computer Security Computers Internet

The Deep Web

The internet has changed the way information is handled and it might be scary to find out how much information is really out there about you. I was surprised for sure.
First let clear up what exactly the deep web is. For this discussion we will classify it as data that is publicly availiable but that is not necesarily indexed by google or yahoo or other search engines for one reason or another.
One reason it might not be publicly availiable is because you might have to use input on some websites to come up with data. Google or other bots are not very good at that.
For instance: http://www.pipl.com/
if you go to this website and input your name, this is input that google could not just automate.

Categories
Computers HTML PHP Programming

From HTML to ServerSide HTML or PHP

HTML is a programming language.  Even though the hard core programmers consider it very limited and almost not a programming language, it still is what they are able to view this post as well as every other webpage with.
HTML is a language that the computer can read amazingly fast and make the “stuff” viewable for us humans. So an HTML page has to have certain elements so that the browser can read it to make it viewable.  Standards and that sort of thing all make this happen.
When making the switch to ServerSide HTML, all of these things still exist.  The only change is you can you programming to make repetitions or read the information from a database instead of having to hard code each line of HTML.
Examples:
HTML – This is raw static HTML the server can just put out there right away.

This is the body

PHP – This is also raw static HTML that the server can just serve up without thinking about it.

This is the body

The only difference between these two statements is how many steps it goes through to actually become raw HTML code that your browser can read. The server will actually process and evaluate “This is the body” in this second statement before it is converted into raw html. This next piece of code would give the same exact result to the user:

<?php echo "This is the body"; ?>

or make the text much more dynamic:

<?php //Pull a paragraph from another file or a database ?>

This commented code is where we could put a very dynamic piece pulling from another file or a database.
This is what WordPress is essentially built on.
Please comment for any clarifications you might need or if I just missed something entirely.
Thanks

Categories
Computers Server

Server Architechture

In this article I will be comparing and contrasting two-tier, three-tier, and n-tier client-server architectures.

Architectures Two tier Three Tier N-Tier
Sameness 1 client 1 client 1 client
client will never know the difference client will never know the difference client will never know the difference
Differences 1 server 2 servers 3 or more servers
One server performs all requests Responsibilities are split up Responsibilities are split up
Advantages Only 1 server to maintain Split responsibilities – might be easier to debug Split responsibilities – might be easier to debug
Flexibility in scaling up or down or just doing replacements Flexibility in scaling up or down or just doing replacements
Disadvantages 1 server has to do all the work, scalability can be a problem Two servers to maintain Many servers to maintain

Comments are always welcome to make my post more accurate and full of knowledge. Thanks

Categories
Computers Internet

Internet Net-Work Model

In this article, I will discus the 5 layers of the Internet Network Model and what they do.  This model is not the same as the OSI model from which you are probably familiar, but it has many similarities.

  1. Physical layer – This is the lowest layer. It mainly is related to transmitting data bits over the actual physical line of wire or other medium.
  2. Data Link Layer – This layer is concerned with creating and understanding those messages and data bits that are transmitted over the wire.
  3. Network Layer – This is the layer that specifies the routes or paths along which a message should travel.
  4. Transport Layer – This is the layer that keeps up the logical connection legitimate for the duration of the request.
  5. Application Layer – This is the layer at which most people see and affiliate with the most. This includes the applications on the computer most people use to carry out their internet requests.
Categories
Apple Mac

Troubleshooting iMac Freezing

These are in no particular order.  They are just in the order I tried them.
  1. Restart computer – First and the easiest is to restart the computer.  This resets temporary memory and
  2. find recently installed programs – uninstall those.
  3. Reset the P-RAM – Restart and hold down command + option + R+ P until restart.
  4. Disk Utility – Verify Disk, Verify permissions
Categories
Mac Mac Mail

mac mail address intelisense

where does mac mail pull its address book intelisense?