Monday 18 June 2012

Web Design 103: Content Management


NB: You are advised to read Website Design 101 and 102 in this blog. Also, the requirement gathering phase on the “moving from programming to software development as well”
Many website designers have always struggled with the correct management of contents. Concluding the technology analysis gives you the platform to move into the designs and expectedly the use of various content that will give the interface and website usage the feel that users will appreciate.
This aspect is what display professionalism and the overall look and feel effect that distinguishes your website. The content of a website include every bit of information, image, video, widget and others that make the website.  Designing a very good website require detail and uttermost attention in managing the content.  Content define a website and the proper management is the true mark of professionalism.
Managing content starts from the layout of the web pages. The layout technically implies how the web pages are divided. It is very difficult to define this as website designers have shaped the layout in various ways as ingenuity hold sway in this aspect. It is ideal that relevant and standardized layout is defined in order to effectively manage the content.
The next content management aspect is the definition of the web theme. The web theme defines the uniform feature of the website through the reflection of the development purpose based on the continuity of design elements.  Your theme will guide the use of the contents including movies, colour usage, text font and size, graphics effect and other elements on the website.
I will like to talk about colour management. Effective management of colour is imperative for website design. The colour combination and the use of different shades of colour should be minded in the course of designing of websites. The use of colour in text, designs and background should be blended to give an excellent impression for users. It should also be noted that the use of movies and heavy images should be sparingly used as it affects the overall loading time and accessibility of websites.

I admit this article might not provide all the bits required for proficiency in content management. For further enlightenment on this particular article, you can contact through pelumiapantaku@gmail.com

Using IP Address to Combat Cyber Crime


Have you been wondering how PayPal, EBay, Google and other websites have been able to identify your location without asking? How does the network administrator in your office identify your system among the numerous ones available? Sometimes, we feel we are anonymous while browsing the internet because there is no physical monitor or no sense of any monitoring arrangement. The simple answer is there is no anonymous user on the web because every device and computers can be identified.
The fact is every device and computers on the internet have unique address which can be used to trace them. This is popularly qualified as IP address with some other technical terms like MAC address always mentioned when describing this unique identification number.  The source of scams or illegal and criminal activity on the internet can be detected through the IP address that often accompanies mails and other communication on the web. Discovering the IP address will be conducted through the Internet Service Provider (ISP) who most times holds the contact address or even residential address of the internet service used.
I will like to propose that using this means can be conducted by the implementation of systems where people can report suspected IP address. The reported IP address or identity of the alleged scammer can be put on a centralized cybercrime database (it must be developed also) with ISPs having access. The IP addresses and identities can then be tracked over a period of time thereby resulting in the overall arrest of the criminals.
I will admit that this process will require a lot of industrial support and collaboration. Evidence of the successful use of this means (Facebook and Pentagon) has shown that it is very viable and often lead to easy arrest of criminals. Also, it requires little technical knowledge as the ISPs do most of the work.

Monday 4 June 2012

CYBER CRIME EXPLAINED


I was thinking about writing the first article on combating cybercrime when it dawned on me that a lot of misconception exists about what this type of crime implies. A lot of people have this vague idea about the actual meaning of cyber crime  and lack the understanding of cyber crime.
Crime can be viewed as any action that is regarded as illegal and punishable under the law of the state. Crime in essence can be viewed as a conduct which portends harm or negatively affect individuals, animals, society or the environment. Experience has shown that crime can be committed in error, deliberately or as a reflex reaction.
Cybercrime is a type of crime which involves the use of computers, internet/web and other technological implementations to conduct illegal activity. This type of crime takes different types of as the web is a wide virtual world where different types of transactions and interactions can be conducted. For the purpose of understanding, some of the types on crime that can be conducted on the web include;

  • Spamming: Some of us are ignorant that sending unsolicited send of mail as part of bulk mailing list for commercial purpose is a crime. This practice exploit the mail address by collecting money from commercial firms for the number of mails sent. Some firms even sell CDs containing mail address and claim they are into e-marketing.

SELLING SOMEBODY ELSE’S MAIL ADDRESS IS A CRIME!
  • Content Abuse: this crime represents the communication or transmission of contents that can offend or affect the state of mind of others. This can include racist images or videos, obscene images and other contents that fall into this category.
  • Cyber Terrorism: The use of the web for terrorist attack is on as series of deliberated and calculated attempt at destroying the instrument of governance in governments are been targeted using sophisticated technological implementations. Some cases like illegal intrusion into technological infrastructure of government agencies have been recorded in the US and defacing of government related websites in Nigeria is another example.
  • Cyber Fraud: This is the most prominent of the crime as various implementations have been deployed in using the web for swindling or deceptively collecting money from victims. This practice can take numerous forms like illegal account access, dishonest use of web interactions, misrepresentation of facts and even betrayal of trust in internet enabled relationships. This type of crime is so wide that it often dwarfs the effort of security agencies as it takes different dimensions. The prominent in developing nations like Nigeria is the popular practice called Yahoo Yahoo where victims are tricked to part with some money based on a juicy business offer or audacious inheritance offer.

This article cannot exhaust the crimes being perpetrated on the web. However, cyber crime represents every illegal or harmful use of the web as it relates to fellow human, animals, society or the environment. We will be exploiting the ways of combating this crime in subsequent posts.


Please follow @originaldgitz for serialization of this article and other technological flakes as required. We will also like you to join the group D-GITZ Media Friends to be part of the family.