Wednesday, May 26, 2010

How to balance protection and overprotection of our child?

How to balance protection and overprotection of our child?

When you’re a parent, it is sometimes difficult to balance the protection or overprotection of our child. Sometimes so many things that he would avoid in life, we want the overprotective spite of ourselves. We would like to have life easy without problems to overcome.

Stages of realization

  • True, as a parent is hard sometimes, we Overprotection spite of ourselves. We would not want our child is injured or he finds himself in a situation sometimes complicated to solve.
  • It’s natural to want to protect. Systematically, it does so without realizing it. Overuse of a protection that could be invasive to the child.
  • By overprotecting, it prevents them from taking their responsibilities. It is necessary that the child has his own failures so that he learns how to cope.
  • If you're still to meet the needs of your child, he will lose confidence in him if he does not take any responsibility. He will not have the chance to resolve whatever the problem he does.
  • As a parent, try to trust him in his choices. If he commits a mistake, let it resolve itself without intervention. Warning, or ask your help of course.
  • Do not forget that the experiment is done with the mistakes we made. Thus he can build his confidence and have autonomy in life.
  • So avoid the over-protecting children while protecting the right balance so that he can learn from his mistakes by himself.

How to understand the origin of dreams?

How to understand the origin of dreams?

Humans sleep on average 7-8 hours per night, during which he dreams between 1 and 1:30. Multiply by the average number of years of life, and we spend the equivalent of 5 full years to sleep. How to understand this strange phenomenon that accompanies us throughout life? How to understand the origin of dreams? Some answers ...

Stages of realization

  • It Sigmund Freud, who in the early 20th century, was the first to attempt to see through the mystery of our nights.
  • For him, the dream is a direct path to the unconscious. It is a means to better understand from a large bank of images, sensations and emotions.
  • Every night, 4-6 successive cycles of sleep for about 1h30.
  • Each cycle is divided into 3 periods of sleep: light sleep, deep sleep and REM sleep.
  • It is during the REM sleep that dreams occur. It's called "paradoxical" because although we are asleep, the brain is in full swing as if we were awake.
  • The dreams are the manifestation of desires, impulses are not expressed in reality.

Tuesday, March 16, 2010

Collection of information through social engineering and social networks

Abstract: Social networks have a significant amount of information that can be exploited. Roelof Temmingh, the author of Maltego at the conference Hack.lu 2008, explains how to leverage this knowledge using the tool.

This presentation Roelof Temmingh was made at the conference Hack.lu (link) held for three days in Luxembourg from 22 to 24 October 2008. The subject had been raised a week earlier at the conference bluehat (link), organized by Microsoft.

It was highlighted by the abundance of information flowing freely on the internet via their use and storage of social networks by the largest number, with sites like Facebook (link) for individuals or LinkedIn (link) for professional example.

These sites alone centralized database of personal and professional information very important both in size only by the sensitive nature of the information it contains. The consequences are probably very damaging to many if they were to fall into the wrong hands

The author of this presentation explains how to take advantage of information available on these sites using a tool he developed and named after Maltego; we had already talked about it very recently with the first version (link), the second is now available on the project's official website (link).

A concrete example of use would, from a domain name like microsoft.com, to recover all the IP ranges used by the alias of the domain. The collection of these aliases would then recover as much information as possible (names, addresses, phone numbers, e-mail) on the owners of fields via type queries WhoIs (link).

It is then possible to see if the owners are on social networks and establish an operation of "social clouding" of their knowledge while recovering the pictures to pass such a study morphopsychology (link).

It is also possible to retrieve other sensitive information like keys PGP / GPG (link), occupations of the persons concerned and other information yet. Ideally, this tool allows for multiple different kinds of information to best prepare for an attack targeted social engineering (link).

Thursday, January 7, 2010

Multiprogramming operating system

In the multiprogramming system, the user can store more than one process in the main memory. The process can have 3 phases:
1. Input
2. Execution phase
3. Output phase
In this, the process execute simultaneously. Consider 2 process p1 and p2. In the First interval time, the process P1 uses CPU. In the second interval time, it uses input/output device. So, second process can have the CPU in the second interval time. This multiprogramming increases the resource utilization by exploiting the concurrence between the CPU and the Input Output sub system. In multiprogramming system CPU switched between the process frequently.