New syllabus for Term 1 2016

For the coming term 1 2016.

I am launching a new version of the following unit.

IT401 : Adv Operating System
CSM201 : Application & Infrastructure Security
ICT206 : Networking Essentials

there will be more updates to come over the year 2016.

regards,

3 Classes of network


class A is for a few subnet but each subnet has a lot of machine.
class C is for a lot of subnet but each subnet has few machine.
class B is in between class A and C.


Fiber Optic in Network diagram


Put FO on the media to represent fibre optic, 
then indicate it in the legend of your network diagram.


Microsoft Access - Primary Key

Foreign Key

Foreign Key:

It is used mainly to create relationship between tables.
The foreign key (MentorID) in the Course table is to create a relationship with the Mentor table MentorID (primary key).
The foreign key (CourseID) in the Student table is to create a relationship with the Course table CourseID (primary key).


OWASP WebGoat 6 - Improper Error Handling - Fail Open Authentication Scheme



In this example, an error in the exception handling routine could allow anyone to login without the need to key in a password.

the process of learning

your first server setup is always difficult.
the subsequent server setup will be easier.
this is the process of learning.

system methodology

system methodology is the approach one takes while building a system.
example, SDLC, agile, prince2 etc

To Google Drive


I find Google Drive to be better for me and will be moving all my stuff over.

Creating a survey for project.

When creating a survey for your project,

first, ask yourself what is the purpose of the survey.
then, create the relevant questions for the survey.

Component of a typical system


A typical system is made up of 3 key components
  • Hardware
  • Software
  • People
Very often the people component are totally forgotten in a system.





Jackson's notation of a typical report.


A typical report structure in Jackson's notation is made up of 
  • Report header
  • Report body
  • Report footer
The report body is made up of a repetitions of record, hence the (*) in the corner of the box. 
Lastly, the each record is made up of its attributes/fields.

Inter-networking risk

When companies link up their networks together, 
any hacking incident may may escalate across to another company. 
This may open doors to legal complication and compensation.

Eraser ver 6

there is no portable version of eraser for version 6 as yet.
the last portable version is 5.
at www.eraser.heidi.ie

Test log


A test log is a summary of all the test cases that have been carried out.
You can put it in a table form (see diagram below).


U08096 OBU Final Year Project - tip for more marks

Final Year Project - Network

For networking design type of project. Tips to get a better grade is to build in redundancy and increase reliability and availability in your network design.

This can be done using the double crossed routers and switches. as below:

This is a common e-commerce and e-business network architecture.


Understand Area Formula