Minggu, 24 November 2013

Terms on Email

  1. Spam

    Spam is a place for email you receive but it is detected virus in it.
  2. Folder

    Folder is a place for email based on its label.
    For instance:
    You make a new folder and give a label on that folder : Facebook
    When you receive email from Facebook, you can clasify that email to Facebook Folder.
    So, emails are put based on its label.
  3. Starred

    Starred is a label given by you to email you receive because that email is very important for you.
  4. Unstarred

     Unstarred is email status where you haven't clasify its label yet.
  5. Trash

     Trash is a place for unneeded email.

Icons on New Mail

Formatting Options consists of:
  • 1 >> change font type
  • 2 >> change font size
  • 3 >> make font bold (Ctrl + B)
  • 4 >> make font italic (Ctrl + I)
  • 5 >> make font underlined (Ctrl + U)
  • 6 >> change font color and font's background color
  • 7 >> change paragraphs align
  • 8 >> have numbered list automatically after you click "Enter" on your keyboard
  • 9 >> have bulleted list automatically after you click "Enter" on your keyboard
  • 10 >> give less gap space on the paragraphs  
  • 11 >> give more gap space on the paragrpahs
  • 12 >> give special space for quotes
  • 13 >> remove formatting options


 Attach Files >> insert files such as *docx, *pptx, etc in lower data size


  • 1 >> insert files using drive up to 10 GB
  • 2 >> insert photos
  • 3 >> insert link
  • 4 >> insert emoticon
  • 5 >> insert invitation


 Discard Draft >> throw away your fail email automatically


  • Default to full-screen >> typed an email on bigger screen
  • Label >> give a label (status) to your email
  • Plain text mode >> type an email without any formatting on the font
  • Print >> print out your email in hardcopy form
  • Check spelling >> check your email spelling if there're wrong spell based on your choosen language



Send >> send your finished typed email

Minggu, 17 November 2013

Electronic Mail (Email)

Nowadays, people are using electronic mail to send letter to their friends of family. They rarely send letter in the form of paper. Now, I'll guide you to send letter via electronic mail.

Create an Account

The first thing that you have to do is create an account. You can make an account in several servers such as Gmail, Yahoo, etc. But now, I'll use Gmail as an example.

Here are some informations to fill the blanks:
  1. You can use your name or guise name
  2. You can use numbers, letters, and periods for you username
  3. Use at least 8 characters and don't use obvious name such as your pet name for you password. Make a strong password.

 

After the loading has finished, your email account would appear and that's mean your account has finished successfully.

 

Send a New Mail



Reply or Forward a Mail


Sign Out



Sign In

Wait until the loading has finished and your account would be opened.

Kamis, 10 Oktober 2013

Produk Ramah Lingkungan

Mau kasih hadiah kenangan ke temen? Tapi bingung mau kasih apa?
Inilah solusinya!

Prdouk Ramah Lingkungan
Dibuat dari bahan-bahan daur ulang dengan desain menarik, kualitas baik, dan harga yang terjangaku!

Ayo, pesan sekarang juga!
Persediaan terbatas.
 
Membeli produk kami berarti Anda turut berpartisipasi dalam upaya pelestarian lingkungan dan menyelamatkan 1 orang yang kelaparan.

More info:
Vanesha (08994311844)
 
 
 

Minggu, 22 September 2013

Cybercrime


Nowadays, there are a lot of criminal acts did by people. Not only in the real life, but also in cyberspace. People call the criminal acts in cyberspace as Cyber Crime. Then, what is Cyber Crime, actually?

I'll show you what Cyber Crime is and it's case...

What is Cyber Crime?

Cyber crime is a criminal act did by someone using computer technology as the main crime, including internet.


How many kinds of Cyber Crime?

There are a lot of cyber crime's kinds. For instance, carding; hacking; cracking; defacing; phising; spamming, malware, etc. But right now, I'm going to tell you only 2 of them, they are spamming and malware.
  1. Spamming

     

     

     

     

     

     

     

    Spamming is one of cyber crimes did through electronic mail (e-mail), where the criminal sends a suspicious message through e-mail to the victim. The criminal called spammer, meanwhile the suspicious message called junk mail.
    Junk mail usually contains viruses that could attack victim's computer. That is why, there's Spam in e-mail so the junk mail could be thrown away directly and would not attack victim's computer. But nowadays, junk mails do not only contain viruses, but also some suspicious advertisements and news that could cheat and make disadvantage for the victim.
  2. Malware

     

     

     

     

    Malware is a program made for breaking a software or operating system. Malware could be in the form of virus, worm, wabbit, key logger, browser hijacker, trojan horse, spyware, backdoor, dialer, exploit and rootkit.
  • Virus is made for breaking files data in computer.
  • Worm is made for attacking operating system in computer, caused antivirus system in the computer become non-active.
  • Wabbit is made for slowing down computer's working system.
  • Key logger is made for recording someone's password account when he/she typed it on keyboard.
  • Browser hijacker is made for bothering browser application in computer.
  • Spyware is made for snooping a user activity in using computer without his/her knowledge.
  • Trojan horse is made for activating virus, worm and spyware.
  • Backdoor is made for bothering computer net.
  • Dialer is made for connecting computer to the internet for sending data that has been captured by spyware or key logger to another person, but your computer does not connect to the internet.
  • Exploit is made for attacking antivirus in computer that has weakened.
  • Rootkit is made for deleting malware's track from a computer.

Now, let's check one of the Cyber Crime case...




Is there any solutions to prevent from Cyber Crime?

Yes, there are some solutions to prevent ourselves from cyber crime.
Here some tips you can practice:
  1. Make the strongest password in all of your accounts.
  2. Activate your antivirus software (it's better to use strong antivirus software, such as Bitdefender; Kaspersky; Norton; etc.).
  3. Make sure your social media profiles (e.g. Facebook, Twitter, etc.) are set to private. 
  4. Download applications from trusted sources.
  5. Update applications and operating system in your computer.
  6. Never reply to emails that ask you to verify your information or confirm your user ID or password.
  7. Be cautious when giving out your personal information on the Internet.

Sources:

http://roniamardi.wordpress.com/
http://indochaters.hexat.com/
http://www.rcmp-grc.gc.ca/