2008年2月24日 星期日

LAMP

Lamp stands for
Linux-OS,
Apache- web server,
MySQL -database server,
Perl( or PHP, Python)-programming language.

(Combining 4 technologies together)

LAMP is use to run used to run dynamic web site or servers. And people are so interesting in this because
First, LAMP is free and open sources.
Second, it is stable.
Third, the efficiency is as good as “J2EE” and “.Net”.

2008年2月17日 星期日

Chapter 3- first two bullet points in Exercise 3.4 (p38).

1)

  1. I believe that the reason why the police damaged the painting was because he did not agree with how they paint the mural. basciallt, he sis not like the idea how they gonna paint the mural.
  2. Also, i believe the factor was because the those people's image(Virgin of Guadalupe, Jesus, Padre Miguel Hifdalgo, Mother Theresa) in his mind is way too different with those artists, students, etc's idea.
  3. The ideally way to respond this situation is to report that to the person who has higher prosition in the police system; or even better, report to the news, let the whole society know this thing.

2) i believe that "I" and "We" are unseparatalble, "We" are maded by "I". Without "I", there are no "We"; and without "We", "I" means nothing. For example, each students, artists are "I," and the mural is made by "We." the mural repersent all "I"s = "We."

More Privacy

i believe that privacy is a negative right because privecy is use to help protect people's property; for example, personal information, home address, bank account, etc. Digital privacy is a person's right to protect his/her own property relate to digital data; this is my definiation for digital privacy. the most populer way for people to use in order to protect their own data in digital privacy is password. and what does pasword means? it means protection in the digital world. that's why i believe that privacy, especially digital privacy, is a negative right.

2008年2月10日 星期日

Service Learning. Chapter 1 of Learning Through Serving.

I believe it is reasonable and appropriate for colleges to educate their students about engaged citizenship. That’s because at the botton line, we are still students, we are still learning. The reason we are still learning is because we are not ready to enter the society. Although I believe that college should educate students, they should not say which things are right or wrong. College students are different than other students, they know how to think, they will create their own principle and follow that, and they know when to correct their own principle. It is ok that they did something wrong; the problem is did the college teach them how to correct themselves? College is like a small society, we learn how to improve ourselves in the college, and we learn how to engage into the citizenship in the college. It is ok that we did something wrong sometime because it is our responsibility to think; and it is the college’s responsibility to teach us how to think.

Privacy.

Basically, after Google release Google street view, they also allow people to remove any picture which has them inside. Google’s reason was any pictures you can find on the Google street view are the same with those view you can see on the street. So there should not be any problem about showing those pictures on the internet. But from other people’s point of view, they believe that you can see them walking on the street, but you have no right to show other people how them looks like, because they have the privacy of their body, house, cars, etc. I believe that that’s no problem to show those street pictures on the internet because those are public properties. But Google has no right to show people’s face on the internet; and what Google can do is use software like Photoshop to erase those people and their properties in the pictures before they put on internet.

2008年2月3日 星期日

career plans and goals

In the future, i really wanna join Americn company in Taiwan, and do works realate to computer.
and after that, i hope that i can open my own company to sell something creative and interesting.

and in fact, what i really wanna do is to be a philanthropist and help those poor African kids.
so as long as my job in the future can help my family, African kids, and meaningful. i ll be more than happy to do that.

1. Explain the difference between symmetric-key and asymmetric-key encryption.


How are keys distributed with each technique?


symmetric-key:
It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit.


asymmetric-key:
It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.


Why is each technique cryptographically secure? In other words, what needs to be done to crack a ciphertext encrypted with each algorithm?


symmetric-key:
because the symmetric-key system only need one key, in order to crack the message, you only need the key. Or you can find the pattern how they encrypt the message. For example: the encrypted message is “Lbj-Xfo,” and you can probably guess that the real message is “Kai-Wen” by moving each letter to the prior letter. (but you probably need to try out every single possible.)


asymmetric-key:
asymmetric-key is like double encryption. First, the user use his private key to encrypt the message, them he/she public the message with public key; although everyone can see the message, only the person with his own private key can decode the message. So, in order to crack the system, you need the person’s private key, or need to know how they created the private key. It is almost impossible to crack the system because the key is too big.


How can each technique be used to confirm a sender's identity?


symmetric-key:
Symmetric-key confirms sender’s identity by knowing who can encrypt the message or decode the message; in other words, by knowing who has the key.


asymmetric-key:
Asymmetric-key confirms the sender’s identity by double the encryption. One person encrypt the message with his private key, and send that with public key. And only the person with another private key can decode the message. The person can also use his private to encrypt his sign in order to let the other person know who he is. (Digital Signature)


What are the strengths and weaknesses of each approach?


symmetric-key:

  • advantages
    Safer (lots of probability), and faster.

  • Disadvantages
    One time transactions, how to give the key to the other person. And once other people know the key, you have to change the key at both sides.


asymmetric-key:

  • advantages:
    Allow letting other people read the encrypted message without any risk.
    No problem for distributing the key.

  • Disadvantages:
    Big and slow.