https://www.paulbui.net/wiki/api.php?action=feedcontributions&user=PaulClayberg&feedformat=atomWLCS - User contributions [en]2024-03-29T09:51:29ZUser contributionsMediaWiki 1.31.8https://www.paulbui.net/wiki/index.php?title=IT_Club&diff=3189IT Club2009-03-29T23:48:23Z<p>PaulClayberg: </p>
<hr />
<div><big>'''Welcome to the Washington-Lee High School IT Club Homepage'''</big><br />
<br />
Current Projects:<br />
* [[WL Freedom Toaster Project]]<br />
* [[WL Cluster Computing]]<br />
<br />
Members:<br />
* <s>Paul Clayberg</s><br />
* Matt Hines<br />
* Alex Lindeman<br />
* Sam Passaglia<br />
* Marc Portis<br />
* Harrison Streeter<br />
* Robert Tedder<br />
* Theresa Tran<br />
* Yaf Ouchna</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back-up&diff=3119Back-up2009-03-16T16:57:54Z<p>PaulClayberg: /* Technical Definition */</p>
<hr />
<div>=Backup=<br />
===Technical Definition===<br />
'''Backup''' (or '''back-up''') is a way of [[Memory|copying files]] to one or more places (independent of the normal [[Storage|file system]]) to avoid loss of [[data]] in case of a [http://en.wikipedia.org/wiki/Nuclear_meltdown mass failure] or system crash.<br />
<br />
===In Layman's Terms===<br />
'''Backup''' are copies of important files that are saved elsewhere, so in case everything breaks you still have your files.<br />
<br />
==Examples==<br />
===RAID===<br />
RAID stands for '''R'''ecursive '''A'''rray of '''I'''ndependant '''D'''isks, and involves copying saved files to multiple [[Storage|disks]] so that, in the event that one fails, another still has a copy of the file. RAID is popular because servers can implement many disks, and having more disks implemented means the data storage is more [[Reliability|reliable]].</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back-up&diff=3118Back-up2009-03-16T16:57:32Z<p>PaulClayberg: /* Technical Definition */</p>
<hr />
<div>=Backup=<br />
===Technical Definition===<br />
'''Backup''' (or '''back-up''') is a way of [[Memory|copying files]] to one or more places (independent of the normal [[Storage|file system]]) to avoid loss of [[data]] in case of a [http://en.wikipedia.org/wiki/Nuclear_Meltdown mass failure] or system crash.<br />
<br />
===In Layman's Terms===<br />
'''Backup''' are copies of important files that are saved elsewhere, so in case everything breaks you still have your files.<br />
<br />
==Examples==<br />
===RAID===<br />
RAID stands for '''R'''ecursive '''A'''rray of '''I'''ndependant '''D'''isks, and involves copying saved files to multiple [[Storage|disks]] so that, in the event that one fails, another still has a copy of the file. RAID is popular because servers can implement many disks, and having more disks implemented means the data storage is more [[Reliability|reliable]].</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back-up&diff=3115Back-up2009-03-16T16:16:03Z<p>PaulClayberg: /* Technical Definition */</p>
<hr />
<div>=Backup=<br />
===Technical Definition===<br />
'''Backup''' (or '''back-up''') is a way of [[Memory|copying files]] to one or more places (independent of the normal [[Storage|file system]]) to avoid loss of [[data]] in case of a [http://www.microsoft.com mass failure] or system crash.<br />
<br />
===In Layman's Terms===<br />
'''Backup''' are copies of important files that are saved elsewhere, so in case everything breaks you still have your files.<br />
<br />
==Examples==<br />
===RAID===<br />
RAID stands for '''R'''ecursive '''A'''rray of '''I'''ndependant '''D'''isks, and involves copying saved files to multiple [[Storage|disks]] so that, in the event that one fails, another still has a copy of the file. RAID is popular because servers can implement many disks, and having more disks implemented means the data storage is more [[Reliability|reliable]].</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back-up&diff=3114Back-up2009-03-16T16:15:44Z<p>PaulClayberg: /* Technical Definition */</p>
<hr />
<div>=Backup=<br />
===Technical Definition===<br />
'''Backup''' (or '''back-up''') is a way of [[Memory|copying files]] to one or more places (independent of the normal [[Storage|file system]]) to avoid loss of [[data]] in case of a [http://www.microsoft.com |mass failure] or system crash.<br />
<br />
===In Layman's Terms===<br />
'''Backup''' are copies of important files that are saved elsewhere, so in case everything breaks you still have your files.<br />
<br />
==Examples==<br />
===RAID===<br />
RAID stands for '''R'''ecursive '''A'''rray of '''I'''ndependant '''D'''isks, and involves copying saved files to multiple [[Storage|disks]] so that, in the event that one fails, another still has a copy of the file. RAID is popular because servers can implement many disks, and having more disks implemented means the data storage is more [[Reliability|reliable]].</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back-up&diff=3113Back-up2009-03-16T16:15:11Z<p>PaulClayberg: New page: =Backup= ===Technical Definition=== '''Backup''' (or '''back-up''') is a way of copying files to one or more places (independent of the normal file system) to avoid...</p>
<hr />
<div>=Backup=<br />
===Technical Definition===<br />
'''Backup''' (or '''back-up''') is a way of [[Memory|copying files]] to one or more places (independent of the normal [[Storage|file system]]) to avoid loss of [[data]] in case of a [http://www.microsoft.com| mass failure] or system crash.<br />
<br />
===In Layman's Terms===<br />
'''Backup''' are copies of important files that are saved elsewhere, so in case everything breaks you still have your files.<br />
<br />
==Examples==<br />
===RAID===<br />
RAID stands for '''R'''ecursive '''A'''rray of '''I'''ndependant '''D'''isks, and involves copying saved files to multiple [[Storage|disks]] so that, in the event that one fails, another still has a copy of the file. RAID is popular because servers can implement many disks, and having more disks implemented means the data storage is more [[Reliability|reliable]].</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3109GUI2009-03-16T15:55:07Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Menus (or Mouse)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [http://www.useit.com/papers/heuristic/heuristic_list.html| usability] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3069Back door2009-03-06T18:05:25Z<p>PaulClayberg: /* Layman's Terms */</p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Security#Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.<br />
<br />
===Layman's Terms===<br />
A '''back door''' is another way of [[Access permissions|doing something you probably shouldn't be doing]], and if left unlocked is a bad thing for you and your computer.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3067Back door2009-03-06T18:04:53Z<p>PaulClayberg: /* Layman's Terms */</p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Security#Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.<br />
<br />
===Layman's Terms===<br />
A '''back door''' is another way of [[Access_Permissions|doing something you probably shouldn't be doing]], and if left unlocked is a bad thing for you and your computer.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Help:Editing&diff=3058Help:Editing2009-03-06T18:00:04Z<p>PaulClayberg: /* [External Links] */</p>
<hr />
<div>==Common symbols and their syntices==<br />
<br />
=== <nowiki>[[</nowiki>''Internal links''<nowiki>]]</nowiki> ===<br />
Creates an internal link (within the wiki). To use linktext other than the name of the page, use a pipe (|), like this: <nowiki>[[</nowiki>''page title''|link text<nowiki>]]</nowiki><br />
:Examples: [[Main_Page]] and [[Main_Page|This goes to the Main Page.]]<br />
<br />
=== <nowiki>[</nowiki>''<nowiki>External Links</nowiki>''<nowiki>]</nowiki>===<br />
Creates an external link (outside of the wiki). Note that a pipe (|) can also be used to change the link's text, but '''a space after the pipe''' is critical.<br />
:Example: [http://www.PaulBui.net An external link.]<br />
:Example with alternate text: <nowiki>[URL here| text]</nowiki><br />
<br />
=== <nowiki>''</nowiki>Double Apostrophes<nowiki>''</nowiki> ===<br />
Italicises the text. Do not confuse this with double quotes ("").<br />
:Example: ''I feel inclined to emphasise my text.''<br />
<br />
=== <nowiki>'''</nowiki>Triple apostrophes<nowiki>'''</nowiki> ===<br />
Emboldens the text. Also ruins your apostrophe key if overdone - use sparingly.<br />
:Example: '''BOOM!'''<br />
<br />
=== <nowiki>----</nowiki> ===<br />
A horizontal rule (<nowiki><hr></nowiki>). Use sparingly.<br />
:Example: See below.<br />
----<br />
<br />
=== <nowiki><nowiki></nowiki></nowiki> ===<br />
Ignores wikitext and formatting. Also fun to say.<br />
:Example: [http://paulbui.net/wl/index.php?title=Help:Editing&action=edit It's all over the place.]<br />
<br />
=== <nowiki>:Indentation</nowiki> ===<br />
Indents text. Place colon as first character in line to be indented. Use in succession to make blocks of text.<br />
:Example: <-- In edit mode, this reads "''':'''Example:"<br />
<br />
=== <nowiki>*Basic Lists</nowiki> ===<br />
Creates a bulletted list. The more asterisks you use, the lower the list level.<br />
:Example:<br />
:*'''<nowiki>*</nowiki>'''Level one<br />
:***'''<nowiki>**</nowiki>'''Level two<br />
:****'''<nowiki>***</nowiki>'''Level three<br />
:***'''<nowiki>**</nowiki>'''Level two again<br />
:***'''<nowiki>**</nowiki>'''Another level two<br />
<br />
=== <nowiki>#Numeric Lists</nowiki> ===<br />
Creates a numeric list. As with bulletted lists, the more octothorpes one uses, the lower the list level.<br />
:Example:<br />
:#'''<nowiki>#</nowiki>'''Level one<br />
:##'''<nowiki>##</nowiki>'''Level two<br />
:###'''<nowiki>###</nowiki>'''Level three<br />
:##'''<nowiki>##</nowiki>'''Level two again<br />
:##'''<nowiki>##</nowiki>'''Another level two</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3056GUI2009-03-06T17:58:36Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [http://www.useit.com/papers/heuristic/heuristic_list.html| usability] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3055GUI2009-03-06T17:58:27Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [http://www.useit.com/papers/heuristic/heuristic_list.html|usability] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3054GUI2009-03-06T17:58:10Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [usability| http://www.useit.com/papers/heuristic/heuristic_list.html] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3053GUI2009-03-06T17:57:58Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [usability|http://www.useit.com/papers/heuristic/heuristic_list.html] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3049GUI2009-03-06T17:56:23Z<p>PaulClayberg: /* WIMP */</p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
WIMP stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [[usability]] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=GUI&diff=3048GUI2009-03-06T17:56:05Z<p>PaulClayberg: </p>
<hr />
<div>=Graphical User Interface (GUI)=<br />
A '''graphical user interface''' (or ''GUI'') is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of [[Command-line Interface|text]]. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.<br />
<br />
===In Layman's Terms===<br />
A '''graphical user interface''' is an interface you can ''see'' as well as read.<br />
<br />
==WIMP==<br />
[[WIMP]] stands for:<br />
*Windows<br />
*Icons<br />
*Mouse (or Menus)<br />
*Pointer (or Pull-down Menus)<br />
WIMP is a way of classifying interfaces as graphical and almost always consist of the four basic elements listed above for [[usability]] reasons.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3035Back door2009-03-06T17:48:10Z<p>PaulClayberg: </p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Security#Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.<br />
<br />
===Layman's Terms===<br />
A '''back door''' is another way of [[Access Permissions|doing something you probably shouldn't be doing]], and if left unlocked is a bad thing for you and your computer.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Hacking&diff=3026Hacking2009-03-06T17:45:59Z<p>PaulClayberg: /* Hacking */</p>
<hr />
<div>== Hacking ==<br />
Unauthorised editing or tampering with security hierarchies or other such data structures. Hackers usually try to break into information they are not permitted to view, such as corporate databases, monetary funding, or other networks, by breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
If you get [[owned|hacked]], you should tighten your [[security]], or [[Special:Preferences#Change_Password|change your password.]]</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3021Back door2009-03-06T17:45:14Z<p>PaulClayberg: /* Back Door */</p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Security#Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.<br />
<br />
===Layman's Terms===<br />
A '''back door''' is another way of [[Hacking|doing something you probably shouldn't be doing]], and if left unlocked is a bad thing for you and your computer.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3016Back door2009-03-06T17:43:13Z<p>PaulClayberg: /* Back Door */</p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Security#Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Back_door&diff=3013Back door2009-03-06T17:42:46Z<p>PaulClayberg: New page: =Back Door= A '''back door''', or "going through the back door," is a way of getting into a system or file by alternative means, such as hacking or network manipulat...</p>
<hr />
<div>=Back Door=<br />
A '''back door''', or "going through the back door," is a way of [[Authentication|getting into a system or file]] by alternative means, such as [[hacking]] or network manipulation. This means that the [[security]] of the file, system, or account was not strong enough and that other ways of accessing it were available, through force or by simple exploration.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Security&diff=3011Security2009-03-06T17:41:55Z<p>PaulClayberg: /* Authentication */</p>
<hr />
<div>== Security ==<br />
Definition:<br />
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one's place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don't have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it's [[integrity]] and to avoid [http://www.turnitin.com plagiarism].<br />
<br />
In Layman's terms:<br />
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that's security.<br />
<br />
<br />
=== Authentication ===<br />
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one's identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer's data base.<ref>[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11 September 2008.</ref><br />
<br />
=== Cryptography ===<br />
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1's complement of the [[binary]] data (i.e. flipping the bits).<br />
<br />
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.<ref>[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008</ref><br />
<br />
== Hacking (h4xx0ring) ==<br />
:''Main article: [[Hacking]]''<br />
<br />
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
== Citations and References ==<br />
<references/></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Security&diff=3008Security2009-03-06T17:40:54Z<p>PaulClayberg: /* Security */</p>
<hr />
<div>== Security ==<br />
Definition:<br />
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one's place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don't have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it's [[integrity]] and to avoid [http://www.turnitin.com plagiarism].<br />
<br />
In Layman's terms:<br />
:Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that's security.<br />
<br />
<br />
=== Authentication ===<br />
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one's identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer's data base.<ref>[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11/9/2008.</ref><br />
<br />
=== Cryptography ===<br />
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1's complement of the [[binary]] data (i.e. flipping the bits).<br />
<br />
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.<ref>[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008</ref><br />
<br />
== Hacking (h4xx0ring) ==<br />
:''Main article: [[Hacking]]''<br />
<br />
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
== Citations and References ==<br />
<references/></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Security&diff=3007Security2009-03-06T17:40:29Z<p>PaulClayberg: /* Security */</p>
<hr />
<div>== Security ==<br />
Definition:<br />
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one's place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don't have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it's [[integrity]] and to avoid [http://www.turnitin.com plagiarism].<br />
<br />
In Layman's terms:<br />
Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that's security.<br />
<br />
<br />
=== Authentication ===<br />
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one's identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer's data base.<ref>[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11/9/2008.</ref><br />
<br />
=== Cryptography ===<br />
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1's complement of the [[binary]] data (i.e. flipping the bits).<br />
<br />
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.<ref>[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008</ref><br />
<br />
== Hacking (h4xx0ring) ==<br />
:''Main article: [[Hacking]]''<br />
<br />
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
== Citations and References ==<br />
<references/></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Compression/decompression&diff=2985Compression/decompression2009-03-06T17:33:25Z<p>PaulClayberg: New page: =Compression= '''Compression''' (usually of data) is a method of maximising storage space on a disk, and can be done in a number of methods. ===Lossless Compression=== 'Lossless' compr...</p>
<hr />
<div>=Compression=<br />
'''Compression''' (usually of [[data]]) is a method of maximising storage space on a disk, and can be done in a number of methods.<br />
===Lossless Compression===<br />
'Lossless' compression is usually favoured, and means that the data, after being compressed, can be perfectly restored to it's original value. Some examples of this are:<br />
*Removing leading/trailing whitespace characters<br />
*Finding patterns in data and replacing them with shorter codes<br />
**.zip, .tar.gz, and .7z all have different algorithms for this<br />
<br />
===Lossy Compression===<br />
'Lossy' compression means that the data, after being compressed, '''can not''' be restored to it's original quality and value. This happens when the data is simply trimmed and not shortened with patterns. An example of this are .mp3 music files, where the original track's quality cannot be restored because of the original [[audio sampling|sampling rate]]. This is generally unfavourable. While it does lower the size of the file on a disk, quality is compromised.<br />
<br />
=Decompression=<br />
'''Decompression''' deals with restoring data back to its original value after it has been compressed. If the file was not lossily compressed, the data can be made to match the original quality. However, if there was data loss in compressing the file, the data can ''never be properly restored'' unless an uncompressed copy of the original file is at hand.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Serial_number&diff=2922Serial number2009-03-06T17:18:15Z<p>PaulClayberg: /* Examples */</p>
<hr />
<div>=Serial Number=<br />
<br />
===Technical Definition===<br />
A product's '''serial number''' is a number, or string of symbols, that are assigned to the product to set it apart from every other instance of that product. This makes each one identifiable and are almost always non-negative.<br />
<br />
===In Layman's Terms===<br />
The '''serial number''' is what makes every product unique.<br />
<br />
==Examples==<br />
The serial number for your hardware device can usually be found on a sticker with the manufacturer's name and logo.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Serial_number&diff=2904Serial number2009-03-06T17:15:49Z<p>PaulClayberg: /* Serial Number */</p>
<hr />
<div>=Serial Number=<br />
<br />
===Technical Definition===<br />
A product's '''serial number''' is a number, or string of symbols, that are assigned to the product to set it apart from every other instance of that product. This makes each one identifiable and are almost always non-negative.<br />
<br />
===In Layman's Terms===<br />
The '''serial number''' is what makes every product unique.<br />
<br />
==Examples==</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Serial_number&diff=2894Serial number2009-03-06T17:13:41Z<p>PaulClayberg: /* Technical */</p>
<hr />
<div>=Serial Number=<br />
<br />
==Definitions==<br />
<br />
===Technical===<br />
A product's '''serial number''' is a number, or string of symbols, that are assigned to the product to set it apart from every other instance of that product. This makes each one identifiable and are almost always non-negative.<br />
<br />
===In Layman's Terms===<br />
The '''serial number''' is what makes every product unique.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Serial_number&diff=2886Serial number2009-03-06T17:10:10Z<p>PaulClayberg: New page: =Serial Number= ==Definitions== ===Technical=== ===In Layman's Terms=== The '''serial number''' is what makes every product unique.</p>
<hr />
<div>=Serial Number=<br />
<br />
==Definitions==<br />
<br />
===Technical===<br />
<br />
<br />
===In Layman's Terms===<br />
The '''serial number''' is what makes every product unique.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=User:PaulClayberg&diff=1880User:PaulClayberg2008-11-07T18:11:12Z<p>PaulClayberg: /* Paul Clayberg */</p>
<hr />
<div>== [[Paul Clayberg]] ==<br />
Born on July 8th, 1991, Paul has a [[Andrew Clayberg|twin]] brother. He likes DDR, colouring his hair, and chewing gum.<br />
<br />
Paul enjoys eating steak, gyros, hummus, and [[Lies|cake.]]<br />
<br />
=== Information ===<br />
Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.<br />
<br />
Curabitur pretium tincidunt lacus. Nulla gravida orci a odio. Nullam varius, turpis et commodo pharetra, est eros bibendum elit, nec luctus magna felis sollicitudin mauris. Integer in mauris eu nibh euismod gravida. Duis ac tellus et risus vulputate vehicula. Donec lobortis risus a elit. Etiam tempor. Ut ullamcorper, ligula eu tempor congue, eros est euismod turpis, id tincidunt sapien risus a quam. Maecenas fermentum consequat mi. Donec fermentum. Pellentesque malesuada nulla a mi. Duis sapien sem, aliquet nec, commodo eget, consequat quis, neque. Aliquam faucibus, elit ut dictum aliquet, felis nisl adipiscing sapien, sed malesuada diam lacus eget erat. Cras mollis scelerisque nunc. Nullam arcu. Aliquam consequat. Curabitur augue lorem, dapibus quis, laoreet et, pretium ac, nisi. Aenean magna nisl, mollis quis, molestie eu, feugiat in, orci. In hac habitasse platea dictumst.<br />
<br />
Fusce convallis, mauris imperdiet gravida bibendum, nisl turpis suscipit mauris, sed placerat ipsum urna sed risus. In convallis tellus a mauris. Curabitur non elit ut libero tristique sodales. Mauris a lacus. Donec mattis semper leo. In hac habitasse platea dictumst. Vivamus facilisis diam at odio. Mauris dictum, nisi eget consequat elementum, lacus ligula molestie metus, non feugiat orci magna ac sem. Donec turpis. Donec vitae metus. Morbi tristique neque eu mauris. Quisque gravida ipsum non sapien. Proin turpis lacus, scelerisque vitae, elementum at, lobortis ac, quam. Aliquam dictum eleifend risus. In hac habitasse platea dictumst. Etiam sit amet diam. Suspendisse odio. Suspendisse nunc. In semper bibendum libero.<br />
<br />
Proin nonummy, lacus eget pulvinar lacinia, pede felis dignissim leo, vitae tristique magna lacus sit amet eros. Nullam ornare. Praesent odio ligula, dapibus sed, tincidunt eget, dictum ac, nibh. Nam quis lacus. Nunc eleifend molestie velit. Morbi lobortis quam eu velit. Donec euismod vestibulum massa. Donec non lectus. Aliquam commodo lacus sit amet nulla. Cras dignissim elit et augue. Nullam non diam. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. In hac habitasse platea dictumst. Aenean vestibulum. Sed lobortis elit quis lectus. Nunc sed lacus at augue bibendum dapibus.<br />
<br />
Aliquam vehicula sem ut pede. Cras purus lectus, egestas eu, vehicula at, imperdiet sed, nibh. Morbi consectetuer luctus felis. Donec vitae nisi. Aliquam tincidunt feugiat elit. Duis sed elit ut turpis ullamcorper feugiat. Praesent pretium, mauris sed fermentum hendrerit, nulla lorem iaculis magna, pulvinar scelerisque urna tellus a justo. Suspendisse pulvinar massa in metus. Duis quis quam. Proin justo. Curabitur ac sapien. Nam erat. Praesent ut quam.<br />
<br />
Vivamus commodo, augue et laoreet euismod, sem sapien tempor dolor, ac egestas sem ligula quis lacus. Donec vestibulum tortor ac lacus. Sed posuere vestibulum nisl. Curabitur eleifend fermentum justo. Nullam imperdiet. Integer sit amet mauris imperdiet risus sollicitudin rutrum. Ut vitae turpis. Nulla facilisi. Quisque tortor velit, scelerisque et, facilisis vel, tempor sed, urna. Vivamus nulla elit, vestibulum eget, semper et, scelerisque eget, lacus. Pellentesque viverra purus. Quisque elit. Donec ut dolor.<br />
<br />
Duis volutpat elit et erat. In at nulla at nisl condimentum aliquet. Quisque elementum pharetra lacus. Nunc gravida arcu eget nunc. Nulla iaculis egestas magna. Aliquam erat volutpat. Sed pellentesque orci. Etiam lacus lorem, iaculis sit amet, pharetra quis, imperdiet sit amet, lectus. Integer quis elit ac mi aliquam pretium. Nullam mauris orci, porttitor eget, sollicitudin non, vulputate id, risus. Donec varius enim nec sem. Nam aliquam lacinia enim. Quisque eget lorem eu purus dignissim ultricies. Fusce porttitor hendrerit ante. Mauris urna diam, cursus id, mattis eget, tempus sit amet, risus. Curabitur eu felis. Sed eu mi. Nullam lectus mauris, luctus a, mattis ac, tempus non, leo. Cras mi nulla, rhoncus id, laoreet ut, ultricies id, odio.<br />
<br />
Donec imperdiet. Vestibulum auctor tortor at orci. Integer semper, nisi eget suscipit eleifend, erat nisl hendrerit justo, eget vestibulum lorem justo ac leo. Integer sem velit, pharetra in, fringilla eu, fermentum id, felis. Vestibulum sed felis. In elit. Praesent et pede vel ante dapibus condimentum. Donec magna. Quisque id risus. Mauris vulputate pellentesque leo. Duis vulputate, ligula at venenatis tincidunt, orci nunc interdum leo, ac egestas elit sem ut lacus. Etiam non diam quis arcu egestas commodo. Curabitur nec massa ac massa gravida condimentum. Aenean id libero. Pellentesque vitae tellus. Fusce lectus est, accumsan ac, bibendum sed, porta eget, augue. Etiam faucibus. Quisque tempus purus eu ante.<br />
<br />
Vestibulum sapien nisl, ornare auctor, consectetuer quis, posuere tristique, odio. Fusce ultrices ullamcorper odio. Ut augue nulla, interdum at, adipiscing non, tristique eget, neque. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Ut pede est, condimentum id, scelerisque ac, malesuada non, quam. Proin eu ligula ac sapien suscipit blandit. Suspendisse euismod. Ut accumsan, neque id gravida luctus, arcu pede sodales felis, vel blandit massa arcu eget ligula. Aenean sed turpis. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Donec sem eros, ornare ut, commodo eu, tempor nec, risus. Donec laoreet dapibus ligula. Praesent orci leo, bibendum nec, ornare et, nonummy in, elit. Donec interdum feugiat leo. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Pellentesque feugiat ullamcorper ipsum. Donec convallis tincidunt urna.<br />
<br />
Suspendisse et orci et arcu porttitor pellentesque. Sed lacus nunc, fermentum vel, vehicula in, imperdiet eget, urna. Nam consectetuer euismod nunc. Nulla dignissim posuere nulla. Integer iaculis lacinia massa. Nullam sapien augue, condimentum vel, venenatis id, rhoncus pellentesque, sapien. Donec sed ipsum ultrices turpis consectetuer imperdiet. Duis et ipsum ac nisl laoreet commodo. Mauris eu est. Suspendisse id turpis quis orci euismod consequat. Donec tellus mi, luctus sit amet, ultrices a, convallis eu, lorem. Proin faucibus convallis elit. Maecenas rhoncus arcu at arcu. Proin libero. Proin adipiscing. In quis lorem vitae elit consectetuer pretium. Nullam ligula urna, adipiscing nec, iaculis ut, elementum non, turpis. Fusce pulvinar.<br />
<br />
=== Notes to Self ===<br />
# Problem analysis<br />
# Specific examples of problem<br />
# How did issues/problems arise<br />
# Perceived benefits<br />
# Measures taken to attempt to solve problem</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=User:PaulClayberg&diff=1879User:PaulClayberg2008-11-07T18:02:40Z<p>PaulClayberg: /* Paul Clayberg */</p>
<hr />
<div>== [[Paul Clayberg]] ==<br />
Born on July 8th, 1991, Paul has a [[Andrew Clayberg|twin]] brother. He likes DDR, colouring his hair, and chewing gum.<br />
<br />
Paul enjoys eating steak, gyros, hummus, and [[Lies|cake.]]<br />
<br />
{{stub}}<br />
<br />
=== Notes to Self ===<br />
# Problem analysis<br />
# Specific examples of problem<br />
# How did issues/problems arise<br />
# Perceived benefits<br />
# Measures taken to attempt to solve problem</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Internet_-_Social_%26_Ethical_Issues&diff=1878Internet - Social & Ethical Issues2008-11-07T17:38:17Z<p>PaulClayberg: </p>
<hr />
<div>'''Objective:'''<br />
* You will be researching and presenting your findings on a particular social and ethical issue involving the Internet.<br />
<br />
'''Requirements:'''<br />
* Identify and state the problem<br />
* Define the important terms relating to the problem (e.g. global, virus, addiction, etc.)<br />
* Give 3 specific examples of the problem from 3 different "[[Areas of Impact]]." For each example, describe the following:<br />
** What is the specific example of the problem?<br />
** Which "Area of Impact" is involved?<br />
** How did the issue/problem arise?<br />
** Who are the stakeholders in your example?<br />
** What are the perceived benefits?<br />
** Why is the issue/problem such a concern?<br />
** What measures have been taken to resolve this problem?<br />
* References section that follows APA or MLA formatting guidelines<br />
<br />
'''Presentation:'''<br />
* Create a 5-10 minute powerpoint (.ppt) presentation to present your topic/issue.<br />
* Also create the PDF handout version of your slides.<br />
* You will submit both your presentation and your pdf<br />
* BONUS POINTS for anything outside of a plain presentation (e.g. audience participation, props, etc.)<br />
<br />
'''Grading Rubric:'''<br />
* Coming Soon!<br />
<br />
'''Groups:'''<br />
<pre><br />
Group #1 - social impact of global viruses<br />
----------<br />
O'Conor Devin<br />
Brower William<br />
<br />
Group #2 - social impact of dependence on the Internet (individual & society)<br />
----------<br />
Islam Mukti<br />
Aldana Ricardo<br />
<br />
Group #3 - social impact of identity theft over the Internet<br />
----------<br />
Apseloff Nicholas<br />
Thomas Hugh<br />
<br />
Group #4 - social impact of open access to unsuitable (inappropriate) material on the Internet<br />
----------<br />
Peneva Teodora<br />
Bekele Dagmawi<br />
<br />
Group #5 - ethical issues related to abuse/misuse of the Internet (e.g. spam)<br />
----------<br />
Kik Kent<br />
Monterroza Oscar<br />
<br />
Group #6 - ethical considerations of IT-rich vs. IT-poor nations as a result of differing access<br />
----------<br />
Lopez-Melean Roberto<br />
Thai Patrick<br />
<br />
Group #7 - ethical considerations relating to workplace monitoring<br />
----------<br />
Panlilio Alfonso<br />
Passaglia Samuel<br />
<br />
Group #8 - social impact on health of the use of mobile devices<br />
----------<br />
Clayberg Paul<br />
Morgan James<br />
<br />
Group #9 - effect on personal productivity of personal communications devices<br />
----------<br />
Goodman Andrew<br />
Vu Paul<br />
<br />
Group #10 - social and environmental impact and ethical considerations of telecommuting<br />
----------<br />
Clayberg Andrew<br />
Singh Prashant<br />
<br />
Group #11 - social impact and ethical considerations of distance learning<br />
----------<br />
Nolasco Alfredo<br />
Veizaga Daniel<br />
<br />
Group #12 - social impact and ethical considerations of digital entertainment<br />
----------<br />
Mclennan Andrew<br />
</pre></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Help:Editing&diff=1877Help:Editing2008-11-07T17:18:04Z<p>PaulClayberg: /* */</p>
<hr />
<div>==Common symbols and their syntices==<br />
<br />
=== <nowiki>[[</nowiki>''Internal links''<nowiki>]]</nowiki> ===<br />
Creates an internal link (within the wiki). To use linktext other than the name of the page, use a pipe (|), like this: <nowiki>[[</nowiki>''page title''|link text<nowiki>]]</nowiki><br />
:Examples: [[Main_Page]] and [[Main_Page|This goes to the Main Page.]]<br />
<br />
=== <nowiki>[</nowiki>''<nowiki>External Links</nowiki>''<nowiki>]</nowiki>===<br />
Creates an external link (outside of the wiki).<br />
:Example: [http://www.PaulBui.net An external link.]<br />
<br />
=== <nowiki>''</nowiki>Double Apostrophes<nowiki>''</nowiki> ===<br />
Italicises the text. Do not confuse this with double quotes ("").<br />
:Example: ''I feel inclined to emphasise my text.''<br />
<br />
=== <nowiki>'''</nowiki>Triple apostrophes<nowiki>'''</nowiki> ===<br />
Emboldens the text. Also ruins your apostrophe key if overdone - use sparingly.<br />
:Example: '''BOOM!'''<br />
<br />
=== <nowiki>----</nowiki> ===<br />
A horizontal rule (<nowiki><hr></nowiki>). Use sparingly.<br />
:Example: See below.<br />
----<br />
<br />
=== <nowiki><nowiki></nowiki></nowiki> ===<br />
Ignores wikitext and formatting. Also fun to say.<br />
:Example: [http://paulbui.net/wl/index.php?title=Help:Editing&action=edit It's all over the place.]<br />
<br />
=== <nowiki>:Indentation</nowiki> ===<br />
Indents text. Place colon as first character in line to be indented. Use in succession to make blocks of text.<br />
:Example: <-- In edit mode, this reads "''':'''Example:"<br />
<br />
=== <nowiki>*Basic Lists</nowiki> ===<br />
Creates a bulletted list. The more asterisks you use, the lower the list level.<br />
:Example:<br />
:*'''<nowiki>*</nowiki>'''Level one<br />
:***'''<nowiki>**</nowiki>'''Level two<br />
:****'''<nowiki>***</nowiki>'''Level three<br />
:***'''<nowiki>**</nowiki>'''Level two again<br />
:***'''<nowiki>**</nowiki>'''Another level two<br />
<br />
=== <nowiki>#Numeric Lists</nowiki> ===<br />
Creates a numeric list. As with bulletted lists, the more octothorpes one uses, the lower the list level.<br />
:Example:<br />
:#'''<nowiki>#</nowiki>'''Level one<br />
:##'''<nowiki>##</nowiki>'''Level two<br />
:###'''<nowiki>###</nowiki>'''Level three<br />
:##'''<nowiki>##</nowiki>'''Level two again<br />
:##'''<nowiki>##</nowiki>'''Another level two</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Help:Editing&diff=1876Help:Editing2008-11-07T17:17:09Z<p>PaulClayberg: /* */</p>
<hr />
<div>==Common symbols and their syntices==<br />
<br />
=== <nowiki>[[</nowiki>''Internal links''<nowiki>]]</nowiki> ===<br />
Creates an internal link (within the wiki). To use linktext other than the name of the page, use a pipe (|), like this: <nowiki>[[</nowiki>''page title''|link text<nowiki>]]</nowiki><br />
:Examples: [[Main_Page]] and [[Main_Page|This goes to the Main Page.]]<br />
<br />
=== <nowiki>[</nowiki>''<nowiki>External Links</nowiki>''<nowiki>]</nowiki>===<br />
Creates an external link (outside of the wiki).<br />
:Example: [http://www.PaulBui.net An external link.]<br />
<br />
=== <nowiki>''</nowiki>Double Apostrophes<nowiki>''</nowiki> ===<br />
Italicises the text. Do not confuse this with double quotes ("").<br />
:Example: ''I feel inclined to emphasise my text.''<br />
<br />
=== <nowiki>'''</nowiki>Triple apostrophes<nowiki>'''</nowiki> ===<br />
Emboldens the text. Also ruins your apostrophe key if overdone - use sparingly.<br />
:Example: '''BOOM!'''<br />
<br />
=== <nowiki>----</nowiki> ===<br />
A horizontal rule (<nowiki><hr></nowiki>). Use sparingly.<br />
:Example: See below.<br />
----<br />
<br />
=== <nowiki><nowiki></nowiki></nowiki> ===<br />
Ignores wikitext and formatting. Also fun to say.<br />
:Example: [http://paulbui.net/wl/index.php?title=Help:Editing&action=edit It's all over the place.]<br />
:Example: [[Editing&action=edit| It's all over the place.]]<br />
<br />
=== <nowiki>:Indentation</nowiki> ===<br />
Indents text. Place colon as first character in line to be indented. Use in succession to make blocks of text.<br />
:Example: <-- In edit mode, this reads "''':'''Example:"<br />
<br />
=== <nowiki>*Basic Lists</nowiki> ===<br />
Creates a bulletted list. The more asterisks you use, the lower the list level.<br />
:Example:<br />
:*'''<nowiki>*</nowiki>'''Level one<br />
:***'''<nowiki>**</nowiki>'''Level two<br />
:****'''<nowiki>***</nowiki>'''Level three<br />
:***'''<nowiki>**</nowiki>'''Level two again<br />
:***'''<nowiki>**</nowiki>'''Another level two<br />
<br />
=== <nowiki>#Numeric Lists</nowiki> ===<br />
Creates a numeric list. As with bulletted lists, the more octothorpes one uses, the lower the list level.<br />
:Example:<br />
:#'''<nowiki>#</nowiki>'''Level one<br />
:##'''<nowiki>##</nowiki>'''Level two<br />
:###'''<nowiki>###</nowiki>'''Level three<br />
:##'''<nowiki>##</nowiki>'''Level two again<br />
:##'''<nowiki>##</nowiki>'''Another level two</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=User:PaulClayberg&diff=1875User:PaulClayberg2008-11-07T17:14:05Z<p>PaulClayberg: /* Paul Clayberg */</p>
<hr />
<div>== [[Paul Clayberg]] ==<br />
Born on July 8th, 1991, Paul has a [[Andrew Clayberg|twin]] brother. He likes DDR, colouring his hair, and chewing gum.<br />
<br />
Paul enjoys eating steak, gyros, hummus, and [[Lies|cake.]]<br />
<br />
{{stub}}</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=User:PaulClayberg&diff=1874User:PaulClayberg2008-11-07T17:13:41Z<p>PaulClayberg: /* Paul Clayberg */</p>
<hr />
<div>== [[Paul Clayberg]] ==<br />
Born on July 8th, 1991, Paul has a [[Andrew Clayberg|twin]] brother. He likes DDR, colouring his hair, and chewing gum.<br />
<br />
Paul enjoys eating steak, gyros, hummus, and [[Lies|cake.]]<br />
<br />
{{stub}}<br />
{{what}}</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Internet_-_Social_%26_Ethical_Issues&diff=1872Internet - Social & Ethical Issues2008-11-07T17:10:20Z<p>PaulClayberg: </p>
<hr />
<div>'''Objective:'''<br />
* You will be researching and presenting your findings on a particular social and ethical issue involving the Internet.<br />
<br />
'''Requirements:'''<br />
* Identify and state the problem<br />
* Define the important terms relating to the problem (e.g. global, virus, addiction, etc.)<br />
* Give 3 specific examples of the problem from 3 different "[[Areas of Impact]]." For each example, describe the following:<br />
** What is the specific example of the problem?<br />
** Which "[[Areas of Impact|Area of Impact]]" is involved?<br />
** How did the issue/problem arise?<br />
** Who are the stakeholders in your example?<br />
** What are the perceived benefits?<br />
** Why is the issue/problem such a concern?<br />
** What measures have been taken to resolve this problem?<br />
* References section that follows APA or MLA formatting guidelines<br />
<br />
'''Presentation:'''<br />
* Create a 5-10 minute powerpoint (.ppt) presentation to present your topic/issue.<br />
* Also create the PDF handout version of your slides.<br />
* You will submit both your presentation and your pdf<br />
* BONUS POINTS for anything outside of a plain presentation (e.g. audience participation, props, etc.)<br />
<br />
'''Grading Rubric:'''<br />
* Coming Soon!<br />
<br />
'''Groups:'''<br />
<pre><br />
Group #1 - social impact of global viruses<br />
----------<br />
O'Conor Devin<br />
Brower William<br />
<br />
Group #2 - social impact of dependence on the Internet (individual & society)<br />
----------<br />
Islam Mukti<br />
Aldana Ricardo<br />
<br />
Group #3 - social impact of identity theft over the Internet<br />
----------<br />
Apseloff Nicholas<br />
Thomas Hugh<br />
<br />
Group #4 - social impact of open access to unsuitable (inappropriate) material on the Internet<br />
----------<br />
Peneva Teodora<br />
Bekele Dagmawi<br />
<br />
Group #5 - ethical issues related to abuse/misuse of the Internet (e.g. spam)<br />
----------<br />
Kik Kent<br />
Monterroza Oscar<br />
<br />
Group #6 - ethical considerations of IT-rich vs. IT-poor nations as a result of differing access<br />
----------<br />
Lopez-Melean Roberto<br />
Thai Patrick<br />
<br />
Group #7 - ethical considerations relating to workplace monitoring<br />
----------<br />
Panlilio Alfonso<br />
Passaglia Samuel<br />
<br />
Group #8 - social impact on health of the use of mobile devices<br />
----------<br />
Clayberg Paul<br />
Morgan James<br />
<br />
Group #9 - effect on personal productivity of personal communications devices<br />
----------<br />
Goodman Andrew<br />
Vu Paul<br />
<br />
Group #10 - social and environmental impact and ethical considerations of telecommuting<br />
----------<br />
Clayberg Andrew<br />
Singh Prashant<br />
<br />
Group #11 - social impact and ethical considerations of distance learning<br />
----------<br />
Nolasco Alfredo<br />
Veizaga Daniel<br />
<br />
Group #12 - social impact and ethical considerations of digital entertainment<br />
----------<br />
Mclennan Andrew<br />
</pre></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Internet_-_Social_%26_Ethical_Issues&diff=1871Internet - Social & Ethical Issues2008-11-07T17:08:03Z<p>PaulClayberg: </p>
<hr />
<div>'''Objective:'''<br />
* You will be researching and presenting your findings on a particular social and ethical issue involving the Internet.<br />
<br />
'''Requirements:'''<br />
* Identify and state the problem<br />
* Define the important terms relating to the problem (e.g. global, virus, addiction, etc.)<br />
* Give 3 specific examples of the problem from 3 different "Areas of Impact." For each example, describe the following:<br />
** What is the specific example of the problem?<br />
** Which "[[Areas of Impact|Area of Impact]]" is involved?<br />
** How did the issue/problem arise?<br />
** Who are the stakeholders in your example?<br />
** What are the perceived benefits?<br />
** Why is the issue/problem such a concern?<br />
** What measures have been taken to resolve this problem?<br />
* References section that follows APA or MLA formatting guidelines<br />
<br />
'''Presentation:'''<br />
* Create a 5-10 minute powerpoint (.ppt) presentation to present your topic/issue.<br />
* Also create the PDF handout version of your slides.<br />
* You will submit both your presentation and your pdf<br />
* BONUS POINTS for anything outside of a plain presentation (e.g. audience participation, props, etc.)<br />
<br />
'''Grading Rubric:'''<br />
* Coming Soon!<br />
<br />
'''Groups:'''<br />
<pre><br />
Group #1 - social impact of global viruses<br />
----------<br />
O'Conor Devin<br />
Brower William<br />
<br />
Group #2 - social impact of dependence on the Internet (individual & society)<br />
----------<br />
Islam Mukti<br />
Aldana Ricardo<br />
<br />
Group #3 - social impact of identity theft over the Internet<br />
----------<br />
Apseloff Nicholas<br />
Thomas Hugh<br />
<br />
Group #4 - social impact of open access to unsuitable (inappropriate) material on the Internet<br />
----------<br />
Peneva Teodora<br />
Bekele Dagmawi<br />
<br />
Group #5 - ethical issues related to abuse/misuse of the Internet (e.g. spam)<br />
----------<br />
Kik Kent<br />
Monterroza Oscar<br />
<br />
Group #6 - ethical considerations of IT-rich vs. IT-poor nations as a result of differing access<br />
----------<br />
Lopez-Melean Roberto<br />
Thai Patrick<br />
<br />
Group #7 - ethical considerations relating to workplace monitoring<br />
----------<br />
Panlilio Alfonso<br />
Passaglia Samuel<br />
<br />
Group #8 - social impact on health of the use of mobile devices<br />
----------<br />
Clayberg Paul<br />
Morgan James<br />
<br />
Group #9 - effect on personal productivity of personal communications devices<br />
----------<br />
Goodman Andrew<br />
Vu Paul<br />
<br />
Group #10 - social and environmental impact and ethical considerations of telecommuting<br />
----------<br />
Clayberg Andrew<br />
Singh Prashant<br />
<br />
Group #11 - social impact and ethical considerations of distance learning<br />
----------<br />
Nolasco Alfredo<br />
Veizaga Daniel<br />
<br />
Group #12 - social impact and ethical considerations of digital entertainment<br />
----------<br />
Mclennan Andrew<br />
</pre></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Internet_-_Social_%26_Ethical_Issues&diff=1870Internet - Social & Ethical Issues2008-11-07T17:07:12Z<p>PaulClayberg: </p>
<hr />
<div>'''Objective:'''<br />
* You will be researching and presenting your findings on a particular social and ethical issue involving the Internet.<br />
<br />
'''Requirements:'''<br />
* Identify and state the problem<br />
* Define the important terms relating to the problem (e.g. global, virus, addiction, etc.)<br />
* Give 3 specific examples of the problem from 3 different "Areas of Impact." For each example, describe the following:<br />
** What is the specific example of the problem?<br />
** Which "[areas of Impact|Area of Impact]" is involved?<br />
** How did the issue/problem arise?<br />
** Who are the stakeholders in your example?<br />
** What are the perceived benefits?<br />
** Why is the issue/problem such a concern?<br />
** What measures have been taken to resolve this problem?<br />
* References section that follows APA or MLA formatting guidelines<br />
<br />
'''Presentation:'''<br />
* Create a 5-10 minute powerpoint (.ppt) presentation to present your topic/issue.<br />
* Also create the PDF handout version of your slides.<br />
* You will submit both your presentation and your pdf<br />
* BONUS POINTS for anything outside of a plain presentation (e.g. audience participation, props, etc.)<br />
<br />
'''Grading Rubric:'''<br />
* Coming Soon!<br />
<br />
'''Groups:'''<br />
<pre><br />
Group #1 - social impact of global viruses<br />
----------<br />
O'Conor Devin<br />
Brower William<br />
<br />
Group #2 - social impact of dependence on the Internet (individual & society)<br />
----------<br />
Islam Mukti<br />
Aldana Ricardo<br />
<br />
Group #3 - social impact of identity theft over the Internet<br />
----------<br />
Apseloff Nicholas<br />
Thomas Hugh<br />
<br />
Group #4 - social impact of open access to unsuitable (inappropriate) material on the Internet<br />
----------<br />
Peneva Teodora<br />
Bekele Dagmawi<br />
<br />
Group #5 - ethical issues related to abuse/misuse of the Internet (e.g. spam)<br />
----------<br />
Kik Kent<br />
Monterroza Oscar<br />
<br />
Group #6 - ethical considerations of IT-rich vs. IT-poor nations as a result of differing access<br />
----------<br />
Lopez-Melean Roberto<br />
Thai Patrick<br />
<br />
Group #7 - ethical considerations relating to workplace monitoring<br />
----------<br />
Panlilio Alfonso<br />
Passaglia Samuel<br />
<br />
Group #8 - social impact on health of the use of mobile devices<br />
----------<br />
Clayberg Paul<br />
Morgan James<br />
<br />
Group #9 - effect on personal productivity of personal communications devices<br />
----------<br />
Goodman Andrew<br />
Vu Paul<br />
<br />
Group #10 - social and environmental impact and ethical considerations of telecommuting<br />
----------<br />
Clayberg Andrew<br />
Singh Prashant<br />
<br />
Group #11 - social impact and ethical considerations of distance learning<br />
----------<br />
Nolasco Alfredo<br />
Veizaga Daniel<br />
<br />
Group #12 - social impact and ethical considerations of digital entertainment<br />
----------<br />
Mclennan Andrew<br />
</pre></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Security&diff=1214Security2008-09-29T16:25:08Z<p>PaulClayberg: /* Security */</p>
<hr />
<div>== Security ==<br />
Definition:<br />
:The ability (or inability) to access certain parts of a programme or network. This is often implemented due to one's place in a hierarchy, such as an [[Paul Bui|administrator]] or general user. Security systems are designed to keep the data safe - For example: [[Main_Page|this]] is an uneditable page, because you probably don't have [[Hacking|sufficient access privileges]] to edit it. Data should always be kept secure to preserve it's [[integrity]] and to avoid [http://www.turnitin.com plagiarism].<br />
<br />
In simple terms:<br />
Security is either being able to (or not being able to) use or change certain things about something. When you need a password to access a file, that's security.<br />
<br />
<s>Lemme slow it down for you:<br />
So there's this kid, right? Yeah. So there's kid named [[Samuel Passaglia|Sam]], and he tries to go into a store. It just so happens that he can't, because he's [[Lies|five]], and you must be 18 to get in. So Sam can't get in the store. Security says that because he's too young, he can't buy stuff from there.</s><br />
<br />
<br />
=== Authentication ===<br />
There are many common forms of authentication to gain access to data. One common, up-and-coming method is called [http://en.wikipedia.org/wiki/Biometrics Biometrics], which uses parts of the body to check for authorisation. Common methods are using fingerprints, retinal scans, and facial recognition. A common retinal exam, for example, is one of the most highly secure forms of checking one's identity, because retinal fibres and patterns are very unique. It works as follows: A retinal scanner uses infrared light for mapping. As a person looks into the eyepiece, an invisible beam of low-energy infrared light traces a circular path on the retina at the back of the eye. The blood-filled capillaries absorb more of the infrared light than the surrounding tissue. Because of this, there is a variation in the intensity of the reflection. The scanner measures this reflection at 320 points along the beam path. It then assigns an intensity grade between zero and 4,095. The resulting numbers are compressed into an 80-byte computer code. This code can then be compared with patterns that have already been entered into the computer's data base.<ref>[http://www.discoveriesinmedicine.com/Ra-Thy/Retinography.html Retinography: How Retinal Scanning Works], Retrieved on 11/9/2008.</ref><br />
<br />
=== Cryptography ===<br />
The science of ciphers and encryption is called [http://en.wikipedia.org/wiki/Cryptography cryptography]. Encryption is widely used to keep data secure - that is, encoding the bytes into a cipher that, in theory, can only be read by the programme itself. At the highest level, the basic bytes of the data ([[Binary|Ones and zeroes]]) are changed, mutated, or flipped. For example, a very simple (and thus very ineffective) cipher would be taking 1's complement of the [[binary]] data (i.e. flipping the bits).<br />
<br />
The Data Encryption Standard (DES) has been the most popular encryption algorithm of the past twenty-five years. Originally developed at IBM Corporation, it was chosen by the National Bureau of Standards (Now the National Institute of Standards and Technologies) as the government-standard encryption algorithm in 1976. Since then, it has become a domestic and international encryption standard, and has been used in thousands of applications. Concerns about its short key length have hampered the algorithm since the beginning, and in 1998 a [[hacking|bruteforce]] machine capable of breaking DES was built. Modifications to DES, like double- and triple-DES, ensure that it will [[Reliability|remain secure]] for the foreseeable future.<ref>[http://www.schneier.com/crypto-gram-0006.html#DES Crypto-gram Newsletter: The Data Encryption Standard], Retrieved on 15 September, 2008</ref><br />
<br />
== Hacking (h4xx0ring) ==<br />
:''Main article: [[Hacking]]''<br />
<br />
Breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
== Citations and References ==<br />
<references/></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Binary&diff=858Binary2008-09-19T17:14:02Z<p>PaulClayberg: /* Binary */</p>
<hr />
<div>== Binary ==<br />
Binary code, or '''Machine Code''', is the basic, lowest level of communication of data used by computers. It consists of a given number of ''bytes'' which contain 8 ''bits'', or places, each. Binary is base 2 of a number, where all place values are powers of the number 2. For example, the number 3 in binary is 00000011<sub>2</sub>, because there is one ''2'' plus one ''1''. Notice how 8 ''bits'' are used.<br />
<br />
=== 2's Complement ===<br />
To represent negative integers, '''2's complement''' is used. This is formed by flipping every bit (''1's compliment'') and adding 1.<br />
For example:<br />
:To find -3<sub>10</sub> in base 2:<br />
:3<sub>10</sub> = 00000011<sub>2</sub><br />
:One's complement: 11111100<sub>2</sub><br />
:Add one: 11111101<sub>2</sub><br />
:&there4; -3<sub>10</sub> = 11111101<sub>2</sub><br />
:Q.E.D.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Awesome&diff=819Awesome2008-09-19T17:03:30Z<p>PaulClayberg: Redirecting to User:PaulClayberg</p>
<hr />
<div>#REDIRECT [[User:PaulClayberg]]</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=User:PaulClayberg&diff=812User:PaulClayberg2008-09-19T17:01:22Z<p>PaulClayberg: </p>
<hr />
<div>== [[Paul Clayberg]] ==<br />
Born on July 8th, 1991, Paul has a [[Andrew Clayberg|twin]] brother. He likes DDR, colouring his hair, and chewing gum.<br />
<br />
Paul enjoys eating steak, gyros, hummus, and [[Lies|cake.]]</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Hacking&diff=308Hacking2008-09-08T00:48:11Z<p>PaulClayberg: /* Hacking */</p>
<hr />
<div>== Hacking ==<br />
Unauthorised editing or tampering with security hierarchies or other such data structures. Hackers usually try to break into information they are not permitted to view, such as corporate databases, monetary funding, or other networks, by breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.<br />
<br />
If you get [[owned|hacked]], you should tighten your [[security]], or [[Special:Preferences|change your password.]]</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Help:Editing&diff=299Help:Editing2008-09-08T00:32:26Z<p>PaulClayberg: /* #Numeric Lists */</p>
<hr />
<div>==Common symbols and their syntices==<br />
<br />
=== <nowiki>[[</nowiki>''Internal links''<nowiki>]]</nowiki> ===<br />
Creates an internal link (within the wiki). To use linktext other than the name of the page, use a pipe (|), like this: <nowiki>[[</nowiki>''page title''|link text<nowiki>]]</nowiki><br />
:Examples: [[Main_Page]] and [[Main_Page|This goes to the Main Page.]]<br />
<br />
=== <nowiki>[</nowiki>''<nowiki>External Links</nowiki>''<nowiki>]</nowiki>===<br />
Creates an external link (outside of the wiki).<br />
:Example: [http://www.PaulBui.net An external link.]<br />
<br />
=== <nowiki>''</nowiki>Double Apostrophes<nowiki>''</nowiki> ===<br />
Italicises the text. Do not confuse this with double quotes ("").<br />
:Example: ''I feel inclined to emphasise my text.''<br />
<br />
=== <nowiki>'''</nowiki>Triple apostrophes<nowiki>'''</nowiki> ===<br />
Emboldens the text. Also ruins your apostrophe key if overdone - use sparingly.<br />
:Example: '''BOOM!'''<br />
<br />
=== <nowiki>----</nowiki> ===<br />
A horizontal rule (<nowiki><hr></nowiki>). Use sparingly.<br />
:Example: See below.<br />
----<br />
<br />
=== <nowiki><nowiki></nowiki></nowiki> ===<br />
Ignores wikitext and formatting. Also fun to say.<br />
:Example: [http://paulbui.net/wl/index.php?title=Help:Editing&action=edit It's all over the place.]<br />
<br />
=== <nowiki>:Indentation</nowiki> ===<br />
Indents text. Place colon as first character in line to be indented. Use in succession to make blocks of text.<br />
:Example: <-- In edit mode, this reads "''':'''Example:"<br />
<br />
=== <nowiki>*Basic Lists</nowiki> ===<br />
Creates a bulletted list. The more asterisks you use, the lower the list level.<br />
:Example:<br />
:*'''<nowiki>*</nowiki>'''Level one<br />
:***'''<nowiki>**</nowiki>'''Level two<br />
:****'''<nowiki>***</nowiki>'''Level three<br />
:***'''<nowiki>**</nowiki>'''Level two again<br />
:***'''<nowiki>**</nowiki>'''Another level two<br />
<br />
=== <nowiki>#Numeric Lists</nowiki> ===<br />
Creates a numeric list. As with bulletted lists, the more octothorpes one uses, the lower the list level.<br />
:Example:<br />
:#'''<nowiki>#</nowiki>'''Level one<br />
:##'''<nowiki>##</nowiki>'''Level two<br />
:###'''<nowiki>###</nowiki>'''Level three<br />
:##'''<nowiki>##</nowiki>'''Level two again<br />
:##'''<nowiki>##</nowiki>'''Another level two</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Lies&diff=291Lies2008-09-08T00:22:44Z<p>PaulClayberg: /* Lies */</p>
<hr />
<div>== Lies ==<br />
Misinformation used to avoid bad situations or telling the truth; false sayings.</div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=BRB_FBI&diff=287BRB FBI2008-09-06T00:38:54Z<p>PaulClayberg: Removing all content from page</p>
<hr />
<div></div>PaulClayberghttps://www.paulbui.net/wiki/index.php?title=Paul_Clayberg&diff=156Paul Clayberg2008-09-04T14:49:54Z<p>PaulClayberg: </p>
<hr />
<div>== Paul Clayberg ==<br />
Has blonde hair. It will be dyed many colours within the next year alone.<br />
Some colours that this species has been seen in the wild with include:<br />
Green,<br />
Blue,<br />
Purple,<br />
Red,<br />
Pink,<br />
and Brown.<br />
It is not known why this species behaves this way or if it has <br />
anything to do with its display during the mating season.<br />
Paul is known to be a gentile species and continues to live as a domesticated<br />
animal within the urban environment. Do not disturb <s>while sleeping</s> ever.</div>PaulClayberg