<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/5390048145092062972?origin\x3dhttp://roxettecueto.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
Wednesday, August 17, 2011'♥
i love spongebob and patrick! ♥



Firewall






Firewalls are software applications that are located in the network gateway server. These applications are capable of offering unique levels of protection to the computers. They face the virus attacks and programs infected by viruses. They will also keep an eye on the unwanted incoming traffic having the motive of attacking computers. They act as a barrier by blocking all the communications that try to access your computer system without consent.
blogged @ 4:23 AM



'♥
i love spongebob and patrick! ♥



Access Control Software


Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.

blogged @ 4:22 AM



'♥
i love spongebob and patrick! ♥



Encryption


It refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to the algorithm.

blogged @ 4:21 AM



'♥
i love spongebob and patrick! ♥



Biometric 


It is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.
blogged @ 4:20 AM







LOOKING BACK ♥

  • July 2011
  • August 2011


  • THE BLOGGER ♥

    Name: Cueto, Roxette M.
    Age: 17 years old
    School: LPU Batangas
    Course: Bachelor of Science in Information Technology
    Address: Pinagsibaan Rosario Batangas




    I WANT ♥

    HIM? HAHAHA
    YOU! HAHAHAHAHA JOKE!

    Comment me on the chatbox :)

    COMMENT HERE ♥

    SWEET ESCAPE ♥

    SARAH
    VIELKA
    KIMBERLY
    KATRINA
    CHARLENE
    GERALDINE
    JANINE


    CREDITS ♥

    Designer
    Imageshack
    Image: x
    AdobePhotoshop/Imageready
    Dafont
    Brushes: Deviantart
    Please leave the credits alone, thanks