IT e-Magazine Issue 6, April 2015
The growth of Information Technology has been phenomenal since the middle of the 21 century. It has affected all aspects of life in one way or another. So the objective of this magazine, which released by the department of Information Technology – Lebanese French University (LFU), is to disseminate information on the application of IT and to be a platform for discussing its benefits and its impact on society. We welcome articles that cover and analyze the benefits and impacts of IT applications on the society and which elaborate on their implementation issues. The criteria for selecting articles for the magazine include: the subject area of the article; new ideas about applications and implementation techniques; how well the information is presented; level of interest to other readers; and, the importance to the IT community. All articles will be subject to a reviewing procedure. Hopefully, contributions to this magazine will 'enhance readability for the general IT reader' and 'help direct society towards a more beneficial use of IT'. Editorial Committee item @ lfu-erbil . net
2000,
WikipediaÂŽ was began as a free-as-infreedom online encyclopedia by Jimmy Wales and Larry Sanger. In March 2015, Wikipedia includes more than 34.5 million articles in 288 languages that have been written by over 53 million registered users. Nowadays, it is the world's sixth-most-popular website in terms of overall visitor traffic.
182.9 Billion Emails Sent / Received Per Day Worldwide The First SMS Message
The first SMS message was sent over the Vodafone GSM network in the United Kingdom on 3 December 1992, from Neil Papworth using a personal computer to Richard Jarvis of Vodafone using an Orbitel 901 han The text of the message was "Merry Christmas".
People who changed the Internet Father of the eMail The Father of e-Mail 'Ray Tomlinson' invented the electronic mail (e-Mail). He implemented the first email system in 1971 on the ARPANET. It was the first system able to send mail between users on different hosts connected to the ARPAnet. The first email sent was "QWERTYUIOP" as a test e-mail. ITeM Website: http://www.lfu-erbil.net/item
ITeM | Issue 6, April – 2015
INSIDE THIS ISSUE
Page 5
A New Technology Trends in Education Mazin S AlHakeem
The education is moving towards BYOD era, everything is going to be cloud and mobility; and the modern technology is imposing to use a new methods in both teaching and learning. According to the latest data, which revealed at the FETC 2015 conference (Florida Educational Technology Conference), about the latest technology trends in education; the three of major trends are: Internet accessing using mobile-connected is passed the tipping point, Videos for homework is on the rise and Using different tools for different academic tasks. Who can read this article: IT, Educational
Page 6
Google Translate Service
Sarah Y Yosif
Google Translate Serves is an online multi language translation service provided by Google Corporation to translate words, text, paragraphs and web page from language to another language. It support 90 languages and serves more than 500 million people monthly. Nowadays, Google translate service is the best electronic translation service available freely ever, although there are no ideal translation system with the fact that based on the human facing some difficulty to find the meaning of some sentences also. Who can read this article: Internet Users, Educational
Page 7
Intranet and Internal Threats Harith Abdullah
The differences between intranet and internet is the key to realize the importance of Intranet security, there are many factors in defining these differences. In general, "difference between Intranets and the Internet is not great in terms of technology, the transmission of information is completely different from the organizational point of view". Intranet can be define as private extension of the internet, normally dedicated to the organization uses. The earlier definition of "Intranets have been distinct as internal communication systems of organizations based on the standards of the Internet and the World Wide Web (WWW)". Who can read this article: Anyone in the field of computer knowledge
2
ITeM | Issue 6, April – 2015
Page 8
Know the 5 Stages of Ethical Hacking Mohammad Salim
This article comes to complement my last article at IT e-Magazine, which titled "Ethical Hackers". There is a wisdom, which means that knowing your weaknesses is a way to defeat your enemy. This wisdom is the main principle of ethical hacking. As shown in figure 1, the five stages of ethical hacking ordered in this sequence: reconnaissance, scanning, gaining access, maintaining access, and the last stage is covering tracks. These five phases or stages presented briefly in this article. Who can read this article: IT Lecturers, IT Students and anyone interested in IT field
Page 10
Office Mix in Education: An Interactive Approach to Flip Teaching in the Ihsan Sayyid Salman
Classroom It is a revolutionary tool that has been developed last year by Microsoft Research to enhance methods of teaching in the classroom which known as Office Mix. It can be defined as digital tool that plug-in for PowerPoint to allow teachers to create dynamic online lectures by using different activities such as annotate slides, add audio and video, embed quizzes, polls and screen recording, and use digital ink to make an interactive lesson (Kniskern, 2015; Wilson, 2014). In addition, it enable students to reserve time class through reviewing their material anywhere at any time and discussing on complex academic materials. This essay will outline the benefits of using Office Mix in education. Who can read this article: IT, Educational
Page 11
Certificates Revocation List in Public Key Infrastructure Jaafar TH. Jaafar
Managing public key certificates revocation has long been a central issue in public key infrastructures. Though various certificate revocation mechanisms have been proposed to address this issue, little effort has been devoted to the empirical analysis of real-world certificate revocation data. A CRL is a Certificate Revocation List. When any certificate is issued, it has a validity period which is defined by the Certification Authority. Usually this is one or two years. Any time a certificate is presented as part of an authentication dialog, the current time should be checked against the validity period. If the certificate is past that period, or expired, then the authentication should fail. This article explains a solution to avoid this breakdown. Who can read this article: Computer Science
3
ITeM | Issue 6, April – 2015
Page 13
Secure Your Wi-Fi Network From Your Disturbing Neighbor Ali Rabee
Bad internet, bad browsing performers and slow download, all of that seems as a problem from your ISP, but did you check first if you are using all your bandwidth, or someone else sharing your internet, this problem could happened if you keep your wireless network without security. Who can read this article: Network Administrator , IT
Page 14
Techniques Used for File Sharing Mohamad T. Sultan
Today, sharing files is not the simple thing it used to be. Many users need to share electronic files with other users on the network. Currently, there are a lot of different ways and functionalities of sharing files and there are many products that can be used simply to allow multiple users to get to the same files and folders. This article is going to discuss all the different types and ways of sharing files so that the readers can decide either for themselves or for their clients what way will serve them best. Who can read this article: Network Administrators , Students, IT, Educational
4
ITeM | Issue 6, April – 2015
A New Technology Trends in Education Mazin S. Al-Hakeem (Ph.D) Department of Information Technology, Lebanese French University - Erbil dr.mazin@lfu-erbil.ne Introduction According to the latest data, which revealed at the FETC 2015 conference (Florida Educational Technology Conference), about the latest technology trends in education; the three of major trends are:
For collaboration with their peers. For taking photos of their assignments. For in-class polling.
Use of Video for Classwork and Homework Video is another tool that has been on the rise in recent years. 46% of US teachers are using video in in the classroom.
1. Internet accessing using mobileconnected is passed the tipping point. 2. Videos for homework is on the rise. 3. Using different tools for different academic tasks.
Many students are accessing video online to help with their homework, especially accessing video created by their teachers to have more control over their learning and believing that they will get more support from an online video.
Internet Connectivity and Personal Access to Mobile Devices The students overwhelmingly identify 3G or 4G-enabled devices as their primary means of connecting to the Internet, 89% of US high schools students have access to Internet-connected smart phones, in additional to have access to a device (typically laptops or tablets) in their school.
Using Different Tools for Different Tasks Rather than using one or even a few platforms for various tasks, students are using video, social media and cell phones for communications, they use ereaders for reading texts and articles; they write, take notes and do research on laptops. Tablets were the second or third choice device for completing many of the academic tasks students are faced with.
The students are using mobile devices both to be more efficient in their daily tasks and their learning processes like:
For anytime research. For educational games.
5
ITeM | Issue 6, April – 2015 imposing to use a new methods in both teaching and learning. References FETC 2015 Education Technology Conference, fetc.org/events/archive /2015-education-technologyconference/information/home.aspx . eLearning Industry, elearningindustry.com Mazin S. Al-Hakeem, “BYOD Policy in Education”, IT e-Magazine, Issue 4, February 2015, http://www.lfu-erbil.net/
Conclusion The education is moving towards BYOD era, everything is going to be cloud and mobility; and the modern technology is
item/issue04/issue_BYOD.php
Google Translate Serves Sarah Y. Yousif Director of QA-LFU, sarahyyosif@lfu-erbil.net Introduction Google Translate Serves is an online multi language translation service provided by Google Corporation to translate words, text, paragraphs and web page from language to another language. It support 90 languages and serves more than 500 million people monthly.
to develop some of the most highperformance translation services on the market”; after that, it was based on Statistical Machine Translation for automatic translation system based on statistical information that work by entering a huge texts in a particular field with the translation availability to this texts during the translation used the translation tables for weighting the translation be more likely in these tables.
Google Translation provide a free supporting for users to reduce them effort and time to make online translation for them work, it is a great tool for who
Before October 2007 Google Translate was based on SYSTRAN ”for working closely with world-renowned Language
6
ITeM | Issue 6, April – 2015 looking for professional translation software based what you want whenever you need it.
•
Advantages: • Free online service. • Service audio pronunciations of the word. • When translate a single word, you find a lot of meanings and synonyms similar at the bottom, in every sense, there is synonymous with a row of other foreign words that may be more appropriate. • Translation between many different languages. • Change the word inside the sentence translation, this property is used in the event of translation complete sentences and paragraphs. • It is available in smart mobile like iOS version and Android version. • Available recognize the sound where the application is listen to the voice conversations and automatically recognize the words used in to 23 different languages.
•
Available recognize the text from the image by using the camera in the mobile and translate this text to 36 language. It allows the users to evaluate whether the translated "useful" or "un useful".
Disadvantages: • Translation contain grammatical mistakes. • Many languages carry words multiple meanings may be synonymous or completely different. Conclusion: Nowadays, Google translate service is the best electronic translation service available freely ever, although there are no ideal translation system with the fact that based on the human facing some difficulty to find the meaning of some sentences also. Reference: • www.systransof.com • www.thawratalweb.com • www.itnews.com
Intranet and Internal Threats Harith A. Hussein (MSc) Department of Information Technology, Lebanese French University - Erbil harith_abd1981@lfu-erbil.net The differences between intranet and internet is the key to realize the importance of Intranet security, there are many factors in defining these differences. In general, "difference between Intranets and the Internet is not great in terms of technology, the transmission of information is completely different from the organizational point of
view"[1]. Intranet can be define as private extension of the internet, normally dedicated to the organization uses. The earlier definition of "Intranets have been distinct as internal communication systems of organizations based on the standards of the Internet and the World Wide Web (WWW)" [2].
7
ITeM | Issue 6, April – 2015 The main objective of using intranet from the organization pint of view is privacy and security [1], the largest events of data theft are stated to have taken place from activities done by the organization’s internal staff.
As conclusion, Trust is good but it may bring on security failure. The major reported data leakage occurrences were carried out by inside organization staff, whether they were seeking revenge or looking of making money. When we write the Intranet policy we must think like a thief, identified all sensitive data and its movement is a mandatory operation in setting any intranet access control system.
According to the [FBI and Computer Security Institute] survey, "twice as many respondents cited their Internet connection as a more frequent point of attack as those who said assaults came from within their internal systems". Concerning the same FBI/CSI report, "For the fifth year in a row, more respondents (74%) cited their Internet connection as a frequent point of attack than cited their internal systems as a frequent point of attack (33%)". [3]
References 1. Kajava, J. and Remes, T. Intranet Security from Organizational Point of View. 2000 2. Telleen, S. T. The Intranet Architecture: Managing information in the new paradigm. Sunnyvale, California. Amdahl Corporation, 1996. 3. Sieberg, D. (2008,April,8). FBI: Cybercrime rising, [CNN Report], Retrieved on (2015,4,13) Available: http://edition.cnn.com/2002/TECH/in ternet/04/07/cybercrime.survey/ 4. Tredinnick , J. (2008,April,8). Intranet Strategies, [Webstie], Retrieved on (2015,4,13) Available: http://www.trigeo.com/contego_rel ease.shtml
Over and above, "Industry research indicates over 65% of all reported security breaches occur from within the network, such as password security leaks" [4]. Instead, organizations starting to prevent attacks from external hackers, in the same time very little attention is being paid to internal employees threats. Finally, it is crucial important to protect insiders from Social Engineering (SE) threats, it is a clever way to manipulation the natural human tendency to trust.
Know the 5 Stages of Ethical Hacking Mohammad Salim Abdulrahman (MSc) Department of Information Technology, Lebanese French University - Erbil mohammads@lfu-erbil.net Introduction This article comes to complement my last article at IT e-Magazine, which titled "Ethical Hackers". There is a wisdom, which means that knowing your
weaknesses is a way to defeat your enemy. This wisdom is the main principle of ethical hacking. As shown in figure 1, the five stages of ethical hacking ordered in this sequence:
8
ITeM | Issue 6, April – 2015 reconnaissance, scanning, gaining access, maintaining access, and the last stage is covering tracks.
These five phases or stages presented briefly in this article
First stage: Reconnaissance This term reconnaissance verbally refers to an initial inspection to acquire information. This term called also as foot printing, which is the first stage in ethical hacking. In this stage, the hacker will collect information regarding the organization or the target that is going to be hacked. Therefore, it is one of the preattacking stages. In this pre-attack stage, hacker gathers the greatest amount of information that are publicly accessible. The information might contain the IP addresses, domain names, locations, and contact information. Hackers have many tools like samspade, email tracker, visual route. One exciting thing to know is that you can also use the simple googling as a foot-printing tool [1].
and scanning stages are exploited now to gain access. The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack-based buffer overflows, denial of service (DoS), and session hijacking. Gaining access named in the hacker world as owning the system [2]. Fourth stage: Maintaining access At this moment, the hacker entered to inside the system by some methods by password guessing or exploiting any of its vulnerabilities. This implies that he is now capable of uploading some files besides downloading some of them. The next objective is to create an easier way or track to get inside when he comes later again. This is similar to make a small secret door in the building so hacker can directly enter in to the building through that door without problems. In the network case, the hacker will do it by uploading some softwares like sniffers, keystroke loggers, Trojan horses [3].
Second stage: Scanning Includes getting the discovered information during reconnaissance stage then using it to test the network. Many tools are available for a hacker, which can use during the scanning stage such as port scanners, dialers, network mappers, vulnerability scanners, and sweepers. Hackers are looking for any information that can help them performing attack such as IP addresses, computer names, and user accounts [2].
Last stage: Covering tracks This is the final stage of ethical hacking or penetration test. The ethical hackers will check whether they can remove or cover the marks that have been created in earlier stages of the test. This work done by clearing all system logs [3]. It is important to know that you need to
Third stage: Gaining access This is the most important stage where the real hacking occurs. All the vulnerabilities discovered during the reconnaissance
9
ITeM | Issue 6, April – 2015 spend a few years not a few days in order to be an ethical hacker.
crack.blogspot.com/2010/12/fivestages-of-ethical-hacking.html. [Accessed 4 April 2015].
References [1] S. Agarwal and S. Woonna, "Ethical Hacking," academia, 2014. [2]
"Hack-O-Crack," Available:
[3]
2014. [Online]. http://hack-o-
"Ethical Hacking main Steps," 2013. [Online]. Available: http://whitehatrwanda.blogspot.c om/2013/03/ethical-hacking-mainsteps.html. [Accessed 3 April 2015].
Office Mix in Education:
An Interactive Approach to Flip Teaching in the Classroom Ihsan Sayyid Salman Department of Computer Science and Digital Technologies, Northumbria University, Newcastle – UK ihsan.rukaibawi@northumbria.ac.uk 1. Introduction: It is a revolutionary tool that has been developed last year by Microsoft Research to enhance methods of teaching in the classroom which known as Office Mix. It can be defined as digital tool that plug-in for PowerPoint to allow teachers to create dynamic online lectures by using different activities such as annotate slides, add audio and video, embed quizzes, polls and screen recording, and use digital ink to make an interactive lesson (Kniskern, 2015; Wilson, 2014). In addition, it enable students to reserve time class through reviewing their material anywhere at any time and discussing on complex academic materials. This essay will outline the benefits of using Office Mix in education.
From an interactivity perspective, Office Mix play a significant role to allow instructors for making exciting online lessons through annotating your slides as you record an audio or video. From a flexibility perspective, Office Mix is convenient platform that help teachers for sharing their courses on the cloud that lead to reserve time class through enabling students to access to those materials on any device anywhere at any time. From a personality perspective, Office Mix is easy to share between students in different ways such as uploaded on the Mix account, emailed as web link and embedded as code on blog or on website of university. In addition, it
2. The Benefits of Implementing Office Mix in Education: Office Mix is a free tool for PowerPoint 2013 that has vital benefits through using it in the classroom in terms of interactivity, flexibility, personality perspective.
01
ITeM | Issue 6, April – 2015 provides analytics tool that help educators to observe an engagement of students through displaying a report of assessment to know how many learners performed on quizzes and how long did they spend on each individual slide.
4. References Kniskern, K. (2015) This is Office Mix, The Superset of PowerPoint, As it Moves Beyond the Classroom. Available at: http://www.winbeta.org/news/office-mixsuperset-powerpoint-it-moves-beyondclassroom (Accessed: 04 April 2015). Wilson, M. (2014) Office Mix Preview Takes Interactive PowerPoint Presentations Online. Available at: http://www.winbeta.org/news/office-mixpreview-takes-interactive-powerpointpresentations-online (Accessed: 04 April 2015). West, P. (2014) How Office Mix is a Powerful Tool for Blended or Flipped Learning. Available at: http://www.ecampusnews.com/topnews/office-mix-learning-240/2/ (Accessed: 04 April 2015). Microsoft (2015) Office Mix. Available at: https://mix.office.com (Accessed: 04 April 2015).
Watch this video: www.youtube.com/watch?v=uPif4lYra6Y
3. Conclusion In conclusion, Office Mix can be seen as digital tool in these days for flipping classroom through helping teachers to improve their traditional methods of teaching in terms of interactivity, flexibility and personality perspective.
Certificates Revocation List in Public Key Infrastructure Jaafar TH. Jaafar (MSc) Master of Computer Science, University of Cairo, Egypt Jaafar_jaafar2000@yahoo.com Introduction Managing public key certificates revocation has long been a central issue in public key infrastructures. Though various certificate revocation mechanisms have been proposed to address this issue, little effort has been devoted to the empirical analysis of realworld certificate revocation data. A CRL is a Certificate Revocation List. When any certificate is issued, it has a validity period which is defined by the Certification
Authority. Usually this is one or two years. Any time a certificate is presented as part of an authentication dialog, the current time should be checked against the validity period. If the certificate is past that period, or expired, then the authentication should fail. This article explains a solution to avoid this breakdown.
00
ITeM | Issue 6, April – 2015 CRLs. It is said that a certificate revocation rate around 10 percent per year is reasonable. Therefore, the size of CRL will be quite long if the CA has many clients. That is, the validation performance is likely to be slow, since the verifier has to download the CRLs from each CA (or CA’s repository) in a certification chain and verify each CRL. PKI Components
This fact is critical problem if the client is the mobile terminal with restricted processing capacities, memory limitations, and network bandwidth. In order to reduce the size of CRLs.
The basic components of public key infrastructure are certification authority, registration authority, PKI Users, repositories, CRL and archives. Certificates Revocation List (CRLs) CRL is a digitally signed list of revoked certificates and usually issued by a CA for the certificates it manages. In case of validating user’s certificate, the verifier obtains the CRL stored in repository and should verify its validity and CA’s digital signature. It is the CA that issues a given set of certificates is also responsible for issuing revocation information associated with those certificates. Certificates contain an expiration date. Unfortunately, the data in a certificate may become unreliable before the expiration date arrives. Certificate issuers need a mechanism to provide a status update for the certificates they have issued. One mechanism is the X.509 certification revocation list (CRL). The CRL contains the following fields: 1. 2. 3. 4. 5. 6. 7.
Conclusion We evidence to the inquiry demonstrates that the CRL will perform a strategic role in enabling the local planning authorities and the Applicants to promote sustainable infrastructure. I have demonstrated that the CRL accords with the development plan and that there are strong grounds to expect that implementation be widely in several areas. Reference L. Kohnfelder. Towards a practical public-key cryptosystem. PhD thesis, Mas-sachusetts Institute of Technology, 1978 ISO. ISO/IEC 9594-8 - Information technology | Open Systems Interconnection | The Directory: Public key and attribute certificate frameworks. International Organization for Standardization, 2008. C. Adams, P. Cain, D. Pinkas, and R. Zuccherato. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161 (Proposed Standard), Aug.2001. Updated by RFC 5816. Nash, W. Duane, C. Joseph, and D. Brink, PKI - Implementing and Managing E-Security, Osborne Media Group, 2000.
Version. Signature. Issuer. This update. Next update. Revoked certificates. CRL Extensions.
“The main advantage of the CRL systems is its simplicity, however, there are several problems pointed out. Especially, the main disadvantage of the CRL systems is its high communication costs between the user and the repository stored on
02
ITeM | Issue 6, April – 2015
Secure your Wi-Fi network from your disturbing neighbors Ali R. Hashim (MSc) Department of Information Technology, Lebanese French University - Erbil alirh@lfu-erbil.net 4. Use MAC filter, filtering will record the MAC of all the devices that could connect your network, and prevent other devices. 5. Disable the 'SSID Broadcast', this point will keep your SSID hidden even for you, so it cannot be shown within searchable wireless networks. 6. Disable remote login, to prevent devices to access your router through WAN connection . 7. Disable accessing your router through wireless, so any one have to connect the router using LAN connection to access it. 8. Change your default LAN IP, all the router configured with one of privet IP and set it’s the first for the router, here you could change the network of LAN , and use any IP(not the first or the last) in this Subnet as router IP . 9. Disabling DHCP server in router and use the manual way to configure any device need to connect your network, this way will keep your LAN subnet hidden from any forging device want to access it.
Introduction Bad internet, bad browsing performers and slow download, all of that seems as a problem from your ISP, but did you check first if you are using all your bandwidth, or someone else sharing your internet, this problem could happened if you keep your wireless network without security. What is the worst thing could happen? The danger here is not just sharing your internet, but it could go farther to hacked your computer, accessing your file, monitor all your actions and steeling your personal information. For all of that I will show here some tips we could do to make your wireless network more secure. What to do? 1. Enable encryption on your wireless network, by using one of the Wi-Fi encryption protocols, Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access II (WPA2) .
2. Use Strong password for accessing your router, password that be from 8 digits, using numbers, uppercase letters and lowercase letters. 3. Use a unique SSID, don’t keep the default one.
03
ITeM | Issue 6, April – 2015
Techniques Used for File Sharing Mohamad T. Sultan (MSc) Assist. Lecturer, Cihan University - Department of Computer Science, taha@engineer.com locks, which mean that the current user is the only one who can edit the file. When the user opens the original file, no other users can get in to that file and all the changes done by the user are automatically saved to that original file. Other users will receive a message indicating that the current opened file is a read only file and those users will not be able to save any changes back to the original file. SMB is very useful in small sized local networks.
Introduction Today, sharing files is not the simple thing it used to be. Many users need to share electronic files with other users on the network. Currently, there are a lot of different ways and functionalities of sharing files and there are many products that can be used simply to allow multiple users to get to the same files and folders. This article is going to discuss all the different types and ways of sharing files so that the readers can decide either for themselves or for their clients what way will serve them best.
2. Synchronization File synchronization is the way of making sure that electronic files in two or more locations are updated using specific rules. What happens in synchronization is that the user automatically creates a copy of the original shared file over a local area network or the internet. When the user gets done changing the shared file, they will be asked whether they want to synchronize the changes by saving and merging their copy back to the original copy of the shared file. Finally the original file will be modified.
Permissions One of the basic elements of file sharing is permissions. These permissions basically means the rights which are given to the users for changing and modifying a shared file. This includes the right for the users to read, write and execute the shared file. Types of File Sharing 1. Server Message Block (SMB) SMB is one of the most well-known file sharing protocols and this techniques is used when the user wants to share files on the local network. SMB provides a way for users applications in a system to read and write to files and to demand services from server applications in a shared network. SMB has a couple of advantages like when the user opens a file using SMB which is on the local network the file will
When there are multiple users accessing and editing the same file. Every user will create a copy and at the end, while merging, some of the copies may get over-written because the synchronization is not been done on real time. However, this technique is useful when used for personal documents without worrying about the conflict issues.
04
ITeM | Issue 6, April – 2015 3. Shared Library Software
Conclusion
This one is just a lot like synchronization and mainly used in multi type media world. Modules used by a program are loaded from individual shared objects. Using the Library software on a server, users can check in and checkout documents, videos or other files. Users need to access the server and find the file they want to edit by creating a copy of that file on the local computer and the server will assign that file with a checkout mark. That's why the only way another user can start to edit the same file is just after the file is been checked back in. This technique is basically works by check-in and check-out the shared file.
This article has discussed and investigated the different types of file sharing permissions and reviewed most of the widely used techniques followed for sharing files. References 1. John, Nicholas A. File sharing and the history of computing: Or, why file sharing is called “file sharing”. Critical Studies in Media Communication,198-211, 2014. 2. R.-Y. Xiao. Survey on anonymity in unstructured peer-to-peer systems. Journal of Computer Science and Technology, 23:660–671, 2008. 3. "Domain Controller Roles". Microsoft TechNet. Retrieved March 4, 2015. 4. A. Iamnitchi. Resource Discovery in Large Resource-Sharing Environments, PhD dissertation, Univ. of Chicago, 2003. 5. North, Dave, Tony Vasile, and Richard C. Clarkson. Systems and methods for secure cloud-based media file sharing. U.S. Patent No. 8,930,475. 6 Jan. 2015
4. Real-Time Collaboration Real time collaboration basically means everybody opens the same document at exactly the same time and when one user makes any change, all other users will see that change in real time. This type has some problems in terms of merging and over-writing other users changes and modifications to the shared file.
05
Readers of IT e-magazine are invited to submit their articles that are consistent with the objective of this magazine for publishing in the future issues, to ITeM’s editorial committee at : item@lfu-erbil.net . Deadlines: - Submissions due: 8th of the Month - Author notification: 10th of the Month - Publish date: 15th of the Month
This issue powered by Turnitin to enforce the high level of originality.
www.lfu-erbil.net/item item@lfu-erbil.net +964 751 020 5916