look in the sylybus please
hows its going so far david?
when are you going to be finished david?
ok thanks alot buddy,
ok thanks buddy for staying in touch with me.
ok then buddy
Hi, Class and Mr. Klie hows its going today for you so far? Among the computer risks I investigated was the PWS:Win32/Aasp.D that has the keylogger program. The key logger could be a risk to network safety and are usually portionof the Trojan horse programs. Key logger is utilized to record keystrokes from onescomputer system and is placed into a .txt file. Following it's delivered through email or electronically delivered to an online computer at another place. Key loggers can beextremely risky since they are capable to get ones information without one even beingaware of it.Key loggers can get any information they desire from ones computer and utilize thatinformation for their advantage. Key loggers can steal banking information, privateinformation and even online gaming information. However not all key loggers utilize their understanding for bad objectives. Some parents may set up the key logger program intheir kids computer systems to know what activities their children are on and what theyare stating.
oh ok then
how are coming along buddy?
Please click the links below to download the remaining documents:
Hi, david i need you to get to working on week 9 please. let me know if you can handle it please?
ok cool then., thanks
tuesday or wednsday if possible
ok thats cool buddy
David i never did get the week 4 TCP/IP Lan Plan
ok then thanks
hi david when are you going to give me week 4 TCP/IP Lan Plan
no i do not have any more questions for you at this time David except when will the ones i have ask you will be ready?
ok cool then
Please click the link below to download the week 4 checkpoint:
Please click the link below to download the week 9 discussion:
I am editing the final presentation now.
how are we comeing now david?
oh ok then thanks