Ln. 4 - Web Applications and Security
Ln. 4 - Web Applications and Security
KEYBOARD TAB
• It has 3 options- Sticky key, Filter keys and Toggle keys.
Sticky Keys
✓ StickyKeys is an accessibility feature to help computer users with physical disabilities, but
it is also used by others as a means to reduce repetitive strain.
✓ StickyKeys allows the user to press and release a modifier key, such as Shift, Ctrl, Alt, or
the Windows key, and have it remain active until any other key is pressed.
✓ To enable StickyKeys, select Use StickyKeys. • Click Apply. Click OK.
✓ To disable Sticky Keys, uncheck Use Sticky Keys and then click on Apply > OK.
✓ Press Shift key 5 times to enable it and again 5 times to disable it.
✓ Usually to get capital A we need to press both Shift + A. But with Sticky key enabled, you
can press Shift and leave it and then click on A separately.
FilterKeys
✓ FilterKeys is a feature of Microsoft Windows. It is an accessibility function that tells the
keyboard to ignore brief or repeated keystrokes, making typing easier for people with
hand tremors. To enable Filter Keys, check Use Filter Keys.
✓ Click Settings under Filter Keys and check “Ignore Repeated Keystrokes”.
✓ Click Apply. • Click OK.
ToggleKeys
✓ It is an accessibility function which is designed for people who have vision impairment or
cognitive disabilities.
✓ When ToggleKeys is turned on, computer emits sound cues when the locking keys (Caps
Lock, Num Lock, or Scroll Lock) are pressed.
✓ A high sound is emitted when the keys are switched on and a low sound is emitted when
they are switched off.
✓ To enable ToggleKeys, Check Use ToggleKeys. Click Settings under it. Click Apply. Click
OK. To disable ToggleKeys, uncheck Use ToggleKeys and then click on Apply > OK.
SOUND TAB
The Accessibility Options Sound tab allows you to enable Windows sounds.
SoundSentry
SoundSentry is designed to help users with auditory impairments. It generates visual
warnings, such as a blinking title bar or a flashing border, whenever the computer generates a
sound. To use SoundSentry, click the Use SoundSentry check box. Then choose the kind of
visual warning you want to receive.
ShowSounds
ShowSounds instructs applications that convey information by sound, to also provide
information visually, through text captions or informative icons.
DISPLAY TAB
High Contrast
High Contrast is an accessibility feature to assist people with vision impairment. You can
change the size and color of fonts and the background for ease of viewing.
Cursor Options
✓ Cursor Options is also an accessibility feature that assists people with vision impairment by
changing the blink rate and width of the cursor.
✓ To change the speed of the cursor blink, move the Blink Rate slider back and forth. Notice
the cursor blinking at various speeds.
✓ To change the width of the cursor, move the Width slider back and forth. Notice the with of
the cursor changing.
MOUSE TAB
MouseKeys
MouseKeys is an accessibility feature that assists people who have difficulty using a mouse.
This option uses the keyboard (especially numeric keypad) as a pointing device instead of a
mouse. Use number pad keys for moving mouse pointer after enabling “Use MouseKeys”. Use
number key 4 to move left, 6 to move right, 2 to move down and 8 to move up.
GENERAL TAB
This tab enables you to configure accessibility options for all users. Select the General Tab, a
window to configure additional accessibility options will be displayed
SerialKeys
SerialKeys is an accessibility feature that assists people that have difficulty using a keyboard
or a mouse (or both). They can use special devices such as Sip, Puff and Breath Switches to
provide input to the computer through Serial Ports.
For example, sipping on the tube activates one device, while puffing on the same tube
activates another.
MODEM
Á modem is a device that converts digital computer signals into a form (analog signals) that
can travel over phone lines. It also re-converts the analog signals back into digital signals. The
word modem is derived from its function MOdulator/DEModulator.
Key Features of an instant messaging are as follows: Text Messages can be sent to one or
more person (Similar to SMS), Group Chats, Audio calling , Video calling and conferencing,
File transfers, Message history, Sticker packs, Easy screen sharing
There are some general rules and etiquettes to be followed while chatting.
✓ Messages should be short and to the point.
✓ Always introduce yourself by name if your screen name doesn’t reflect it.
✓ Always ask if the other person has time to chat first.
✓ In a business environment, know exactly what you want to discuss.
✓ Typing your messages in uppercase is extremely rude - it’s considered shouting and very
aggressive.
✓ Give people time to respond.
✓ Wherever possible, give the person you are communicating with your undivided attention.
✓ It’s important to properly end an IM conversation - you may think the chat is over, but the
other person may not.
CHATTING ON GMAIL
You can also use the chatting services after signing into their Gmail Account.
Once you sign into your Gmail account, a contact window will be displayed either on the
left side or the right side within the browser.
If you would like to chat with a contact, double click on the contact’s name.
Now you can start typing the message you want to send and the other contact should be
able to respond to your chat message.
Chatting on Yahoo
Before you start using Yahoo! Messenger, a Yahoo Mail account is required.
You should have a list of contacts that are available for chat. If you don’t have any
contacts, you can add their Yahoo Mail account to your contact list by sending an invite.
Note: If you would like to import your contacts from other sources such as Microsoft
Outlook, Gmail, Hotmail, etc., you can use the import option.
Having used Yahoo! Messenger, now go ahead and chat with your classmates using a
Yahoo mail account through a web browser.
✓ Once you have created a blog, you need to submit content that you want others to view.
This process ids called posting content.
• To create a post, click New Post.
• Title- You must provide a title for your post; choose a tile that this post will focus on. For
example, “School Annual Day Function 2012”.
• Using the rich text box, you can type content that you want others to read.
• Click Publish Post to publish your content.
• To view the post, you can type the blog address in the address bar of the web browser,
you should see your blog along with the post.
• Photos, Videos etc can be added.
• You can comment on posts published by others.
• In the Enter your comment here… text box, type your comments about the post.
• Provide your email and name
• Once you have typed content in comment area, review carefully and Click Post Comment.
• Now you will see the blog along with your comment.
Qumana
▪ Qumana is a free blog application that is simple and easy to use.
▪ It can be downloaded from www.qumana.com.
▪ Once installed, you can use the program to manage blogs.
▪ Users don’t need to have HTML code knowledge in order to render the posts in correct
format.
▪ The posts can be composed and edited without connecting to the internet.
Launching Qumana
• To launch Qumana, Click Start > Programs > Qumana > Qumana.
• You need an existing blog account to use with Qumana.
• Enter your WordPress blog address and Click Next. A login window appears.
• Give the WordPress blog address in the Web address field. Enter the Username and
password of the WordPress account.
• Click Next > Finish.
• If posts are already available in your blog, Qumana will download and display the existing
blogs as well.
• To create a post, Click New Post.
• Note: Enter the title for the post in the Title field and the post content in the area given
below the page title.
• Click Publish Post.
• The post will get automatically updated to your WordPress blog.
• To insert a picture, click on the image icon on the right hand side of the application.
• To view the published content, open the web browser and type your blog address.
OLTP-
• OLTP stands for Online transaction process.
• It is a type of data processing that consists of executing a number of transactions occurring
concurrently—online banking, shopping, order entry, or sending text messages, for
example.
• OLTP captures, stores, and processes data from transactions.
• It is secure and password protected.
• Many protocols & security measures have been adopted to ensure the safe and secure OLTP.
Online Threats
The threats / vulnerabilities that uses www to facilitate crimes are called Online Threats. Like:-
1) Phishing :- The act of acquiring personal / private and sensitive data from personal
computers for use in fraudulent activities. For eg. Mails from unknown persons that ask for
your credit / debit card details.
2) Email spoofing :- It is the creation of email messages with a forged sender address. For eg.
Sending an email with a forged email address which appears to be original. These mails are
infected mails which contain worms.
3) Chat Spoofing:- Spoofing means hoax, trick, or deceive which contains false information.
Hiding / Faking the identity of another person over the internet is called chat spoofing
Secure transactions:
If you are using online shopping or transactions, websites even store your credit card or
online banking personal information.
This info can be tracked and used by un-authorized users often known as hackers to misuse
this information.
Since such information is sent over the network, it is always recommended to use only
secure websites for such transactions.
Verify if the website uses secure transaction; usually it is indicated through a digital
certificate represented as a golden lock in the web browser’s address bar.
▪ Use antivirus and antispyware software: Computers are prone to attacks from Malware
that could harm your computer. These tracks browsing behavior or send personal data from
your computer; programs such as keyloggers could be installed on your computer track and
transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users.
▪ Do not immediately respond to mails from unknown users. It may be a fake mail trying to
gather personal information. NEVER open the attachment from an unknown source.
▪ Clear browser cookies frequently: Cookies are programs that are created on your local
computer when you visit websites. Though cookies are meant for storing data based on your
activity performed during your earlier visit such as logon details, details of a shopping cart,
visited pages in a website, etc. they could also be tracked by unauthorized users and
possibly gain access to your personal information.
▪ Keep the operating system and software applications up to date.
▪ Install firewalls: Firewalls could be software or hardware and can assist in keeping a
computer and a network secure. Firewalls analyze the network traffic and determine if the
traffic should be allowed or not.
▪ Never install software from unknown sources: Verify the source if it is legitimate by
searching the internet or referring to comments from other users before downloading them;
understand the nature and the purpose of the software before attempting to download and
install them.
▪ Remove unwanted or unknown software applications: These might have got installed without
your knowledge when you have visited some websites.
OCCUPATIONAL HAZZARDS
❑ A worker may face Occupational hazards at workplace.
❑ An occupational hazard is the illness one may acquire due to his occupation.
❑ Like people working in a chemical factory may get affected due to presence of certain
chemicals.
❑ Some types of occupational hazards are : Physical hazards, chemical hazards, biological
hazards, , behavioural hazards, radiological hazards, ergonomic hazards etc.
Types of Accidents:
Accidents may be of following types :
- Accidents at workplace : Slips and fall accidents, fire
- Industrial disease/illness
- Road traffic accidents
- Clinical Accidents
- Sports related accidents
Workplace accidents may include injuries that are caused to the workers due to falls, slips
and trips.
Slip and call accidents may occur at any working environment and the injuries may vary
from minor ache to major severe accident.
Some injuries suffered might include fracture, sprain, knee or elbow injury, wrist or head
injuries etc.
Handling Accidents:
Accidents must be handled carefully. The accident should be handled compassionately
without assigning blame on others.
- Every organization must follow SOP for accident handling
- Safety measures must be placed to prevent workplace accidents
- Immediately call the medical team for any injury
- Stay alert
- Pay attention to and follow emergency drills
Emergency :
• Any unexpected situation that needs immediate attention and action.
• An emergency situation might pose a sudden risk to life, property health etc. and needs
intervention to prevent deteriorating results/ hazards.
• An emergency situation is one that:
➢ threatens the employees, customers or the public
➢ disrupts or shuts down the operations
➢ causes physical or environmental damage
Emergencies that require evacuation include:
Fire , Explosion , Floods , Earthquake , Hurricane , Tornado , Toxic material release , Civil
disturbance , Workplace violence
Types of Emergency :
✓ Various types of emergencies are there and there should be an emergency management
plan to handle the situation of emergency. Some of the types of emergencies are as
follows :
✓ - Chemical spills , Extreme heat waves , Droughts , Pandemics , Terrorist attack ,
Fire , Floods , Thunderstorms , Leakage of some hazardous gas/ chemical
✓ Generally the situation of emergency occurs as a result of some disaster. Disaster may be
either natural or caused by some human activity.
✓ Some of the types of emergencies that require evacuation are: Fire , Explosion , Floods
, Earthquake , Hurricane , Tornado , Toxic material release , Civil disturbance ,
Workplace violence
Sources of Hazards
Checklist for Workstations :
The workstation should:
● provide sufficient space for the user to alter position comfortably
● provide adequate lighting
● have windows fitted with adjustable coverings to alter the sunlight level
● be spacious enough when a workstation is shared by more than one person
Workplace Evacuation
In case of emergency there should be provision for evacuation. Evacuation is the process of
emptying a place in case of an emergency, disaster.
Every company must ensure following points for evacuation in case of any emergency:
• An evacuation policy : Every organization must have an evacuation policy. All the Team
Leaders are responsible for informing about the policy to their employees about it.
• Organization must have a designated assembly point for emergencies.
• A ‘buddy system’ for individuals with special needs or disabilities must be designated. This
system ensures that differently-abled are assisted and guided out of the premises or the
impacted area properly.
• Floor plans with evacuation routes in work areas.
• Assembly areas, where you are required to assemble after evacuation, must be properly
taken care of.
• Periodic evacuation drills should be conducted.
Healthy Living
✓ ‘A healthy body has a healthy mind’ - a very popular saying is true .
✓ ‘Healthy Lifestyle leads to a healthy being.
✓ A healthy living has a lasting impact on an individual which ultimately yields a healthy
environment at home as well as at work place. a happy and healthy worker will always
perform best to his ability.
✓ A healthy lifestyle helps to keep and improve people’s health and well being.
✓ A healthy lifestyle includes : healthy eating habits , physical activities , stress management
, healthy mind , sound sleep , goal setting