5. Facebook
Introduced And Purpose
Is It Safe?
Drawbacks
Hackers
How To Prevent?
Finger Prints
How its Work?
DNA
Is it Programming Langusge?
Friday, March 10, 2017 5
7. launched on February 4, 2004. It was founded by Mark Zuckerberg with his
college roommates and fellow Harvard University student Eduardo Savarin.
Mark Zuckerberg created Facebook in his Harvard dorm room.
Friday, March 10, 2017
7
9. Overall, Facebook as a website is a pretty safe
place. There is built-in security that helps to
protect you and your information. One primary
level of security that Facebook uses is
called Secure Socket Layer (SSL).
With all the reports of companies getting
hacked, information being stolen, as well as
the whole personal identity theft issue, you
may be left wondering
whether Facebook is safe to use.
IS FACEBOOK SAFE?
Friday, March 10, 2017
9
10. Phishing is still
the most
popular
method of
hacking
facebook.
Millions of Facebook users
access Facebook through
their mobile phones. In
case the hacker can gain
access to the victims
mobile phone then he can
probably gain access to
his/her Facebook account
Keylogging is the easiest
way to hack a Facebook
password. Keylogging
sometimes can be so
dangerous that even a
person with good
knowledge of computers
can fall for it.
Almost 80% percent people
use stored passwords in their
browser to access the
Facebook. This is quite
convenient, but can
sometimes be extremely
dangerous. Stealer's are
software's specially designed
to capture the saved
passwords stored in the
victims Internet browser.
Drawbacks of
Facebook
Security
Friday, March 10, 2017
10
11. Sometimes a
hacker uses
the Facebook
account to
spread viruses
and spam
Hackers may
also use a
person's
Facebook
account to ask
their Facebook
friends for
money
Hackers also
may hack into
a person's
Facebook
account for
various
reasons
Friday, March 10, 2017 11
12. The latest example of using many people's
Facebook pages to spread viruses was the
various pornographic and violent pictures
that were found on Facebook in November
This break of security caused many users to
fear their vulnerability to more malicious
attacks on the social networking giant in
the future.
Some users deactivated their accounts after
these attacks occurred.
Friday, March 10, 2017 12
13. “The term "biometrics" is derived from
the Greek words "bio" meaning life and
"metric" meaning to measure”.
Friday, March 10, 2017 13
15. Authentication by biometric verification is
becoming increasingly common in corporate and
public security systems, consumer electronics,
and point-of-sale applications.
In addition to security, the driving force behind
biometric verification has been convenience, as
there are no passwords to remember or security
tokens to carry.
eg.
Measuring someone’s gait doesn’t even require a
contact with the person.
16. Fingerprint recognition
refers to the automated method of verifying a match between two
human fingerprints.
Fingerprints are one of many forms of biometrics used to identify
individuals and verify their identity.
17.
18. Scanning process
In this step take the skectech of finger print
Processer
process the skectech and convert into binary code
Storage
Store this binary code in the database
20. Fingerprint
authentication
technology is no
longer going to be
reserved for secret
high clearance
government
facilities – we get to
use fingerprint
clearance for
accessing email,
logging into social
networks like
Facebook or
Twitter, and
anything else that
requires a password.
Finger code Biometric
DNA
Friday, March 10, 2017 20
22. DNA Diagram
DNA is not only a
complex and self-
contained programming
language for life, but also
a pattern representation
system that efficiently
stores massive amounts of
information and provides
built-in mechanisms for
environmental
adaptation.
Friday, March 10, 2017 22
23. From IT point of view the DNA is a
virtual machine with its own machine
code.
The memory addresses contain 2 bits
00,01,10,11 which are named A,G,T,C
(A,G,U,C).
Each 3 memory address build a machine
code instruction, named “codon”. This is
6 bits.
The number of possible instructions 64.
The program begins with an “AUG”
(methionin) entry point, and there are 3
possible exit point. Just like a computer
program. Instructions can create 20
amino acids.
24. IS DNA A PROGRAMMING LANGUAGE?
It has been used once to make a 4-ary arithmetic system,
followed by a very simple computer (see MAYA-II) that
excels at tic-tac-toe.
But it's not a programming language. It's not even actually
an arithmetic system (although it can be used to symbolically
create one).
It's not a program. It's more like a blueprint, where the
positions of the codes represent where to stick amino acids
together to form proteins. The proteins are molecular
machines that perform single tasks.
25. Computers store data in two-valued bits,
grouped as bytes of 7 or more bits (for
ASCII). One byte holds 2^7=128 unique
values.
DNA stores data in four-valued base pairs,
which RNA then groups as codons of 3
pairs. One codon holds 4^3=2^6=64
unique values.
A sequence of base pairs that convey
biological information is called a gene.
DNA includes extra information to express
or suppress specific genes. Each gene has
at least one bit of information for
expression or suppression.
Computer files may be measured in
megabytes or gigabytes: millions or
billions of bytes. One CD-ROM disc may
store about 710 MB. Modern solid-state
memory and disk drives can store
gigabytes.
26. The thing I want to represent is that I want to
prepare an application of finger print
authentication so that our login should require our
fingerprint for safety purpose on fb. The main and
distinguish idea that I want to represent that I want
to made a DNA coding detector sensor so that the
owner of the appliance should already code its DNA
coding sequence in its appliance. Whenever he or
she want to login, the sensor should detect its DNA
sequence code in order to avoid hacking and misuse
of information. If the detected code matched with
the user code, the computer will login automatically
otherwise it will reject the provided code.
Friday, March 10, 2017 26