Monday, April 13, 2009

Microsoft Access Security

In the ever-changing world of computer software and programming, it is only inevitable that malware will also change. It would be convenient if malware never changed, never was updates, was always the same. This would make combating it not only easy but could be done with very little effort what-so-ever. But unfortunately the creators of malware are almost as smart as the creators of anti-malware, so it is an ever changing battle. The three types of malware discussed in the book are phishing, spam, and spyware. (In correction, only one of these is actually malWARE, but I use the term as a general description of any program, device, or scheme used in an attempt to uproot the integrity of a program's or person's security. Basically, scum is scum, no matter how you label it.)

Phishing is a sometimes elaborate scam to steal your identity through the creation of a mock website. For example, a familiar website is altered to look like that the victim is familiar with. The domain name is created using characters from a different language. These are called homographs and are usually sent to the receiver's personal email requesting personal information. Many fall for this because the homograph they are viewing looks identical to the real one. Spam is unsolicited email sent out in mass quantities. The sheer number of spammers out there is mind boggling. Imagine if you got a hundred telemarketing calls a day. Spyware is software that has purpose of collection personal information off of your computer. They piggyback on programs that sound legitimate and then hide in your system. Spyware is closely related to Adware, which upon being downloaded onto your computer it displays numerous pop-up ads and advertisements. This is much like inviting someone into your home that once inside turns out to be a traveling salesman.

Microsoft Office 07 has a feature called the Trust Center which helps to protect you from attached code attacks. The Trust Center checks add-ins for trusted publisher and code locations, and gives you the heads-up if something looks phishy (pun intended). It is always good to activate macro, ActiveX, add-n, and VBA code detection and notification when using Microsoft Office programs, especially when using them on a network. The Trust Center also helps to protect you against homographic attacks by detecting potentially phony domain names and addresses. Basically it's like having your own personal FBI agent inside your computer, but you still have to use wisdom and discretion. Never open emails or download programs that you are unsure about. The Trust Center can do its job well, but if you are consistently opening the door for malware to disrupt your systems integrity it is only inevitable that something phishy will slip through security.

My experience with these types of malware is limited, more of it being from an observational stand point rather than through actual mistakes. I did make the mistake once of cluttering my computer up with adware and spyware, but after cleaning up the mess with anti-malware programs I conceded to learn my lesson and have never had a problem with them again. I’ve seen phishing websites, and they do look very legitimate, but was never foolish enough to fall for them. And who hasn't had to deal with spam. It is the most ridiculous form of advertising known to man. I've taken marketing and sales classes in college and one of the most important things they teach you is that niche marketing has a much greater effect than mass marketing. If you're sending out your spam to 10,000+ email address, this is an example of what will happen: a) 20% of the email addresses will be invalid or inactive, b) 90% of what is left will be automatically sent to the recipient’s junk mail folder and deleted without viewing, c) 80% of what actually reaches an inbox will be deleted without being read, d) of what is even read-either out of curiosity or ignorance-80% will be deleted, e) of those who even look into what you are offering by visiting the link or whatever else you provide, 90% will decide that it is stupid or uninteresting because they aren't in the target niche to begin with. So when taking these percentages and using a hypothetical number of 10,000 email addresses, you would have 3-4 people actually interested (albeit naively) in what you are offering. This is a 0.035% success rate. Not exactly a profitable enterprise is you ask me.

Monday, April 6, 2009

Exporting & Importing with Access

I had fun experimenting with Importing and Exporting data with Access. I didn't have too difficult a time in doing so either, although when exporting data from Access to an html file some of the information did not show up. In this instance it was a graph that I was trying to export. Everything exported fine except for the actual graph, and I'm not exactly sure why.

I found all of these exporting and importing options to be really useful tools. Even though some of them I might never have a use for, it is good to know the usefulness of them and the versatility of the Access program. Attaching a database to an email message would be very useful, especially if you are emailing your boss or a potential client a sample database. You can use several of these tools together. You can import a chart created in Excel into a report on employee productivity created with Access and then export that report as an attachment in an email that you can send to your boss. Or you can import a list of employee contacts from your outlook email program and input them into a table in Access and then import the same Excel productivity chart into a report created with employee contact information. This final report that displays employee contact information along with a productivity chart can be exported into a Word file that can then be printed and handed out to the necessary parties. The possibilities with importing and exporting data are numerous. It is fun to be creative and come up with unique ways of using these tools.

Exporting to HTML files opens up a whole new world of possibilities that I would like to spend more time experimenting with and integrating into my own web development. Any of the above examples could be exported into HTML files that could be uploading via ftp to a web server. This would be useful, for example, if there was a company website that had a page for employee contacts. Through what I learned this week, I could integrate a database on employee information into this website, and then any changes I need to make to this website I could do in the database, rather than having to update the HTML.

Database Integration

Microsoft Access 2007 is a very extensive and versatile program; one of its most useful features being its ability to integrate with the Internet. In this blog I will talk about a few important uses of Access integration, and also a few warnings.

From my research, I found the best use of Access on the Web is for sites that contain data which changes often. The most formidable that comes to mind is an online store with an ever changing product catalog, such as Amazon.com. The inventory on such a site is constantly changing, constantly being added to, subtracted from, or modified. Imagine the tedious work that would be involved in editing such a site through basic HTML (or XHTML). It would be ridiculous. If such a site is driven by a database, making these edits would be much simpler. This integration is made possible through a data access page, which is a webpage that is connected directly to the data in your database. Any changes made in that database will be integrated into your online store via this data access page.

Another big part of online stores, besides the online inventory, is the shopping cart. Access comes in handy when you need to perform calculations or apply some sort of algorithm to the data that affects the way it is presented on your site, which a shopping cart is a prime example of. A database is very useful for the ever-changing environment that an online store calls for. It is easy to see why such sites as Amazon.com or Ebay.com would be reliant on database/Internet integration.

During my research, I also found several warnings concerning the use of database driven websites. While this method is excellent for online inventory and sales, it should not be used for the entire format of your site. Formatting and styling of page layouts is much more difficult on text elements derived from a database. Also, articles should not be stored in a database because all of the formatting necessary for such file types is much more difficult through a database. Large Access databases consume much more server resources than most other file formats. Database connections are also more expensive in terms of time and processing power, and many search engines may not be able to "see" your pages if they are completely database driven.

In conclusion, Access integration with the Internet can be very useful and profitable, but must be used wisely. Use it for what is necessary to ensure the quality of design that you require, but use standard web design for everything else. This will help your website to continue to run proficiently, even if it contains large database files.