4 research outputs found

    Overview on Models and Standards Classification in E-Learning System

    Get PDF
    ABSTRACT E-learning is interface of information technology and educational technology which use of the tools to exchange information electronically and will be done with different models. Increasing access to hardware and software for e-learning, especially development of internet technology, educational institutions should modify education methods. Certainly, e-learning as a new method for teaching and learning has been welcomed in most parts of the world which can have many benefits for teachers, students and organizations. With improve facilities, equipment and infrastructure needed for e-learning can be established training courses at any time and any place and access to training programs and information resources and provided opportunities need to enhance knowledge and learn new skills. To implement and use the benefits of e-learning should recognize models and standards of e-learning. In this paper has been checked the concepts, principles, features, benefits and types of e-learning models and standards classification and instructional design models in the e-learning system

    Activation of the Under-windows Honey pot in Presenting a Factitious Networking

    No full text
    The extending use of the new technologies, the increasing number of the users, and also the increasing amount of the exchanged data between them, will certainly lower the acquaintance level of the personal elements with this virtual world, and this has caused the companies and the personal users ' security to be threatened more and more by extra danger. Security is one of the most complicated and most important current issues of the computer network world. In this study, in addition to discussing honey pot, a new method to enhance the security level has been presented, which has used a kind of honey pot called Honeyed. Our proposed method is that we will be able to actively and regularly change the Honey's presented configuration by an algorithm sketching. We performed our sketched tool in a network with a multi-node windows system and analyzed our study results and outputs. Finally, we will explain that thereby an invader cannot easily find out the network's existing deficiencies and weak points and cannot proceed with the next steps of the invasion
    corecore