Slide 1 - Department of Computer Science and Engineering
-
Upload
dominque23 -
Category
Technology
-
view
1.645 -
download
0
description
Transcript of Slide 1 - Department of Computer Science and Engineering
![Page 1: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/1.jpg)
The Internet & the The Internet & the World Wide WebWorld Wide Web
Exploring CyberspaceExploring Cyberspace–Connecting to the InternetConnecting to the Internet–How Does the Internet work?How Does the Internet work?–The World Wide WebThe World Wide Web–Email & Other Ways of Communicating Email & Other Ways of Communicating over the Netover the Net–Telephony, Multimedia, Webcasting, Telephony, Multimedia, Webcasting, Blogs, E-CommerceBlogs, E-Commerce–Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & SpywarePharming, Cookies, & Spyware
Chapte
r
![Page 2: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/2.jpg)
22
Connecting to the InternetConnecting to the Internet Internet HistoryInternet History
– Began with 1969’s ARPANET for US Dept. of Began with 1969’s ARPANET for US Dept. of DefenseDefense
– 62 computers in 197462 computers in 1974– 500 computers in 1983500 computers in 1983– 28,000 computers in 198728,000 computers in 1987– Early 1990s, multimedia became available on Early 1990s, multimedia became available on
internetinternet To connect you needTo connect you need
– An access device (computer)An access device (computer)– A means of connection (phone line, cable hookup, A means of connection (phone line, cable hookup,
or wireless)or wireless)– An Internet Service Provider (ISP)An Internet Service Provider (ISP)
![Page 3: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/3.jpg)
33
Connecting to the InternetConnecting to the Internet
Definition: Definition: BandwidthBandwidth is an expression of how is an expression of how much data – text, voice, video and so on – can much data – text, voice, video and so on – can be sent through a communications channel in a be sent through a communications channel in a given amount of time.given amount of time.
Definition: Definition: BasebandBaseband is a slow type of connection is a slow type of connection that allows only one signal to be transmitted at that allows only one signal to be transmitted at a time.a time.
Definition: Definition: BroadbandBroadband is a high speed connection is a high speed connection that allows several signals to be transmitted at that allows several signals to be transmitted at once.once.
![Page 4: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/4.jpg)
44
Connecting to the InternetConnecting to the Internet
Data Transmission SpeedsData Transmission Speeds– Originally measured in bits per second (bps) Originally measured in bits per second (bps) – 8 bits are needed to send one character, such as 8 bits are needed to send one character, such as AA
or or aa– Currently measured in kilobits per second (Kbps)Currently measured in kilobits per second (Kbps)– Kilo-Kilo- stands for a thousand stands for a thousand– A 28.8 Kbps modem sends 28,800 bits per secondA 28.8 Kbps modem sends 28,800 bits per second– How many characters per second would that be?How many characters per second would that be?
– Mbps connections send 1 million bits per secondMbps connections send 1 million bits per second– Gbps connections send 1 billion bits per secondGbps connections send 1 billion bits per second
28,800 / 8 = 3600 characters per second
![Page 5: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/5.jpg)
55
Connecting to the InternetConnecting to the Internet
ModemsModems– Can be either internal or external to your PCCan be either internal or external to your PC– Most ISPs offer local access numbersMost ISPs offer local access numbers– Need call waiting turned off; either manually or in Need call waiting turned off; either manually or in
WindowsWindows High-speed phone linesHigh-speed phone lines
– ISDN lineISDN line– DSL lineDSL line
Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G
![Page 6: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/6.jpg)
66
Connecting to the InternetConnecting to the Internet ModemsModems High-speed phone linesHigh-speed phone lines
– ISDN lineISDN line Integrated Services Digital NetworkIntegrated Services Digital Network Allows voice, video, & data transmission over copper phone Allows voice, video, & data transmission over copper phone
lineslines Can transmit 64 to 128 KbpsCan transmit 64 to 128 Kbps
– DSL lineDSL line Uses regular phone lines, DSL modemUses regular phone lines, DSL modem Receives data at 1.5-9 Mbps; sends at 128Kbps – 1.5 MbpsReceives data at 1.5-9 Mbps; sends at 128Kbps – 1.5 Mbps Is always onIs always on
Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G
![Page 7: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/7.jpg)
77
Connecting to the InternetConnecting to the Internet ModemsModems
28.8 Kbps takes 4 3/4 hours to download 6 minute video28.8 Kbps takes 4 3/4 hours to download 6 minute video High-speed phone linesHigh-speed phone lines
– ISDN lineISDN line 1 hour to download 6 minute video1 hour to download 6 minute video
– DSL lineDSL line 11 minutes to download 6 minute video11 minutes to download 6 minute video
Cable ModemsCable Modems– Connects the PC to a cable-TV systemConnects the PC to a cable-TV system
2 minutes to download a 2 minute video2 minutes to download a 2 minute video SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G
![Page 8: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/8.jpg)
88
Connecting to the InternetConnecting to the Internet
ModemsModems High-speed phone linesHigh-speed phone lines
– ISDN lineISDN line– DSL lineDSL line
Cable ModemsCable Modems SatelliteSatellite
– Always-on connection using satellite dish to satellite Always-on connection using satellite dish to satellite orbiting earthorbiting earth
– Send data at 56 – 500 Kbps; receive at 1.5 MbpsSend data at 56 – 500 Kbps; receive at 1.5 Mbps
Wi-Fi & 3GWi-Fi & 3G
![Page 9: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/9.jpg)
99
Connecting to the InternetConnecting to the Internet ModemsModems High-speed phone linesHigh-speed phone lines
– ISDN lineISDN line– DSL lineDSL line
Cable ModemsCable Modems SatelliteSatellite Wi-Fi & 3GWi-Fi & 3G
– Wi-Fi Wi-Fi Name for a set of wireless standards set by IEEEName for a set of wireless standards set by IEEE Typically used with laptops that have Wi-Fi hardwareTypically used with laptops that have Wi-Fi hardware
– 3G3G High-speed wireless that does not need access pointsHigh-speed wireless that does not need access points Uses cell phonesUses cell phones
![Page 10: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/10.jpg)
1010
Connecting to the InternetConnecting to the Internet
Internet Access ProvidersInternet Access Providers– Internet Service Providers (ISP)Internet Service Providers (ISP)
Local, regional, or national organization that Local, regional, or national organization that provides internet accessprovides internet access
Examples: AT&T Worldnet, EarthLinkExamples: AT&T Worldnet, EarthLink
– Commercial Online ServiceCommercial Online Service A members-only company that provides A members-only company that provides
specialized content and internet accessspecialized content and internet access Examples: AOL, MSNExamples: AOL, MSN
– Wireless Internet Service ProvidersWireless Internet Service Providers
![Page 11: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/11.jpg)
1111
Connecting to the InternetConnecting to the Internet
Internet Access ProvidersInternet Access Providers Commercial Online ServiceCommercial Online Service Wireless Internet Service ProvidersWireless Internet Service Providers
– Internet Access for laptops, notebooks, Internet Access for laptops, notebooks, smartphones, PDA userssmartphones, PDA users
– These devices contain wireless modemsThese devices contain wireless modems– Examples: AT&T Wireless, Verizon Wireless, Examples: AT&T Wireless, Verizon Wireless,
Earthlink Net ZeroEarthlink Net Zero
![Page 12: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/12.jpg)
1212
How Does the Internet Work?How Does the Internet Work?
ProtocolsProtocols– The set of rules a computer follows to The set of rules a computer follows to
electronically transmit data.electronically transmit data.– TCP/IP is the internet protocolTCP/IP is the internet protocol
Developed in 1978Developed in 1978 Used for all internet transactionsUsed for all internet transactions
PacketsPackets– Fixed-length blocks of data for transmissionFixed-length blocks of data for transmission– Data transmissions are broken up into Data transmissions are broken up into
packetspackets
![Page 13: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/13.jpg)
1313
How Does the Internet Work?How Does the Internet Work? IP AddressesIP Addresses
– Every device connected to the internet has Every device connected to the internet has an addressan address
– Each IP address uniquely identifies that Each IP address uniquely identifies that devicedevice
– The address is four sets of 3-digit numbers The address is four sets of 3-digit numbers separated by periodsseparated by periods Example: 95.160.10.240Example: 95.160.10.240 Each number is between 0 and 255Each number is between 0 and 255 Static IP addresses don’t changeStatic IP addresses don’t change Dynamic IP addresses change each sessionDynamic IP addresses change each session Since addresses are limited, and most PCs are Since addresses are limited, and most PCs are
not connected a lot of the time, dynamic not connected a lot of the time, dynamic addresses are commonaddresses are common
![Page 14: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/14.jpg)
1414
How Does the Internet Work?How Does the Internet Work? Domain namesDomain names
– Must be uniqueMust be unique– Identify the website, and the type of site it isIdentify the website, and the type of site it is
www.whitehouse.govwww.whitehouse.gov is NOT the same as is NOT the same as www.whitehouse.orgwww.whitehouse.org
.gov means government.gov means government .org means professional or nonprofit organization.org means professional or nonprofit organization
DNS (Domain Name System)DNS (Domain Name System)– A distributed set of serversA distributed set of servers– Provides the mapping between the IP addresses Provides the mapping between the IP addresses
and domain namesand domain names– Domain names must be registered to ensure Domain names must be registered to ensure
uniquenessuniqueness– Requires static IP addressRequires static IP address
![Page 15: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/15.jpg)
1515
How Does the Internet Work?How Does the Internet Work?
The board of trustees of the Internet Society The board of trustees of the Internet Society (ISOC) oversees the standards(ISOC) oversees the standards
Internet Corporation for Assigned Names and Internet Corporation for Assigned Names and Numbers (ICANN) regulates domain namesNumbers (ICANN) regulates domain names
American Registry for Internet Numbers American Registry for Internet Numbers (ARINN) administers the unique IP addresses for (ARINN) administers the unique IP addresses for North & South America, Caribbean, and sub-North & South America, Caribbean, and sub-Saharan AfricaSaharan Africa
Two other organizations administer the unique Two other organizations administer the unique IP addresses for Europe and the Asia-Pacific IP addresses for Europe and the Asia-Pacific regionregion
![Page 16: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/16.jpg)
1616
The World Wide WebThe World Wide Web
Web BrowsersWeb Browsers– Software for web-surfingSoftware for web-surfing– Examples: Internet Explorer, Netscape Navigator, Examples: Internet Explorer, Netscape Navigator,
Mozilla FireFox, Opera, SafariMozilla FireFox, Opera, Safari Practical Browser ToolsPractical Browser Tools
– Status Bar: security info, page load progressStatus Bar: security info, page load progress– Favorites (bookmarks): shortcuts to frequently Favorites (bookmarks): shortcuts to frequently
visited sitesvisited sites– View > Source: view the code of a web pageView > Source: view the code of a web page– History: tracks your recent browser activityHistory: tracks your recent browser activity– Clear History/Cache: protect your privacyClear History/Cache: protect your privacy
![Page 17: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/17.jpg)
1717
The World Wide WebThe World Wide Web
WebsiteWebsite– The location of a particular computer that The location of a particular computer that
has a unique addresshas a unique address Web PagesWeb Pages
– The documents and files on a websiteThe documents and files on a website– Can include text, pictures, sound, and videoCan include text, pictures, sound, and video
Home pageHome page– The main entry point for the website The main entry point for the website
(index.html)(index.html)– Contains links to other pages on the Contains links to other pages on the
websitewebsite
![Page 18: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/18.jpg)
1818
The World Wide WebThe World Wide Web Uniform Resource Locator (URL)Uniform Resource Locator (URL)
– A character string that points to a specific piece of A character string that points to a specific piece of information anywhere on the webinformation anywhere on the web
– A website’s unique addressA website’s unique address– It consists ofIt consists of
The web protocol, httpThe web protocol, http The domain name of the web serverThe domain name of the web server The directory or folder on that serverThe directory or folder on that server The file within the directory, including optional The file within the directory, including optional
extensionextension http://http://www.nps.govwww.nps.gov//yoseyose//home.htmhome.htm
protocol domain name file name . extensiondirectory
![Page 19: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/19.jpg)
1919
The World Wide WebThe World Wide Web Web portalsWeb portals
– A gateway website that offers a broad array A gateway website that offers a broad array of resources and services, online shopping of resources and services, online shopping malls, email support, community forums, malls, email support, community forums, stock quotes, travel info, and links to other stock quotes, travel info, and links to other categories.categories.
– Examples: Yahoo, AOL, Microsoft Network Examples: Yahoo, AOL, Microsoft Network (MSN), Lycos, or Google(MSN), Lycos, or Google
– Most require you to log in, so you canMost require you to log in, so you can Check the home page for general informationCheck the home page for general information Use the subject guide to find a topic you wantUse the subject guide to find a topic you want Use a keyword to search for a topicUse a keyword to search for a topic
![Page 20: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/20.jpg)
2020
The World Wide WebThe World Wide Web Search Services (Search Engines)Search Services (Search Engines)
– Organizations that maintain databases accessible Organizations that maintain databases accessible through websites to help you find information on through websites to help you find information on the internetthe internet
– Examples: Yahoo Search, MSN, Google and Ask Examples: Yahoo Search, MSN, Google and Ask JeevesJeeves
– Databases are compiled using software programs Databases are compiled using software programs called spiderscalled spiders Spiders crawl through the World Wide WebSpiders crawl through the World Wide Web Follow links from one page to anotherFollow links from one page to another Index the words on that siteIndex the words on that site
– Only a snapshot of the InternetOnly a snapshot of the Internet– Does not cover the entire WebDoes not cover the entire Web– Search engines differ in resultsSearch engines differ in results
![Page 21: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/21.jpg)
2121
The World Wide WebThe World Wide Web 4 web search tools4 web search tools
– Keyword IndexesKeyword Indexes Type one or more search keywords, and you see Type one or more search keywords, and you see
web pages “hits” that contain those wordsweb pages “hits” that contain those words For phrases with two or more words, put phrase For phrases with two or more words, put phrase
in quotesin quotes Examples are Google, Gigablast, HotBot, MSN Examples are Google, Gigablast, HotBot, MSN
Search, Yahoo SearchSearch, Yahoo Search Google Resume (get results for your own name)Google Resume (get results for your own name)
– Subject DirectoriesSubject Directories Search by selecting lists of categories or topicsSearch by selecting lists of categories or topics Example sites are Beaucoup, Galaxy, LookSmart, Example sites are Beaucoup, Galaxy, LookSmart,
MSN Directory, Netscape, Open Directory Project, MSN Directory, Netscape, Open Directory Project, YahooYahoo
– Metasearch EnginesMetasearch Engines– Specialized Search EnginesSpecialized Search Engines
![Page 22: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/22.jpg)
2222
The World Wide WebThe World Wide Web 4 web search tools4 web search tools
– Keyword IndexesKeyword Indexes– Subject DirectoriesSubject Directories– Metasearch EnginesMetasearch Engines
Allows you to search several search engines Allows you to search several search engines simultaneouslysimultaneously
Examples are Dogpile, Ixquick, Mamma, Examples are Dogpile, Ixquick, Mamma, MetaCrawler, ProFusion, Search, VivisimoMetaCrawler, ProFusion, Search, Vivisimo
– Specialized Search EnginesSpecialized Search Engines Help locate specialized subject matter, like info Help locate specialized subject matter, like info
on movies, health, jobs, blogson movies, health, jobs, blogs Examples are Career.com (jobs), Expedia Examples are Career.com (jobs), Expedia
(travel), Internet Movie Database (movies), (travel), Internet Movie Database (movies), Technorati (blogs)Technorati (blogs)
![Page 23: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/23.jpg)
2323
The World Wide WebThe World Wide Web
Should you trust information you find Should you trust information you find online?online?
There is no central authority that verifies There is no central authority that verifies all web sitesall web sites
Guidelines to evaluate Web ResourcesGuidelines to evaluate Web Resources– Does the information appear on a Does the information appear on a
professional site maintained by a professional site maintained by a professional organization?professional organization?
– Does the website authority appear to be Does the website authority appear to be legitimate?legitimate?
– Is the website objective, complete, and Is the website objective, complete, and current?current?
![Page 24: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/24.jpg)
2424
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net
Email ProgramEmail Program– Enables you to send email by running email Enables you to send email by running email
software on your computer that interacts with an software on your computer that interacts with an email server at your ISPemail server at your ISP
– Incoming mail is stored on the server in an Incoming mail is stored on the server in an electronic mailboxelectronic mailbox
– Upon access, mail is sent to your client’s inboxUpon access, mail is sent to your client’s inbox– Simple Mail Transport Protocol (SMTP) is for Simple Mail Transport Protocol (SMTP) is for
sending, Post Office Protocol v3 (POP3) or Internet sending, Post Office Protocol v3 (POP3) or Internet Message Access Protocol (IMAP) is for retrievingMessage Access Protocol (IMAP) is for retrieving
– Examples: Microsoft’s Outlook Express, Netscape’s Examples: Microsoft’s Outlook Express, Netscape’s Mail, Apple Computer’s Apple Mail, QualComm’s Mail, Apple Computer’s Apple Mail, QualComm’s EudoraEudora
![Page 25: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/25.jpg)
2525
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Web-based EmailWeb-based Email
– You send and receive messages by You send and receive messages by interacting via a browser with a websiteinteracting via a browser with a website
– Advantage: You can easily send and receive Advantage: You can easily send and receive messages while travelingmessages while traveling
– Disadvantage: Not as many features as an Disadvantage: Not as many features as an Email ProgramEmail Program
– Examples: Yahoo! Mail, Hotmail, GMailExamples: Yahoo! Mail, Hotmail, GMail
![Page 26: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/26.jpg)
2626
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net ListservListserv
– An email-based discussion groupAn email-based discussion group– Uses an automatic mailing-list server that sends Uses an automatic mailing-list server that sends
email to subscribers on selected topicsemail to subscribers on selected topics
NewsgroupsNewsgroups– A giant electronic discussion boardA giant electronic discussion board– There are thousands of free internet newsgroupsThere are thousands of free internet newsgroups– Usenet is the worldwide public network of servers Usenet is the worldwide public network of servers
on the internet on the internet www.usenet.comwww.usenet.com – To participate you need a newsreaderTo participate you need a newsreader
![Page 27: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/27.jpg)
2727
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Instant MessagingInstant Messaging
– Any user on a given email system can send a Any user on a given email system can send a message and have it pop up instantly on the screen message and have it pop up instantly on the screen of anyone logged into that systemof anyone logged into that system
– Presence – Displays your online status to other Presence – Displays your online status to other usersusers
– Examples: AOL Instant Messenger, MSN Messenger, Examples: AOL Instant Messenger, MSN Messenger, ICQ, AT&T IM Anywhere, Yahoo MessengerICQ, AT&T IM Anywhere, Yahoo Messenger
– Not all IM systems interoperate (work together)Not all IM systems interoperate (work together)– To get it, you:To get it, you:
download the software download the software connect to the internetconnect to the internet register with the serviceregister with the service
![Page 28: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/28.jpg)
2828
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net Real-Time Chat (RTC)Real-Time Chat (RTC)
– Participants have a typed discussion while online at Participants have a typed discussion while online at the same timethe same time
– Example: Internet Relay ChatExample: Internet Relay Chat– IM is one-on-one, but RTC has a list of participantsIM is one-on-one, but RTC has a list of participants
Netiquette – appropriate online behaviorNetiquette – appropriate online behavior– Before you ask a question, consult the FAQBefore you ask a question, consult the FAQ– Avoid Avoid flamingflaming– Don’t SHOUT – using all capital lettersDon’t SHOUT – using all capital letters– Be careful with jokesBe careful with jokes– Don’t send huge file attachments unless requestedDon’t send huge file attachments unless requested
![Page 29: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/29.jpg)
2929
Email & Other Ways of Email & Other Ways of Communicating over the NetCommunicating over the Net FTP – File Transfer ProtocolFTP – File Transfer Protocol
– A software standard for transferring files between A software standard for transferring files between computers with different Operating Systemscomputers with different Operating Systems Microsoft Windows Microsoft Windows Linux Linux Unix Unix Macintosh OS, and so forth Macintosh OS, and so forth
– You can transfer files from an FTP site on the You can transfer files from an FTP site on the internet to your PCinternet to your PC
– Know your FTP site! Know your FTP site! If the FTP site is offering copyrighted material such as If the FTP site is offering copyrighted material such as
music and movies for free, you are breaking US law if music and movies for free, you are breaking US law if you download files!you download files!
You may also get a virus or spyware on your PC from You may also get a virus or spyware on your PC from themthem
![Page 30: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/30.jpg)
3030
Telephony, RSS, Webcasting, Telephony, RSS, Webcasting, Blogs, WikisBlogs, Wikis Internet Telephony (VoIP)Internet Telephony (VoIP)
– Uses the internet to make phone callsUses the internet to make phone calls– Long-distance calls are either very inexpensive or Long-distance calls are either very inexpensive or
freefree With no PC, dial a special phone number to packetize With no PC, dial a special phone number to packetize
your callyour call With a PC that has a sound card, microphone, Internet With a PC that has a sound card, microphone, Internet
connection, and internet telephone software such as connection, and internet telephone software such as Skype, Google Talk or Microsoft NetMeetingSkype, Google Talk or Microsoft NetMeeting
– Currently inferior in quality to normal phone Currently inferior in quality to normal phone connectionsconnections
– Often bundles videoconferencingOften bundles videoconferencing– Providers include: Vonage, Verizon, Skype, etc.Providers include: Vonage, Verizon, Skype, etc.
![Page 31: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/31.jpg)
3131
Telephony, RSS, Webcasting, Telephony, RSS, Webcasting, Blogs, WikisBlogs, Wikis
RSS newsreadersRSS newsreaders– Programs or Websites that scour the web and pull together Programs or Websites that scour the web and pull together
“feeds” from several websites to one place“feeds” from several websites to one place BlogBlog
– Short for web log, a diary-style web pageShort for web log, a diary-style web page– Have become popular, both privately and in politicsHave become popular, both privately and in politics
Podcasting / VideocastingPodcasting / Videocasting– Recording internet radio or similar internet audio programsRecording internet radio or similar internet audio programs– Some radio stations webcast their audio programs over the Some radio stations webcast their audio programs over the
internetinternet– Example: iTunes, podcast.net, odeo.com, youtube.com, Google Example: iTunes, podcast.net, odeo.com, youtube.com, Google
VideoVideo WikisWikis
– A website on which authoring and editing can be done by A website on which authoring and editing can be done by anyone at anytime using a simple browser.anyone at anytime using a simple browser.
– Example: www.wikipedia.orgExample: www.wikipedia.org
![Page 32: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/32.jpg)
3232
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware The internet was founded as a The internet was founded as a
collaborative tool based on trustcollaborative tool based on trust Not everyone on the internet is honestNot everyone on the internet is honest SnoopingSnooping
– Email is not privateEmail is not private Corporate management has the right to view Corporate management has the right to view
employees’ emailemployees’ email Email that travels over the internet may be Email that travels over the internet may be
captured and monitored and read by someone captured and monitored and read by someone elseelse
Not all ISPs protect their customers’ privacyNot all ISPs protect their customers’ privacy
![Page 33: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/33.jpg)
3333
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware Spam: Electronic Junk MailSpam: Electronic Junk Mail
– Unsolicited email that takes up your time and may Unsolicited email that takes up your time and may carry viruses or spywarecarry viruses or spyware
– Delete it without opening the messageDelete it without opening the message– Never reply to a spam messageNever reply to a spam message– When you sign up for something, don’t give your When you sign up for something, don’t give your
email addressemail address– Use spam filtersUse spam filters– Fight back by reporting new spammers to Fight back by reporting new spammers to
www.abuse.netwww.abuse.net or or www.spamhaus.orgwww.spamhaus.org or or www.rahul.net/falkwww.rahul.net/falk
![Page 34: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/34.jpg)
3434
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware SpoofingSpoofing
– Using fake email sender names so the message Using fake email sender names so the message appears to be from a different source, so you will appears to be from a different source, so you will trust it.trust it.
– If you don’t know the sender, don’t open it.If you don’t know the sender, don’t open it. PhishingPhishing
– Using trusted institutional names to elicit Using trusted institutional names to elicit confidential informationconfidential information
– Some common schemes look like they are from Some common schemes look like they are from your bank or from eBay and ask you to “update” your bank or from eBay and ask you to “update” your account. your account.
– Don’t do it – the legitimate company already knows Don’t do it – the legitimate company already knows your account information!your account information!
– If you want to update your information, CALL the If you want to update your information, CALL the number in the phone book, not the number in the number in the phone book, not the number in the email!email!
![Page 35: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/35.jpg)
3535
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware PharmingPharming
– Redirecting you to an imposter web page.Redirecting you to an imposter web page.– Thieves implant malicious software on your PCThieves implant malicious software on your PC– Redirects you to an imposter web page even when Redirects you to an imposter web page even when
you type the correct URL!you type the correct URL!– To foil it, type the URL with https first (for http To foil it, type the URL with https first (for http
secure)secure)
https://www.microsoft.comhttps://www.microsoft.com Use this one with https, Use this one with https, notnot
http://www.microsoft.comhttp://www.microsoft.com Since it has http, it could Since it has http, it could be spoofedbe spoofed
![Page 36: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/36.jpg)
3636
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware CookiesCookies
– Little text files left on your hard disk by some Little text files left on your hard disk by some websites you visitwebsites you visit
– Can include your log-in name, password, and Can include your log-in name, password, and browser preferencesbrowser preferences
– Can be convenientCan be convenient– But they can be used to gather information about But they can be used to gather information about
you and your browsing habitsyou and your browsing habits ““Third party” cookies: used by advertising companies Third party” cookies: used by advertising companies
to track users across multiple sitesto track users across multiple sites People share machinesPeople share machines Cookie theft & modificationCookie theft & modification
![Page 37: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/37.jpg)
3737
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware SpywareSpyware
– Applications that download without your Applications that download without your knowledgeknowledge
– They hide on your PC and capture They hide on your PC and capture information about what is on the PC and information about what is on the PC and what you are doingwhat you are doing
– That information is then transmitted to the That information is then transmitted to the spyware master’s website on the internetspyware master’s website on the internet
– Information may be used against you to Information may be used against you to steal your identity, get credit cards in your steal your identity, get credit cards in your name, or for other crimesname, or for other crimes
![Page 38: Slide 1 - Department of Computer Science and Engineering](https://reader033.fdocuments.in/reader033/viewer/2022061216/54b262044a7959ed1f8b4586/html5/thumbnails/38.jpg)
3838
Snooping, Spoofing, Phishing, Snooping, Spoofing, Phishing, Pharming, Cookies, & Pharming, Cookies, & SpywareSpyware Spyware (continued)Spyware (continued)
– To prevent spyware, you must install and To prevent spyware, you must install and use “Antispyware software” at all timesuse “Antispyware software” at all times
– Examples: Ad Aware, AntiSpyware, Spybot Examples: Ad Aware, AntiSpyware, Spybot Search & Destroy, Pest Patrol, SpyCatcher, Search & Destroy, Pest Patrol, SpyCatcher, Yahoo toolbar with Anti-SpyYahoo toolbar with Anti-Spy
– Be careful about free and illegal downloads Be careful about free and illegal downloads since they are a source of spywaresince they are a source of spyware
– Don’t say “I agree” when you are Don’t say “I agree” when you are downloading something – read the fine downloading something – read the fine printprint
– Beware of unsolicited downloadsBeware of unsolicited downloads