Vous êtes sur la page 1sur 4

Reference Guide on Empowerment Technologies

WELCOME TO THE WORLD OF WORLD WIDE WEB (W3)

I. Brief Historical Background of the WWW

 The World Wide Web (abbreviated WWW or the Web) is an information space where
documents and other web resources are identified by Uniform Resource Locators (URLs),
interlinked by hypertext links, and accessible via the Internet.
 English scientist Tim Berners-Lee invented the World Wide Web in 1989.
 He wrote the first web browser in 1990 while employed at CERN in Switzerland.
 The browser was released outside CERN in 1991, first to other research institutions starting in
January 1991 and to the general public on the Internet in August, 1991.
 World Wide Web has been central to the development of the Information Age and is the
primary tool billions of people use to interact on the Internet.
 Web pages are primarily text documents formatted and annotated with Hypertext Markup
Language (HTML). In addition to formatted text, web pages may contain images, video, audio,
and software components that are rendered in the user's web browser as coherent pages
of multimedia content.
 World Wide Web is a global collection of documents and other resources, linked by hyperlinks
and URIs. Web resources are usually accessed using HTTP, which is one of many Internet
communication protocols.
 World Wide Web (WWW) is combination of all resources and users on the Internet that are
using the Hypertext Transfer Protocol (HTTP).
 A broader definition comes from the World Wide Web Consortium (W3C): "The World Wide
Web is the universe of network-accessible information, an embodiment of human
knowledge."
 The internet is, as its name implies, a network -- a vast, global network that incorporates a
multitude of lesser networks. As such, the internet consists of supporting infrastructure and
other technologies.
 In contrast, the Web is a communications model that, through HTTP, enables the exchange of
information over the internet.
 Berners-Lee developed hypertext, the method of instant cross-referencing that supports
communications on the Web, making it easy to link content on one web page to content
located elsewhere. The introduction of hypertext revolutionized the way people used the
internet.
 In 1989, Berners-Lee began work on the first World Wide Web server at CERN. He called the
server "httpd” and dubbed the first client "WWW.” Originally, WWW was just
a WYSIWYG hypertext browser/editor that ran in the NeXTStep environment. The World Wide
Web has been widely available since 1991.
II. FEATURES OF WEB
 HyperText Information System;
 Cross-Platform;
 Distributed. Approximately 70 million active sites as of December 2007;
 Open Standards and Open Source. TCP/IP, HTTP, HTML, CSS;
 Web Browser: provides a single interface to many services;
 Dynamic, Interactive, Evolving;
 "Web 2.0"

Prepared by: Angelito T. Pera, LPT Page 4 of 6


Reference Guide on Empowerment Technologies
RULES OF NETIQUETTE:
The etiquette guidelines that govern behavior when communicating on the Internet have become
known as netiquette. Netiquette covers not only rules of behavior during discussions but also
guidelines that reflect the unique electronic nature of the medium. According to Shea's (2004) online
book, Netiquette are as presented below, viz:
1. Identify yourself: Begin messages with a salutation and end them with your name.
2. Include a subject line. Give a descriptive phrase in the subject line of the message header that
tells the topic of the message (not just "Hi, there!").
3. Avoid sarcasm. People who don't know you may misinterpret its meaning.
4. Respect others' privacy. Do not quote or forward personal email without the original author's
permission.
5. Acknowledge and return messages promptly.
6. Copy with caution. Don't copy everyone you know on each message.
7. No spam (a.k.a. junk mail). Don't contribute to worthless information on the Internet by sending
or responding to mass postings of chain letters, rumors, etc.
8. Be concise. Keep messages concise—about one screen, as a rule of thumb.
9. Use appropriate language: Avoid coarse, rough, or rude language. Observe good grammar and
spelling.
10. Use appropriate emoticons (emotion icons) to help convey meaning. Use "smiley's" or
punctuation such as :-) to convey emotions.
11. Use appropriate intensifiers to help convey meaning. Avoid "flaming" (online "screaming") or
sentences typed in all caps, Use asterisks surrounding words to indicate italics used for emphasis
(*at last*), Use words in brackets, such as (grin), to show a state of mind and Use common
acronyms (e.g., LOL for "laugh out loud").
ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE
 Internet is defined as the information superhighway. This means that anyone has access to this
highway, can place info, and can grab that info.
 Types of Information with Risk: Mother’s and Father’s name, Sibling’s Name, Address, Home
Add, Phone Number, Birthday, Email Address and Cellphone Number
Some Tips to Stay Safe Online:
1. Be mindful on what you share online.
2. Do not just accept terms and conditions, read it.
3. Do not share your password with anyone.
4. Do not talk to strangers whether online or face-to- face.
5. Never post anything about a future vacation.
6. Add friends you know in real life.
7. Avoid visiting untrusted websites.
8. If you have WiFi at home, make it private by adding a password.
9. Install and update an antivirus software on your computer, viz:, BitDefender, ESET NOD32, F-
Secure, Kaspersky, Norton, AVAST and SMADAV1

Prepared by: Angelito T. Pera, LPT Page 5 of 6


Reference Guide on Empowerment Technologies
10. Avoid downloading anything from untrusted websites.
11. Buy the software, do not use pirated ones.
12. Do not reply or click links from suspicious emails.
INTERNET THREATS
1. Malware – stands for malicious software
a. Virus – is a malicious program designed to replicate itself and transfer from one computer to
another (internet, local networks, FDs, CDs, etc.)
b. Worm – is a malicious program that transfers from one computer to another by any types of
means. Ex. ILOVEYOU Worm
c. Trojan – is a malicious program that disguises as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.
d. Spyware – is a program that runs in the background without you knowing it (thus called “spy”). It
has the ability to monitor what you are currently doing and typing through keylogging.
e. Adware – is a program designed to send you advertisements, mostly as pop-ups.
2. Spam – is an unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing – is an unwanted acquisition of sensitive personal information like passwords and credit
card details.
4. Botnet – is a group of compromised computer connected to a network ("zombie")
5. Denial of Service Attack - disrupts computer access to internet services
UNCLASSIFIED INTERNET THREATS:
6. Distributed denial-of-service (DDoS) attack: or DDoS attack: It is when a malicious user gets a
network of zombie computers to sabotage a specific website or server.
7.Hacking: It is a term used to describe actions taken by someone to gain unauthorized access to a
computer.
8.Ransomware: It is a type of malware that restricts access to your computer or your files and
displays a message that demands payment in order for the restriction to be removed.
9.Spoofing: This technique is often used in conjunction with phishing in an attempt to steal your
information.
10. WPA2 Handshake Vulnerabilities: The Key reinstallation attack (or Krack) vulnerability allows a
malicious actor to read encrypted network traffic on a Wi-Fi Protected Access II (WPA2) router and
send traffic back to the network.
PROTECTING REPUTATIONS ONLINE
Here are some actions you can take right now to protect your online reputation in 2017:
1. Clean up your current situation;
2. Registering your name as a domain;
3. Secure your name across all social platforms;
4. Publish regular content;
5. Get active on social media;
6. Claim and verify your Google listing;
7. Manage online reviews.

Prepared by: Angelito T. Pera, LPT Page 6 of 6


Reference Guide on Empowerment Technologies

Prepared by: Angelito T. Pera, LPT Page 7 of 6

Vous aimerez peut-être aussi