Académique Documents
Professionnel Documents
Culture Documents
Internet
1
Internet
It is a huge collection of computer networks
It is of a network of networks.
2
How does the internet works?
3
Dialup connection
It is made by dialing into an Internet service
provider's (ISP) computer
A telephone connection
Modem (external/internal)
Communication software
4
Dialup connection con…
− Advantage
− It is flexible
− Less monthly payment
− Disadvantages
− It is not fast
5
Broad band connection
Advantages
Faster
Disadvantages
Expensive
Not flexible
6
Protocol
− Protocol is common language among devices
to have a common understanding
− It is a formal rule governing the exchange of
information between devices so as to provide
reliable and efficient transfer of information
− Protocol tells how message is addressed and
govern network traffic flow by controlling
priority, routing and sequencing of messages
7
Common protocols
TCP:
Divides the data into packets
Attaches packets with necessary information
to reassemble the data and check for errors.
IP:
It labels all the packets with a header
containing the address of the destination and
sends them on their way.
8
Internet services
− Common internet services are:
− www (World wide web)
− E-mail (Electronic mail)
− FTP(File Transport protocol)
− Telnet
− Internet relay chat(IRC)
− Internet telephony
− Video conference
9
www
Vast collection of document stored on internet
Can contains video, sound, graphics and text
documents
It uses HTML to design a web document
The way the world accessing information on the
internet is as:
The web is not linear
(you can use any link)
The web is rich media internet :
(Video, audio, text documents)
The web is interactive
10
www internet terms
− Web server: is a program and computer which
responds to the request from the web browser
− Webpage : A single page of a web in the internet
− Web browser: is a program allow user to display
and interact with hypertext documents
− Homepage: the first hypertext document to be
shown when a user follows a link to the web server
− HTTP : The protocol used by web to transfer
hypertext documents and other internet resources
11
Uniform Resource Locator(URL)
Question:
What is the difference b/n web server and web browser?
12
~ http://www.Google.com.et (URL)
~ http ~ protocol
~ www ~ Host
~ Google ~ domain
Purpose Country
13
How to surf the web with a Browser
14
E-Mail
− Using e-mail, a user can send and receive mail
15
Basic e-mail terms
From:- sender information
Sent : date of sending
To: To whom the message may concern
CC: Carbon copy
Replay:
Forward:
Inbox: incoming mail
Draft: unfinished e-mail
Trash : deleted messages storage folder
Sent: outgoing mail
16
FTP (File Transfer Protocol):
17
Telnet con…
− Usenet:
− Using Usenet millions of computer users exchange
information on a vast range of topics like e-mail
− Usenet differ from e-mail because of :
− Usenet messages are stored on central computers,
− And users must connect to these computers to read
or download the messages posted to these groups
− In e-mail it is distributed among all mail box
18
Chat & Instant Messaging
Search Engine:
Search engines respond to a user entry, or query, by
searching the lists and displaying a list of documents
that match the search query.
19
Malware(Computer Virus)
20
What is Malware?
− Mal-ware is a combined words of malicious
and software
− It is software designed to damage a computer
system without the owner's agreement
− Malware includes computer
− viruses,
− worms,
− Trojan horses
− spyware,
− adware, and other malicious and unwanted
software.
21
Phases of Malware
Dormancy phase –
This is intended to create a sense of trust in the user.
Propagation phase –
Malwares duplicates itself without making damage.
Triggering phase –
The malware is triggered by some action such as:
Date or a particular number of replications,
A certain sequence of keystroke.
Damaging phase – it is of full destroying phase
Destroying all the data in the computer
Files cannot be stored on it,
transposing characters in a data file
displaying a greeting message on the screen. Etc
22
Common Types of Malware
− There are of Three common types of malware
− Virus
− Worm
− Trojan horse
23
Virus
− A computer virus attaches itself to a program or
file and spread from one computer to another,
leaving infections as it travels.
− It attached to an executable file,
− virus may exist on your computer but it actually
cannot infect your computer unless you run or
open the malicious program.
− Virus cannot be spread without a human action,
24
Virus Category
Macro Viruses:
Attacks Application SW( Ms. Word and excel)
Network virus
Logic Bomb
Compassion virus
.COM and .EXD
Boot sector Virus
Destroy boot sector of hard disk
It widespread through floppy disk (Uncommon today )
Multipartite Viruses
It spread through infected media
usually hide in the memory.
Gradually, the virus moves to the boot sector of the hard
drive 25
Worm
− Worms spread from computer to computer,
− Unlike a virus, it has the capability to travel without
any human action.
− It has a capability to replicate itself on your system,
− Worm consumes too much system memory as a
result , Web servers, network servers and
individual computers will stop responding.
− It Allow malicious users to control your
computer remotely.
− Worm make your computer too slow
26
Trojan horse
At the First glance will appear to be useful software
but will actually do damage once installed or run on
your computer.
Changing your desktop, adding silly active desktop
icons or they can cause serious damage by deleting
files and destroying information on your system.
Trojans are also known to create a backdoor on your
computer that gives malicious users access to your
system, possibly allowing confidential or personal
information to be compromised.
Unlike viruses and worms, Trojans do not reproduce
by infecting other files nor do they self-replicate.
27
Symptoms of an infected computer
28
How to Protect your computer
Use latest updates antivirus .
Use an Internet firewall (Note: Windows XP with SP2 has
a firewall already built-in and active). A firewall is a system
that prevents unauthorized use and access to your computer.
A firewall can be either hardware or software.
Use standard antivirus software and keep it current.
Never open an e-mail attachment from someone you
don't know.
Avoid opening an e-mail attachment from someone you
know, unless you know exactly what the attachment is. The
sender may be unaware that it contains a virus.
If you use Microsoft Office applications, it's a good idea to
keep them updated too.
29
10Q!!!
30