Pages

Monday 5 April 2021

CYBER HYGIENE

 

CYBER HYGIENE

INTERNET THREATS:

            There are a lot of dangers that pose clear threats to internet users and they seem to get more dangerous every day. There are various threats which cause damage to your computer, and even to networked computers.

 

Types of Internet Threats:

  • Viruses.
  • Network worms.
  • Trojans.
  • Spyware/Adware.
  • Other Malware.
  • Other Threats.

A virus is a program that replicates itself, usually by attaching itself to other files and program. A worm is a program that does not infect other programs but makes copies of itself. Trojan horse programs do not replicate nor make copies of themselves, by rely on other "Manual" method of distribution. Viruses are spread in a variety of ways.

SOME EXAMPLES:

  • E-mail attachments.
  • Instant Messages links and attachments.
  • Compromised web services.
  • Usenet News groups.
  • Internets relay chat channels.
  • Floppy diskettes.
  • File downloads.

DETECTING THREATS:

  • Show computer, system reboots.
  • Mouse moves itself.
  • Browse goes to unexpected websites.
  • Slow internet access.
  • Endless popup ads.
  • New desktop tools bars.

PROTECTION OF COMPUTER FROM CYBER ATTACKS:

  1. Keep your firewall turned on.
  2. Keep all your software and your operating system up-to date.
  3. Keep your antivirus software up to date.
  4. Keep your Antispyware technology up to date Anti-Virus program.

ANTI-VIRUS: An antivirus program is designed to protect your computer from possible viruses infection. Most viruses are designed to operate in the background that the user will not notice. Virus protection program search for, detect, and attempt to remove these viruses. Anti-virus program must be kept up to date in order for them to provide adequate protection.

 

INSTALLING SYMANTEC ANTIVIRUS 8.1:

ü  Exit other programs, already exiting antivirus software's on your computer.

ü  Double click the "Symantec 8.1 - setup.exe" installer.

ü  The installation window, labeled "Symantec antivirus client setup" will open, click next to proceed.

ü  Read the license agreement and click on "I accept the terms of the license agreement" and click Next button.

ü  You will be given the option to install snap-ins for checking e-mail. "Do not check either of the snap-ins" click Next.

ü  You will be given an option to install either the Managed (or) unmanaged version of Symantec Anti-Virus, click "Unmanaged" then click next.

ü  Check on "Run live update" and click Next and click "Install" button.

ü  A window containing technology support information will appear click on Next.

ü  Click finish button and then "Reboot now".

 

WEB BROWSERS AND SURFING THE WEB

 WEB BROWSERS AND SURFING THE WEB

Students customize their web browsers with the LAN proxy settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be configured. 

Surfing (or) browsing the net means going across the internet in search of particular topic to surf the net we need a suitable tool which is nothing but a Web Browser.

Web Browsers help to download the required content and they communicate with server using TCP/IP Protocol to retrieve and display required information. These supports internet protocol like HTTP, FTP, using HTML. Web Browser uses powerful programming languages like Java, Java Script cold fusion, PHP (Hypertext preprocessor), VB (Visual Basic), XML (extended mark up languages), Perl (Practical extraction and reporting language) and other surfing languages.

The popular Web Browsers are Microsoft internet explorer, Mozilla Fire Fox, Apple Safari, net Scope Navigator, Opera, and Lynx.

CUSTOMIZING WEB BROWSERS WITH LAN PROXY SETTINGS:

  1. Select Tools menu in IE.
  2. Select internet options.          
  3. Select connections.

 Here we have two options:

a.       Dial-up and virtual private Network (VPN).

b.      LAN setting.

The selection is dependent on kind of connections you are trying to configure. They are:

              i.        Dial-up Modem connection.

            ii.        LAN connection.

          iii.        DSL (Digital) subscriber line) or cable Modem.

INTERNET BOOK MARKS:

            The purpose of internet Book Mark is to easily access Web pages that the user has visited and plans to visit.

            The book marks with in internet explorer are called favorites.

POP-UP BLOCKERS:

1.         Pop up adds (or) pop-ups are a form of one line advertising on www to attract the attention of users.

2.         Pop up interrupt the user less but making it more difficult for the user to determine which Webs opened them.

3.         Now must of the Web Browsers allow the user to block unwanted pop-up completely.

 

 

 

 

PLUG – INS:

1.         A plug – in is a software component program that interact with a main (host) program or application to provide better integration of Media.

2.         Plug-ins extends the existing browser capabilities like Multimedia files are launched and place in browser window.

3.         Few famous plug-ins are

®       Apple quick time.

®       Real Networks.

®       Macromedia flash.

®       Microsoft Media Player.

®       Adobe shockwave.

®       Sun Microsystems’s Java Applets.

 

SEARCH ENGINES AND NETIQUETTE

SEARCH ENGINE:

Search engines are one of the primary ways that the internet users find websites. The term “search engine” is often used generically to describe both crawler based search engines and Human powered directories. These two types of search engines gather their listings in radically different ways.  

 

CRAWLER BASED SEARCH ENGINES:

            Crawler Based search engines such as Google create their listings automatically. They “Crawler” or “Spider” the web then people search through what they have formed if you charge your Web pages crawler based search engines eventually find these changes and that can affect how you are listed page little, body copy and other elements which all play a role.  

 

HUMAN POWER DIRECTIONS:

            A human powered directory such as an open directory depends on humans for its listing you submit a short description to the directory for your entire site (or) editors write once for sites. They review a search looks for matches only in the description submitted.

            Search engine software is the third part of search engine. This is the program that sifts through the millions of pages recorded in the index to find matches to a search and rank them in order of what it believes in most relevant.

 

NETIQUETTE [INTERNET ETIQUETTE]:

  1. "Netiquette" stands for "Internet Etiquette", and refers to the set of practices created over the years to make the Internet experience pleasant for everyone.
  2. Like other forms of etiquette, netiquette is primarily concerned with matters of courtesy in communications.
  3. The Internet is a "place" with its own very special rules. People who communicate over the Internet are called "Netizens".
  4. It's important to learn the rules of the Internet before you logon, so that you can be a "good netizen".
  5. Netiquette is the "do's and don’ts" of communicating on the Internet. It explains what is and is not acceptable behavior online and what you should and should not do.

 

RULES FOR NETIQUETTE:

Rule1:  Remember the Human.

Rule2:  Adhere to real-life standards of behavior.

®    Be ethical.

®    If you use shareware, pay for it.

®    Breaking the law is bad Netiquette.

Rule3:  Know where you are in cyberspace.

Rule4:  Respect other people's time and bandwidth.

Rule5:  Make yourself look good online.

Rule6:  Share expert knowledge.

Rule7:  Help keep flame wars under control.

Rule8:  Respect other people's privacy.

Rule9:  Don't abuse your power.

Rule10: Be forgiving of other people's mistakes

NETWORKING CONCEPTS

                                                                                                                                            ...