Skip to main content

Home/ Digiteen/ Group items tagged faq

Rss Feed Group items tagged

Brody C

Safety and Security on the Internet - 0 views

  • Why Should I Worry About Security? The Internet is a global collection of Interconnected Networks that facilitate information exchange and computer connectivity. The Internet is comprised of many different computers, all of which fall into two categories: servers (also known as "hosts") and clients (also known as "guests") -- technically, everything on the Internet can be considered a "host," but for this discussion, we'll use "hosts" and "guests." Guest machines send bursts of computer data called "packets" which are analyzed by the server belonging to the guest's Internet service provider. If the data is located locally (on the ISP's machine), the ISP's server will return the packets. If the information sought is not local (on another machine), the ISP's server hands off the packets to a router, which then sends the packets to the server containing the information. Once the information is located, it is sent back to the guest machine. There are many different types of computers that fill these two categories: mainframes, minicomputers, PCs, Macintosh, Unix and others. Despite the many varieties of computers that combine to form the Internet, every computer connected to the Internet needs to be able to communicate with every other computer -- without this ability, there is no Internet. All of these computers are able to communicate because in a sense they can all speak the same language -- TCP/IP. TCP/IP actually isn't a language; it is in computer terms what is known as a "protocol." A protocol is simply a standard for transmitting and receiving bits of information. As long as all of the interconnected computers follow the same protocol, they can exchange information. Unfortunately, when data is sent from one computer to another on the Internet, every other computer in between has an opportunity to see what's being sent. This poses an obvious security problem.
  • Say you decide to purchase concert tickets on the Web. To do so, you need to fill out an electronic form with your name, address and credit card number. When you submit the form, your information passes from computer to computer on its way to the concert ticket web server. It is possible that someone could be watching the data passing through one of the computers that is in between your computer and the concert ticket server. No one knows how often this happens, but everyone concedes it is technically possible. And its also possible off the web, too -- E-mail can be captured (and read, if not encrypted), as can file transfers via unsecure FTP. If someone wanted to, it wouldn't be too difficult to connect a capture device to someone's phone line (assuming they use a modem to connect to the Internet) and steal an electronic copy of the data exchanged on the Internet. Even if you make your purchase on a secure web site supporting the latest security features, it has been recently shown that secure sites can cause Internet Explorer (and other browsers) to send sensitive information to a non-secure server in plain text format.
  • The point is, there are a lot of security issues related to a network such as the Internet. No FAQ could possibly cover them all. That is why this FAQ concentrates on Internet Explorer. Because there are millions of people who use Microsoft Windows family products, and because those millions have the ability to blend Internet Explorer with these products, the seriousness about security should be of paramount importance to everyone. Remember,  software products are only as secure as the environment in which they operate.
  • ...2 more annotations...
  • What Security Features does Internet Explorer Have? Internet Explorer is a safe browser in many ways. The latest version of IE supports Secure Socket Layer (SSL) 2.0/3.0, Private Communication Technology (PCT) 1.0, CryptoAPI, and VeriSign certificates, and one version employs 128-bit encryption, one of the strongest forms of encryption that's commercially available for use over the Internet. To see if you have the 128-bit version of Internet Explorer, go to the Wells Fargo Bank site and take their browser test. "Secure Socket Layer (SSL) is a Netscape-developed protocol submitted to the W3C working group on security for consideration as a standard security approach for World Wide Web browsers and servers on the Internet. SSL provides a security "handshake" that is used to initiate the TCP/IP connection. This handshake results in the client and server agreeing on the level of security they will use and fulfills any authentication requirements for the connection. Thereafter, SSL's only role is to encrypt and decrypt the byte stream of the application protocol being used (for example, HTTP). This means that all the information in both the HTTP request and the HTTP response are fully encrypted, including the URL the client is requesting, any submitted form contents (such as credit card numbers), any HTTP access authorization information (usernames and passwords), and all the data returned from the server to the client." -- Microsoft's IIS 1.0 Features Tour. It has been reported, however, that SSL has been cracked. Private Communication Technology (PCT) is a Microsoft-developed security protocol available in IE only. According to their Internet draft, "The Private Communication Technology (PCT) protocol is designed to provide privacy between two communicating applications (a client and a server), and to authenticate the server and (optionally) the client. PCT assumes a reliable transport protocol (e.g., TCP) for data transmission and reception. The PCT protocol is application protocol-independent. A "higher level" application protocol (e.g., HTTP, FTP, TELNET, etc.) can layer on top of the PCT protocol transparently. The PCT protocol begins with a handshake phase that negotiates an encryption algorithm and (symmetric) session key as well as authenticating a server to the client (and, optionally, vice versa), based on certified asymmetric public keys. Once transmission of application protocol data begins, all data is encrypted using the session key negotiated during the handshake." IE also supports server and client authentication by using digital certificates to identify users to web servers. In addition, IE supports code signing with Authenticode, which verifies that downloaded code has not been modified. For more information on Authenticode, visit Microsoft's Authenticode page or the excellent Authenticode FAQ page. CryptoAPI 1.0 provides the underlying security services for the Microsoft Internet Security Framework. CryptoAPI allows developers to integrate cryptography into their applications. Microsoft has given a great deal of thought to the issue of security and it products, and Internet Explorer 4.0 is no exception. From "Security Zones" to continued support and refinement of Authenticode, IE4 promises to be one of the safest browsers of all time.  You can read all about the security available in IE 4 at http://www.microsoft.com/ie/ie40/?/ie/ie40/features/ie-security.htm. Also, check out what Microsoft is doing to keep transactions private with IE 4.
  • What are "Cookies?" Cookies are small text files that are sent to web browsers by web servers.  The main purpose of cookie files are to identify users and to present customized information based on personal preferences.  Cookie files typically contain information such as your name (or username), password information, or ad-tracking information.  There is a good body of literature on  the Internet about cookies.  Despite what you may have read or heard, most people, including myself, do not view cookies as any kind of a security threat.  However, because of the way cookies work (e.g., a web server storing a text file on someone's hard drive), Microsoft (and other browser manufacturers) have built options into their browsers that notify users when cookies are being passed to them, and give the user an option to prevent the cookie from being accepted.  I don't think this is a good idea.  By rejecting cookies, your browser may not display the entire page or the site may not function as intended. The reality is that cookies are text files -- they cannot contain viruses or execute applications, they cannot search your hard drive for information or send it to web servers, and most of the information they contain is simple tracking information designed to effect better customer service.
  •  
    safe things to do on the Internet and what to learn that is big
Alan K

U.S. Copyright Office - Frequently Asked Questions - 3 views

  •  
    A F.A.Q page of the most commonly asked questions about Copyright. If you have a question about Copyright, it is probably answered here.
Becca B

Why is Netiquette Important? | Why - 0 views

  • DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude.
  • Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone.
  • The very basic rule in Netiquette is thinking before posting.
  • ...1 more annotation...
  • Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. google_protectAndRun("ads_core.google_render_ad", google_handleError, google_render_ad); Share 
  •  
    "Why is Netiquette Important? The internet is now a medium of communication for most people nowadays. Everything from business transactions, buying and selling, socializing or simply blogging your thoughts are conducted over the internet. Net etiquette is a fusion of the internet and good manners in cyberspace. Though nothing is really concrete in cyberspace it is important to bear in mind that the internet involves millions of people. It is like a world in a gadget, but the people you are dealing with on the other end are real and not mere avatars. Our generation now lives in the internet; there are formalities and guidelines to follow to render professionalism, courtesy, and order making the internet more useful and effective as possible. The very basic rule in Netiquette is thinking before posting. Be careful with any personal, confidential or legal matters sent through email messages. Remember, emails can be forwarded to anyone. Unsolicited messages are spam and detested by everyone. Chain letters can be one example; it would be best to delete it and not forward it. Be careful when spreading warnings about Internet viruses sometimes it may just be a hoax. Many get fooled by this and immediately copy paste and send it to everyone in their mail list. You may end up getting a lot of junk mail or spam in the process. DO NOT CAPITALIZE TOO MUCH or it may seem like you are shouting and this is rude. Lessen the use of acronyms, BRB for “be right back” and etc. Not everyone is familiar with this internet lingo. Acronyms may be ideal in the chat room but unprofessional in email. Make use of the FAQ, Frequently Asked Questions, it is a form of orientation for news groups and social networks. Bear in mind that everything has consequences anything you do will affect you. Not observing proper Netiquette may mean losing your internet account. Share "
Becca B

Netiquette - The Code of Conduct for the Internet - By Jason - 0 views

  •  
    "Never forget that the person reading your mail or posting is, indeed, a person, with feelings that can be hurt. Here are some key points to keep in mind: * It's not nice to hurt other people's feelings. Who are you trying to prove anything to? Just keep offensive comments to yourself and try to be constructive. * Never type a whole message in caps, whethere its an instant message, a reply to a post in a message board, or in an email. writing a whole message in caps means that one is yelling (unless you do not mean it that way). If you do not mean it to come across that way, make sure you tell people you are not yelling. Remember, people can not tell what mood you are in by just typing something (unless you are using a webcam and microphone of course...). So please please please do not use caps to write messages. Thanks! * Never mail or post anything you wouldn't say to your reader's face. The internet is not a place to find or pick a fight. There are people out there with the same intentions you have of just researching and just finding useful information and that is all. No need to start any trouble. Please ;] * Notify your readers when flaming. For those of you who do not know what flaming is, here is the basic definition. Flaming is when a person or group of people decide to express their negativity about a certain situation, maybe a world event or something. The reason one is told to notify people when doing this is because some people may not know you are flaming. I mean, this is the internet. It's not like you have the person sitting in front of you where you can look at their face and tell they are mad or annoyed about something. So please, let people know that the post or message you are about to post is of this kind. On a side note, flaming can also be toward people. It can be toward their beliefs, comments they may have made, ideas, etc. Please do not do this kind of flaming. Again, we are trying to eliminate unneccessary confrontations o
alex c

Internet Slang, Netiquette, Lingo, Acronyms - 1 views

  • Ironically, the origin of the smiley face is a highly controversial debate. The most accepted belief is that graphic artist Howard Ball of Worcester, MA, created the smiley when asked to design a morale boosting campaign. He started with just the smile, but soon realized disgruntled employees might turn it upside down to a frown, so he added eyes.  Other Emoticons:   :) The classic smile. "I'm happy" or "my meaning is positive." Some Word programs will automatically turn this into a graphic after hitting return.   ;)   The wink. "Just kidding," sarcasm, etc.    :-)  Smiley with a nose.   :-D     Laughing. A slightly goofier version of the smiley, this one signifies a particularly happy mood or a laughing response.   8)       Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin.    2.  Chat Acronyms.  Verdan
  • Glasses or sunglasses. The cool smiley.  :p       Tongue hanging out. Self-explanatory.    :(  The frown. Disappointed or sad.    >:  Angry face.  :x        Sick face.  :O       Embarassed or shocked.  0:-)     Angel with halo. "Who, me?"  >:-)  Evil grin. 
  • These abbreviations of commonly used chat phrases are often used in e-mail too. Although they can be great timesavers, it's easy to lose people if you overuse them.  ASAP As Soon As Possible BFN Bye For Now BTW By The Way DIY Do It Yourself FAQ Frequently Asked Questions FYA For Your Amusement FYI For Your Information K Okay KISS Keep It Simple, Stupid LMHO Laughing My Head Off LOL Laughing Out Loud OBO Or Best Offer OTL Out To Lunch OTFL On The Floor Laughing THX Thanks TIA Thanks In Advance TTFN Ta Ta For Now
  •  
    This teaches you what abbreviations mean and what emoticons are.
carrie n

Autism FAQ: What is safety awareness? - 0 views

  •  
    This is what social awareness it!
Michael C

Internet Addiction - Symptoms, Signs, Treatment, and FAQS - TechAddiction - 0 views

  •  
    Addiction to virtual worlds has symptoms and cures that are very helpful to people that suffer from it.
Haley M

Why must I indicate a claim for individual copyright materials in my program? | Screenr... - 0 views

  • Film and television programs contain a number of separate copyright materials including the visual images and associated sounds, the screenplay or narration, and other material incorporated in the film such as the music, sound recordings and artistic works. When a film or television program is copied, communicated or retransmitted under the royalty collection services, there are royalties for each of the separate copyright materials. By indicating a claim to a copyright material, you are warranting to Screenrights that you own or control the right to claim royalties for that specific copyright material incorporated in the program.
  •  
    This article explains why you must indicate a claim for individual copyright materials.
Kelby W

Private Internet Browsing - Activating Private Internet Browsing Mode in Your Favorite ... - 0 views

  •  
    Many ways to help you be safe on the internet.   "he term private Internet browsing encompasses a wide array of precautions that Web surfers can take to ensure that their activity on the Web cannot be traced. Motives for private Internet browsing are plenty, with both privacy and safety at the forefront of many Internet users' minds. Whatever the inspiration for browsing anonymously may be, the bottom line is that many people want to avoid leaving tracks behind. Proxy Servers for Private Internet Browsing Private Internet browsing can involve utilizing firewalls and proxy servers to prevent those in the outside world from viewing Web surfing activity, including rogue individuals as well as Internet Service Providers and even the government. These types of private Internet browsing measures are commonly used in countries where access is limited as well as at the workplace or on campus. Private Internet Browsing Within the Web Browser For many Web surfers, however, private Internet browsing involves clearing their tracks from others who may have access to the same computer or mobile device that they're currently using. Most popular Web browsers offer ways to browse anonymously, with no history or other private data such as cache or cookies left behind at the end of your browsing session. How to Activate Private Internet Browsing The methods for activating this type of private Internet browsing differ across browsers, operating systems, and device types. The following step-by-step tutorials teach you how to browse anonymously in the browser of your choice."
Vicki Davis

Personas for Firefox | Frequent Questions - 2 views

  •  
    Have some students design personas for firefox. You could design a persona to promote digital citizenship.
Liz Luby

EFF: Frequently Awkward Questions for the Entertainment Industry - 0 views

  • The RIAA has sued more than 20,000 music fans for file sharing
  • To that end, EFF has prepared a sample list of tough questions for times when you hear entertainment industry representatives speaking and want to challenge their positions. Asking hard questions is a way of "keeping honest people honest" and revealing when they're actually being deceptive.
  • DRM has clearly failed to stop songs from getting on file sharing networks
  • ...3 more annotations...
  • Recording off the radio is clearly permitted by copyright law and something Americans have done for over 25 years
  • Is it ever legal for me to use software like DVD Shrink or Handbrake to rip a digital copy of a DVD I own onto a video iPod or my laptop
  • Major entertainment companies have repeatedly brought lawsuits to block new technologies, including the VCR, Digital Audio Tape recorders, the first MP3 player, the ReplayTV PVR, and now P2P software.
Erin B

Rent Movies Online - Free Shipping, No Late Fees - Review Price Plans, FAQs - 0 views

  • How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device.
  • $8.99 a month 1 DVD out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $13.99 a month 2 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. $16.99 a month 3 DVDs out at-a-time (Exchange each DVD as often as you want)plus Instantly watch online on your PC or Mac or right on your TV via an Internet connected Netflix ready device. Instantly watch as often as you want, anytime you want. Limited Plan $4.99 a month 1 DVD out at-a-time (Limit 2 per month)plus Instantly watch up to 2 hours of movies & TV episodes online on your PC or Mac.
  •  
    Netflix is another good example of internet commerce. "How does Netflix work? Rent what you want Simply point and click to add movies & TV episodes to your list. Get DVDs by mail plus instantly watch movies (some new releases) & TV episodes (including current season) online on your PC or Mac or streamed instantly from Netflix over the Internet right to your TV via a Netflix ready device. "
Vicki Davis

Net Neutrality FAQ: What's in it for You - PC World - 1 views

  •  
    Net neutrality is an important issue being addressed by the US government right now to prevent companies from sort of creating their own version of the Internet. These rules are supposed to keep things "open." I'm also sending these to my digiteen students (you can follow digiteen at http://www.twitter.com/digiteen) and Flat Classroom students (http://www.twitter.com/flatclassroom) for work on their project.
  •  
    Net neutrality deserves a mention in the Digiteen project and is an important topic being debated here in the US.
1 - 13 of 13
Showing 20 items per page