internet lecture - 3

12
1 Internet Lecture -3 CSIT100 2 Topics Internet Protocols Freeware Open Source software What is shareware? What is a browser plug-in? What is a cookie? Spam What are “worms”, “viruses”? Anti-Spyware ... Trojan horse Phishing Pharming Audio & Video Key Logger .. Software Firewall What happens to deleted files? 3 Internet protocols … ftp telnet nntp https mms P2P P2P - BitTorrent 4 Internet protocols … 5 ftp The computers on the Internet have a standard tool (program-service) for transferring copies of files. This service is called ftp (file transfer protocol). ftp programs: FTP Voyager (pay) FileZilla (free) CuteFTP (pay) FireFTP (free) WinSCP (free) 6 We can transfer ASCII and Binary files ASCII file (text, postscript file, e-mail files) (ASCII = American Society Code Information Interchange)

Upload: others

Post on 24-Jun-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Lecture - 3

1

Internet Lecture - 3

CSIT100

2

Topics

• Internet Protocols

• Freeware

• Open Source software

• What is shareware?

• What is a browser plug-in?

• What is a cookie?

• Spam

• What are “worms”, “viruses”?

• Anti-Spyware ... Trojan horse

• Phishing

• Pharming

• Audio & Video

• Key Logger .. Software

• Firewall

• What happens to deleted files?

3

Internet protocols …

• ftp

• telnet

• nntp

• https

• mms

• P2P

• P2P - BitTorrent

4

Internet protocols …

5

ftp

• The computers on the Internet have a standard tool (program-service) for transferring copies of files. This service is called ftp (file transfer protocol).

• ftp programs:

– FTP Voyager (pay)

– FileZilla (free)

– CuteFTP (pay)

– FireFTP (free)

– WinSCP (free)

6

We can transfer ASCII and Binary files

• ASCII file (text, postscript file, e-mail files)

• (ASCII = American Society Code Information Interchange)

Page 2: Internet Lecture - 3

2

7

ASCII characters ….

• ASCII file (text, postscript file, e-mail files)

8

We can transfer ASCII and Binary files

• ASCII file (text, postscript file, e-mail files)

• Binary files (WORD file, images, voice, compressed files)

9

Binary file

ÿØÿà JFIF H H ÿÛ C %# , #&')*)-0-(0%()(ÿÛC(((((((((((((((((((((((((((((((((((((((((((((((((((ÿÀ XX" ÿÄ

ÿÄ µ } !1AQa"q2�‘¡#B±ÁRÑð$3br‚%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–—

˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ

ÿÄ µ w !1AQaq"2�B‘¡±Á#3RðbrÑ$4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰

Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚâãäåæçèéêòóôõö÷øùúÿÚ ? ð71½®ºÿ C_/t|Á}:_3n)óœJfq)6ŸJè-´ ç F9®“JðD²`Ì3škRÓ¹çðZI3a5ÑišÄ‚àŽõêG‚£‹cÁ®‚/ª§

Íe4Élâ´%€Å_ÖtÃöW<ŠôAS VƧáÈd²qÞˆÁتNÇÈZ¼BD#£Uí>,âº/‰Z,¶Z¡m¼gükJÈÀ5çã6¹»wW5„•a`Ç5$*1Vvôã5áN¡ÎÛ(±øÓ”Iõ«›qBÇSÎ*

uêXc,B€rk•MЋ!–aœvhÑ�g¡Û„Ë«c,“eg5Ô€F§Íu–I`wÁ\8=sV'K{¼åÏî¾léÍaÍ®c @¹n8ÏéÆ4ðÊËsï²nX•yjËÚ®°÷,±m‡Ž½Gs7»�ótàdTZ„êß2ÏoJ¨Ó{t5ÉV¯2Ôûœ.SI¢rK(Çj”JU9–“•ïR½Ë§"¸•úΕËnß¼#¢•Û2ªò•÷E'˜X×Y�S'’^Ç™æŒz-

Gæg#94Î0riØ»hJ’‡ó¦†éÅVó0qJ%äö⯕•kY…°äÔT’7#Š ²|À†ïRîM ª&YS—Á£8çðªÌ@ž÷(±À�Š\ƒs³°ì�̧èj9Žzx …….

Open an image file with … notepad

10

… image

ÿØÿà JFIF H H ÿÛ C %# , #&')*)-0-(0%()(ÿÛC(((((((((((((((((((((((((((((((((((((((((((((((((((ÿÀ XX" ÿÄ

ÿÄ µ } !1AQa"q2�‘¡#B±ÁRÑð$3br‚%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–—

˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ

ÿÄ µ w !1AQaq"2�B‘¡±Á#3RðbrÑ$4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰

Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚâãäåæçèéêòóôõö÷øùúÿÚ ? ð71½®ºÿ C_/t|Á}:_3n)óœJfq)6ŸJè-´ ç F9®“JðD²`Ì3škRÓ¹çðZI3a5ÑišÄ‚àŽõêG‚£‹cÁ®‚/ª§

Íe4Élâ´%€Å_ÖtÃöW<ŠôAS VƧáÈd²qÞˆÁتNÇÈZ¼BD#£Uí>,âº/‰Z,¶Z¡m¼gükJÈÀ5çã6¹»wW5„•a`Ç5$*1Vvôã5áN¡ÎÛ(±øÓ”Iõ«›qBÇSÎ*

uêXc,B€rk•MЋ!–aœvhÑ�g¡Û„Ë«c,“eg5Ô€F§Íu–I`wÁ\8=sV'K{¼åÏî¾léÍaÍ®c @¹n8ÏéÆ4ðÊËsï²nX•yjËÚ®°÷,±m‡Ž½Gs7»�ótàdTZ„êß2ÏoJ¨Ó{t5ÉV¯2Ôûœ.SI¢rK(Çj”JU9–“•ïR½Ë§"¸•úΕËnß¼#¢•Û2ªò•÷E'˜X×Y�S'’^Ç™æŒz-

Gæg#94Î0riØ»hJ’‡ó¦†éÅVó0qJ%äö⯕•kY…°äÔT’7#Š ²|À†ïRîM ª&YS—Á£8çðªÌ@ž÷(±À�Š\ƒs³°ì�̧èj9Žzx …….

Open an image file with … notepad

11

… voice (analog – digital)

12

0&²uŽfϦ٠ª bÎlæ 3&²uŽfϦ٠ª bÎlê 2 – S y m p h o n y N o . 9 ( S c h e r z o ) L u d w i g v a n B e e t h o v e n , c o m p o s e r . S e a t t l e S y m p h o n y . G e r a r d S c h w a r z , d i r e c t o r @¤ÐÒãÒ—ð É^¨Pª W M / L y r i c s W M F S D K V e r s i o n 8 . 0 0 . 0 0 . 4 3 7 3 W M F S D K N e e d e d 0 . 0 . 0 . 0 0 0 0 W M / C o m p o s e r * L u d w i g v a n B e e t h o v e n W M / P u b l i s h e r V o x W M / G e n r e C l a s s i c a l W M / M C D I L 6 + 9 6 + 1 7 5 5 + 9 3 E F + E A D 3 + 1 3 A A 4 + 1 A 2 E 4 + 1 F 5 B 6 W M / T r a c k N u m b e r W M / Y e a r 2 0 0 2 W M / E n c o d i n g T i m e ËŠ•å¼Ç0 W M / U n i q u e F i l e I d e n t i f i e r b A M G a _ i d = R 6 8 8 7 3 7 ; A M G p _ i d = V A ; A M G t _ i d = T 6 9 3 3 8 8 2 W M / A l b u m T i t l e . B e e t h o v e n [ V o x ] D i s c 1 W M / A l b u m A r t i s t V a r i o u s A r t i s t s W M / P r o v i d e r A M G " W M / P r o v i d e r S t y l e C l a s s i c a l Îuø{�FÑ�‚ ̀ —É¢² ˆü ¡Ü«ŒG©ÏŽä À Seh í“ÿ[¨†J‘~‰¾›„âTPp

0׿òxÎÀÌ `². 0Îò, ( ººˆü µ¿_.©ÏŽã À Se¤ ÒÓ«º©ÏŽæ À Se v ”#D˜”ÑI¡ANEpTv . W M / M e d i a C l a s s P r

i m a r y I D ¼}`Ñ#ãâK†¡H¤*(D 2 W M / M e d i a C l a s s S e c o n d a r y I D W M / W M C o n t e n t I D zv�ÒPÕåLœJÍòáî½ $ W M / W M C o l l e c t i o n I D Lôââ¹Iž×

véÚ.¥ . W M / W M C o l l e c t i o n G r o u p I D Lôââ¹Iž× véÚ.¥tÔßÊ E¤ºš«Ë–ªè

… voice

Page 3: Internet Lecture - 3

3

13

ASCII and Binary Files

ASCII Files:

.htm .html .shtml .php .pl .cgi .js .cnf .css

.forward .htaccess .map .pwd .txt .grp .ctl

Binary Files:

.jpg .gif .png .tif .exe .zip .sit .rar .ace

.class .mid .ra .avi .ocx .wav .mp3 .au

14

Telnet software: DXTelnet

• An Internet protocol that allows you to log in to remote computer on the Internet.

• TelNet also provides access to library systems, databases and information resources.

• Telnet (Telecommunications network )

15

nntp

• Protocol that supports the distribution, retrieval and posting of usenet news over the internet.

• nntp (network news transfer protocol)

16

Recognizing Secure Sites

• Familiarity and accreditations

• Transport Layer Security (TLS)– Address bar has a padlock

• Site advisors

17

Transport Layer Security (TLS): is a protocol whose purpose is to

protect data (ex: credit card info), between customer and online store

18

• The secure version of http (port 443)

– Used in: e-commerce, e-mail, …

Page 4: Internet Lecture - 3

4

19

Website reputation tools…

• … rates sites based on their safety.

• These tools alert users of a site’s potential to have viruses, malware, and of risk to have your identity stolen

• Examples:– Avast WebRep

– AVG LinkScanner

– Dr. Web LinkChecker

– McAfee SiteAdvisor

– Norton Safe Web

– Trend Micro TrendProtect

– MyWOT's Web of Trust

20

Chrome browser – website rating alert

21

mms://

• Microsoft's proprietary network streaming protocol

• mms (microsoft media server )

Sky News … TV

mms://live1.wm.skynews.servecast.net/skynews_wmlz_live300k/

23

P2P (Peer-to-Peer)

24

P2P

• Peer-to-Peer; it allows direct access, with permission, of a computer with another.

• …

Page 5: Internet Lecture - 3

5

25

P2P

• Peer-to-Peer; it allows direct access, with permission, of a computer with another.

• Music files (or plain files) exchange…

26

P2P - BitTorrent

27

P2P

• Usually when you download a file from the internet, it works as follows:

27

server

Web user

28

P2P - BitTorrent

• However with the BitTorrent protocol utilized, downloading a file works as follows:

The idea is that in addition to the

server sending data to individuals

(clients /peers /you /user), the

individuals also share acquired data

with other individuals.

29

P2P - BitTorrent

• Bit Torrent is just a basic set of rules and description of how to do things to help you and allow you to quickly download files as well as distribute the file being downloaded at the same time.

• In order to use a torrent file you must however, have a Bit Torrent client to download the torrent extension files.

• BitTorrent.com to get a bit-Torrent client

• These BitTorrent applications read files with a .torrent file extension…

30

P2P vs BitTorrent…

P2P

• One to one

• P2P programs:– Kazaa

– Napster (original)

– Limewire

– WinMX

– …

BitTorrent

• One to many and many to one

• BitTorrent programs:– μTorrent

– Deluge

– Vuze

– …

Page 6: Internet Lecture - 3

6

31

For more TORRENT RELATED info…

• http://www.tech-faq.com/download-torrent-files.shtml

• http://www.associatedcontent.com/article/477663/how_to_open_a_torrent_file.html

32

What is Internet Relay Chat (IRC) protocol?

33

What is Internet Relay Chat (IRC) protocol?

• An application that allows groups of users to communicate via messages on-line, using computers connected with the Internet.

IRC: First chat software

34

35

What is IM ?

• Instant Messaging; exchange real-time typed messages or chat …….

36

IM examples

• Instant Messaging; exchange real-time typed messages or chat …

– Google Talk

– MSN Messenger

– AOL Instant Messenger

– Yahoo Messenger

Page 7: Internet Lecture - 3

7

37

Video Conferencing

• Real time transmission of audio and video that enables 2 or more people to have a meeting.

38

What is freeware?

• Software that may be used for free but not sold

39

Open Source

• Is software that provides its source code to everybody to use, modify and improve…

• …for free…

40

Open Source – Examples…

http://en.wikipedia.org/wiki/List_of_open_source_software_packages

41

What is shareware?

• Commerical Software distributed on a … “Try-Before–You-Buy” basis with limited functionality.

• Nagware – is a type of shareware that “nags” you to buy the software…

42

What is a browser plug-in?

• Special software program, which extends a browser’s functionality.

• It can enable us to view or hear some multimedia files on the web, that would otherwise not be available by default.

Page 8: Internet Lecture - 3

8

43

Plug-in Examples

• RealPlayer

• Adobe Acrobat Reader Portable Document Format (PDF)

• ShockWave player

• Active-X

44

What is a cookie?

• Small text files that some web sites store (automatically) on your computer’s hard drive.

• The text files may contain personally identifiable information…

• Why? In order to recognize you (your computer) when you visit again their web site and to keep track of your visits.

45

What is a cookie?

46

Can you delete cookies?

• Internet Explorer 11…– Click the gear

– Safety

– Delete browsing history…

– Check-box next to Cookies…

– Click Delete

47

Spam

• Spam is any message or posting, that is sent to multiple recipients who have not specifically requested the message.

• Other common terms for spam include:

1. Unsolicited commercial email (UCE),

2. Unsolicited bulk email (UBE)

3. Junk mail

48

Spam

Page 9: Internet Lecture - 3

9

49 50

What are “worms”, “viruses”?

• Worms and Viruses are malicious software programs that aim to harm your computer (software-hardware)

• Viruses

– Attaches self to program or file

– May spread via to other computer via network

– Can damage hardware software

• Worms– Spread from computer to computer unaided by human

action

– Infects email contact lists (ex. Outlook’s contact list)

– Can reduce computer network performance and/or stop responding

51

Tips to guard computers?

• Don't open e-mail from an unknown source.

• Only open expected e-mail attachments.

• Don't automatically open e-mail attachments.

• Don't download programs from Web sites, unless you know and trust the source.

• Keep your anti-virus software updated!

52

Trojan horse

53

Trojan horse

• A program that appears to be performing a desired function, but is in fact performing something malicious…

54

Anti-Spyware for Trojan horses

• Microsoft Windows Defender (www.microsoft.com)

• Malwarebytes' Anti-Malware (www.malwarebytes.org)

• Spybot Search & Destroy (www.safer-networking.org)

Free Software

Page 10: Internet Lecture - 3

10

55

Phishing

• Is a method of fraudulently obtaining sensitive information, such as passwords, bank account, social security number, etc…

• Typically done through e-mail communication, where the e-mail seems legitimate, but it is not…

56

Phishing @ MSU

57

Phishing online…

58

Pharming

• Receiving an e-mail with instructions to login to a web site that is fake, but you assume to be legitimate…

• This site will collect your login information… username & password

59

Pharming-example

60

Audio format … MP3

• MP3 is an audio compression algorithm

• It is also known as MPEG-1 Audio Layer-3

(MPEG = Moving Picture Experts Group)

Page 11: Internet Lecture - 3

11

61

Other audio formats …

• WAV (Waveform Audio Format)

• WMA (Windows Media Audio)

• OGG (free open standard)

• FLAC (lossless)

62

audio formats…

63 64

Podcasts

• Personalized off-line audio web casts (non-music). For example audio broadcast, like a radio show.

65

Examples …

66

Key Logger … software

• A computer program that records every keystroke on a computer…

• To protect yourself … Use an anti-spyware program to remove (locate) unauthorized software and keystroke monitoring programs.

DISCLAIMER: Logging other people’s keystrokes, without their permission, can be considered illegal.

Page 12: Internet Lecture - 3

12

67

Key logger software

68

Firewall

• It is a software application used to block outside invaders

• Allows some packets to pass (in/out), blocking others.

69

Firewall

70

Firewall …

Firewall won’t protect you from viruses

It will protect you from intrusion attempts and internet worms

Firewall software are not perfect

Firewall access is allowed or blocked, by the firewall, through a computer’s network ports

71

Check your network defenses…

1.https://www.grc.com/

2.http://security.symantec.com/sscv6/home.asp

3.http://www.auditmypc.com/

72

For fun…

• Get to know your internet connection– Speed

• http://www.speakeasy.net/speedtest/• http://www.speedtest.net/

– IP Address• http://whatismyipaddress.com/ (click on Additional IP details)

Ping (Packet Internet Groper) is a networking tool:a tool to measure round trip time of a message sent from source to destination