In order to choose the order in which web pages are displayed to the user, search engines use scoring system. Internet connections There are many different ways to connect to the Internet. This phenomenon is called digital divide: there are people e.
In order to overcome this social problem, WiMAX is spreading, a sort of very long range Wireless which arrives up to 10 Km but works only if the transmitting and receiving antennas are in line of sight and whose theoretical speed of 70 Mbps decreases with distances to about 40 Mbps.
Paolo Coletti Basic Computer course book 4. Computer security Being connected to the Internet means giving anybody access to the computer. This law requirements apply clearly to all companies and professionals which handle data, but they also apply to personal users who communicate data. To personal users who do not communicate data still the security requirements to avoid data theft apply. Encryption Encryption is a text masking technique, derived from military use, which transforms information in such a way that it may be correctly read only with a special password called key.
It uses two keys, a public key for encrypting, usually known only to one computer or person, and a private key for decrypting, usually known by all the computers or people which legitimately may read the information.
The size of these keys, and thus the difficulty to be guessed, is expressed in bits, with bits being the typically most secure size used. The sent messages are encrypted and later decrypted by A with his private key. In case somebody Page 20 of 33 Edition 8. Even when somebody uses the public key to decrypt, it does not work. The same process happens whenever a browser tries to send a password or secret information to a website using a secure connection see section 4.
In this case private and public keys coincides and are kept secret. The encryption and decryption process is done automatically by a program PDF creation programs or compression programs can do it, see page 11 for instructions how to do it or even by the operative system if the entire disk is encrypted , which asks the password to the user every time.
The two following schemas illustrate instead the usage of encryption for digital signature. A wants to publish a publicly available document with its signature. Paolo Coletti authority to distribute private and public keys.
Even though theoretically a simple password is enough, to be sure that the user does not give the private password around, the certification authority gives him, after having identified him through a governmental identity card, a password usually together with another identification tool a smart card, a telephone number for an OTP to be send , which, when used together, correspond to his private key. An automatic signature program takes care of automatically encrypting documents.
The service to digitally sign documents is offered by private certification companies, with prices currently affordable also by private users and with alternative devices such as smartcards or OTP devices see section 4. Documents for which it is important to determine the exact date of the signature have moreover a temporal mark signed directly by the certification authority. Passwords On the Intranet the user is identified only by his username, known to everybody, and his password, known only to him.
Therefore it is absolutely necessary to keep passwords secret. Unfortunately many people use very trivial passwords. This is the list of the most common passwords in password, , , , qwerty, dragon, pussy, baseball, football, letmein, monkey, , abc, There exist automatic programs which are able to try 4 billion passwords each second, and they usually start trying combinations of words and numbers the complete set of all Italian, German and English words can be tried in less than 1 second.
Unfortunately every website asks the user to register with a password and users who use always the same password are giving it away to every website they register, even untrustworthy ones. It is a good procedure to have at least three passwords: one for important use bank account , a second one for everyday use and a last one for unimportant use registering to unknown websites or to services that will not be used anymore.
They seem to be unreadable, but computer experts can reveal them instantly. Store passwords in programs only if that computer has a single user i. Page 24 of 33 Edition 8. Paolo Coletti 4. Usually biometric identification is considered to be very secure and thus it is used to replace completely the password system. For very important activities, such as digital signature or bank operations, usually a personal device is instead added to the standard login and password system.
The usual password is remembered personally by the user and a personal device provides the second part of the password. This device can be a smartcard, such as the national health card, which is inserted into a card reader or a USB token and they provide to the program or web site the second half of the password which is stored inside the object.
This big advantage of this second system is that, even if both parts of the password are intercepted or guessed, the second part can be used only that time and will expire after a few seconds.
Viruses From the Internet many unauthorized connection attempts arrive. Some of these are mistakenly authorized and manage to reach the Intranet or at least to come in contact with programs which are behind the firewall.
If these connections carry malign intentions, usually their aim is to explore and use the Intranet computers, to destroy Intranet data or to stop some Intranet services which is a dangerous attack if these services are managing stock trades or telephone calls.
Defense against these kinds of attacks is in charge system administrators. The virus is a little program which has this name because its life cycle is the same of a biological organism: survive and duplicate.
It arrives on the computer through email attachments, downloaded files, CDs and floppy disks or directly from the Intranet. It is often hidden inside other good files or programs, which are called infected. As soon as the user mistakenly runs it often trying to run the good program or to open the good file , the virus orders the computer to run itself every time the computer is turned on, thus assuring its survival. It starts duplicating itself, infecting other files, CDs and floppy disks, and trying to send itself around by email or on the Intranet.
No viruses are known to be able to damage hardware. These types are not exclusive: for example a Trojan horse which is at the same time a spyware and an adware. An infected computer can be recognized by some symptoms. To check the computer for viruses and to try to remove viruses from the computer, the user can run a special program called antivirus.
If a virus is found, it tries to remove it and to repair damaged files. Some files can be unrecoverable. If there is an infected file, it tries to delete the virus and repair it. In this case, whenever a virus or a suspect file is run, the antivirus prevents it from running and warns the user.
A lot of antivirus programs, free and commercial, exist. Their most important feature is obviously the possibility to be constantly updated through the Internet. Emails 4. Attachments For viruses, email attachments are a first class way of traveling, since they are very often opened by users without any precaution. Sometimes viruses hide inside files which were really sent by the sender, unaware of having an infected computer. Other times a virus takes control of the mail reader program and sends itself to the whole address book, counterfeiting the sender address often using an address taken from the address book in order to avoid that the real infected computer be identified and to gain the thrust of the receiver, and writing in the email text smart sentences pretending to be a regular friend of the receiver.
The Edition 8. Paolo Coletti Basic Computer course book arrival of this kind of email usually creates havoc, since the receiver is sure that the fake sender has a virus, while the original infected computer is another one.
The basic rule is never open any attachment from the mail reader program. Save the attached files on the desktop and run an antivirus program to check these files before opening them. Even when the email comes from a friend: he cannot know that to have got a virus, or he can not be the real sender. Spam Spam messages are unsolicited unwanted bulk emails. They are unsolicited, meaning that the user did not ask to receive them, they are unwanted, meaning that the user did not want to receive them, and they are bulk, meaning that they are sent to millions of addresses.
The email message contains commercial information usually on medicines, pornography, software or investments. They promise good luck to anyone resending it and bad luck to anyone trashing it, or they contain a sad story of an ill child desiring postcards or an urgent warning about a terrible virus: their content is probably false or too old, and a search on the WWW will reveal this immediately.
With C and. Uncover code integration issues that improve code quality using continuous integration. With this book, you will explore techniques for leveraging the tiny WiFi chip to enhance your drone and control it over a mobile phone.
Limited-time offer …. Now you have known the best websites for downloading free PDF books and free manga books , click the download button below and start reading your favorite PDF books on your computer! Free Download. Rating: 4. Last updated on November 14, Leave a Comment. Invalid name. Please input a valid email address! Please input review content! Comment On the contrary, thanks to modern technology you can now download free computer courses and tutorials in PDF files.
There are many websites like computer-pdf. Web Designing 2. Certification Course in Computer Technology 3. VFX and Animation 4. Tally 5.
0コメント