SlideShare a Scribd company logo
1 of 18
Webmastering BASICS Using
     Dreamweaver


           Unit 6
           Hosting and
           Maintenance
Choosing and Registering a
    Domain Name




     A WHOIS search allows you to determine whether a
     domain name is available for registration.


2
Network Solutions’ Whois Search




3
Who is search for hwscott.net




4
Registering a Domain




5
Why is Antivirus Protection
    Important




6
Security and Virus Protection

       Viruses can do everything from delete your
        files, prevent your computer from starting, or
        more commonly, use your computer to send
        spam or more viruses.
       If you run a windows machine, and are
        connected to the internet, virus scanning is a
        must.


7
What are Viruses?

       Computer viruses are named such due to their
        similarities to biological viruses.
       Computer viruses are malicious programming
        designed to replicate and spread.
       Though their purposes differ from virus to virus
        they commonly modify, delete or even steal
        data from your computer.


8
What are Viruses? continued

       They can also allow hackers access and
        control your PC over the Internet.
       Most viruses are designed to be covert, at
        least until they execute their main
        function, meaning without antivirus protection
        you may not even know when your computer
        is infected.


9
Macs and Security and Virus
     Protection

        If you run a Mac operating system, it is
         debatable whether you need virus protection.
         Generally the reason for having a virus
         scanner is to downstream check.
        Over 99.9% of viruses only work on
         windows, so your chances of getting a virus on
         a Mac system is very slim, but you can still
         pass them on.

10
Beware, viruses can be sent in
     files

        If you regularly send files to your friends via
         email (i.e., funny videos, pictures, word
         documents, games), and those friends use
         windows, you should consider virus scanning
         the files before sending them on.
        This is not necessary if you use a service that
         checks your emails for you, such as Hotmail
         or GMail. A good Mac virus scanner is
         ClamX.
11
Proxy Use

        It only takes one proxy to put a gaping hole in
         network security.
        Proxy sites help malware and other web-
         related threats to sneak into networks
         undetected.
        SSL proxies are a particular problem since
         the secure tunnels used allow viruses and
         worms to sidestep network anti-virus and web
         filtering security entirely.
12
Phishing and Password Theft

        Many proxy users are unaware of the risks to
         their own personal security and identity.
        Malicious proxy servers do exist and are
         capable of recording everything sent to the
         proxy, including unencrypted logins and
         passwords.



13
Phishing and Password Theft

        Although some proxy networks claim to only
         use „safe‟ servers, due to the „anonymous‟
         nature of these tools, proxy server safety is
         impossible to police.
        Users understand that whenever they use a
         proxy, they risk someone “in the middle”
         reading their data.


14
Copyright and Fair Use for
     Students

         Because you are a student, you can use
         copyrighted material.
        You have to follow certain guidelines when
         using copyrighted material.




15
Student Copyright Guidelines

        Web Images: You can use up to 10% or 15
         images (whichever is less) from any one
         collective work (such as a web page or a
         book) in your presentation.
        Music: You can include 10% or 30 seconds
         of a song (whichever is less) in your
         presentation.


16
Student Copyright Guidelines

        Illustrations: You may use no more than 5
         images by 1 artist.
        Motion: You may put 10% or 3 minutes
         (whichever is less) of a copyrighted film into
         your presentation.
        Any image that you find online needs a
         citation.
        Paste the URL of the image directly beneath
         it.
17
Copyright Resources

        http://www.cyberbee.com/cb_copyright.swf
        http://kb.iu.edu/data/arit.html
        http://www.copyrightkids.org/cbasicsframes.htm




18

More Related Content

What's hot

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackAvanzo net
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9robsworld
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallBev Robb
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 

What's hot (20)

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Adware
AdwareAdware
Adware
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Internet security
Internet securityInternet security
Internet security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Web security
Web securityWeb security
Web security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Network security
Network securityNetwork security
Network security
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 

Viewers also liked

Website Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelWebsite Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelPaulsTrainingsstuff
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide webcstenzhorn
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesJude Pugh
 
Rational Functions
Rational FunctionsRational Functions
Rational FunctionsHope Scott
 
Internet connections
Internet connectionsInternet connections
Internet connectionsentonline
 
CBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersCBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersPaulsTrainingsstuff
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highwaybh_aditya
 
Best Strategies For Website Promotion
Best Strategies For Website PromotionBest Strategies For Website Promotion
Best Strategies For Website PromotionTushar Malviya
 
Internet service provider
Internet service providerInternet service provider
Internet service providerloizazeptania
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMSJaime Delgado
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnamPham Duc
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider pptPutri Sanuria
 

Viewers also liked (16)

Website Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelWebsite Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-model
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide web
 
Isp
IspIsp
Isp
 
CS-ISP Overview
CS-ISP OverviewCS-ISP Overview
CS-ISP Overview
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 
Rational Functions
Rational FunctionsRational Functions
Rational Functions
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
CBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersCBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelers
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highway
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Best Strategies For Website Promotion
Best Strategies For Website PromotionBest Strategies For Website Promotion
Best Strategies For Website Promotion
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMS
 
ISP
ISPISP
ISP
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 

Similar to Unit6

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeSysfore Technologies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 

Similar to Unit6 (20)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
M
MM
M
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Computer security
Computer securityComputer security
Computer security
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information security
Information securityInformation security
Information security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

More from Hope Scott

Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Hope Scott
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Hope Scott
 
Quadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipQuadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipHope Scott
 
Polynomial Function by Desirae &
Polynomial Function by Desirae & Polynomial Function by Desirae &
Polynomial Function by Desirae & Hope Scott
 
Quadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaQuadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaHope Scott
 
Elizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionElizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionHope Scott
 
How to Print EOY Attendance Report
How to Print EOY Attendance ReportHow to Print EOY Attendance Report
How to Print EOY Attendance ReportHope Scott
 

More from Hope Scott (7)

Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Ellipses by Tom & Ashley
Ellipses by Tom & Ashley
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia
 
Quadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipQuadratic Function by Robert & Phillip
Quadratic Function by Robert & Phillip
 
Polynomial Function by Desirae &
Polynomial Function by Desirae & Polynomial Function by Desirae &
Polynomial Function by Desirae &
 
Quadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaQuadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & Cristina
 
Elizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionElizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear Function
 
How to Print EOY Attendance Report
How to Print EOY Attendance ReportHow to Print EOY Attendance Report
How to Print EOY Attendance Report
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Unit6

  • 1. Webmastering BASICS Using Dreamweaver Unit 6 Hosting and Maintenance
  • 2. Choosing and Registering a Domain Name A WHOIS search allows you to determine whether a domain name is available for registration. 2
  • 4. Who is search for hwscott.net 4
  • 6. Why is Antivirus Protection Important 6
  • 7. Security and Virus Protection  Viruses can do everything from delete your files, prevent your computer from starting, or more commonly, use your computer to send spam or more viruses.  If you run a windows machine, and are connected to the internet, virus scanning is a must. 7
  • 8. What are Viruses?  Computer viruses are named such due to their similarities to biological viruses.  Computer viruses are malicious programming designed to replicate and spread.  Though their purposes differ from virus to virus they commonly modify, delete or even steal data from your computer. 8
  • 9. What are Viruses? continued  They can also allow hackers access and control your PC over the Internet.  Most viruses are designed to be covert, at least until they execute their main function, meaning without antivirus protection you may not even know when your computer is infected. 9
  • 10. Macs and Security and Virus Protection  If you run a Mac operating system, it is debatable whether you need virus protection. Generally the reason for having a virus scanner is to downstream check.  Over 99.9% of viruses only work on windows, so your chances of getting a virus on a Mac system is very slim, but you can still pass them on. 10
  • 11. Beware, viruses can be sent in files  If you regularly send files to your friends via email (i.e., funny videos, pictures, word documents, games), and those friends use windows, you should consider virus scanning the files before sending them on.  This is not necessary if you use a service that checks your emails for you, such as Hotmail or GMail. A good Mac virus scanner is ClamX. 11
  • 12. Proxy Use  It only takes one proxy to put a gaping hole in network security.  Proxy sites help malware and other web- related threats to sneak into networks undetected.  SSL proxies are a particular problem since the secure tunnels used allow viruses and worms to sidestep network anti-virus and web filtering security entirely. 12
  • 13. Phishing and Password Theft  Many proxy users are unaware of the risks to their own personal security and identity.  Malicious proxy servers do exist and are capable of recording everything sent to the proxy, including unencrypted logins and passwords. 13
  • 14. Phishing and Password Theft  Although some proxy networks claim to only use „safe‟ servers, due to the „anonymous‟ nature of these tools, proxy server safety is impossible to police.  Users understand that whenever they use a proxy, they risk someone “in the middle” reading their data. 14
  • 15. Copyright and Fair Use for Students Because you are a student, you can use copyrighted material.  You have to follow certain guidelines when using copyrighted material. 15
  • 16. Student Copyright Guidelines  Web Images: You can use up to 10% or 15 images (whichever is less) from any one collective work (such as a web page or a book) in your presentation.  Music: You can include 10% or 30 seconds of a song (whichever is less) in your presentation. 16
  • 17. Student Copyright Guidelines  Illustrations: You may use no more than 5 images by 1 artist.  Motion: You may put 10% or 3 minutes (whichever is less) of a copyrighted film into your presentation.  Any image that you find online needs a citation.  Paste the URL of the image directly beneath it. 17
  • 18. Copyright Resources  http://www.cyberbee.com/cb_copyright.swf  http://kb.iu.edu/data/arit.html  http://www.copyrightkids.org/cbasicsframes.htm 18