SlideShare a Scribd company logo
Arpanet
Robert Thompson
Block 2
Hard bounce and soft bounce
• Hard bounce is an email that got returned to
sender because the person they were sending
to has a non valid email address
• Soft bounce is when it gets there then just
sent back
Computer spam
• This is when someone sends out the same
email to many people lots of times to get
them to buy something or just bug them
Internet vs Intranet
• There a few major differences like that
intranet and internet are to totally different
environments and the intranet runs faster.
Pop
• Short for post office protocol and it is app
layer internet
Phishing
• This is a computer frauds attempt at getting
information from you.
Encryption and decryption
• This is when u send someone a message on
your computer that is all scrambled and weird
so that if someone were to get it they could
not read it and decryption is when they get it
and unscramble it so they can read it.
Netiquette
• This is how you should act when you are
online and it is important so that you don’t get
in trouble
Router
• A router is the thing that connects you up the
computer to the internet
Router
• A router is the thing that connects you up the
computer to the internet

More Related Content

What's hot

Lesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the InternetLesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the Internetguevarra_2000
 
Welcome pc
Welcome pcWelcome pc
Welcome pc
hbhardwaj1
 
Protocols presentation
Protocols presentationProtocols presentation
Protocols presentation
Louise Reed
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
The internet
The internetThe internet
The internet
Kaunain Ahmad
 
Take a Tour of ringEmail Service
Take a Tour of ringEmail ServiceTake a Tour of ringEmail Service
Take a Tour of ringEmail ServiceClearhub Pte Ltd
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateMegan Hoerauf
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devicesbrownjordan
 
Comppt22
Comppt22Comppt22
Comppt22Deliad
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
Buddhima Wijerathna Wickramasinghe
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemailu083133
 
E mail and fax
E mail and faxE mail and fax
E mail and fax
Ankit Gupta
 
Internet connections
Internet connectionsInternet connections
Internet connections
entonline
 
Email Ppt
Email PptEmail Ppt
Email PptDyern
 
Email
EmailEmail

What's hot (19)

Lesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the InternetLesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the Internet
 
week10
week10week10
week10
 
Welcome pc
Welcome pcWelcome pc
Welcome pc
 
Protocols presentation
Protocols presentationProtocols presentation
Protocols presentation
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Email ppt
Email pptEmail ppt
Email ppt
 
The internet
The internetThe internet
The internet
 
Take a Tour of ringEmail Service
Take a Tour of ringEmail ServiceTake a Tour of ringEmail Service
Take a Tour of ringEmail Service
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
Comppt22
Comppt22Comppt22
Comppt22
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemail
 
E mail and fax
E mail and faxE mail and fax
E mail and fax
 
The Internet
The InternetThe Internet
The Internet
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Email
EmailEmail
Email
 

Viewers also liked

From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
The New School
 
Arpanet
ArpanetArpanet
Arpanet
jeremygc99
 
History of the internet.pptx done!
History of the internet.pptx done!History of the internet.pptx done!
History of the internet.pptx done!arivas2595
 
Shortcut Keys
Shortcut KeysShortcut Keys
Shortcut Keys
lynblair
 
Excel short cut key
Excel short cut keyExcel short cut key
Excel short cut key
adarshcrp
 
Basics of computers
Basics of computersBasics of computers
Basics of computers
pankaj chandel
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
Huggermugger Eran
 
Arpanet
ArpanetArpanet
Arpanetsmithz
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
Kalpana Dangol
 
Shortcuts (Computer commannds)
Shortcuts (Computer commannds)Shortcuts (Computer commannds)
Shortcuts (Computer commannds)
NadeemZaman Pakistan
 
Operating system by ajay yadav shq upr
Operating system by ajay yadav shq uprOperating system by ajay yadav shq upr
Operating system by ajay yadav shq upr
Ajay Yadav
 
computer virus
computer viruscomputer virus
computer virus
Kunal Yadav
 
10 Important Points for Interview Skills
10 Important Points for Interview Skills10 Important Points for Interview Skills
10 Important Points for Interview Skills
bhaktibhatt
 
Basics of computer & internet .pptx
Basics of computer & internet  .pptxBasics of computer & internet  .pptx
Basics of computer & internet .pptx
Satish k
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PC
shashikant pabari
 
Keyboard shortcuts
Keyboard shortcutsKeyboard shortcuts
Keyboard shortcuts
Rajusrivastawa
 
ARPANET
ARPANETARPANET
ARPANET
Akhil Kaushik
 

Viewers also liked (20)

From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
 
Arpanet
ArpanetArpanet
Arpanet
 
Arpanet.53
Arpanet.53Arpanet.53
Arpanet.53
 
History of the internet.pptx done!
History of the internet.pptx done!History of the internet.pptx done!
History of the internet.pptx done!
 
Shortcut Keys
Shortcut KeysShortcut Keys
Shortcut Keys
 
Excel short cut key
Excel short cut keyExcel short cut key
Excel short cut key
 
Basics of computers
Basics of computersBasics of computers
Basics of computers
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Arpanet
ArpanetArpanet
Arpanet
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Shortcuts (Computer commannds)
Shortcuts (Computer commannds)Shortcuts (Computer commannds)
Shortcuts (Computer commannds)
 
Operating system by ajay yadav shq upr
Operating system by ajay yadav shq uprOperating system by ajay yadav shq upr
Operating system by ajay yadav shq upr
 
computer virus
computer viruscomputer virus
computer virus
 
10 Important Points for Interview Skills
10 Important Points for Interview Skills10 Important Points for Interview Skills
10 Important Points for Interview Skills
 
Basics of computer & internet .pptx
Basics of computer & internet  .pptxBasics of computer & internet  .pptx
Basics of computer & internet .pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PC
 
Keyboard shortcuts
Keyboard shortcutsKeyboard shortcuts
Keyboard shortcuts
 
All About Short Keys
All About Short KeysAll About Short Keys
All About Short Keys
 
ARPANET
ARPANETARPANET
ARPANET
 

Similar to Arpanet

The internet
The internetThe internet
The internet
joseph0914
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
chairesj
 
Carnivore
CarnivoreCarnivore
Carnivore
sabnam jebin
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatesarah s
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
namansaini11
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
Shail Shah
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Anil Pokhrel
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internetnivi88
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojoseph
Jijo Joseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateJijo Joseph
 
DIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmarDIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmar
JAMESFRANCISGOSE
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2erowell
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2dlombana
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
Bangladesh Network Operators Group
 
Protocols
Protocols Protocols
Protocols
Louise Reed
 
Protocols
Protocols Protocols
Protocols
Louise Reed
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication InvestigateBrain Young
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateBrain Young
 

Similar to Arpanet (20)

The internet
The internetThe internet
The internet
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
 
Presentation1(1)
Presentation1(1)Presentation1(1)
Presentation1(1)
 
Carnivore
CarnivoreCarnivore
Carnivore
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internet
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojoseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com template
 
DIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmarDIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmar
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Protocols
Protocols Protocols
Protocols
 
Protocols
Protocols Protocols
Protocols
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 

More from Rthompson2

Second Other One
Second Other OneSecond Other One
Second Other OneRthompson2
 
Slide Show 2 2
Slide Show 2 2Slide Show 2 2
Slide Show 2 2Rthompson2
 
Slide Show 1 2
Slide Show 1 2Slide Show 1 2
Slide Show 1 2Rthompson2
 
Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Rthompson2
 

More from Rthompson2 (6)

Playstation
PlaystationPlaystation
Playstation
 
Second Other One
Second Other OneSecond Other One
Second Other One
 
Other One
Other OneOther One
Other One
 
Slide Show 2 2
Slide Show 2 2Slide Show 2 2
Slide Show 2 2
 
Slide Show 1 2
Slide Show 1 2Slide Show 1 2
Slide Show 1 2
 
Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Arpanet

  • 2. Hard bounce and soft bounce • Hard bounce is an email that got returned to sender because the person they were sending to has a non valid email address • Soft bounce is when it gets there then just sent back
  • 3. Computer spam • This is when someone sends out the same email to many people lots of times to get them to buy something or just bug them
  • 4. Internet vs Intranet • There a few major differences like that intranet and internet are to totally different environments and the intranet runs faster.
  • 5. Pop • Short for post office protocol and it is app layer internet
  • 6. Phishing • This is a computer frauds attempt at getting information from you.
  • 7. Encryption and decryption • This is when u send someone a message on your computer that is all scrambled and weird so that if someone were to get it they could not read it and decryption is when they get it and unscramble it so they can read it.
  • 8. Netiquette • This is how you should act when you are online and it is important so that you don’t get in trouble
  • 9. Router • A router is the thing that connects you up the computer to the internet
  • 10. Router • A router is the thing that connects you up the computer to the internet