IS 161
BASIC COMPUTER APPLICATIONS
Intro. to Internet and E-mail
1
Module Objectives
• Understanding of what the Internet is and
how it operates.
• Acquiring skills to conduct searches and
research on the Internet using the World
Wide Web and ethics envolved.
• Understanding and using Internet
communication tools.
2
Introduction
to the
Internet and Web
3
The Internet
• It is the largest network in the world that
connects hundreds of thousands of
individual networks all over the world.
• The popular term for the Internet is the
“information highway”.
• Rather than moving through geographical
space, it moves your ideas and information
through cyberspace – the space of
electronic movement of ideas and
information.
4
Internet
• No one owns it
• It has no formal management organization.
• As it was originally developed by the
Department of defense, this lack of
centralization made it less vulnerable to
wartime or terrorist attacks.
• To access the Internet, an existing network
need to pay a small registration fee and
agree to certain standards based on the
TCP/IP (Transmission Control
Protocol/Internet Protocol) .
5
The Internet
• Every computer in Internet is identified by a
unique IP address. IP Address is a unique
set of numbers (such as 110.22.33.114)
which identifies a computer’s location.
• Internet is accessible to every user all over
the world
6
The Internet
• A special computer DNS (Domain Name
Server) is used to provide a name to the IP
Address so that the user can locate a
computer by a name.
• For example, a DNS server will resolve a
name http://www.google.com to a
particular IP address to uniquely identify
the computer on which this website is
hosted.
7
The Internet
How DNS works
8
The uses of the Internet
• Send e-mail messages.
• Send (upload) or receive (download) files
between computers.
• Participate in discussion groups, such as
mailing lists and newsgroups.
• Surfing the web.
9
The Intranet
• Intranet is the system in which multiple PCs
are connected to each other.
• PCs in intranet are not available to the
world outside the intranet.
• Usually each organization has its own
Intranet network and members/employees
of that organization can access the
computers in their intranet.
10
The Intranet
• Each computer in Intranet is also identified
by an IP Address which is unique among the
computers in that Intranet.
11
The Internet vs Intranet
12
Similarities between Internet and
Intranet
• Intranet uses the internet protocols such as
TCP/IP and FTP.
• Intranet sites are accessible via the web
browser in a similar way as websites in the
internet. However, only members of
Intranet network can access intranet hosted
sites.
13
Similarities between Internet and
Intranet
• In Intranet, own instant messengers can be
used as similar to yahoo messenger/gtalk
over the internet
14
Differences between Internet
and Intranet
• Internet is general to PCs all over the world
whereas Intranet is specific to few PCs.
• Internet provides a wider and better access
to websites to a large population, whereas
Intranet is restricted.
• Internet is not as safe as Intranet. Intranet
can be safely privatized as per the need.
15
What is Web?
• The Web (World Wide Web) consists of information
organized into Web pages containing text and graphic
images.
• It contains hypertext links, or highlighted keywords
and images that lead to related information.
• A collection of linked Web pages that has a common
theme or focus is called a Web site.
• The main page that all of the pages on a particular
Web site are organized around and link back to is
called the site’s home page.
16
How to access the Internet?
• Many schools and businesses have direct
access to the Internet using special high-
speed communication lines and equipment.
• Students and employees can access
through the organization’s local area
networks (LAN) or through their own
personal computers.
• Another way to access the Internet is
through Internet Service Provider (ISP).
17
Internet Service Provider (ISP)
• A commercial organization with permanent
connection to the Internet that sells
temporary connections to subscribers.
• Examples:
• Prodigy, America Online, Microsoft
network, AT&T Networks.
18
How to access the Web?
• Once you have your Internet connection, then
you need special software called a browser to
access the Web.
• Web browsers are used to connect you to
remote computers, open and transfer files,
display text and images.
• Web browsers are specialized programs.
• Examples of Web browser: Mozilla fire fox,
Internet Explorer, Google chrome, Netscape
Navigator (Navigator) and Operamini.
19
Client/Server Structure of the Web
• Web is a collection of files that reside on computers,
called Web servers, that are located all over the
world and are connected to each other through the
Internet.
• When you use your Internet connection to become
part of the Web, your computer becomes a Web
client in a worldwide client/server network.
• A Web browser is the software that you run on your
computer to make it work as a web client.
20
Hypertext Markup Language
(HTML)
• The public files on the web servers are ordinary
text files, much like the files used by word-
processing software.
• To allow Web browser software to read them,
the text must be formatted according to a
generally accepted standard.
• The standard used on the web is Hypertext
markup language (HTML).
21
Hypertext Markup Language (HTML)
• HTML uses codes, or tags, to tell the Web browser
software how to display the text contained in the
document.
• For example, a Web browser reading the
following line of text:
<B> A Review of the Book<I>Wind
Instruments of the 18th Century</I></B>
• recognizes the <B> and </B> tags as instructions
to display the entire line of text in bold and the
<I> and </I> tags as instructions to display the text
enclosed by those tags in italics.
22
Addresses on the Web:IP Addressing
• Each computer on the internet does have a
unique identification number, called an IP
(Internet Protocol) address.
• The IP addressing system currently in use on
the Internet uses a four-part number.
• Each part of the address is a number ranging
from 0 to 255, and each part is separated from
the previous part by period,
• For example, 106.29.242.17
23
IP Addressing
• The combination of the four IP address parts
provides 4.2 billion possible addresses (256 x
256 x 256 x 256).
• This number seemed adequate until 1998.
• Members of various Internet task forces are
working to develop an alternate addressing
system that will accommodate the projected
growth.
• However, all of their working solutions require
extensive hardware and software changes
throughout the Internet.
24
Domain Name Addressing
• Most web browsers do not use the IP address t locate
Web sites and individual pages.
• They use domain name addressing.
• A domain name is a unique name associated with a
specific IP address by a program that runs on an
Internet host computer.
• This program, which coordinates the IP addresses and
domain names for all computers attached to it, is
called DNS (Domain Name System ) software.
• The host computer that runs this software is called a
domain name server.
25
Domain Name Addressing
• Domain names can include any number of parts
separated by periods, however most domain names
currently in use have only three or four parts.
• Domain names follow hierarchical model that you can
follow from top to bottom if you read the name from
the right to the left.
• For example, the domain name gsb.uchicago.edu is the
computer connected to the Internet at the Graduate
School of Business (gsb), which is an academic unit of
the University of Chicago (uchicago), which is an
educational institution (edu).
• No other computer on the Internet has the same
domain name. 26
Uniform Resource Locators
• The IP address and the domain name each identify a particular
computer on the Internet.
• However, they do not indicate where a Web page’s HTML
document resides on that computer.
• To identify a Web pages exact location, Web browsers rely on
Uniform Resource Locator (URL).
• URL is a four-part addressing scheme that tells the Web
browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file resides
 The pathname of the folder or directory on the computer on
which the file resides
 The name of the file
27
Structure of a Uniform Resource Locators
http://www.chicagosymphony.org/civicconcerts/index.htm
protocol
Domain name
pathname
filename
http => Hypertext Transfer Protocol
28
HTTP
• The transfer protocol is the set of rules that the
computers use to move files from one computer
to another on the Internet.
• The most common transfer protocol used on the
Internet is the Hypertext Transfer Protocol (HTTP).
• Two other protocols that you can use on the
Internet are the File Transfer Protocol (FTP) and
the Telnet Protocol
29
How to find information on the Web?
• A number of search tools have been developed and
available to you on certain Web sites that provide
search services to help you find information.
• Examples:
 Google  www.google.com
 Yahoo  www.yahoo.com
 Excite  www.excite.com
 Lycos  www.lycos.com
 AltaVista  www/alta-vista.com
 MSN WebSearch  www.search.msn.com
30
How to find information on the Web?
• You can find information by two basic means.
• Search by Topic and Search by keywords.
• Some search services offer both methods, others only
one.
• Yahoo offers both.
 Search by Topic
You can navigate through topic lists
 Search by keywords
You can navigate by entering a keyword or phase into
a search text box.
31
What is email?
• Electronic mail, most commonly referred to
as email or e-mail since 1993, is a method
of exchanging digital messages from an
author to one or more recipients
• You can use email to send & receive
messages over the internet
32
What you need
• a computer with internet access
• an email account with a service provider such as
Yahoo, Gmail, Hotmail, etc.
• note: Microsoft Outlook and Apple Mail, are NOT
email providers (which is why you can’t email
from library computers without an account)
33
Choosing an email provider
• Most common are Hotmail (Microsoft), Gmail
(Google), Yahoo Mail (Yahoo!)
34
Setting up your email account
• Parts of an email address: kulwa@yahoo.com
– user name : kulwa (you create your own)
(each is unique)
– @ symbol : unique to email addresses
– email provider’s name: yahoo
– domain : .com (yours will be .com)
35
Password
• Something easy to remember, but difficult to
guess
– Do NOT use sensitive information, such as
SSN, bank PIN, etc.
• Usually a combination of letters and numbers
is best
• Verification questions in case you forget your
password
36
The parts of an email
• To : enter the exact email address of your
recipient (remember: name@provider.domain)
For multiple recipients, separate each address
with a comma
• CC : carbon copy
• BCC : BLIND carbon copy – is anonymous
• Subject : the topic of your email – very important
• Body : the message of your email
• Attachments : the paperclip symbol - files or
photos
37
DRAFT EMAILS & SAVING FOR LATER
• Drafts: When creating an e-mail the computer
will automatically save your work periodically. If
for any reason you should be interrupted (i.e.
lapse in internet connection) you can retrieve
your latest work what is called the DRAFT BOX.
38
Receiving email
• If you have any messages you should see them
listed on the screen or in your Inbox
• At the top of each message is a header with
information about the sender, date, and routing
of each message.
From: kulwa@yahoo.com (Kulwa Steven)
To: neema@gmail.com
CC:
Subject: Email Basics class
Date: Mon, 3 May 2010 8:31 PST
39
Replying to an email
• Reply vs Reply All
• When you click on Reply, your message will
automatically be sent to the person who
sent you the email (FROM field in header.)
• When you click on Reply All, your message
will automatically be sent to the person who
sent you the email AND everyone in the TO
and CC fields in the header.
40
Forwarding an email
• When you click on FORWARD, you may
share the email you’ve received by sending
it to others.
• You may add your own message before
sending.
41
Opening attachments
• Usually photos or documents
• If you don’t know the sender, do NOT open
the attachment
• Avoid opening files with executable
extensions such
as .exe, .cmd, .com, .vbe, .bat etc. especially
when you don’t know the sender
42
Deleting email &trash can
• Once you’ve read an email, you must decide if you
want to save it or delete it.
• Click on delete to send the email to the TRASH CAN
• The message disappears from your list of messages but
is not truly deleted yet, so if you make a mistake you
can get the message back.
• Just look in the Trash folder. However, once you exit the
program, the messages are usually deleted for good.
43
Privacy, viruses, & spam
• Privacy: CC vs BCC
• Viruses: Never open attachments from unknown
senders.
• Safety: Never send personal financial information
via email, even if it looks like a legitimate request
from your bank or financial institution.
• Spam: unsolicited commercial email, so delete
them
44
Chatting & texting
Texting Online
Is similar to texting using a cell phone but texts received can
only be viewed once, then they are permanently deleted after
being read. This is useful if you do not have a cell phone or
will not be near your cell phone and need to communicate to
another cell phone.
Chatting
This is real-time communication with no delay. Usually done
with those you know online. Be selective who you chat with.
As with spam and phishing, scams can occur with chatting as
well.
45
To Sign-out
46
Internet and Security
47
Phishing Scams
• Phishing is the attempt to acquire sensitive
information such as usernames, passwords, and
credit card details ( and sometimes, indirectly,
money), often for malicious reasons. By
masquerading as a trustworthy entity in electronic
communication.
• Phishers use a number of different techniques to
try to trick their victims. Below are some of
techniques one should be aware off in order to
prevent him/her self from phishing scams
48
Phishing techniques
1. Key-loggers and Screen-loggers are particular
varieties of malware that track keyboard input
and send relevant information to the hacker via
the Internet. They can embed themselves into
users' browsers as small utility programs known
as helper objects that run automatically when
the browser is started as well as into system files
as device drivers or screen monitors.
49
Phishing techniques
2. Malware-Based Phishing refers to scams that
involve running malicious software on users' PCs.
Malware can be introduced as an email
attachment, as a downloadable file from a web
site, or by exploiting known security
vulnerabilities--a particular issue for small and
medium businesses (SMBs) who are not always
able to keep their software applications up to
date.
50
Phishing techniques
3. Deceptive Phishing. The term "phishing" originally
referred to account theft using instant messaging but
the most common broadcast method today is a
deceptive email message. Messages about the need to
verify account information, system failure requiring
users to re-enter their information, fictitious account
charges, undesirable account changes, new free
services requiring quick action, and many other scams
are broadcast to a wide group of recipients with the
hope that the unwary will respond by clicking a link to
or signing onto a bogus site where their confidential
information can be collected.
51
Phishing techniques
4. Search Engine Phishing occurs when phishers create
websites with attractive (often too attractive)
sounding offers and have them indexed legitimately
with search engines. Users find the sites in the
normal course of searching for products or services
and are fooled into giving up their information. For
example, scammers have set up false banking sites
offering lower credit costs or better interest rates
than other banks. Victims who use these sites to save
or make more from interest charges are encouraged
to transfer existing accounts and deceived into giving
up their details.
52
Phishing techniques
5. Man-in-the-Middle Phishing is harder to detect than
many other forms of phishing. In these attacks
hackers position themselves between the user and
the legitimate website or system. They record the
information being entered but continue to pass it on
so that users' transactions are not affected. Later
they can sell or use the information or credentials
collected when the user is not active on the system.
53
How to prevent phishing scams
1. Check the email Carefully A phishing email may
claim to be from a legitimate company and when you
click the link to the website, it may look exactly like
the real website. The email may ask you to fill in the
information. Most phishing emails will start with
“Dear Customer” so you should be alert when you
come across these emails. You should know that a
legitimate company will not send spam emails. The
email may contain the names of fictional personnel
who supposedly work in the legitimate company.
54
How to prevent phishing scams
2. Never Enter Financial or Personal Information: Most
of the phishing emails will direct you to pages where
entries for financial or personal information are
required. An Internet user should never make
confidential entries through the links provided in the
emails.
55
How to prevent phishing scams
3. Protection through Software: Anti-spyware and
firewall settings should be used to prevent phishing
attacks and users should update the programs
regularly. Firewall protection prevents access to
malicious files by blocking the attacks. Antivirus
software scans every file which comes through the
Internet to your computer. It helps to prevent
damage to your system.
56
How to prevent phishing scams
4. Never Send Personal Information through emails:
Never send an email with sensitive information to
anyone. Make it a habit to check the address of the
website. A secure website always starts with “https”.
57
How to prevent phishing scams
5. Check Bank Details Regularly: To prevent bank
phishing and credit card phishing scams, you should
personally check your statements regularly. Get
monthly statements for your financial accounts and
check each and every entry carefully to ensure no
fraudulent transactions have been made without
your knowledge.
58
How to prevent phishing scams
6. Never Download Files from Unreliable Sources: If
you get a message stating a certain website may
contain malicious files, do not open the website.
Web browsers provide settings to prevent access to
malicious web pages and when you try to access a
malicious site, an alert message will appear. Never
download files from suspicious emails or websites.
Even search engines may show certain links which
may lead users to a phishing webpage which offers
low cost products. If the user makes purchases at
such a website, the credit card details will be
accessed by the phishers.
59

Module 2 - Introduction to Internet and E-mail-1_075923.pptx

  • 1.
    IS 161 BASIC COMPUTERAPPLICATIONS Intro. to Internet and E-mail 1
  • 2.
    Module Objectives • Understandingof what the Internet is and how it operates. • Acquiring skills to conduct searches and research on the Internet using the World Wide Web and ethics envolved. • Understanding and using Internet communication tools. 2
  • 3.
  • 4.
    The Internet • Itis the largest network in the world that connects hundreds of thousands of individual networks all over the world. • The popular term for the Internet is the “information highway”. • Rather than moving through geographical space, it moves your ideas and information through cyberspace – the space of electronic movement of ideas and information. 4
  • 5.
    Internet • No oneowns it • It has no formal management organization. • As it was originally developed by the Department of defense, this lack of centralization made it less vulnerable to wartime or terrorist attacks. • To access the Internet, an existing network need to pay a small registration fee and agree to certain standards based on the TCP/IP (Transmission Control Protocol/Internet Protocol) . 5
  • 6.
    The Internet • Everycomputer in Internet is identified by a unique IP address. IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location. • Internet is accessible to every user all over the world 6
  • 7.
    The Internet • Aspecial computer DNS (Domain Name Server) is used to provide a name to the IP Address so that the user can locate a computer by a name. • For example, a DNS server will resolve a name http://www.google.com to a particular IP address to uniquely identify the computer on which this website is hosted. 7
  • 8.
  • 9.
    The uses ofthe Internet • Send e-mail messages. • Send (upload) or receive (download) files between computers. • Participate in discussion groups, such as mailing lists and newsgroups. • Surfing the web. 9
  • 10.
    The Intranet • Intranetis the system in which multiple PCs are connected to each other. • PCs in intranet are not available to the world outside the intranet. • Usually each organization has its own Intranet network and members/employees of that organization can access the computers in their intranet. 10
  • 11.
    The Intranet • Eachcomputer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet. 11
  • 12.
    The Internet vsIntranet 12
  • 13.
    Similarities between Internetand Intranet • Intranet uses the internet protocols such as TCP/IP and FTP. • Intranet sites are accessible via the web browser in a similar way as websites in the internet. However, only members of Intranet network can access intranet hosted sites. 13
  • 14.
    Similarities between Internetand Intranet • In Intranet, own instant messengers can be used as similar to yahoo messenger/gtalk over the internet 14
  • 15.
    Differences between Internet andIntranet • Internet is general to PCs all over the world whereas Intranet is specific to few PCs. • Internet provides a wider and better access to websites to a large population, whereas Intranet is restricted. • Internet is not as safe as Intranet. Intranet can be safely privatized as per the need. 15
  • 16.
    What is Web? •The Web (World Wide Web) consists of information organized into Web pages containing text and graphic images. • It contains hypertext links, or highlighted keywords and images that lead to related information. • A collection of linked Web pages that has a common theme or focus is called a Web site. • The main page that all of the pages on a particular Web site are organized around and link back to is called the site’s home page. 16
  • 17.
    How to accessthe Internet? • Many schools and businesses have direct access to the Internet using special high- speed communication lines and equipment. • Students and employees can access through the organization’s local area networks (LAN) or through their own personal computers. • Another way to access the Internet is through Internet Service Provider (ISP). 17
  • 18.
    Internet Service Provider(ISP) • A commercial organization with permanent connection to the Internet that sells temporary connections to subscribers. • Examples: • Prodigy, America Online, Microsoft network, AT&T Networks. 18
  • 19.
    How to accessthe Web? • Once you have your Internet connection, then you need special software called a browser to access the Web. • Web browsers are used to connect you to remote computers, open and transfer files, display text and images. • Web browsers are specialized programs. • Examples of Web browser: Mozilla fire fox, Internet Explorer, Google chrome, Netscape Navigator (Navigator) and Operamini. 19
  • 20.
    Client/Server Structure ofthe Web • Web is a collection of files that reside on computers, called Web servers, that are located all over the world and are connected to each other through the Internet. • When you use your Internet connection to become part of the Web, your computer becomes a Web client in a worldwide client/server network. • A Web browser is the software that you run on your computer to make it work as a web client. 20
  • 21.
    Hypertext Markup Language (HTML) •The public files on the web servers are ordinary text files, much like the files used by word- processing software. • To allow Web browser software to read them, the text must be formatted according to a generally accepted standard. • The standard used on the web is Hypertext markup language (HTML). 21
  • 22.
    Hypertext Markup Language(HTML) • HTML uses codes, or tags, to tell the Web browser software how to display the text contained in the document. • For example, a Web browser reading the following line of text: <B> A Review of the Book<I>Wind Instruments of the 18th Century</I></B> • recognizes the <B> and </B> tags as instructions to display the entire line of text in bold and the <I> and </I> tags as instructions to display the text enclosed by those tags in italics. 22
  • 23.
    Addresses on theWeb:IP Addressing • Each computer on the internet does have a unique identification number, called an IP (Internet Protocol) address. • The IP addressing system currently in use on the Internet uses a four-part number. • Each part of the address is a number ranging from 0 to 255, and each part is separated from the previous part by period, • For example, 106.29.242.17 23
  • 24.
    IP Addressing • Thecombination of the four IP address parts provides 4.2 billion possible addresses (256 x 256 x 256 x 256). • This number seemed adequate until 1998. • Members of various Internet task forces are working to develop an alternate addressing system that will accommodate the projected growth. • However, all of their working solutions require extensive hardware and software changes throughout the Internet. 24
  • 25.
    Domain Name Addressing •Most web browsers do not use the IP address t locate Web sites and individual pages. • They use domain name addressing. • A domain name is a unique name associated with a specific IP address by a program that runs on an Internet host computer. • This program, which coordinates the IP addresses and domain names for all computers attached to it, is called DNS (Domain Name System ) software. • The host computer that runs this software is called a domain name server. 25
  • 26.
    Domain Name Addressing •Domain names can include any number of parts separated by periods, however most domain names currently in use have only three or four parts. • Domain names follow hierarchical model that you can follow from top to bottom if you read the name from the right to the left. • For example, the domain name gsb.uchicago.edu is the computer connected to the Internet at the Graduate School of Business (gsb), which is an academic unit of the University of Chicago (uchicago), which is an educational institution (edu). • No other computer on the Internet has the same domain name. 26
  • 27.
    Uniform Resource Locators •The IP address and the domain name each identify a particular computer on the Internet. • However, they do not indicate where a Web page’s HTML document resides on that computer. • To identify a Web pages exact location, Web browsers rely on Uniform Resource Locator (URL). • URL is a four-part addressing scheme that tells the Web browser:  What transfer protocol to use for transporting the file  The domain name of the computer on which the file resides  The pathname of the folder or directory on the computer on which the file resides  The name of the file 27
  • 28.
    Structure of aUniform Resource Locators http://www.chicagosymphony.org/civicconcerts/index.htm protocol Domain name pathname filename http => Hypertext Transfer Protocol 28
  • 29.
    HTTP • The transferprotocol is the set of rules that the computers use to move files from one computer to another on the Internet. • The most common transfer protocol used on the Internet is the Hypertext Transfer Protocol (HTTP). • Two other protocols that you can use on the Internet are the File Transfer Protocol (FTP) and the Telnet Protocol 29
  • 30.
    How to findinformation on the Web? • A number of search tools have been developed and available to you on certain Web sites that provide search services to help you find information. • Examples:  Google  www.google.com  Yahoo  www.yahoo.com  Excite  www.excite.com  Lycos  www.lycos.com  AltaVista  www/alta-vista.com  MSN WebSearch  www.search.msn.com 30
  • 31.
    How to findinformation on the Web? • You can find information by two basic means. • Search by Topic and Search by keywords. • Some search services offer both methods, others only one. • Yahoo offers both.  Search by Topic You can navigate through topic lists  Search by keywords You can navigate by entering a keyword or phase into a search text box. 31
  • 32.
    What is email? •Electronic mail, most commonly referred to as email or e-mail since 1993, is a method of exchanging digital messages from an author to one or more recipients • You can use email to send & receive messages over the internet 32
  • 33.
    What you need •a computer with internet access • an email account with a service provider such as Yahoo, Gmail, Hotmail, etc. • note: Microsoft Outlook and Apple Mail, are NOT email providers (which is why you can’t email from library computers without an account) 33
  • 34.
    Choosing an emailprovider • Most common are Hotmail (Microsoft), Gmail (Google), Yahoo Mail (Yahoo!) 34
  • 35.
    Setting up youremail account • Parts of an email address: kulwa@yahoo.com – user name : kulwa (you create your own) (each is unique) – @ symbol : unique to email addresses – email provider’s name: yahoo – domain : .com (yours will be .com) 35
  • 36.
    Password • Something easyto remember, but difficult to guess – Do NOT use sensitive information, such as SSN, bank PIN, etc. • Usually a combination of letters and numbers is best • Verification questions in case you forget your password 36
  • 37.
    The parts ofan email • To : enter the exact email address of your recipient (remember: name@provider.domain) For multiple recipients, separate each address with a comma • CC : carbon copy • BCC : BLIND carbon copy – is anonymous • Subject : the topic of your email – very important • Body : the message of your email • Attachments : the paperclip symbol - files or photos 37
  • 38.
    DRAFT EMAILS &SAVING FOR LATER • Drafts: When creating an e-mail the computer will automatically save your work periodically. If for any reason you should be interrupted (i.e. lapse in internet connection) you can retrieve your latest work what is called the DRAFT BOX. 38
  • 39.
    Receiving email • Ifyou have any messages you should see them listed on the screen or in your Inbox • At the top of each message is a header with information about the sender, date, and routing of each message. From: kulwa@yahoo.com (Kulwa Steven) To: neema@gmail.com CC: Subject: Email Basics class Date: Mon, 3 May 2010 8:31 PST 39
  • 40.
    Replying to anemail • Reply vs Reply All • When you click on Reply, your message will automatically be sent to the person who sent you the email (FROM field in header.) • When you click on Reply All, your message will automatically be sent to the person who sent you the email AND everyone in the TO and CC fields in the header. 40
  • 41.
    Forwarding an email •When you click on FORWARD, you may share the email you’ve received by sending it to others. • You may add your own message before sending. 41
  • 42.
    Opening attachments • Usuallyphotos or documents • If you don’t know the sender, do NOT open the attachment • Avoid opening files with executable extensions such as .exe, .cmd, .com, .vbe, .bat etc. especially when you don’t know the sender 42
  • 43.
    Deleting email &trashcan • Once you’ve read an email, you must decide if you want to save it or delete it. • Click on delete to send the email to the TRASH CAN • The message disappears from your list of messages but is not truly deleted yet, so if you make a mistake you can get the message back. • Just look in the Trash folder. However, once you exit the program, the messages are usually deleted for good. 43
  • 44.
    Privacy, viruses, &spam • Privacy: CC vs BCC • Viruses: Never open attachments from unknown senders. • Safety: Never send personal financial information via email, even if it looks like a legitimate request from your bank or financial institution. • Spam: unsolicited commercial email, so delete them 44
  • 45.
    Chatting & texting TextingOnline Is similar to texting using a cell phone but texts received can only be viewed once, then they are permanently deleted after being read. This is useful if you do not have a cell phone or will not be near your cell phone and need to communicate to another cell phone. Chatting This is real-time communication with no delay. Usually done with those you know online. Be selective who you chat with. As with spam and phishing, scams can occur with chatting as well. 45
  • 46.
  • 47.
  • 48.
    Phishing Scams • Phishingis the attempt to acquire sensitive information such as usernames, passwords, and credit card details ( and sometimes, indirectly, money), often for malicious reasons. By masquerading as a trustworthy entity in electronic communication. • Phishers use a number of different techniques to try to trick their victims. Below are some of techniques one should be aware off in order to prevent him/her self from phishing scams 48
  • 49.
    Phishing techniques 1. Key-loggersand Screen-loggers are particular varieties of malware that track keyboard input and send relevant information to the hacker via the Internet. They can embed themselves into users' browsers as small utility programs known as helper objects that run automatically when the browser is started as well as into system files as device drivers or screen monitors. 49
  • 50.
    Phishing techniques 2. Malware-BasedPhishing refers to scams that involve running malicious software on users' PCs. Malware can be introduced as an email attachment, as a downloadable file from a web site, or by exploiting known security vulnerabilities--a particular issue for small and medium businesses (SMBs) who are not always able to keep their software applications up to date. 50
  • 51.
    Phishing techniques 3. DeceptivePhishing. The term "phishing" originally referred to account theft using instant messaging but the most common broadcast method today is a deceptive email message. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confidential information can be collected. 51
  • 52.
    Phishing techniques 4. SearchEngine Phishing occurs when phishers create websites with attractive (often too attractive) sounding offers and have them indexed legitimately with search engines. Users find the sites in the normal course of searching for products or services and are fooled into giving up their information. For example, scammers have set up false banking sites offering lower credit costs or better interest rates than other banks. Victims who use these sites to save or make more from interest charges are encouraged to transfer existing accounts and deceived into giving up their details. 52
  • 53.
    Phishing techniques 5. Man-in-the-MiddlePhishing is harder to detect than many other forms of phishing. In these attacks hackers position themselves between the user and the legitimate website or system. They record the information being entered but continue to pass it on so that users' transactions are not affected. Later they can sell or use the information or credentials collected when the user is not active on the system. 53
  • 54.
    How to preventphishing scams 1. Check the email Carefully A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. You should know that a legitimate company will not send spam emails. The email may contain the names of fictional personnel who supposedly work in the legitimate company. 54
  • 55.
    How to preventphishing scams 2. Never Enter Financial or Personal Information: Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. 55
  • 56.
    How to preventphishing scams 3. Protection through Software: Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system. 56
  • 57.
    How to preventphishing scams 4. Never Send Personal Information through emails: Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”. 57
  • 58.
    How to preventphishing scams 5. Check Bank Details Regularly: To prevent bank phishing and credit card phishing scams, you should personally check your statements regularly. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge. 58
  • 59.
    How to preventphishing scams 6. Never Download Files from Unreliable Sources: If you get a message stating a certain website may contain malicious files, do not open the website. Web browsers provide settings to prevent access to malicious web pages and when you try to access a malicious site, an alert message will appear. Never download files from suspicious emails or websites. Even search engines may show certain links which may lead users to a phishing webpage which offers low cost products. If the user makes purchases at such a website, the credit card details will be accessed by the phishers. 59