Communication protocols govern inter-machine communication.

 

IP establishes ffg. Rules:

 

  1. Every node (computer) on the Internet will have an Internet address made up of four numbers, with each number to be less than 256.
  2. All messages are divided into pockets of information.
  3. Each message packet is stuffed (electronically speaking) into an IP envelope.
  4. The outside of the IP envelope contains the address to which the envelope is being sent and the address of the computer sending the messages.

 

Some of the computers that make up the Internet are routers. These computers are responsible for making sure that messages sent out on the Internet are routed to the correct destination.

 

Choosing a service provider

 

Finding the right access would require obtaining information and comparing services.

 

Comparison of choices of dedicated providers vary.

 

Service providers

 

 

Limitations of Plain Old Telephone Service (POTS)

 

POTS has inherent problem being analog technology tuned for distribution of voice information. Thus thus is less than ideal for connecting to digital internet.

 

Bandwith to transmit analog voice is around 3000 cycles per second, which is the raw bandwith of a pots line. Maximum usage of 3000 hertz of bandwith could be accomplished with various analog encoding tricks such as frequency shift keying (300-2400 bits per second), quadrature amplitude modulation (4800-9600 bps) and phase quadrature modulation (9600 bps and above).

 

Crackers breaking in

 

Crackers may  break into multiple computers to make it difficult to find point of origin, an activity known as “connection laundering.”

 

Password do’s and don’ts

 

1.      Joes, an account where the username is identical to the password. This is great for a cracker, since the password is easy to guess and remember. Don’t use password that is username in reverse, capitalized or doubled.

2.      Don’t use same password on every machine. This practice though hassle-free for the user since only one password should be remembered, but also so for the cracker as many systems may be entered by using the same password.

3.      Don’t write passwords down as having passwords in your wallet may provide access to computer systems if wallet is stolen, the same applies to keeping copies of passwords in file cabinest or desk drawers. This may be obviated by selecting an easy to remember password.

4.      Don’t use first or last name or combination as password.

5.      Don’t use spouse’s or child’s name as password.

6.      Don’t use password of all digits or all of the same letter.

7.      Don’t use personal information that is easily obtainable.

8.      Don’t use a word from the dictionary since internet worm also used dictionary to break passwords.

9.      Don’t use password shorter than 6 characters.

10.  Don’t feel secure with long password such as a sentence.

11.  Do use a password with mixed-case alphabetics.

12.  Do use a password with nonalphabetic charcters.

13.  Use a password you can type quickly without having to look at keyboard since another could watch if you type too slow.

 

You could select a line of verse using first, second, third letter from each word.

 

Services that provide gateways

 

  • America Online
  • AppleLink
  • AT&T Mail
  • BITNET
  • BIX
  • CompuServe
  • Connect PIN
  • Delphi
  • Easylink
  • Envoy-100
  • FidoNet
  • Genie
  • GeoNet
  • Gold 400
  • IBMMAIL
  • KeyLink
  • MCI Mail
  • Prodigy
  • SprintMail
  • WWIVNet

 

Some alternatives to listserv software

 

  • Almanac
  • MAILBASE
  • PMDF Mailserv
  • MAJORDOMO
  • UNIX Listserver
  • Usenet newsgroups
  • Various homegrown list servers
  • Manually maintained lists

 

Flames vs smileys

 

Flames happen when one user sends sarcastic, insulting and nasty comment triggered by a silly comment or breach of network rules.

 

Smileys clearly need no explaining by now.

 

Environmental variables

 

  • EDITOR
  • MAILER
  • PAGER
  • SHELL
  • NEWSBOX
  • NAME
  • ORGANISATION
  • NEWSOPTS

 

Marketing items that can be successfully translated into Internet activities:

 

  • Product flyers or introductory information
  • Product announcements
  • Product specification sheets
  • Pricing information
  • Catalogs
  • Events and demos
  • Free software
  • Customer support
  • Company contacts
  • Promotional notices of specials and sales
  • Documentaion and manuals
  • Multimedia description
  • Market and customer surveys and needs assessments
  • Product performance data
  • Service evalutions
  • Reviews and product commentary
  • Customer service information and functions
  • Job placement or recruitment notices
  • Dialogs with customers and others

 

 

 

 

 

P.S. Thanks for pawsing to e-mail me.
o,-.___,-.
0\./).".(\./
ooo(_0_)
oOo/ \/))
00,,(II.II)
oo00.00
Please..\~~~~~~
odrop…..\~~~~~
oOme……\~~~
ooOa……….\`~
oOOoline.O…\~
ooOOosome.o..\
OOooOOtime.o./
ooooOOO0o~~\.o./
oOoOoO~~.~–~/
OOoo~~~\\/''\
OOO~~.o//\__-==
~~~~ooo..//

 

Advertisements