blog




  • Essay / Internet and its services - 4902

    Internet and its services Working with the Internet does not simply mean browsing www and sending and receiving e-mails. The basic structure of the Internet has been developed over the last 30 years of the Internet's existence. The Internet is a heterogeneous global network composed of a large number of host computers and local networks. The Internet uses the TCP/IP protocol suite. This allows the integration of a large number of different computers into a single network with very efficient communication between them. This way the user can access information on all types of host computers from a desktop, Macintosh or whatever they have. TCP/IP, the communications standard on which the Internet is based, originated from work done at the U.S. Department of Defense in the late 1960s. The first version of the Internet was created in 1969 and had just four computers. In 1982, a set of specifications and protocols were implemented, known as TCP/IP in reference to their two major elements, the Transmission Control Protocol and the Internet Protocol. The development and implementation of TCP/IP spurred a massive growth process for the Internet. "By the end of 1987, growth was estimated to have reached 15% per month and remained high for the next two years. By 1990, the connected Internet included more than 3,000 active networks, more than 3,000 networks active and more than 200,000 computers In January 1992 the number of hosts on the Internet was 727,000, doubling approximately every 7 months Different user groups are connected to the Internet: universities and other educational institutions, government agencies. , military and, increasingly, private companies The most basic function of the Internet is to transmit electronic information from one computer to another. A 32-bit Internet address or IP number identifies each computer. network This number is usually represented by four numbers connected by dots. However, for human users, these numbers are usually difficult to remember. Computers are also identified by domain names, which are to some extent similar to postal addresses. Special programs, called name servers, translate domain names into IP addresses. Internet services can be divided... middle of paper ... authors who put these things together, however, are getting more and more sneaky to get them to bypass firewalls. Comet Cursor, for example, uses an HTTP post command to connect without the intervention of a firewall. You can also install a registry monitor such as Regmon to monitor your registry for unwanted registry changes, but this is not foolproof either. Probably the best removal method is to download a spyware removal program and run it as if it were an antivirus. The best examples of these programs are: Adaware from Lavasoft. Available at http://www.lavasoftusa.com/ or on OptOut from professional cybernut Steve Gibson. Available at: http://grc.com/optout.htm, these two programs are free and are updated regularly. Here are some links, if you want to know more about spyware: http://www.spychecker.com/http://grc.com/optout.htmhttp://www.thebee.com/bweb/iinfo200. htmC. Illegal stuff.1. Cheating on paid sites.2. Hacking software.3. Downloading pirated apps and games.4. Ordering books and music CDs with the generated credit card.5. Read other people's emails.6. Spying on other people on the Internet.