90 likes | 205 Views
Basics, Ethics, & Security. FTP & Telnet. FTP-File Transfer Protocol Standard way of moving files over a network. Varied clients including Secure FTP, Web Browsers, and WS-FTP. Telnet Opens a session on a remote computer to perform tasks. Varied clients including Secure Shell. SECURE SHELL.
E N D
FTP & Telnet • FTP-File Transfer Protocol • Standard way of moving files over a network. • Varied clients including Secure FTP, Web Browsers, and WS-FTP. • Telnet • Opens a session on a remote computer to perform tasks. • Varied clients including Secure Shell.
SECURE SHELL • Graphical interface for TELNET and FTP. • Uses more secure communication than other utilities. • Allows some functions to be done in Windows style.
EMAIL • Electronic mail. • Varied clients including PINE (in telnet) and Web Browsers.
CLIENT-SERVER • Allows remote user to interact as if local. • Used when bandwidth is low or when resources must be centralized (like software). • Examples include Citrix, Telnet.
Security: Viruses/Trojans • A virus is a piece of software that attaches itself to a legitimate program and gets executed with the program, installing itself in memory and reproducing. • A Trojan is a program meant to distract the user while damage is done to the computer. • Threats: • Data corruption. • System shutdown. • Remedies: • Stick with commercial software purchased on CDs. • Install antivirus software and update the definitions regularly. • Only open e-mail attachments if you already know their content. • Back up your data regularly.
Security: Spyware • Software that performs tasks on your computer, typically without your consent. • Threats: • Unwanted pop-up ads. • Collects personal information. • Computer slows, crashes. • Remedies: • Install anti-spyware software. • Only download from sites you trust. • Research suspect programs with engines, friends.
Security: Hackers • People who look for a computer with a security hole for the purpose of exploiting the hole. This type of person is looking for a thrill, has something to prove or is simply acting with malice. • Threats: • Pick up your personal information. • Use your accounts. • Corrupt your computer with viruses, etc. • Remedies: • Set up a firewall. • Encrypt private data. • Update patches regularly.
Computing Ethics: Norms • Ethical norms extend to computer usage. • Some are minor issues, such as not using reply-all to mass emails, no flaming. • More important issues: consideration of Privacy and respect of Intellectual Property.