Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Internet applicationsInternet applicationsInternet applications, Lecture notes of Computer Science

Internet applicationsInternet applicationsInternet applicationsInternet applications

Typology: Lecture notes

2018/2019
On special offer
30 Points
Discount

Limited-time offer


Uploaded on 12/10/2019

karthik-stranger
karthik-stranger 🇮🇳

1 document

1 / 84

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Student Notes
for Computer
Science And
Computer
Applications
CS &
BCA
Prof. Charles E. Raj
INTERNET AND ITS APPLICATIONS
Student Notes
for Computer
Science And
Computer
Applications
CS &
BCA
Prof. Charles E. Raj
INTERNET AND ITS APPLICATIONS
CS &
BCA
Prof. Charles E. Raj
INTERNET AND ITS APPLICATIONS
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
Discount

On special offer

Partial preview of the text

Download Internet applicationsInternet applicationsInternet applications and more Lecture notes Computer Science in PDF only on Docsity!

Student Notes for Computer Science And Computer Applications

CS &

BCA

Prof. Charles E. Raj

INTERNET AND ITS APPLICATIONS

Student Notes for Computer Science And Computer Applications

CS &

BCA

Prof. Charles E. Raj

INTERNET AND ITS APPLICATIONS

Student Notes for Computer Science And Computer Applications

CS &

BCA

Prof. Charles E. Raj

INTERNET AND ITS APPLICATIONS

INTERNET AND ITS APPLICATIONS

UNIT- I

Connecting to the Internet – Domain Name System - Exchanging E-mail – Sending and Receiving Files -

Fighting Spam, Sorting Mail and avoiding e-mail viruses – types of viruses – Harmful effects of virus -

Chatting and Conferencing on the Internet – Online Chatting

CONNECTING TO THE INTERNET:

Internet Communications Protocols TCP/IP TCP and IP were developed by a department of defense (DOD) research project to connect a number different networks designed by different vendors into a networks of networks. It was initially successful because it delivered a few basic services that everyone needs file transfer, electronic mail, remote logon across a very large number of client and server systems. Several computers in a small department can use TCP/IP on a single LAN. IP: IP is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destinations address. The internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gate way machines that move data from department to organizations to region and then around the world. TCP: TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. INTERNET HOST : Each computer on the internet is called a host computer. The computers on the internet are millions of internet hosts, are connected by cables, phone lines and satellite connections. Internet protocol (IP) address IP defines a universal addressing scheme called IP address. An IP address is a 32 bit binary addressing scheme and each standard address is unique on the internet. IP addressing scheme is used to identify networks, networks devices and network

INTERNET AND ITS APPLICATIONS

UNIT- I

Connecting to the Internet – Domain Name System - Exchanging E-mail – Sending and Receiving Files -

Fighting Spam, Sorting Mail and avoiding e-mail viruses – types of viruses – Harmful effects of virus -

Chatting and Conferencing on the Internet – Online Chatting

CONNECTING TO THE INTERNET:

Internet Communications Protocols TCP/IP TCP and IP were developed by a department of defense (DOD) research project to connect a number different networks designed by different vendors into a networks of networks. It was initially successful because it delivered a few basic services that everyone needs file transfer, electronic mail, remote logon across a very large number of client and server systems. Several computers in a small department can use TCP/IP on a single LAN. IP: IP is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destinations address. The internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gate way machines that move data from department to organizations to region and then around the world. TCP: TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. INTERNET HOST : Each computer on the internet is called a host computer. The computers on the internet are millions of internet hosts, are connected by cables, phone lines and satellite connections. Internet protocol (IP) address IP defines a universal addressing scheme called IP address. An IP address is a 32 bit binary addressing scheme and each standard address is unique on the internet. IP addressing scheme is used to identify networks, networks devices and network

INTERNET AND ITS APPLICATIONS

UNIT- I

Connecting to the Internet – Domain Name System - Exchanging E-mail – Sending and Receiving Files -

Fighting Spam, Sorting Mail and avoiding e-mail viruses – types of viruses – Harmful effects of virus -

Chatting and Conferencing on the Internet – Online Chatting

CONNECTING TO THE INTERNET:

Internet Communications Protocols TCP/IP TCP and IP were developed by a department of defense (DOD) research project to connect a number different networks designed by different vendors into a networks of networks. It was initially successful because it delivered a few basic services that everyone needs file transfer, electronic mail, remote logon across a very large number of client and server systems. Several computers in a small department can use TCP/IP on a single LAN. IP: IP is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destinations address. The internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gate way machines that move data from department to organizations to region and then around the world. TCP: TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. INTERNET HOST : Each computer on the internet is called a host computer. The computers on the internet are millions of internet hosts, are connected by cables, phone lines and satellite connections. Internet protocol (IP) address IP defines a universal addressing scheme called IP address. An IP address is a 32 bit binary addressing scheme and each standard address is unique on the internet. IP addressing scheme is used to identify networks, networks devices and network

Another way to find an IP address

  1. Open the command prompt. The command prompt is usually located within the Accessories folder.
  2. At the “command prompt” screen type ipconfig then press Enter if this doesn’t work type in ipconfig /all. Domain and host names: A domain is unique name associated with specific IP address by a program that runs on an internet host computer. Each part of domain is called the sub domain. The sub domains are separated by periods. The name constructed so that each sub domain tells something about the computer. The rightmost sub domain is called the top level domain. Types of Domains: Another way to find an IP address
  3. Open the command prompt. The command prompt is usually located within the Accessories folder.
  4. At the “command prompt” screen type ipconfig then press Enter if this doesn’t work type in ipconfig /all. Domain and host names: A domain is unique name associated with specific IP address by a program that runs on an internet host computer. Each part of domain is called the sub domain. The sub domains are separated by periods. The name constructed so that each sub domain tells something about the computer. The rightmost sub domain is called the top level domain. Types of Domains: Another way to find an IP address
  5. Open the command prompt. The command prompt is usually located within the Accessories folder.
  6. At the “command prompt” screen type ipconfig then press Enter if this doesn’t work type in ipconfig /all. Domain and host names: A domain is unique name associated with specific IP address by a program that runs on an internet host computer. Each part of domain is called the sub domain. The sub domains are separated by periods. The name constructed so that each sub domain tells something about the computer. The rightmost sub domain is called the top level domain. Types of Domains:

Top-level domain The way to understand an address is to read from right to left. In general there are two types of top level domains. I. Generic domains/organization domains II. Country Domains/Geographical domains

1. Generic domains/Organization domains Organizations domains are based on an addressing scheme developed before the days of international networks .edu Servers that provide educational services .gov About the government of a country .mil Servers that provide military information .org Provide information about the organizations in the world .com Servers providing commercial services on the internet .net Information services / networks .int Organizations established by international treaty ii. Country Domains/Geographical domains The international top level domain uses a 2-letter country code. Country code toplevel domains are two letter destinations assigned to individual countries. Each country linked to the web has a two letter top level domain. The following table shows the various country code top level domains Domain Country Domain country Domain country .in India .co Colombia .mx Mexico .aq Antarctica .dk Denmark .nz New Zealand .at Australia .eg Egypt .om Oman .bd Bangladesh .af Afghanistan .pk Pakistan .bm Bermuda .jp Japan .qa Qatar .br brazil .it Italy .sa Saudi Arabia .ca Canada .is island .th Thailand .cn china .kw Kuwait .us United states .cu Cuba .lk Srilanka .uk United kingdom Top-level domain The way to understand an address is to read from right to left. In general there are two types of top level domains. I. Generic domains/organization domains II. Country Domains/Geographical domains 1. Generic domains/Organization domains Organizations domains are based on an addressing scheme developed before the days of international networks .edu Servers that provide educational services .gov About the government of a country .mil Servers that provide military information .org Provide information about the organizations in the world .com Servers providing commercial services on the internet .net Information services / networks .int Organizations established by international treaty ii. Country Domains/Geographical domains The international top level domain uses a 2-letter country code. Country code toplevel domains are two letter destinations assigned to individual countries. Each country linked to the web has a two letter top level domain. The following table shows the various country code top level domains Domain Country Domain country Domain country .in India .co Colombia .mx Mexico .aq Antarctica .dk Denmark .nz New Zealand .at Australia .eg Egypt .om Oman .bd Bangladesh .af Afghanistan .pk Pakistan .bm Bermuda .jp Japan .qa Qatar .br brazil .it Italy .sa Saudi Arabia .ca Canada .is island .th Thailand .cn china .kw Kuwait .us United states .cu Cuba .lk Srilanka .uk United kingdom Top-level domain The way to understand an address is to read from right to left. In general there are two types of top level domains. I. Generic domains/organization domains II. Country Domains/Geographical domains 1. Generic domains/Organization domains Organizations domains are based on an addressing scheme developed before the days of international networks .edu Servers that provide educational services .gov About the government of a country .mil Servers that provide military information .org Provide information about the organizations in the world .com Servers providing commercial services on the internet .net Information services / networks .int Organizations established by international treaty ii. Country Domains/Geographical domains The international top level domain uses a 2-letter country code. Country code toplevel domains are two letter destinations assigned to individual countries. Each country linked to the web has a two letter top level domain. The following table shows the various country code top level domains Domain Country Domain country Domain country .in India .co Colombia .mx Mexico .aq Antarctica .dk Denmark .nz New Zealand .at Australia .eg Egypt .om Oman .bd Bangladesh .af Afghanistan .pk Pakistan .bm Bermuda .jp Japan .qa Qatar .br brazil .it Italy .sa Saudi Arabia .ca Canada .is island .th Thailand .cn china .kw Kuwait .us United states .cu Cuba .lk Srilanka .uk United kingdom

activity logging. FTP servers are accessed by a FTP client who allows the user to move the files between the server computer and the client computer. NEWS servers: They work as source of distributions and delivery for hundreds of available public news groups accessible over the USENET news network. USENET is global bulletin board system that can be approach via internet or via a variety of online services IRC servers: Internet relay chat is comprised of various independent networks of servers that allow users to connect to each other via an IRC network. It is an option for those who seeking real time competence. PORT AND PORT NUMBERS: A port is an additional 16 bit number that uniquely identifies the particular service on any given machine on the internet. Port numbers are 16 bit wide, therefore each computer on the internet has a maximum number of 216 or 65,536 ports. The particular application is identified by its unique port number in the same way that a specific television station has a unique channel number. Port numbers are divided into three ranges:  Well-known ports are those from 0 through 1,023.  Registered ports are those from 1,024 through 49,151.  Dynamic and private ports are those from 49,152 through 65,535. These ports are controlled and assigned by the internet assigned number authority (IANA). The following table shows the protocol port numbers: Port Number Protocol 21 File Transfer Protocol (FTP) 25 Simple Mail Transfer Protocol (SMTP) 80 Hyper Text Transfer Protocol (HTTP) 110 Post Office Protocol 3 (POP 3) activity logging. FTP servers are accessed by a FTP client who allows the user to move the files between the server computer and the client computer. NEWS servers: They work as source of distributions and delivery for hundreds of available public news groups accessible over the USENET news network. USENET is global bulletin board system that can be approach via internet or via a variety of online services IRC servers: Internet relay chat is comprised of various independent networks of servers that allow users to connect to each other via an IRC network. It is an option for those who seeking real time competence. PORT AND PORT NUMBERS: A port is an additional 16 bit number that uniquely identifies the particular service on any given machine on the internet. Port numbers are 16 bit wide, therefore each computer on the internet has a maximum number of 216 or 65,536 ports. The particular application is identified by its unique port number in the same way that a specific television station has a unique channel number. Port numbers are divided into three ranges:  Well-known ports are those from 0 through 1,023.  Registered ports are those from 1,024 through 49,151.  Dynamic and private ports are those from 49,152 through 65,535. These ports are controlled and assigned by the internet assigned number authority (IANA). The following table shows the protocol port numbers: Port Number Protocol 21 File Transfer Protocol (FTP) 25 Simple Mail Transfer Protocol (SMTP) 80 Hyper Text Transfer Protocol (HTTP) 110 Post Office Protocol 3 (POP 3) activity logging. FTP servers are accessed by a FTP client who allows the user to move the files between the server computer and the client computer. NEWS servers: They work as source of distributions and delivery for hundreds of available public news groups accessible over the USENET news network. USENET is global bulletin board system that can be approach via internet or via a variety of online services IRC servers: Internet relay chat is comprised of various independent networks of servers that allow users to connect to each other via an IRC network. It is an option for those who seeking real time competence. PORT AND PORT NUMBERS: A port is an additional 16 bit number that uniquely identifies the particular service on any given machine on the internet. Port numbers are 16 bit wide, therefore each computer on the internet has a maximum number of 216 or 65,536 ports. The particular application is identified by its unique port number in the same way that a specific television station has a unique channel number. Port numbers are divided into three ranges:  Well-known ports are those from 0 through 1,023.  Registered ports are those from 1,024 through 49,151.  Dynamic and private ports are those from 49,152 through 65,535. These ports are controlled and assigned by the internet assigned number authority (IANA). The following table shows the protocol port numbers: Port Number Protocol 21 File Transfer Protocol (FTP) 25 Simple Mail Transfer Protocol (SMTP) 80 Hyper Text Transfer Protocol (HTTP) 110 Post Office Protocol 3 (POP 3)

DOMAIN NAME SYSTEM:

The domain address is converted into number internally. The part of the internet that keeps track of address is called the DNS domain name system DNS server is a computer that translates the domain name of another in to an IP address and vice versa on request. Every computer in the network has an IP address, which specifies its physical network connection. To locate the information in internet two kinds of address can be used. These are domain names and IP addresses. Domain names follow a format called Domain name system. EXCHANGING E-MAIL: Email concepts: Email allows the user to send data in the form of text, pictures, sound and video to a remote computer on the internet. These email services are created by companies on specific web services and can be accessed by anyone anywhere in the world at anytime. Some of the familiar servers that offer free email services on the internet are Yahoo, Rediff, Gmail and Hotmail and etc. These three things that you must have to send and receive email  An internet email account  A connection to the internet  A software application that handles email Receiving incoming messages: The incoming messages are received in an email mailbox that resides on a mail server. Depending upon the type of connection that you have, download e-mail from the mail server to your computer or you may read your e-mail from the mail server. Mail server receives and stores email messages in mail boxes by using a protocol called post office protocol 3(POP 3) or internet message access protocol (IMAP) Sending outgoing messages: Write email messages on your computer by using e-mail applications. Then, transfer the messages to an SMTP (simple mail transfer protocol) server, a mail server that accepts outgoing e-mail. The SMTP server that takes care of sending your e-mail messages may be a different server.

DOMAIN NAME SYSTEM:

The domain address is converted into number internally. The part of the internet that keeps track of address is called the DNS domain name system DNS server is a computer that translates the domain name of another in to an IP address and vice versa on request. Every computer in the network has an IP address, which specifies its physical network connection. To locate the information in internet two kinds of address can be used. These are domain names and IP addresses. Domain names follow a format called Domain name system. EXCHANGING E-MAIL: Email concepts: Email allows the user to send data in the form of text, pictures, sound and video to a remote computer on the internet. These email services are created by companies on specific web services and can be accessed by anyone anywhere in the world at anytime. Some of the familiar servers that offer free email services on the internet are Yahoo, Rediff, Gmail and Hotmail and etc. These three things that you must have to send and receive email  An internet email account  A connection to the internet  A software application that handles email Receiving incoming messages: The incoming messages are received in an email mailbox that resides on a mail server. Depending upon the type of connection that you have, download e-mail from the mail server to your computer or you may read your e-mail from the mail server. Mail server receives and stores email messages in mail boxes by using a protocol called post office protocol 3(POP 3) or internet message access protocol (IMAP) Sending outgoing messages: Write email messages on your computer by using e-mail applications. Then, transfer the messages to an SMTP (simple mail transfer protocol) server, a mail server that accepts outgoing e-mail. The SMTP server that takes care of sending your e-mail messages may be a different server.

DOMAIN NAME SYSTEM:

The domain address is converted into number internally. The part of the internet that keeps track of address is called the DNS domain name system DNS server is a computer that translates the domain name of another in to an IP address and vice versa on request. Every computer in the network has an IP address, which specifies its physical network connection. To locate the information in internet two kinds of address can be used. These are domain names and IP addresses. Domain names follow a format called Domain name system. EXCHANGING E-MAIL: Email concepts: Email allows the user to send data in the form of text, pictures, sound and video to a remote computer on the internet. These email services are created by companies on specific web services and can be accessed by anyone anywhere in the world at anytime. Some of the familiar servers that offer free email services on the internet are Yahoo, Rediff, Gmail and Hotmail and etc. These three things that you must have to send and receive email  An internet email account  A connection to the internet  A software application that handles email Receiving incoming messages: The incoming messages are received in an email mailbox that resides on a mail server. Depending upon the type of connection that you have, download e-mail from the mail server to your computer or you may read your e-mail from the mail server. Mail server receives and stores email messages in mail boxes by using a protocol called post office protocol 3(POP 3) or internet message access protocol (IMAP) Sending outgoing messages: Write email messages on your computer by using e-mail applications. Then, transfer the messages to an SMTP (simple mail transfer protocol) server, a mail server that accepts outgoing e-mail. The SMTP server that takes care of sending your e-mail messages may be a different server.

 Read your email. Deleting messages from the server Your email program usually deletes them from the POP server after downloading. Our applications have a setting that enables you to choose whether to delete the email from the server. Using abbreviations, emoticons, and smiley’s: Emoticons and smiley's Smiley's are punctuations used to conveying mood or emotions in written online communications. Emoticons are used to compensate for the inability to convey voice inflections, facial expressions, and bodily gestures in written communications. Some emoticons are better known as “smiley”. Emotions can be very effective towards avoiding misinterpretation of the writer intents. The most emoticons will look like a face, eyes, nose and mouth. :) Happy :(( Crying :( Sad :)) Laughing ;) wink :-& Sick :-/ Confused [-( Not talking :P Tongue (:| Tired :O Shock @ }:- Rose X-( Angry %% Good luck B-) Cool **== flag Abbreviations used in E-mail: Chat abbreviations are commonly used in e-mail, online chatting online discussion forum postings, instant messaging, and in text messaging, especially between cell phone users. Abbreviations Meaning Abbreviations Meaning AND Any day now CYO See you online AFK Away from keyboard DIKU Do I know you? B4N Bye for now F2F Face to face  Read your email. Deleting messages from the server Your email program usually deletes them from the POP server after downloading. Our applications have a setting that enables you to choose whether to delete the email from the server. Using abbreviations, emoticons, and smiley’s: Emoticons and smiley's Smiley's are punctuations used to conveying mood or emotions in written online communications. Emoticons are used to compensate for the inability to convey voice inflections, facial expressions, and bodily gestures in written communications. Some emoticons are better known as “smiley”. Emotions can be very effective towards avoiding misinterpretation of the writer intents. The most emoticons will look like a face, eyes, nose and mouth. :) Happy :(( Crying :( Sad :)) Laughing ;) wink :-& Sick :-/ Confused [-( Not talking :P Tongue (:| Tired :O Shock @ }:- Rose X-( Angry %% Good luck B-) Cool **== flag Abbreviations used in E-mail: Chat abbreviations are commonly used in e-mail, online chatting online discussion forum postings, instant messaging, and in text messaging, especially between cell phone users. Abbreviations Meaning Abbreviations Meaning AND Any day now CYO See you online AFK Away from keyboard DIKU Do I know you? B4N Bye for now F2F Face to face  Read your email. Deleting messages from the server Your email program usually deletes them from the POP server after downloading. Our applications have a setting that enables you to choose whether to delete the email from the server. Using abbreviations, emoticons, and smiley’s: Emoticons and smiley's Smiley's are punctuations used to conveying mood or emotions in written online communications. Emoticons are used to compensate for the inability to convey voice inflections, facial expressions, and bodily gestures in written communications. Some emoticons are better known as “smiley”. Emotions can be very effective towards avoiding misinterpretation of the writer intents. The most emoticons will look like a face, eyes, nose and mouth. :) Happy :(( Crying :( Sad :)) Laughing ;) wink :-& Sick :-/ Confused [-( Not talking :P Tongue (:| Tired :O Shock @ }:- Rose X-( Angry %% Good luck B-) Cool **== flag Abbreviations used in E-mail: Chat abbreviations are commonly used in e-mail, online chatting online discussion forum postings, instant messaging, and in text messaging, especially between cell phone users. Abbreviations Meaning Abbreviations Meaning AND Any day now CYO See you online AFK Away from keyboard DIKU Do I know you? B4N Bye for now F2F Face to face

BBN Bye bye now FAQ Frequently ask questions BBS Be back soon GL Good luck CU See you HAGN Have a good night CUL See you later HAND Have a nice day CYA See ya WU? What’s up? FORMATTED E-MAIL: HTML: this is formatted with HTML tags just like web pages. It includes text formatting, numbering, bullets, alignments, horizontal lines, backgrounds, hyperlinks. It is actually sent using the MIME protocol. Rich Text Format: this format can be read by most word processing applications. Documents in this format are also called RTF files. MIME (multipurpose internet mail extensions): it is used for attachments. Formatting includes text formatting, pictures, video and sound. Web based E-mail Advantages:  Using web based email we can access the web as well as read our mail.  Most web-based e-mail is free. Disadvantages:  We can read two kinds of messages on the web. SENDING AND RECEIVING FILES: Attachments:  An attachment is a file that has been encoded as text so that it can be included in an e-mail message.  The three common ways to encode e-mail attachments are:  MIME- Multipurpose Internet Mail Extension is the standard method.  Unencoding- this method is supported by some older e-mail applications. BBN Bye bye now FAQ Frequently ask questions BBS Be back soon GL Good luck CU See you HAGN Have a good night CUL See you later HAND Have a nice day CYA See ya WU? What’s up? FORMATTED E-MAIL: HTML: this is formatted with HTML tags just like web pages. It includes text formatting, numbering, bullets, alignments, horizontal lines, backgrounds, hyperlinks. It is actually sent using the MIME protocol. Rich Text Format: this format can be read by most word processing applications. Documents in this format are also called RTF files. MIME (multipurpose internet mail extensions): it is used for attachments. Formatting includes text formatting, pictures, video and sound. Web based E-mail Advantages:  Using web based email we can access the web as well as read our mail.  Most web-based e-mail is free. Disadvantages:  We can read two kinds of messages on the web. SENDING AND RECEIVING FILES: Attachments:  An attachment is a file that has been encoded as text so that it can be included in an e-mail message.  The three common ways to encode e-mail attachments are:  MIME- Multipurpose Internet Mail Extension is the standard method.  Unencoding- this method is supported by some older e-mail applications. BBN Bye bye now FAQ Frequently ask questions BBS Be back soon GL Good luck CU See you HAGN Have a good night CUL See you later HAND Have a nice day CYA See ya WU? What’s up? FORMATTED E-MAIL: HTML: this is formatted with HTML tags just like web pages. It includes text formatting, numbering, bullets, alignments, horizontal lines, backgrounds, hyperlinks. It is actually sent using the MIME protocol. Rich Text Format: this format can be read by most word processing applications. Documents in this format are also called RTF files. MIME (multipurpose internet mail extensions): it is used for attachments. Formatting includes text formatting, pictures, video and sound. Web based E-mail Advantages:  Using web based email we can access the web as well as read our mail.  Most web-based e-mail is free. Disadvantages:  We can read two kinds of messages on the web. SENDING AND RECEIVING FILES: Attachments:  An attachment is a file that has been encoded as text so that it can be included in an e-mail message.  The three common ways to encode e-mail attachments are:  MIME- Multipurpose Internet Mail Extension is the standard method.  Unencoding- this method is supported by some older e-mail applications.

  1. Click done when you are finished. Receiving an attach files When you receive a message with an attachment, you may notice a paper clip in the message. To view the attachment, first open the message. Before you save the file, use the scan with antivirus software to check the file for viruses. FIGHTING SPAM: Controlling E-mail volume and reducing spam:  The term “spam” is the internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).  Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US mail.  Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:  Foreign bank scams or advance fee fraud schemes  Phishing scams, a very popular and dangerous form of email fraud  Pyramid scams, including multilevel marketing (MLM)  Other “get rich quick” or “make money fast” (MMF) schemes.  Quack health products and remedies  Ads for pornographic websites  Offers of software for collecting email address and sending UCE  Offers of bulk emailing services for sending UCE. How is spam mail generated? Spam is email created by randomly combining characters to form actual e-mail address. Additionally replying to spam causes your e-mail address to be added to the senders address list, generating more spam. What can you do about spam? There are few things you can do about spam:
  2. You can set up e-mail “rules” or “filters” that automatically delete unwanted messages. Using filters requires that you know something about the unwanted messages
  3. Click done when you are finished. Receiving an attach files When you receive a message with an attachment, you may notice a paper clip in the message. To view the attachment, first open the message. Before you save the file, use the scan with antivirus software to check the file for viruses. FIGHTING SPAM: Controlling E-mail volume and reducing spam:  The term “spam” is the internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).  Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US mail.  Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:  Foreign bank scams or advance fee fraud schemes  Phishing scams, a very popular and dangerous form of email fraud  Pyramid scams, including multilevel marketing (MLM)  Other “get rich quick” or “make money fast” (MMF) schemes.  Quack health products and remedies  Ads for pornographic websites  Offers of software for collecting email address and sending UCE  Offers of bulk emailing services for sending UCE. How is spam mail generated? Spam is email created by randomly combining characters to form actual e-mail address. Additionally replying to spam causes your e-mail address to be added to the senders address list, generating more spam. What can you do about spam? There are few things you can do about spam:
  4. You can set up e-mail “rules” or “filters” that automatically delete unwanted messages. Using filters requires that you know something about the unwanted messages
  5. Click done when you are finished. Receiving an attach files When you receive a message with an attachment, you may notice a paper clip in the message. To view the attachment, first open the message. Before you save the file, use the scan with antivirus software to check the file for viruses. FIGHTING SPAM: Controlling E-mail volume and reducing spam:  The term “spam” is the internet slang that refers to unsolicited commercial email (UCE) or unsolicited bulk email (UBE).  Some people refer to this kind of communication as junk email to equate it with the paper junk mail that comes through the US mail.  Unsolicited email most often contains advertisements for services or products, but very few reputable marketers use UCE to advertise. The most commonly seen spam includes the following:  Foreign bank scams or advance fee fraud schemes  Phishing scams, a very popular and dangerous form of email fraud  Pyramid scams, including multilevel marketing (MLM)  Other “get rich quick” or “make money fast” (MMF) schemes.  Quack health products and remedies  Ads for pornographic websites  Offers of software for collecting email address and sending UCE  Offers of bulk emailing services for sending UCE. How is spam mail generated? Spam is email created by randomly combining characters to form actual e-mail address. Additionally replying to spam causes your e-mail address to be added to the senders address list, generating more spam. What can you do about spam? There are few things you can do about spam:
  6. You can set up e-mail “rules” or “filters” that automatically delete unwanted messages. Using filters requires that you know something about the unwanted messages
  1. It is wise to ignore (delete) spam. Some spammers will automatically add you to an email list and then tell you to “unsubscribe if you do not want to receive further messages”.
  2. You can try contacting the ISP (internet service provider) of the person or group that sent the messages and ask for help. Stopping spammers:  Spam emails are emails sent to you without consent. It is email that you don’t want and didn’t ask for, and its content can cause embarrassment and distress.  If you complain to the sender’s system administrator or postmaster, he or she may close the spammers account.  If you want to get more information, the following websites are to be followed www.stopspam.com www.cauce.org www.spamcon.org www.caude.org Reporting spam:  Before you delete your spam, forward your spamto:spam@uce.gov as this is the spam box for FTC (federal trade commission) Avoiding sending spam If you run an internet mailing list, or any other type of email advertising and promotion, this is what you need to know in order to avoid being accessed of sending spam.  Do not purchase email lists or so-called opt-in lists  Do not send unsolicited emails with an “opt-out” option  Do not request a receipt of delivery for your mailing  Do not use any spamming or harvesting software.  Do not send numerous identical messages. Avoid receiving spam email:  Spam has increasingly become a problem on the internet. While every internet user receives some spam email, certain behaviors on the internet will cause you to receive even more than average  They found that email addresses posted to web sites or in newsgroups attract the most spam.
  3. It is wise to ignore (delete) spam. Some spammers will automatically add you to an email list and then tell you to “unsubscribe if you do not want to receive further messages”.
  4. You can try contacting the ISP (internet service provider) of the person or group that sent the messages and ask for help. Stopping spammers:  Spam emails are emails sent to you without consent. It is email that you don’t want and didn’t ask for, and its content can cause embarrassment and distress.  If you complain to the sender’s system administrator or postmaster, he or she may close the spammers account.  If you want to get more information, the following websites are to be followed www.stopspam.com www.cauce.org www.spamcon.org www.caude.org Reporting spam:  Before you delete your spam, forward your spamto:spam@uce.gov as this is the spam box for FTC (federal trade commission) Avoiding sending spam If you run an internet mailing list, or any other type of email advertising and promotion, this is what you need to know in order to avoid being accessed of sending spam.  Do not purchase email lists or so-called opt-in lists  Do not send unsolicited emails with an “opt-out” option  Do not request a receipt of delivery for your mailing  Do not use any spamming or harvesting software.  Do not send numerous identical messages. Avoid receiving spam email:  Spam has increasingly become a problem on the internet. While every internet user receives some spam email, certain behaviors on the internet will cause you to receive even more than average  They found that email addresses posted to web sites or in newsgroups attract the most spam.
  5. It is wise to ignore (delete) spam. Some spammers will automatically add you to an email list and then tell you to “unsubscribe if you do not want to receive further messages”.
  6. You can try contacting the ISP (internet service provider) of the person or group that sent the messages and ask for help. Stopping spammers:  Spam emails are emails sent to you without consent. It is email that you don’t want and didn’t ask for, and its content can cause embarrassment and distress.  If you complain to the sender’s system administrator or postmaster, he or she may close the spammers account.  If you want to get more information, the following websites are to be followed www.stopspam.com www.cauce.org www.spamcon.org www.caude.org Reporting spam:  Before you delete your spam, forward your spamto:spam@uce.gov as this is the spam box for FTC (federal trade commission) Avoiding sending spam If you run an internet mailing list, or any other type of email advertising and promotion, this is what you need to know in order to avoid being accessed of sending spam.  Do not purchase email lists or so-called opt-in lists  Do not send unsolicited emails with an “opt-out” option  Do not request a receipt of delivery for your mailing  Do not use any spamming or harvesting software.  Do not send numerous identical messages. Avoid receiving spam email:  Spam has increasingly become a problem on the internet. While every internet user receives some spam email, certain behaviors on the internet will cause you to receive even more than average  They found that email addresses posted to web sites or in newsgroups attract the most spam.

 If you select the Open it option the appropriate application will start and open the file. Selecting Save it to disk will open the Save As dialog box enabling you to save the file to disk.  Try to always use the Save it to disk option, as this decreases the risk of a virus entering your computer. Click on the OK button Here are 13 useful tips to save your computer from email bugs and viruses. These steps are especially useful for those who use Microsoft Outlook or any other software like Thunder Bird as an email client.

  1. Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.
  2. When possible, avoid e-mail attachments both when sending and receiving e-mail.
  3. Configure Windows to always show file extensions. In Windows 2000, this is done through Explorer via the Tools menu: Tools/Folder Options/View – and uncheck “Hide file extensions for known file types”. This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG).  If you select the Open it option the appropriate application will start and open the file. Selecting Save it to disk will open the Save As dialog box enabling you to save the file to disk.  Try to always use the Save it to disk option, as this decreases the risk of a virus entering your computer. Click on the OK button Here are 13 useful tips to save your computer from email bugs and viruses. These steps are especially useful for those who use Microsoft Outlook or any other software like Thunder Bird as an email client.
  4. Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.
  5. When possible, avoid e-mail attachments both when sending and receiving e-mail.
  6. Configure Windows to always show file extensions. In Windows 2000, this is done through Explorer via the Tools menu: Tools/Folder Options/View – and uncheck “Hide file extensions for known file types”. This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG).  If you select the Open it option the appropriate application will start and open the file. Selecting Save it to disk will open the Save As dialog box enabling you to save the file to disk.  Try to always use the Save it to disk option, as this decreases the risk of a virus entering your computer. Click on the OK button Here are 13 useful tips to save your computer from email bugs and viruses. These steps are especially useful for those who use Microsoft Outlook or any other software like Thunder Bird as an email client.
  7. Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.
  8. When possible, avoid e-mail attachments both when sending and receiving e-mail.
  9. Configure Windows to always show file extensions. In Windows 2000, this is done through Explorer via the Tools menu: Tools/Folder Options/View – and uncheck “Hide file extensions for known file types”. This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG).
  1. Never open e-mail attachments with the file extensions VBS, SHS or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.
  2. Never open attachments with double file extensions such as NAME.BMP.EXE or NAME.TXT.VBS
  3. Do not share your folders with other users unless necessary. If you do, make sure you do not share your full drive or your Windows directory.
  4. Disconnect your network or modem cable when you’re not using your computer – or just power it down.
  5. If you feel that an e-mail you get from a friend is somehow strange – if it is in a foreign language or if it just says odd things, double-check with the friend before opening any attachments.
  6. When you receive e-mail advertisements or other unsolicited e-mail, do not open attachments in them or follow web links quoted in them.
  7. Never open e-mail attachments with the file extensions VBS, SHS or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.
  8. Never open attachments with double file extensions such as NAME.BMP.EXE or NAME.TXT.VBS
  9. Do not share your folders with other users unless necessary. If you do, make sure you do not share your full drive or your Windows directory.
  10. Disconnect your network or modem cable when you’re not using your computer – or just power it down.
  11. If you feel that an e-mail you get from a friend is somehow strange – if it is in a foreign language or if it just says odd things, double-check with the friend before opening any attachments.
  12. When you receive e-mail advertisements or other unsolicited e-mail, do not open attachments in them or follow web links quoted in them.
  13. Never open e-mail attachments with the file extensions VBS, SHS or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.
  14. Never open attachments with double file extensions such as NAME.BMP.EXE or NAME.TXT.VBS
  15. Do not share your folders with other users unless necessary. If you do, make sure you do not share your full drive or your Windows directory.
  16. Disconnect your network or modem cable when you’re not using your computer – or just power it down.
  17. If you feel that an e-mail you get from a friend is somehow strange – if it is in a foreign language or if it just says odd things, double-check with the friend before opening any attachments.
  18. When you receive e-mail advertisements or other unsolicited e-mail, do not open attachments in them or follow web links quoted in them.

- File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part of Operating System or data files. - Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program. - Macro viruses: Macro viruses are written by using the Macro programming languages like VBA, which is a feature of MS office package. A macro is a way to automate and simplify a task that you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computers. - Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and change their code every time they infect a different system. This helps the Polymorphic Viruses to hide from anti-virus software. - Armored Viruses: Armored Viruses are type of viruses that are designed and written to make itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself from antivirus programs, making it more difficult to disinfect. - Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic nature which helps them to hide from heuristic detection. - Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-virus application by encrypting parts of the virus itself. This is known as mutation. - Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered anti- antivirus. Some Retroviruses attack the anti-virus application and stop it from running or some other destroys the virus definition database. Multiple Characteristic viruses: Multiple Characteristic viruses have different characteristics of viruses and have different capabilities - File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part of Operating System or data files. - Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program. - Macro viruses: Macro viruses are written by using the Macro programming languages like VBA, which is a feature of MS office package. A macro is a way to automate and simplify a task that you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computers. - Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and change their code every time they infect a different system. This helps the Polymorphic Viruses to hide from anti-virus software. - Armored Viruses: Armored Viruses are type of viruses that are designed and written to make itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself from antivirus programs, making it more difficult to disinfect. - Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic nature which helps them to hide from heuristic detection. - Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-virus application by encrypting parts of the virus itself. This is known as mutation. - Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered anti- antivirus. Some Retroviruses attack the anti-virus application and stop it from running or some other destroys the virus definition database. Multiple Characteristic viruses: Multiple Characteristic viruses have different characteristics of viruses and have different capabilities - File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the part of Operating System or data files. - Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail addresses which are stored in the address book and replicate by e-mailing themselves to the addresses stored in the address book of the e-mail program. - Macro viruses: Macro viruses are written by using the Macro programming languages like VBA, which is a feature of MS office package. A macro is a way to automate and simplify a task that you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are usually stored as part of the document or spreadsheet and can travel to other systems when these files are transferred to another computers. - Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance and change their code every time they infect a different system. This helps the Polymorphic Viruses to hide from anti-virus software. - Armored Viruses: Armored Viruses are type of viruses that are designed and written to make itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself from antivirus programs, making it more difficult to disinfect. - Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic nature which helps them to hide from heuristic detection. - Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and disinfection by anti-virus applications. After the work, these types of viruses try to hide from the anti-virus application by encrypting parts of the virus itself. This is known as mutation. - Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus application running on the computer. A retrovirus can be considered anti- antivirus. Some Retroviruses attack the anti-virus application and stop it from running or some other destroys the virus definition database. Multiple Characteristic viruses: Multiple Characteristic viruses have different characteristics of viruses and have different capabilities

HARMFUL EFFECTS OF VIRUS

 Computer virus can slow down your computer.  Might corrupt your system files.  Might make some programs faulty or corrupt  Might damage your boot sector creating problems when you boot into the windows.  Might steal important information from your computer and send to some other person.  Might change the power ratings of your computer and could blast the system CHATTING AND CONFERENCING ON THE INTERNET: Online chatting, messaging, and conferencing concepts  Online chatting or online conferencing enables internet users to exchange text or to have discussions with groups of people in real time.  The groups of people involved may be anywhere in the world.  This group communication can take the form of text, voice, or video, and messages and responses can be changed. FORMS OF CHAT, MESSAGING AND CONFERENCING Real time chat: Each participant sees each message with seconds of when it is sent, and the reply is given quickly. However, all participants need to be online at a same time.

HARMFUL EFFECTS OF VIRUS

 Computer virus can slow down your computer.  Might corrupt your system files.  Might make some programs faulty or corrupt  Might damage your boot sector creating problems when you boot into the windows.  Might steal important information from your computer and send to some other person.  Might change the power ratings of your computer and could blast the system CHATTING AND CONFERENCING ON THE INTERNET: Online chatting, messaging, and conferencing concepts  Online chatting or online conferencing enables internet users to exchange text or to have discussions with groups of people in real time.  The groups of people involved may be anywhere in the world.  This group communication can take the form of text, voice, or video, and messages and responses can be changed. FORMS OF CHAT, MESSAGING AND CONFERENCING Real time chat: Each participant sees each message with seconds of when it is sent, and the reply is given quickly. However, all participants need to be online at a same time.

HARMFUL EFFECTS OF VIRUS

 Computer virus can slow down your computer.  Might corrupt your system files.  Might make some programs faulty or corrupt  Might damage your boot sector creating problems when you boot into the windows.  Might steal important information from your computer and send to some other person.  Might change the power ratings of your computer and could blast the system CHATTING AND CONFERENCING ON THE INTERNET: Online chatting, messaging, and conferencing concepts  Online chatting or online conferencing enables internet users to exchange text or to have discussions with groups of people in real time.  The groups of people involved may be anywhere in the world.  This group communication can take the form of text, voice, or video, and messages and responses can be changed. FORMS OF CHAT, MESSAGING AND CONFERENCING Real time chat: Each participant sees each message with seconds of when it is sent, and the reply is given quickly. However, all participants need to be online at a same time.