Topics

• Internet Protocols

• Freeware

• Open Source software

• What is shareware?

• What is a browser plug-in?

• What is a cookie? Internet Lecture - 3 • Spam • What are “worms”, “viruses”?

• Anti-Spyware ... Trojan horse

CSIT100 • Phishing

• Pharming

• Audio & Video

• Key Logger .. Software

• Firewall

• What happens to deleted files?

2

Internet protocols … Internet protocols …

• ftp • telnet • nntp • https • mms • P2P • P2P -

3 4

ftp We can transfer ASCII and Binary files

• The computers on the Internet have a standard tool (program-service) for transferring copies of files. This service is called ftp (file transfer • ASCII file (text, postscript file, e-mail files) protocol). • ftp programs:

– FTP Voyager (pay) – FileZilla (free) – CuteFTP (pay) • (ASCII = American Society Code Information Interchange) – FireFTP (free) – WinSCP (free)

5 6

1 ASCII characters …. We can transfer ASCII and Binary files

• ASCII file (text, postscript file, e-mail files) • ASCII file (text, postscript file, e-mail files) • Binary files (WORD file, images, voice, compressed files)

7 8

Binary file … image

ÿØÿà JFIF H H ÿÛ C %# , #&')*)-0-(0%()(ÿÛ ÿØÿà JFIF H H ÿÛ C %# , #&')*)-0-(0%()(ÿÛ C(((((((((((((((((((((((((((((((((((((((((((((((((((ÿÀ XX" ÿÄ C(((((((((((((((((((((((((((((((((((((((((((((((((((ÿÀ XX" ÿÄ ÿÄ µ } !1AQa"q2‘¡#B±ÁRÑð$3br‚ ÿÄ µ } !1AQa"q2‘¡#B±ÁRÑð$3br‚ %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–— %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzƒ„…†‡ˆ‰Š’“”•–— ˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ ˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚáâãäåæçèéêñòóôõö÷øùúÿÄ

ÿÄ µ w !1AQaq"2B‘¡±Á ÿÄ µ w !1AQaq"2B‘¡±Á #3RðbrÑ$4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰ #3RðbrÑ$4á%ñ&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz‚ƒ„…†‡ˆ‰ Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚâãäåæçèéêòóôõö÷øùúÿÚ Š’“”•–—˜™š¢£¤¥¦§¨©ª²³´µ¶·¸¹ºÂÃÄÅÆÇÈÉÊÒÓÔÕÖ×ØÙÚâãäåæçèéêòóôõö÷øùúÿÚ ? ð71½®ºÿ C_/t|Á}:_3n)óœJfq)6ŸJè-´ ç ? ð71½®ºÿ C_/t|Á}:_3n)óœJfq)6ŸJè-´ ç F9®“JðD²`Ì3škRÓ¹çðZI3a5ÑišÄ‚àŽõêG‚£‹cÁ®‚/ª§ F9®“JðD²`Ì3škRÓ¹çðZI3a5ÑišÄ‚àŽõêG‚£‹cÁ®‚/ª§ Íe4Élâ´%€Å_ÖtÃöW<Šô Íe4Élâ´%€Å_ÖtÃöW<Šô AS VƧáÈd²qÞˆÁتNÇÈZ¼ AS VƧáÈd²qÞˆÁتNÇÈZ¼ BD#£Uí>,âº/‰Z,¶Z¡m¼gükJÈÀ5çã6¹»wW5„•a`Ç5$*1Vvôã5áN¡ÎÛ(±øÓ”Iõ«›qBÇSÎ* BD#£Uí>,âº/‰Z,¶Z¡m¼gükJÈÀ5çã6¹»wW5„•a`Ç5$*1Vvôã5áN¡ÎÛ(±øÓ”Iõ«›qBÇSÎ* uêXc,B€rk•MЋ!–aœvhсg¡Û„Ë«c,“eg5Ô€F§Íu–I`wÁ\8=sV'K{¼åÏî¾léÍaÍ®c uêXc,B€rk•MЋ!–aœvhсg¡Û„Ë«c,“eg5Ô€F§Íu–I`wÁ\8=sV'K{¼åÏî¾léÍaÍ®c @¹n8ÏéÆ4ðÊËsï²nX•yjËÚ®°÷,±m‡Ž½Gs7»ótàdTZ„êß2ÏoJ¨Ó{t5ÉV¯2Ôûœ. @¹n8ÏéÆ4ðÊËsï²nX•yjËÚ®°÷,±m‡Ž½Gs7»ótàdTZ„êß2ÏoJ¨Ó{t5ÉV¯2Ôûœ. SI¢rK(Çj”JU9–“•ïR½Ë§"¸•úΕËnß¼#¢•Û2ªò•÷E'˜X×YS'’^Ç™æŒz- SI¢rK(Çj”JU9–“•ïR½Ë§"¸•úΕËnß¼#¢•Û2ªò•÷E'˜X×YS'’^Ç™æŒz- Gæg#94Î0riØ»hJ’‡ó¦†éÅVó0qJ%äö⯕•kY…°äÔT’7#Š ²|À†ïRîM ª&YS—Á£8çðªÌ@ž÷ Gæg#94Î0riØ»hJ’‡ó¦†éÅVó0qJ%äö⯕•kY…°äÔT’7#Š ²|À†ïRîM ª&YS—Á£8çðªÌ@ž÷ (±ÀŠ \ƒs³°ì¸èj9Žzx ……. (±ÀŠ \ƒs³°ì¸èj9Žzx …….

Open an image file with … notepad Open an image file with … notepad

9 10

… voice (analog – digital) … voice

0&²uŽfϦ٠ª bÎlæ 3&²uŽfϦ٠ª bÎlê 2 – S y m p h o n y N o . 9 ( S c h e r z o ) L u d w i g v a n B e e t h o v e n , c o m p o s e r . S e a t t l e S y m p h o n y . G e r a r d S c h w a r z , d i r e c t o r @¤ÐÒãÒ—ð É^¨Pª W M / L y r i c s W M F S D K V e r s i o n 8 . 0 0 . 0 0 . 4 3 7 3 W M F S D K N e e d e d 0 . 0 . 0 . 0 0 0 0 W M / C o m p o s e r * L u d w i g v a n B e e t h o v e n W M / P u b l i s h e r V o x W M / G e n r e C l a s s i c a l W M / M C D I L 6 + 9 6 + 1 7 5 5 + 9 3 E F + E A D 3 + 1 3 A A 4 + 1 A 2 E 4 + 1 F 5 B 6 W M / T r a c k N u m b e r W M / Y e a r 2 0 0 2 W M / E n c o d i n g T i m e ËŠ•å¼Ç0 W M / U n i q u e F i l e I d e n t i f i e r b A M G a _ i d = R 6 8 8 7 3 7 ; A M G p _ i d = V A ; A M G t _ i d = T 6 9 3 3 8 8 2 W M / A l b u m T i t l e . B e e t h o v e n [ V o x ] D i s c 1 W M / A l b u m A r t i s t V a r i o u s A r t i s t s W M / P r o v i d e r A M G " W M / P r o v i d e r S t y l e C l a s s i c a l Îuø{Fс‚ `—É¢² ˆü ¡Ü«ŒG©ÏŽä À Seh í“ÿ[¨†J‘~‰¾›„âTPp 0׿òxÎÀÌ `². 0Îò, ( º º ˆü µ¿_.©ÏŽã À Se¤ ÒÓ«º©ÏŽæ À Se v ”#D˜”ÑI¡ANEpTv . W M / M e d i a C l a s s P r i m a r y I D ¼}`Ñ#ãâK†¡H¤*(D 2 W M / M e d i a C l a s s S e c o n d a r y I D W M / W M C o n t e n t I D zvÒPÕåLœJÍòáî½ $ W M / W M C o l l e c t i o n I D Lôââ¹Iž× véÚ.¥ . W M / W M C o l l e c t i o n G r o u p I D Lôââ¹Iž× véÚ.¥tÔßÊ E¤ºš«Ë– ªè

11 12

2 ASCII and Binary Files Telnet software: DXTelnet

. ASCII Files: • An Internet protocol that allows you to log in to remote computer on the Internet. .htm .html .shtml .php .pl .cgi .js .cnf .css .forward .htaccess .map .pwd .txt .grp .ctl • TelNet also provides access to library systems, databases and information resources. . Binary Files:

.jpg .gif .png .tif .exe .zip .sit .rar .ace .class .mid .ra .avi .ocx .wav .mp3 .au • Telnet (Telecommunications network )

13 14

nntp Recognizing Secure Sites

• Protocol that supports the distribution, retrieval • Familiarity and accreditations and posting of news over the internet. • Transport Layer Security (TLS) • nntp (network news transfer protocol) – Address bar has a padlock • Site advisors

15 16

• The secure version of http (port 443) – Used in: e-commerce, e-mail, …

Transport Layer Security (TLS): is a protocol whose purpose is to protect data (ex: credit card info), between customer and online store

17 18

3 Website reputation tools… Chrome browser – website rating alert

• … rates sites based on their safety. • These tools alert users of a site’s potential to have viruses, malware, and of risk to have your identity stolen • Examples: – Avast WebRep – AVG LinkScanner – Dr. Web LinkChecker – McAfee SiteAdvisor – Norton Safe Web – Trend Micro TrendProtect – MyWOT's Web of Trust

19 20

mms://

• Microsoft's proprietary network streaming protocol • mms (microsoft media server ) Sky News … TV

mms://live1.wm.skynews.servecast.net/skynews_wmlz_live300k/

21

P2P (Peer-to-Peer) P2P

• Peer-to-Peer; it allows direct access, with permission, of a computer with another. • …

23 24

4 P2P P2P - BitTorrent

• Peer-to-Peer; it allows direct access, with permission, of a computer with another. • Music files (or plain files) exchange…

25 26

P2P P2P - BitTorrent

• Usually when you download a file from the • However with the BitTorrent protocol utilized, internet, it works as follows: downloading a file works as follows:

The idea is that in addition to the server sending data to individuals (clients /peers /you /user), the individuals also acquired data server with other individuals.

Web user

27 27 28

P2P - BitTorrent P2P vs BitTorrent…

• Bit Torrent is just a basic set of rules and description of how to do things to help you and P2P BitTorrent allow you to quickly download files as well as • One to one • One to many and many to distribute the file being downloaded at the same one time. • P2P programs: – • BitTorrent programs: • In order to use a torrent file you must however, – (original) – μTorrent have a Bit Torrent to download the torrent – Limewire – extension files. – WinMX – – … – … • BitTorrent.com to get a bit-Torrent client • These BitTorrent applications read files with a .torrent file extension…

29 30

5 For more TORRENT RELATED info… What is Internet Relay Chat (IRC) protocol?

• http://www.tech-faq.com/download-torrent-files.shtml • http://www.associatedcontent.com/article/477663/how_to _open_a_torrent_file.html

31 32

What is Internet Relay Chat (IRC) protocol?

• An application that allows groups of users to communicate via messages on-line, using computers connected with the Internet.

IRC: First chat software

33 34

What is IM ? IM examples

• Instant Messaging; exchange real-time typed • Instant Messaging; exchange real-time typed messages or chat ……. messages or chat … – Google Talk – MSN Messenger – AOL Instant Messenger – Yahoo Messenger

35 36

6 Video Conferencing What is freeware?

• Real time transmission of audio and video that • Software that may be used for free but not sold enables 2 or more people to have a meeting.

37 38

Open Source Open Source – Examples…

• Is software that provides its source code to everybody to use, modify and improve…

• …for free…

http://en.wikipedia.org/wiki/List_of_open_source_software_packages

39 40

What is shareware? What is a browser plug-in?

• Commerical Software distributed on a … • Special software program, which extends a “Try-Before–You-Buy” basis with limited browser’s functionality. functionality. • It can enable us to view or hear some multimedia files on the web, that would otherwise not be available by default. • Nagware – is a type of shareware that “nags” you to buy the software…

41 42

7 Plug-in Examples What is a cookie?

• RealPlayer • Small text files that some web sites store (automatically) on your computer’s hard drive. • Adobe Acrobat Reader Portable Document Format (PDF) • The text files may contain personally identifiable information… • ShockWave player • Why? In order to recognize you (your computer) • Active-X when you visit again their web site and to keep track of your visits.

43 44

What is a cookie? Can you delete cookies?

• Internet Explorer 11… – Click the gear – Safety – Delete browsing history… – Check-box next to Cookies… – Click Delete

45 46

Spam Spam

• Spam is any message or posting, that is sent to multiple recipients who have not specifically requested the message. • Other common terms for spam include:

1. Unsolicited commercial email (UCE), 2. Unsolicited bulk email (UBE) 3. Junk mail

47 48

8 What are “worms”, “viruses”?

• Worms and Viruses are malicious software programs that aim to harm your computer (software-hardware) • Viruses – Attaches self to program or file – May spread via to other computer via network – Can damage hardware software • Worms – Spread from computer to computer unaided by human action – Infects email contact lists (ex. Outlook’s contact list) – Can reduce performance and/or stop responding

49 50

Tips to guard computers? Trojan horse

• Don't open e-mail from an unknown source. • Only open expected e-mail attachments. • Don't automatically open e-mail attachments. • Don't download programs from Web sites, unless you know and trust the source. • Keep your anti-virus software updated!

51 52

Trojan horse Anti-Spyware for Trojan horses

• A program that appears to be performing a • Defender desired function, but is in fact performing (www.microsoft.com) something malicious… • Malwarebytes' Anti-Malware (www.malwarebytes.org) • Spybot Search & Destroy (www.safer-networking.org)

Free Software

53 54

9 Phishing Phishing @ MSU

• Is a method of fraudulently obtaining sensitive information, such as passwords, bank account, social security number, etc… • Typically done through e-mail communication, where the e-mail seems legitimate, but it is not…

55 56

Phishing online… Pharming

• Receiving an e-mail with instructions to login to a web site that is fake, but you assume to be legitimate… • This site will collect your login information… username & password

57 58

Pharming-example Audio format … MP3

• MP3 is an audio compression algorithm • It is also known as MPEG-1 Audio Layer-3 (MPEG = Moving Picture Experts Group)

59 60

10 Other audio formats … audio formats…

• WAV (Waveform Audio Format) • WMA (Windows Media Audio) • OGG (free open standard) • FLAC (lossless)

61 62

Podcasts

• Personalized off-line audio web casts (non- music). For example audio broadcast, like a radio show.

63 64

Examples … Key Logger … software

• A computer program that records every keystroke on a computer… • To protect yourself … Use an anti-spyware program to remove (locate) unauthorized software and keystroke monitoring programs.

DISCLAIMER: Logging other people’s keystrokes, without their permission, can be considered illegal.

65 66

11 Key logger software Firewall

• It is a software application used to block outside invaders • Allows some packets to pass (in/out), blocking others.

67 68

Firewall Firewall …

. Firewall won’t protect you from viruses . It will protect you from intrusion attempts and internet worms . Firewall software are not perfect . Firewall access is allowed or blocked, by the firewall, through a computer’s network ports

69 70

Check your network defenses… For fun…

1.https://www.grc.com/ • Get to know your internet connection – Speed • http://www.speakeasy.net/speedtest/ 2.http://security.symantec.com/sscv6/home.asp • http://www.speedtest.net/ – IP Address • http://whatismyipaddress.com/ (click on Additional IP details) 3.http://www.auditmypc.com/

Ping (Packet Internet Groper) is a networking tool: a tool to measure round trip time of a message sent from source to destination

71 72

12