
Ques 1) How to Book a Domain ? Follow these steps for booking your Domain Name: Step 1 In the Domain search box on the home page enter the domain name you want, select an extension for your Domain name (e.g. .com, .net, org, .tv etc.) and start your search by clicking on the Search button. Step 2 The results page will next show you whether the Domain is available or not. If not available then you will have to resume your search again. If your Domain name is available, you may proceed to register by selecting the checkbox against the domain name you want and clicking on Continue. Step 3 Proceed to complete the Domain registration form. Note: INSTALINKS.NET does not need any pre-registration, and you will directly proceeded to a Domain registration form. Registration is absolutely free of cost. You only have to register once on the site. After completing and submitting the Domain registration form, you will get an order code and will receive an email from Instalinks containing your all information pertaining to the domain that you have booked. Your domain will be activated within 48 hrs of receiving your payment. Note: This email does NOT mean that your domain has been registered, it merely confirms your order. You have to send the Cheque/Draft for the amount pertaining to the domain you have booked to INSTALINKS for the registration of the domain. From the day you have applied for Domain booking, Instalinks will keep it for a maximum period of 21 days, during which you will receive reminders. After 21 days, your domain will become available again and may be booked by someone else. Ques 2) What is WHOIS ? WHOIS (pronounced "who is") is an Internet database that contains information on domain names including the name servers associated with the domain name, the domain registrar and the Administrative, Billing and Technical contacts with postal and email addresses. Each domain registrar maintains a WHOIS database with all contact information for the domain names hosted on their servers. The InterNIC WHOIS database, on the other hand, is vast and has information on all .com, .net and .org domain names. The WHOIS is also a tool or an application which searches the domain name information contained in WHOIS databases. It is generally used to check either the availability of a domain name or the ownership of a domain name. The tool requires you to enter a domain name such as webdevelopersnotes.com (without the www prefix). If the domain is available you will be informed of the same, else, you would be displayed one or more details: • The registrant information. Details of the person who registered the domain name including their postal and email addresses and phone number. • The contacts: Each domain name is associated with three contacts - Administrative, Billing and Technical. In most cases, all the three would belong to the same person (the registrant). Note: The technical contact might be of the company hosting the domain name. • The creation and expiration date of the domain name • The name servers associated with the domain name Ques 3) What is Cybersquatting ? Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. The term is derived from "squatting," which is the act of occupying an abandoned or unoccupied space or building that the squatter does not own, rent or otherwise have permission to use. Cybersquatting, however, is a bit different in that the domain names that are being "squatted" are (sometimes but not always) being paid for through the registration process by the cybersquatters. Cybersquatters usually ask for prices far greater than that at which they purchased it. Some cybersquatters put up derogatory remarks about the person or company the domain is meant to represent in an effort to encourage the subject to buy the domain from them. Others post paid links via Google, Yahoo, Ask.com and other paid advertising networks to the actual site that the user likely wanted, thus monetizing their squatting. Some argue that the dividing line of Cybersquatting is one of the most loosely used terms related to domain name intellectual property law and is often incorrectly used to refer to the sale or purchase of generic domain names. Cybersquatting (also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price. The term is derived from "squatting," which is the act of occupying an abandoned or unoccupied space or building that the squatter does not own, rent or otherwise have permission to use. Cybersquatting, however, is a bit different in that the domain names that are being "squatted" are (sometimes but not always) being paid for through the registration process by the cybersquatters. Cybersquatters usually ask for prices far greater than that at which they purchased it. Some cybersquatters put up derogatory remarks about the person or company the domain is meant to represent in an effort to encourage the subject to buy the domain from them.[citation needed] Others post paid links via Google, Yahoo, Ask.com and other paid advertising networks to the actual site that the user likely wanted, thus monetizing their squatting Ques 4) What is Pretty Good Privacy ? Pretty Good Privacy (PGP) : It is a computer program that provides cryptographic privacy and authentication. PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail communications. How PGP Works ? PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and, finally, public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a user name and/or an e-mail address. The first version of this system was generally known as a web of trust to contrast with the X.509 system which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Current versions of PGP encryption include both options through an automated key management server. Compatibility As PGP evolves, PGP systems that support newer features and algorithms are able to create encrypted messages that older PGP systems cannot decrypt, even with a valid private key. Thus, it is essential that partners in PGP communication understand each other's PGP capabilities or at least agree on PGP settings. Digital signatures PGP supports message authentication and integrity checking. The latter is used to detect whether a message has been altered since it was completed (the message integrity property), and the former to determine whether it was actually sent by the person/entity claimed to be the sender (a digital signature). In PGP, these are used by default in conjunction with encryption, but can be applied to plaintext as well. The sender uses PGP to create a digital signature for the message with either the RSA or DSA signature algorithms. To do so, PGP computes a hash (also called a message digest) from the plaintext, and then creates the digital signature from that hash using the sender's private keys. Web of trust Both when encrypting messages and when verifying signatures, it is critical that the public key used to send messages to someone or some entity actually does 'belong' to the intended recipient. Simply downloading a public key from somewhere is not overwhelming assurance of that association; deliberate (or accidental) impersonation is possible. PGP has, from its first versions, always included provisions for distributing a user's public keys in an 'identity certificate' which is so constructed cryptographically that any tampering (or accidental garble) is readily detectable. But merely making a certificate which is impossible to modify without being detected effectively is also insufficient. It can prevent corruption only after the certificate has been created, not before. Users must also ensure by some means that the public key in a certificate actually does belong to the person/entity claiming it. From its first release, PGP products have included an internal certificate 'vetting scheme' to assist with this; a trust model which has been called a web of trust. A given public key (or more specifically, information binding a user name to a key) may be digitally signed by a third party user to attest to the association between someone (actually a user name) and the key. There are several levels of confidence which can be included in such signatures. Although many programs read and write this information, few (if any) include this level of certification when calculating whether to trust a key. Ques 5) What do you mean by Digital Signature ? (Bob's public key) Bob (Bob's private key) Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private Key. Bob's Co-workers: Anyone can get Bob's Public Key, but Bob keeps his Private Key to himself Pat Doug Susan Bob's Public key is available to anyone who needs it, but he keeps his Private Key to himself.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages25 Page
-
File Size-