1. The Web vs. the Internet
The Internet is a vast 'interconnection of computer networks'
that spans the globe. It is comprised of millions of computing devices
that trade volumes of information. Desktop computers, mainframes, GPS
units, cell phones, car alarms, video game consoles, and even soda pop machines
are connected to the Net.
The Internet started in the late 1960's as an American
military project, and has since evolved into a massive public spiderweb. No
single organization owns or controls the Internet. The Net has grown into
a spectacular mishmash of non-profit, private sector, government, and
entrepreneurial broadcasters.
The Internet houses many layers of information, with each
layer dedicated to a different kind of documentation. These different layers
are called 'protocols'. The most popular protocols are the World Wide Web, FTP,
Telnet, Gopher-space, instant messaging, and email.
The World Wide Web, or 'Web' for short, is the most popular
portion of the Internet. The Web is viewed through web browser software.
2. Browser
A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents.
The most popular web browsers in 2010 are:
Firefox, Google Chrome, Internet Explorer, and Safari
3. URL
URL's, or 'uniform resource locators', are the web browser addresses of Internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers.URL's commonly use three parts to address a page or file: the protocol (which is the portion ending in '//:'); the host computer (which sometimes ends in .com); and the filename /pagename itself. For example:
- https://personal.bankofamerica.com/login/password.htm
- http://forums.about.com/ab-guitar/?msg61989.1
- ftp://files.microsoft.com/public/eBookreader.msi
- telnet://freenet.edmonton.ca/main
4. IP Address
Your computer's 'internet protocol' address
is a four-part electronic serial number. An IP address looks something like
'202.3.104.55', complete with dot separators. Every computer, cell phone,
and device that accesses the Internet is assigned at least one IP address for
tracking purposes. Wherever you browse, whenever you send an email or instant
message, and whenever you download a file, your IP address acts like a type of
automobile license plate to enforce accountability and traceability
5. Email
Email (formerly spelled e-mail with a hyphen) is electronic mail. It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook).
Email has many cousins: text messaging,
instant messaging, live chat, videomail (v-mail), Google Waving
6. Blogs and Blogging
A blog ('web log') is a modern online writer's column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages.
Web logs are usually arranged
chronologically, and with less formality than a full website. Blogs vary
in quality from very amateurish to very professional. It costs nothing to start
your own personal blog
7. ISP
ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP's will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).Today, you will also hear about WISP's, which are Wireless Internet Service Providers. They cater to laptop users who travel regularly.
8. Download
Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. "I want to download a new musical ringtone for my cell phone", "I want to download a trial copy of Microsoft Office 2010"). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed.Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.
9. Malware
Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things:- vandalize your computer in some way
- steal your private information
- take remote control of your computer ('zombie' your computer) for other ends
- manipulate you into purchasing something
10. Addons and Plugins
Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web.Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.
11. Trojan
A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the Trojan file.12. Spamming and Filtering
'Spam' has two meanings. 1) Spam can mean 'the rapid repetition of a keyboard command'. But more commonly, 2) spam is the jargon name of 'unwanted/unsolicited email'. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords.Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, and then either deletes or quarantines messages that appear to be spam. Look for a 'spam' or 'junk' folder in your mailbox to see your quarantine of filtered email.
13. Firewall
Firewall is a generic term to describe 'a barrier against destruction'. It comes from the building term of a protective wall to prevent the spreading of house fires or engine compartment fires. In the case of computing, 'firewall' means to have software and/or hardware protecting you from hackers and viruses.Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system.