Presentation is loading. Please wait.

Presentation is loading. Please wait.

WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005.

Similar presentations


Presentation on theme: "WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005."— Presentation transcript:

1 WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005

2 2 Overview Getting Started Getting Started What can you do on the Internet? What can you do on the Internet? Where can you get free Internet access? Where can you get free Internet access? Browsers and Searching Browsers and Searching Safety Issues Safety Issues Brief Overview of Chat and Instant Messaging (IM) Brief Overview of Chat and Instant Messaging (IM) Where to get more information Where to get more information Summary Summary

3 3 Getting Started What do you need to get started? What do you need to get started? Access to a computer that is connected to the Internet Access to a computer that is connected to the Internet

4 4 Finding Free Internet Access Where to look for free Internet access if you dont have a computer: Where to look for free Internet access if you dont have a computer: Public libraries Public libraries Community Mental Health Centers Community Mental Health Centers Some colleges/universities? Some colleges/universities? Where to look for free Internet access if you have a computer (though you have to put up with a lot of advertising): Where to look for free Internet access if you have a computer (though you have to put up with a lot of advertising):

5 5 What can you do on the Internet? Find information using internet browsers and search engines Find information using internet browsers and search engines Send and receive and subscribe to lists Send and receive and subscribe to lists Communicate with other people Communicate with other people Distance learning Distance learning Shop Shop

6 6 Browsers and Searching Examples of Browsers Examples of Browsers Internet Explorer Internet Explorer Netscape Netscape Mozilla Firefox Mozilla Firefox

7 7 Internet Explorer

8 8 Netscape

9 9 How to use a browser URL (Universal Resource Locator) - address of information on the World Wide Web URL (Universal Resource Locator) - address of information on the World Wide Web Use HyperText Transport Protocol (http) or HTTP over Secure Sockets Layer (SSL), abbreviated https Use HyperText Transport Protocol (http) or HTTP over Secure Sockets Layer (SSL), abbreviated https https://www.sitename.com https://www.sitename.com https://www.sitename.com Domain suffixes (e.g..com) tell you the type of site or where it is located. Domain suffixes (e.g..com) tell you the type of site or where it is located.

10 10 Important Domain Suffixes to Know Anything not ending with these suffixes is definitely outside the US. Some of these, like.com,.org and.net, may be. Knowing where you are is the key to knowing how much to trust the information. Anything not ending with these suffixes is definitely outside the US. Some of these, like.com,.org and.net, may be. Knowing where you are is the key to knowing how much to trust the information. AC - Academic (same as.edu) AC - Academic (same as.edu) CO - Commercial (same as.com) CO - Commercial (same as.com) COM - Commercial COM - Commercial EDU - Educational Site in the U.S. EDU - Educational Site in the U.S. GOV – U.S. Government GOV – U.S. Government INT - International INT - International MIL – U.S. Military MIL – U.S. Military NET - Network NET - Network ORG - Non-Profit Organization ORG - Non-Profit Organization ARPA – Research Organization ARPA – Research Organization NATO – North Atlantic Treaty Organization NATO – North Atlantic Treaty Organization

11 11 Internet Explorer example with Domain Suffix search

12 12 Search Engines What is a Search Engine? What is a Search Engine? Enables users to search the Web Enables users to search the Web Uses keywords to find information Uses keywords to find information Modern version of a library card catalog Modern version of a library card catalog Features usually include: Features usually include: Ranking of pages by how well they matched keywords Ranking of pages by how well they matched keywords Suggestion of possible alternate search terms Suggestion of possible alternate search terms Option to find similar pages Option to find similar pages Results are often affected by sponsored advertising Results are often affected by sponsored advertising

13 13 Most Popular Search Engines? Google (www.google.com) Google (www.google.com) Yahoo! (www.yahoo.com) Yahoo! (www.yahoo.com) AltaVista (www.altavista.com) AltaVista (www.altavista.com) Lycos (www.lycos.com) Lycos (www.lycos.com)

14 14 Doing Research with Google Example 1 – Finding a Psychiatrist

15 15 Doing Research with Google Example 1 – Finding a Psychiatrist, continued

16 16 Doing Research with Google Example 1 – Finding a Psychiatrist, continued

17 17 Doing Research with Google Example 1 – Finding a Psychiatrist, continued

18 18 Doing Research with Google Example 1 – Finding a Psychiatrist, continued

19 19 Doing Research with Google Example 1 – Finding a Psychiatrist, continued

20 20 Doing Research with Google Example 2 – Finding Local Information

21 21 Doing Research with Google Example 2 – Finding Local Information, continued

22 22 Doing Research with Google Example 2 – Finding Local Information, continued

23 23 Doing Research with Google Example 3 – Getting Information from a Phone Number Now click Google Maps

24 24 Doing Research with Google Example 3 – Getting Information from a Phone Number, contd Click on To here

25 25 Doing Research with Google Example 3 – Getting Information from a Phone Number, contd Enter starting address, click on Get Directions

26 26 Doing Research with Google Example 3 – Getting Information from a Phone Number, contd

27 27 Doing Research with Google Example 4 – Looking up Medication

28 28 Doing Research with Google Example 4 – Looking up Medication, continued Type Lithium in the search box and press the Enter key

29 29 Doing Research with Google Example 4 – Looking up Medication, continued Click on Drug Information

30 30 Doing Research with Google Example 4 – Looking up Medication, continued Click on the top listing of Lithium

31 31 Doing Research with Google Example 4 – Looking up Medication, continued

32 32 Questions? Getting Started Getting Started What can you do on the Internet? What can you do on the Internet? Where can you get free Internet access? Where can you get free Internet access? Browsers and Searching Browsers and Searching this is next this is next Safety Issues Safety Issues Brief Overview of Chat and IM Brief Overview of Chat and IM Where to get more information Where to get more information Summary Summary

33 33 How can you get a free account? How can you get a free account? If you already have an account, what do you need to know to set it up on your computer? If you already have an account, what do you need to know to set it up on your computer? How do you subscribe to an list? How do you subscribe to an list? Example: finding and subscribing to Example: finding and subscribing to

34 34 Where can you get a free account? Where can you get a free account? Google keywords: free Google keywords: free gmail.google.com gmail.google.com Many, many others Many, many others These can all be used through browsers These can all be used through browsers

35 35 Setting Up an Client What if you have an account and want to set up an program (also known as a client)? What if you have an account and want to set up an program (also known as a client)? Common, popular programs: Common, popular programs: Outlook Outlook Outlook Express Outlook Express Eudora Eudora Mac OS X Mail Mac OS X Mail Netscape Netscape Mozilla, Mozilla Thunderbird Mozilla, Mozilla Thunderbird Opera, Pegasus, Lotus Notes… others? Opera, Pegasus, Lotus Notes… others?

36 36 Setting Up , cont. These items will usually be supplied by your Internet Service Provider (ISP), but… These items will usually be supplied by your Internet Service Provider (ISP), but… What do they really mean? Account Name Account Name User Name User Name Password Password Incoming Server Name Incoming Server Name Incoming Server Type Incoming Server Type Outgoing Server Name Outgoing Server Name

37 37 Setting Up , contd Lets look at the easy ones first… Lets look at the easy ones first… Account Name Account Name This is going to be the full address, and will look something like: for example, This is going to be the full address, and will look something like: for example, User Name User Name This is just the part before so in the example here, would just be anne This is just the part before so in the example here, would just be anne Password Password This is whatever was assigned or chosen as a password when the account was created. This is whatever was assigned or chosen as a password when the account was created.

38 38 Setting Up , contd Now for the trickier ones… Whats a Server and what do these mean? Now for the trickier ones… Whats a Server and what do these mean? Incoming Server Name Incoming Server Name Incoming Server Type Incoming Server Type Outgoing Server Name Outgoing Server Name

39 39 Setting Up , contd Servers are computers that are set up to service requests. In overly-simplified terms, they are out there waiting for clients to ask them to do something. They typically hold on to large amounts of data, can search through the data, pass requests on to other servers, and talk to each other through well-defined rules called protocols. Servers are computers that are set up to service requests. In overly-simplified terms, they are out there waiting for clients to ask them to do something. They typically hold on to large amounts of data, can search through the data, pass requests on to other servers, and talk to each other through well-defined rules called protocols.

40 40 Setting Up , contd An server typically uses a couple of different protocols, one called Simple Mail Transfer Protocol (SMTP), and one called Post Office Protocol (POP). SMTP is used by the program on your computer to hand mail off to the server. POP is used by the program on your computer to retrieve your from the server. Some servers use a different protocol called IMAP (the Internet Message Access Protocol), to retrieve your from the server, but the information needed is exactly the same. An server typically uses a couple of different protocols, one called Simple Mail Transfer Protocol (SMTP), and one called Post Office Protocol (POP). SMTP is used by the program on your computer to hand mail off to the server. POP is used by the program on your computer to retrieve your from the server. Some servers use a different protocol called IMAP (the Internet Message Access Protocol), to retrieve your from the server, but the information needed is exactly the same.

41 41 Setting Up , contd Incoming Server Name Incoming Server Name typically mail.domain.extension or pop.domain.extension typically mail.domain.extension or pop.domain.extension e.g. mail.registeredsite.com, pop.east.cox.net e.g. mail.registeredsite.com, pop.east.cox.net Incoming Server Type Incoming Server Type Usually POP3 Usually POP3 IMAP more common on University/College systems IMAP more common on University/College systems Outgoing Server Name Outgoing Server Name Typically mail.domain.extension or smtp.domain.extension Typically mail.domain.extension or smtp.domain.extension E.g. smtp.east.cox.net, smtp.idt.com, mail.madethisup.com E.g. smtp.east.cox.net, smtp.idt.com, mail.madethisup.com

42 42 Subscribing to Lists What is an list? What is an list? Electronic mailing lists are a special usage of that allows for widespread distribution of information to many Internet users. Software is installed on a server which processes incoming messages and distributes the message to all users subscribed to the mailing list. Electronic mailing lists are a special usage of that allows for widespread distribution of information to many Internet users. Software is installed on a server which processes incoming messages and distributes the message to all users subscribed to the mailing list.

43 43 Subscribing to Lists, contd Where to start looking: Where to start looking: (new feature of Google) (new feature of Google) Google keywords: list Google keywords: list

44 44 Subscribing to Go to Go to If you havent already joined follow the instructions to create a user id and password. This will give you full access to all of the web-based features of the group. These features include: If you havent already joined follow the instructions to create a user id and password. This will give you full access to all of the web-based features of the group. These features include: Changing how your s are delivered. You can stop your , get all your s in one Digest each day, or get individual . If you join yahoogroups, you have control. Changing how your s are delivered. You can stop your , get all your s in one Digest each day, or get individual . If you join yahoogroups, you have control.

45 45 Subscribing, continued Ability to read and respond to from the web- based interface. Ability to read and respond to from the web- based interface. If you prefer not to be a member of yahoogroups, you can subscribe by sending a blank (one with no message or subject) to If you prefer not to be a member of yahoogroups, you can subscribe by sending a blank (one with no message or subject)

46 46 Subscribing, continued joining yahoogroups

47 47 Subscribing, continued joining yahoogroups

48 48 Subscribing, continued joining yahoogroups

49 49 Internet Safety Basics Basics What is Phishing? What is Phishing? What is Spoofing? What is Spoofing? Avoiding Scams Avoiding Scams Ways to avoid being Spoofed Ways to avoid being Spoofed More Spoofing More Spoofing Virus Protection software Virus Protection software Attachments Attachments Firewalls Firewalls

50 50 Internet Safety Usernames & Passwords Usernames & Passwords When you register with different sites, you will generally pick a username and a password. When you register with different sites, you will generally pick a username and a password. Write down the site name, username, and password and keep the information in a safe place (NOT on your computer). Write down the site name, username, and password and keep the information in a safe place (NOT on your computer). Get in the habit of doing this each time you register with any site. Get in the habit of doing this each time you register with any site. This way if something happens to your computer, you still have the information. This way if something happens to your computer, you still have the information. Protect your password information, since most people use the same password in a lot of places. If someone knows your password for one site, they might be able to use it to get at more personal information at another site. Protect your password information, since most people use the same password in a lot of places. If someone knows your password for one site, they might be able to use it to get at more personal information at another site.

51 51 Internet Safety Sharing Personal Information Sharing Personal Information Use caution in sharing personally identifying information in chat or on mailing lists. It is wise to choose an alias and not to tell too much about yourself until you are really sure that the person or persons you are conversing with are trustworthy. Trust your instincts. Use caution in sharing personally identifying information in chat or on mailing lists. It is wise to choose an alias and not to tell too much about yourself until you are really sure that the person or persons you are conversing with are trustworthy. Trust your instincts.

52 52 What is Phishing? (fish´ing) (n.) The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. (fish´ing) (n.) The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. identity theft identity theft Phishing schemes often involve spoofing of internet addresses. Phishing schemes often involve spoofing of internet addresses.

53 53 What is Spoofing? In networking, the term is used to describe a variety of ways in which hardware and software can be fooled. IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In networking, the term is used to describe a variety of ways in which hardware and software can be fooled. IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. Spoofing is used combined with phishing to spam to thousand of people asking them to go to a web site to confirm some kind of confidential financial information Spoofing is used combined with phishing to spam to thousand of people asking them to go to a web site to confirm some kind of confidential financial information When they click on the link in the , they arrive at a site that looks just like the business they expect, whether it is AOL, their bank, or some other institution they would trust with their credit card information. When they click on the link in the , they arrive at a site that looks just like the business they expect, whether it is AOL, their bank, or some other institution they would trust with their credit card information. Many people are tricked into entering personal data and credit card information on these sites. Many people are tricked into entering personal data and credit card information on these sites.

54 54 Avoiding Scams NEVER enter personal data unless you are certain of where you are, how you got there, and if you are entering credit card or financial data, you should be on a secure web site (the URL should begin with https://) NEVER enter personal data unless you are certain of where you are, how you got there, and if you are entering credit card or financial data, you should be on a secure web site (the URL should begin with https://) The same goes for giving any personal information to someone who calls on the phone, even if they claim to be a representative of your credit card company checking to make sure your credit card hasnt been used fraudulently. Hang up and call the number on the back of your credit card. The same goes for giving any personal information to someone who calls on the phone, even if they claim to be a representative of your credit card company checking to make sure your credit card hasnt been used fraudulently. Hang up and call the number on the back of your credit card.

55 55 Ways to avoid being Spoofed

56 56 Browser with Spoofstick installed

57 57 More Spoofing Spoofing and return addresses Spoofing also refers to forging an header to make it appear as if it came from somewhere or someone other than the actual source. Spoofing also refers to forging an header to make it appear as if it came from somewhere or someone other than the actual source. header header It is possible for headers to be forged, just as it is possible for someone to forge a return address on a letter. Spammers do this all the time so that they are less likely to be caught. It is possible for headers to be forged, just as it is possible for someone to forge a return address on a letter. Spammers do this all the time so that they are less likely to be caught.

58 58 Virus Protection Software Anti-Virus software is absolutely essential for a PC running Microsoft Windows. Anti-Virus software is absolutely essential for a PC running Microsoft Windows. The ones with the most name recognition are the ones that come bundled with new PCs The ones with the most name recognition are the ones that come bundled with new PCs McAfee McAfee Norton Anti-virus Norton Anti-virus Free online scans for viruses and spyware are available at This site will test computer speed, 'net connection, drive health, etc. and not only flags any potential issues but also explains why the issue is important and how to address it. Free online scans for viruses and spyware are available at This site will test computer speed, 'net connection, drive health, etc. and not only flags any potential issues but also explains why the issue is important and how to address it.http://housecall.trendmicro.com

59 59 Virus Protection Software, contd Free Anti-Virus software is available at Click on Get AVG Free and follow the instructions to download and install the software. Free Anti-Virus software is available at Click on Get AVG Free and follow the instructions to download and install the software. Google keywords: virus protection Google keywords: virus protection

60 60 Attachments NEVER open an attachments if you dont know the person who sent it NEVER open an attachments if you dont know the person who sent it Only open attachments from someone you know if it has been scanned for viruses or it is a graphics (picture) file (.jpg,.gif). Only open attachments from someone you know if it has been scanned for viruses or it is a graphics (picture) file (.jpg,.gif). Which attachments are unsafe? Which attachments are unsafe? Any attachment that came from someone you dont know Any attachment that came from someone you dont know Almost any attachment except graphics (picture) files ending in.jpg,.gif that will simply be opened and displayed. Almost any attachment except graphics (picture) files ending in.jpg,.gif that will simply be opened and displayed. Attachments ending in.exe and.zip are particularly dangerous. Attachments ending in.exe and.zip are particularly dangerous.

61 61 Firewalls A firewall is a security system that acts as a protective boundary between a network and the outside world. A firewall is a security system that acts as a protective boundary between a network and the outside world. Firewalls are a good idea if you have a connection that is always on such as a cable modem or DSL. With a connection that is always on, you may have the same address on the internet for long periods of time, and you have a high speed connection, making you a tempting target for a hacker. Firewalls are a good idea if you have a connection that is always on such as a cable modem or DSL. With a connection that is always on, you may have the same address on the internet for long periods of time, and you have a high speed connection, making you a tempting target for a hacker. If you are using a modem and dial-up connection, this is really not critical because it is unlikely that a hacker will try to get to your computer through a relatively slow dial-up connection that isnt there all the time. If you are using a modem and dial-up connection, this is really not critical because it is unlikely that a hacker will try to get to your computer through a relatively slow dial-up connection that isnt there all the time. Also, when connecting to the internet through a modem, your address on the internet changes every time you connect. Also, when connecting to the internet through a modem, your address on the internet changes every time you connect.

62 62 Firewalls, continued. Windows XP includes Internet Connection Firewall (ICF) software you can use to restrict what information is communicated between the Internet and your home or small office network. Windows XP includes Internet Connection Firewall (ICF) software you can use to restrict what information is communicated between the Internet and your home or small office network. For information about firewalls, including places to get free firewall software go to: For information about firewalls, including places to get free firewall software go to: Google keywords: firewall software Google keywords: firewall software

63 63 Chat and Instant Messaging (IM) Popular chat programs Popular chat programs mIRC, xChat, ICQ mIRC, xChat, ICQ Google keywords: chat programs Google keywords: chat programs Popular Instant Messaging Programs Popular Instant Messaging Programs AOL Instant Messenger AOL Instant Messenger Yahoo! Messenger Yahoo! Messenger MSN Messenger MSN Messenger Windows Messenger Windows Messenger Google keywords: instant messaging Google keywords: instant messaging

64 64 Where to get More Information Information on low cost re-cycled computers Information on low cost re-cycled computers nd, click on find recycled hardware. Make sure when buying any kind of used computer equipment that there is a legal copy of Microsoft Windows or the Mac OS and that you get the CDs and documentation that originally came with the computer. nd, click on find recycled hardware. Make sure when buying any kind of used computer equipment that there is a legal copy of Microsoft Windows or the Mac OS and that you get the CDs and documentation that originally came with the computer. nd nd Google keywords: recycled computers Google keywords: recycled computers

65 65 Where to get More Information, continued Web sites providing information on patient assistance programs providing no cost prescriptions for eligible participants Web sites providing information on patient assistance programs providing no cost prescriptions for eligible participants Google keywords: patient assistance programs Google keywords: patient assistance programs

66 66 Where to get More Information, continued For people who take meds who would like or phone reminders. Google keywords: phone reminders or reminders For people who take meds who would like or phone reminders. Google keywords: phone reminders or reminders These are free, but will only send one a day: These are free, but will only send one a day: These have a low cost, but will send more than one a day: These have a low cost, but will send more than one a day:

67 67 Where to get More Information, continued Earliest mental health sites est. on the web, 1 of 3

68 68 Where to get More Information, continued Earliest mental health sites est. on the web, 2 of 3

69 69 Where to get More Information, continued Earliest mental health sites est. on the web, 3 of 3

70 70 Summary Getting Started Getting Started What can you do on the Internet? What can you do on the Internet? Where can you get free Internet access? Where can you get free Internet access? Browsers and Searching Browsers and Searching Safety Issues Safety Issues Brief Overview of Chat and Instant Messaging Brief Overview of Chat and Instant Messaging Where to get more information Where to get more information


Download ppt "WRAP and the Internet Presented by Anne Frank Anne Northeast WRAP Conference Amherst, MA 21 July 2005."

Similar presentations


Ads by Google