Presentation is loading. Please wait.

Presentation is loading. Please wait.

Informasi Teknologi Class 2 Internet and Intranet History and Function dan internet Browsing (if possible) Transfer File and File.

Similar presentations

Presentation on theme: "Informasi Teknologi Class 2 Internet and Intranet History and Function dan internet Browsing (if possible) Transfer File and File."— Presentation transcript:

1 Informasi Teknologi

2 Class 2 Internet and Intranet History and Function dan internet Browsing (if possible) Transfer File and File Saving Virus

3 MISPREDICTIONS BY IT INDUSTRY LEADERS This “telephone” has too many shortcomings to be seriously considered as a means of communication. The device is inherently of no value to us. - Western Union internal memo, 1876 I think there is a world market for maybe five computers. There is no reason anyone would want a computer in their home. 640K ought to be enough for anybody. Dell has a great business model, but that dog won’t scale. -Thomas Watson, chairman of IBM, 1943 But what [is a microchip] good for? -Engineer at the Advanced Computing Systems Division of IBM, Ken Olson, president, chairman, and founder of Digital Equipment Corp., Attributed to Bill Gates, chairman of Microsoft, John Shoemaker, head of Sun’s server division, 2000

4 Internet and Intranet Internet International network of network that are commercial (private) and publicly owned, connecting thousands of different network from more 200 countries around the world. (Managing digital Firm Page 17, K.C Laudon)

5 Internet and Intranet Intranet An internal network based on internet and World Wide Web Standards (Managing digital Firm Page 24, K.C Laudon) Extranet Private Intranet that is accessible to authorize d outsiders. (Managing digital Firm Page 24, K.C Laudon)

6 Internet Map Internet map: net/Backbones/ net/Backbones/

7 Internet History 1836 Telegraph, Patented Transatlantic cable. Europe and US 1876 Telephone by Alexander Graham Bell 1957 Sputnik launch (USSR), Advanced Research Projects Ag ency (ARPA) Inside US DoD Packet-switching (PS) networks initiate as foundat ion of data transfer in internet 1969 the birth of ARPANET by DoD 1971 ARPANET expanded to 15 nodes (23 host), were i ntroduce 1972 the first public demonstration of ARPANET connecting 40 host, Telnet were introduce

8 Internet History (con ’ t) 1973 The first International connection of ARPANET to University College of London (England) and Royal Radar Establishme nt (Norway) Ethernet and FTP (file transfer protocol) format were initiate, the idea of internet emerged TCP (Transmission Control Program) used as standard in ARPANET network Telenet, commercial version of ARPANET launched Networking networks expanding. UUCP (Unix-to-Unix CoPy) created by AT&T Bell Labs and distributed together with UNIX UNIX as operating system still used until now.

9 Internet History (con ’ t) become more popular Internet became reality with 100 connected host. THEORYNET became the fist network that provide to more than 100 researcher. format and specifications became standard Public demonstration of ARPANET/Packet Radio Net/ SATNET Internet protocols through gateways News Groups introduced USENET created with UUCP and still used until today ARPA created Internet Configuration Control Board.

10 Internet History (con ’ t) 1981 Various private and commercial network started to combi ne and connected. BITNET ("Because It's Time NETwork ” ) started as first co operative network at City University (New York) with first connection to Yale University 1982 TCP/IP (Transmission Control Protocol (TCP) dan Interne t Protocol (IP) ), became future data communication stand ard Internet became bigger and bigger Name server created, host naming with alphabet characte rs started. Internet Activities Board (IAB) created replacing ICCB Berkeley Labs launch UNIX 4.2BSD with TCP/IP

11 Internet History (con ’ t) 1984 Host connected reach 1000 hosts Domain Name Server (DNS) implemented, host naming b ecome less complicated = sity.mydept.mynetwork.mycountry ( Internet power become reality with 5000 host connected a nd 241 news groups. Network News Transfer Protocol (NNTP) created Internet commercialization, host number increased to UUNET established provided commercial UUCP and Use net access.

12 Internet History (con ’ t) 1988 Introduction of Internet Relay Chat (IRC) 1989 Host increase to 100,000 hosts. The first relay between commercial and internet Internet Engineering Task Force (IETF) and Internet Rese arch Task Force (IRTF) established under IAB 1990 Host increase to 300,000 Hosts and 1,000 News groups ARPANET existence decrease The World ( the first company that provide i nternet service through dial up

13 Internet History (con ’ t) 1991 Friendly User Interface ke WWW created. Gopher created by Paul Lindner and Mark P. McCahill fro m university of Minnesota. World-Wide Web (WWW) standard established by CERN; Tim Berners-Lee 1992 Multimedia change the face of internet Host number increase to 1 million, News groups reach 4,000 Established of Internet Society (ISOC) The first MBONE audio multicast (March) dan video multi cast (November). "Surfing the Internet" introduced by by Jean Armour Polly.

14 Internet History (con ’ t) 1993 WWW revolution, 2 Million hosts and 600 WWW sites. Business and Media really take notice of the Internet. White house and United Nations on-line. Mosaic popularity in internet as front end for WWW evolved to Netscape the most popular WWW browser at that time Internet commercialization started, 3 million host www sites and newsgroup ARPANET/Internet 25 th year anniversary. Local community started to connect directly to internet, US senate start to give information server access. Internet Became life standard, the first Cyberbank opened

15 Internet History (con ’ t) Million Hosts, 100,000 WWW Sites. dial-up systems (by Compuserve, America Online, Prodigy) selling internet access Domain name registration is not free any more. Search Engine technology introduced Microsoft entering internet business, 12.8 Million hosts and 0.5 million WWW sites. Telephone Technology through internet (VO-IP) became threat to telecommunication industry, they plead to US senat e to banned this technology. (US Senate only banned this te chnology only for 1 year) WWW wars between netscape dan microsoft started.

16 Domain Name Registration Jan. ‘ 89 - Jul. ‘ 97 April 2001: 31,000,000 Domain Names!!!

17 September 2002 The Internet Reached Two Important Milestones: 200,000,000 IP Hosts > 840,000,000 Users

18 Internet Growth Trends 2005 The sky is the limits Use search engine to find more information

19 Broadband Internet

20 Internet Growth Trends 1977: 111 hosts on Internet 1981: 213 hosts 1983: 562 hosts 1984: 1,000 hosts 1986: 5,000 hosts 1987: 10,000 hosts 1989: 100,000 hosts 1992: 1,000,000 hosts 2001: 150 – 175 million hosts 2002: over 200 million hosts By 2010, about 80% of the planet will be on the Inte rnet

21 The Internet was not known as "The Internet" until January 1984, at which time there were 1000 hosts that were all converted over to using TCP/IP. Chart by William F. Slater, III Sept. 1, 2002 Dot-Com Bust Begins Copyright 2002, William F. Slater, III, Chicago, IL, USA

22 Internet Population (in million) Asia 258 Europe231 Canada & USA222 Latin America 56 Middle East 17 Oceania 16 Africa 13 Total 813 (Oct. 2004, )

23 and internet INTERNET naming based on TCP/IP protocol IP (Internet Protocol) Based on 4 column between 0 and 255 and each colu mn separated by dot. This technology called IPv4 (Internet Protocol Version 4)

24 and internet (con ’ t) IP address management in the world being distributed an d manage by InterNIC where it will distributed to ISP (Inte rnet Service Provider), ISP will distributed to its user and customer. DNS (domain name system) used to give flexibility to tran slate ip address number to non number identification = =

25 and internet (con ’ t) DNS concepts can be describe as = country = = United Kingdom = United States = Japan = Australia = Singapore

26 and internet (con ’ t) ac / the third column = institution = Academic Education militer commercial = government / or = organization = Internet Service Provider = television Web = web provide company Sch = school

27 and internet (con ’ t) unila / 2 nd column = institution name.itb.= Institut Teknologi Bandung = Universitas = = PT. Metrodata Elektronik = Koran Republika Maiser. / 1 st column = machine/host name/sub institution  maiser = komputer mail  cnrg = computer network research  xxx = komputer

28 Format MISAL : reader Pine(unix environment) Outlook(windows environment) Netscape Messengger(windows environment) Eudora(windows environment) Pegasus(dos/windows environment) dll

29 Main component of (HEADER) From (sender) To(receiver) CC(carbon copy / tembusan) BCC(blind carbon copy / tembusan) Subject(isi subyek dari ) ATTACHMENT(sisipan file)

30 Internal Universitas Lampung Telnet ke server menggunakan Telnet client (windows XP) Server telnet + Web based  server utama  internal webmail

31 Telnet procedure Start  Run  cmd (untuk menjalankan console DOS pada windows XP) Ketikkan telnet

32 Virus Theories for self-replicating programs are first developed Apple Viruses 1, 2, and 3 are some of the first viruses "in the wild," or public domain. Found on the Apple II operating syst em, the viruses spread through Texas A&M via pirated compute r games Fred Cohen, while working on his dissertation, formally d efines a computer virus as "a computer program that can affect other computer programs by modifying them in such a way as t o include a (possibly evolved) copy of itself." Two programmers named Basit and Amjad replace the e xecutable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any dri ve. Infected floppies had " © Brain" for a volume label.

33 Virus (con ’ t) Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both.EXE and.COM files and deletes any programs run on that day Symantec launches Norton AntiVirus, one of the first anti-virus programs developed by a large company Tequila is the first widespread polymorphic virus foun d in the wild. Polymorphic viruses make detection difficult for virus scanners by changing their appearance with each new infection viruses are in existence, an increase of 420% fr om December of 1990.

34 Virus (con ’ t) The Melissa virus, W97M/Melissa, executes a macro i n a document attached to an , which forwards the docu ment to 50 people in the user's Outlook address book. The vi rus also infects other Word documents and subsequently ma ils them out as attachments. Melissa spread faster than any other previous virus The Love Bug, also known as the ILOVEYOU virus, s ends itself out via Outlook, much like Melissa. The virus com es as a VBS attachment and deletes files, including MP3, M P2, and JPG. It also sends usernames and passwords to the virus' author. W97M.Resume.A, a new variation of the Melissa virus, is det ermined to be in the wild. The "resume" virus acts much like Melissa, using a Word macro to infect Outlook and spread its elf.

35 Virus (con ’ t) 2001 The Anna Kournikova virus, also known as VBS/SST. It spreads by sending copies of itself to the entire address book in Micros oft Outlook. It is believed that this virus was created with a so-called virus creation kit, a program which can enable even a novice programmer to create these malicious programs. The Code Red I and II worms attacked computer networks in July and Augu st. According to Computer Economics they affected over 700,000 computers and caused upwards of 2 billion in damages. A worm spreads through external and (then) internal computer networks, as opposed to a virus which infects computers via and certain web sites. Code Red took advantage of a vulnerability in Microsoft's Windows 2000 and Windows NT server software. Microsoft developed a patch to protect networks against the worm, and a dmits that they too were attacked. Other major companies affected includ e AT&T, and the AP.

36 Virus (con ’ t) Trojan.Xombe, Randex, Bizex, Witty, MP3Concept, Sas ser, Mac OS X, W64.Rugrat.3344, Symb/Cabir-A, JS/Scob-A, WCE/Duts-A, W32/Amus-A, social engineering taking the lead in propagation technique s. Trojan.Xombe was sent out to a wide audience. It posed as a message from Microsoft Windows Update asking you to run the attached revision to XP Service Pack 1. In February it was demonstrated that virus writers were starting to ply their craft for money. A German magazine managed to buy a li st of infected IP addresses from a distributor of the virus Randex. These IP addresses were for sale to spammers who could use the infected machines as mail zombies. In April saw the Sasser worm which is the first to effectively use th e LSASS Windows vulnerability; a vulnerability that allowed the wo rm to spread via an open FTP port instead of through In June Symb/Cabir-A appeared to infect Nokia Series 60 mobile phones. The worm is designed to spread to nearby Bluetooth-ena bled devices.

37 Virus (con ’ t) Bropia, Troj/BankAsh, Commwarrior, Chod In 2005 the end of January saw the Bropia Worm which targets MSN Messenger for spreading. The 9th of February then saw Troj/BankAsh, the first Trojan to a ttack the new (still in beta) Microsoft AntiSpyware product. This Trojan also was reported to go after various British on-line banking services. The start of March saw distribution of another mobile phone wor m: Commwarrior, which spread via MMS messaging. The end of March/start of April saw variants of Chod appear. Th is is a sophisticated worm that spreads via and the MSN Messaging client.

38 Virus (Con ’ t)

Download ppt "Informasi Teknologi Class 2 Internet and Intranet History and Function dan internet Browsing (if possible) Transfer File and File."

Similar presentations

Ads by Google