Presentation is loading. Please wait.

Presentation is loading. Please wait.

Aktiwiteit 1, bl 22 Internet Terminology/ terminologie.

Similar presentations


Presentation on theme: "Aktiwiteit 1, bl 22 Internet Terminology/ terminologie."— Presentation transcript:

1 Aktiwiteit 1, bl 22 Internet Terminology/ terminologie

2 Phishing:  Poging om sensitiewe en privaat inligting soos wagwoorde, kredietkaart besonderhede, rekeningnommers, ens. te bekom  deur voor te gee die boodskap kom van 'n betroubare bron.  e-pos en kitsboodskappe (sms) word gebruik  ontvangers word na 'n vals webtuiste wat soos 'n egte een lyk, bv. 'n bank, gelok  waarop dan vir bogenoemde besonderhede gevra word. Kjuitgespreek soos Eng visvang: fishing

3

4

5 Spam the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients./ groot hoeveelheid advertensies of promosiemateriaal (gemorspos) wat ontvanger nie noodwendig wil hê nie. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender./ persoon wat dit stuur betaal min daarvoor, maar dis die ontvanger wat die materiaal moet aflaai, wat die meeste betaal.

6 Inbox flooded with spam Spelling mistake – one of the indicators that it is spam

7 Cookies a piece of text stored on a user's computer by the web browser (internet explorer)/ teksdeeltjie wat deur webblaaier op gebruiker se rekenaar gestoor word

8 Cookies continued/ vervolg to enable website to open quicker when user accesses the site again./ om die webblad gouer oop te maak wanneer die gebruiker dit weer besoek Usually harmless, but can contain malicious software/ gewoonlik skadeloos, maar kan soms gevaarlike programmatuur bevat Use disk clean up to remove once a month/ vee een keer ‘n maand skoon deur disk cleanup

9

10

11 Voorstelling van Firewall

12 is a type of malicious software that can be installed on computers and collects little bits of information about users without their knowledge and secretly monitors the user's computing habits The presence of spyware is hidden and can be difficult to detect. Spyware is secretly installed on the user's personal computer. It collects information such as Internet surfing habits and sites that have been visited Can interfere with user control of the computer for example installing additional software and redirecting Web browser activity. Spyware can change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet or functionality of other programs. Spyware

13 This popup usually contains the spyware and is installed when user clicks on link.

14 Keyloggers Keystroke logging (often called keylogging) is the action of tracking the keys struck on a keyboard, in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

15 Keylogging in action

16 Wireless key logging receiver

17 Proxy server A proxy server is a server that acts as an intermediary between your computer and other servers.

18

19 Pop ups Pop-up ads or pop-ups are a form of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Pop-ups are generally new web browser windows to display advertisements. A variation on the pop-up window is the pop- under advertisement, which opens a new browser window hidden under the active window. Pop-unders do not interrupt the user immediately and are not seen until the covering window is closed, making it more difficult to determine which web site opened them.

20

21 Flash Adobe Flash (formerly Macromedia Flash) is a multimedia platform used to add animation, video, and interactivity to Web pages. Flash is frequently used for advertisements and games.

22

23 QuickTime is a multimedia framework developed by Apple Inc. QuickTime is capable of handling various formats of digital video, picture, sound, panoramic images, and interactivity.

24

25 ActiveX A software module It enables a program to add functionality by calling ready-made components that blend in and appear as normal parts of the program. They are typically used to add user interface functions, such as 3D toolbars, a notepad, calculator or even a spread sheet. On the Internet, ActiveX controls can be linked to a Web page and downloaded by a compliant Web browser. Such controls turn Web pages into software as if the program were launched from a server. Like any executable program running in the computer, ActiveX controls can perform any operation on your data. This is why the default configuration in most Web browsers is to prompt the user if an ActiveX control is being requested so the user can decide to download it or not (not always an easy decision).

26 ActiveX including different kinds of 3D buttons, switches, knobs, sliders, switch sliders, switchknobs and others can be widely applied in many industry HMI applications and Simulation environments.


Download ppt "Aktiwiteit 1, bl 22 Internet Terminology/ terminologie."

Similar presentations


Ads by Google