Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Viruses and Spyware The Real Story Mr. G. From Whence Spyware Comes Spyware usually ends up on your machine because of something you do, like clicking.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
World Wide Web and Internet Communications. Definitions O Adware – unwanted advertising banners, pop- ups, pop-unders, etc. in your web browser O Anti-virus.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
IT security By Tilly Gerlack.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Keeping Your Computer Safe and Running Efficiently.
Malicious Software.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Agenda Using FTP What is FTP? How to Use the FTP Program How to transfer files Using FTP.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Hillsborough Community College
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Telnet/SSH Connecting to Hosts Internet Technology.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Telnet and FTP

Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection with remote machine To use:  Need telnet application software – Microsoft Windows Telnet (built into Windows 95 and greater) Macintosh Terminal (built into Mac OS X and greater)  Need an account on remote machine – you will be prompted login and password OR  Some systems will allow you to login as guest to access some resources like databases  Example: telnet cisunix.unh.edu

rsh rsh – remote shell Another protocol that allows us login access Use the rlogin (remote login) command in the terminal window Example: rlogin cisunix.unh.edu –l username (you can omit –l username if your username is the same on both systems) rlogin skips past the login: prompt and will present the Password: prompt

ssh ssh – secure shell ssh is another popular protocol that allows us login access  More secure than telnet or rsh since it encrypts all data that passes over the network  This can prevent a third party from spying on the network traffic and reading your sensitive information (like your password) Example: slogin euler.unh.edu –l username (Avoid using the generic cisunix.unh.edu with slogin or you may get a warning message about conflicting host keys) ssh secure shell replaces other, insecure terminal applications like Telnet and FTP

FTP FTP – file transfer protocol Allows you to send files and directories over a network FTP client – software that allows you to connect to an FTP server on the Internet  Originally clients were text-based and used commands (much like UNIX) – these still exist  Graphical based FTP clients now exist; e.g.: WS_FTP File Manager through Blackboard  Clients transfer data in one of two modes: ascii (for text files) and binary (for all others) Need an account on remote system (username and password) but some sites allow anonymous ftp  Login with anonymous  Enter address as password  Good for downloading software and database information (otherwise information would have to be sent sneakernet or as an attachment)

Viruses Downloading files from the Internet introduces the possibility that your computer could become infected with a virus Virus – generic term applied to a wide variety of malicious programs that invade your computer; not all cause damage (but many do) Computer virus is similar to biological virus in that it passes from computer to computer like a biological virus passes from person to person Platform specific (e.g., a Windows virus will not infect UNIX system, etc.) Types:  Traditional virus – attach to programs or data files, replicate themselves, then damage data, hard disk, etc.  Worms – stand alone programs designed to infect networks. They travel from network to network, replicating themselves along the way.  Trojan Horse program – legitimate program with hidden code that is activated by a trigger that causes the code to execute  Virus – gets transmitted in messages

Viruses - Prevention 1. Use a secure operating system 2. Run antivirus software (aka virus detection software) Scanner – checks files to see if they were infected: Looks for characteristic data patterns found in programs infected by known viruses Determines if a program’s file size is changed Eradication program – disinfects by wiping virus from hard drive Innoculators – will prohibit a program from running if it detects a virus 3. Keep antivirus software up-to-date 4. Avoid programs from unknown sources (like Internet) including mail attachments from unknown senders 5. Don’t use pirated copies of software; purchase commercial software on CDs as they cannot be modified 6. Don’t double-click on an attachment that contains an executable (file extension like.exe,.com,.vbs) and don’t run macros in a document unless you know what they do 7. Back up files regularly just in case…

Adware and Spyware Adware – software that displays ads on your computer  Ads pop up even if you are not browsing the Web  Some companies provide free software in exchange for advertising on your display Spyware – software that sends your personal information to a third party without your permission or knowledge; collects info about:  Web sites you visit  Sensitive info like your username and password  Some companies use collected info to send you unsolicited targeted ads Both cause performance issues with your computer like:  Computer hangs frequently, slows down, does not work properly  Hijacks your Web browser, gives you a new start page

Adware and Spyware - (con’t) Usually install secretly on your computer by either:  Tricking you into clicking a link that installs it; e.g., it opens a Window dialog box, you click Cancel and it installs it  Installing freeware that installs it; e.g., free file sharing program might secretly install spyware on your computer To protect against adware and spyware:  Use antivirus software as newer products now include adware and spyware scanning; Some ISPs are now providing protection from adware and spyware as well  Make sure that the programs you install do not contain adware: Read license agreement carefully Check the publisher’s Web site carefully Search the Internet for the name of the program and the keywords adware and spyware  Install a pop-up blocker to prevent adware and spyware pop-up windows (then you won’t accidently click a deceptive link)  Do not unwittingly install adware or spyware; e.g., you may see a dialog box to verify that you want to install a program – click No