Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home1/haradeep/articleside.com/configdb.php on line 8

Deprecated: preg_replace(): The /e modifier is deprecated, use preg_replace_callback instead in /home1/haradeep/articleside.com/article.php on line 88
Important Web Basics Affecting Your Computer Security

Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

Important Web Basics Affecting Your Computer Security

By Peter McKiel Subscribe to RSS | November 30th 2011 | Views:
loading
 
  



With our increasing dependence on computing devices and the Internet to run our lives, it’s essential to have the right know-how to keep your personal information protected against malware theft.

Part 1 of this guide series looked at the workings of Hosts, IP addresses, DNS, ISP’s and the Backbone.

The following guide will continue to explore some key Web terms to better enable you to keep your computer or network safe. We will cover protocols and related activities which enable computers to talk to each other, as this will help you understand how they can be used against you by cyber criminals.

Protocols - TCP/IP

Protocols are the term given to the set of conventions governing the treatment and formatting of data in electronic communications systems. Basically, this boils down to the fact that without protocols, computers cannot communicate with each other online.

To clarify further with an analogy - if you call an orange a banana and I call it a pear, we would never be able to understand each other - a common agreement has to be made as to what we will both call it.

Translated to computers and the Internet, different organisations have their own proprietary way of formatting and transmitting data, so there has to be a protocol for all computers to speak the same language.

Transmission Control Protocol Internet Protocol (TCP/IP) is the accepted set of communication standards that act as a ‘universal translator’ if you will. It comes packaged by default with all major computer operating systems.

As we have previously discussed in the last guide, IP relates to the unique address of your computer which identifies it on the Internet so that communications can reach you. TCP is responsible for breaking data into smaller chunks called packets for easier transfer between different computing devices. It then reassembles these multiple packets in the correct sequence and performs error-checking to ensure that the complete data message arrives intact at its destination.

DHCP

In the early days of the Internet, IP addresses were manually coded to each computer. But once the web exploded in popularity it became extremely tricky to track which IP addresses were already in use and which ones were freed up when a computer was removed from the network.

Dynamic Host Configuration Protocol (DHCP) was then created to automate this process. Thus, a DHCP server is given a block of IP addresses that it manages. In this way, your Host (which delivers web pages) will contact the DHCP server when you turn your computer on to request an IP address. The DHCP server will then check its database of IP addresses and find one that is not in use to assign to your Host.

NAT

As more and more people in the world are now using computers online, inevitably the issue arises of IP addresses running short. While a newer IP protocol is under development which will allow for exponential increases in available IP addresses, in the mean time something called Network Address Translation (NAT) is used to tackle this problem. NAT essentially reduces the IP addresses on a local network to a single IP for external use.

To clarify further, without NAT, a company with 1000 computers that wanted all of them to be connected with the Internet would need to have 1000 separate public IP addresses. But using NAT, the company will only need 1 public IP address recognised on the Web, while all the computers on its internal network will still be uniquely recognised by each other but their IP addresses will be hidden from external view.

This hiding of internal IP addresses not only allows for more Hosts to share the Internet, it also adds an extra layer of security. This is because by not allowing the outside world to know the exact IP addresses on your internal network, you take away a crucial piece of information that cyber criminals could use to hack your system.

Conclusion

In summary of the above guide, you will now know that protocols are what allow for standardised communication between computers, that TCP/IP is the collection of these protocols and that NAT gives added cyber protection by allowing computers on the same network to hide their unique IP addresses from the outside world. With all this complexity going on in the background to facilitate the electronic transfer of information, you can also now understand that antivirus software acts as a brave soldier guarding against unauthorised breaches while computing devices communicate with each other.

Peter McKiel - About Author:
Peter McKiel is an independent IT Consultant. He research on antivirus software

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/important-web-basics-affecting-your-computer-security.htm

Related Software Articles Subscribe to RSS

FAQs about the effectiveness of Recycling software
Published by Angel on May 9th 2012 | Software
The recycling unit that wants to register profitable results can find an able ally in the form of ro...
 
Is scrap metal software the perfect solution for recyclers?
Published by Angel on March 21st 2012 | Software
In an effort to automate his scrap metal business, a recycler implements scrap metal software to reg...
 
The perfect web development supplier need to have a competent team of veteran software developers
Published by Josejames on June 9th 2012 | Software
When you opt for E-commerce solutions developer, it would be best to select enterprise specializing ...
 
Several reasons of virus creation and antivirus the only solution
Published by Alexs on December 16th 2011 | Software
Viruses, be it in physical or virtual world; both types can be hazardous. Focusing on the virtual sc...
 
What is so special about scrap metal software
Published by Angel on April 16th 2012 | Software
Individuals involved in scrap metal business have started using scrap software to gain good control ...
 
Why you need to use Recruitment software
Published by Maria Warne on June 17th 2012 | Software
Recruitment software has completely revolutionized the way HR department operates in any business. T...
 
Custom software services are best offered in Scottsdale
Published by Liza Andy on January 24th 2012 | Software
In case, we are selling mass products under the banner of mass marketing, thus, there are no doubts ...
 
Selection of software that recovers the lost video
Published by Wonderseo on January 18th 2012 | Software

Sometimes it happened that videos are lost suddenly by its user. You may lose your videos some t...
 
Amortization software - Essential Tool for Every Business
Published by Andrew Johnson on June 11th 2012 | Software
Amortization software is an essential tool. You may have heard the word amortization, if you own a b...
 
What is so special about waste management software
Published by Angel on December 20th 2011 | Software
Waste management software provides the ideal solution for waste management sectors. But here we have...
 
Resource Planning software makes efficient forecasting of resources
Published by David Hog on August 16th 2012 | Software
A business engages in various activities like planning of resource, scheduling of activities, coordi...
 
Library software at its best from 247lib.com
Published by James Blee on July 25th 2012 | Computer
There is also a web based supervisor which means that help is always available making this library s...
 
A bodyguard for your machine- Antivirus security software
Published by Dany on February 7th 2012 | Software
We are living in era of digitalization. We use computers for almost all purposes liking shopping pro...
 
Banking software companies and the effect of their solutions
Published by Angel on March 28th 2012 | Software
Financial institutions have started implementing banking solutions built by banking software compani...
 
Factors to consider while choosing Time clock software
Published by Hope It Helps on July 30th 2012 | Software
Are you looking out for employee time clock software? If your answer is “Yes” then there are a l...
 
All about the legal billing software
Published by Ivon Lerdorf on February 8th 2012 | Software
Billing is a very important & is a tedious activity for a lawyer. Introducing the legal billing soft...
 
Use Resource planning software to systemize your business
Published by David Hog on July 19th 2012 | Software
An organization’s growth depends on the strategies and decisions that it incorporates while moving...
 
India is one of the most desirable offshore software development countries!
Published by Sumitdass on August 23rd 2012 | Software
Software development is the need of every organization. Standard ‘off-the-shelf’ software or a c...
 
Why use scrap recycling software
Published by Angel on March 2nd 2012 | Software
Recyclers have realized the potential of scrap recycling software, which is built to simplify busine...
 
An introduction to music writing software
Published by Angie Turner on June 16th 2012 | Software
If you are part of the current crop of young musicians and songwriters then chances are that you wil...