Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

Important Web Basics Affecting Your Computer Security

By Peter McKiel Subscribe to RSS | November 30th 2011 | Views:
loading
 
  



With our increasing dependence on computing devices and the Internet to run our lives, it’s essential to have the right know-how to keep your personal information protected against malware theft.

Part 1 of this guide series looked at the workings of Hosts, IP addresses, DNS, ISP’s and the Backbone.

The following guide will continue to explore some key Web terms to better enable you to keep your computer or network safe. We will cover protocols and related activities which enable computers to talk to each other, as this will help you understand how they can be used against you by cyber criminals.

Protocols - TCP/IP

Protocols are the term given to the set of conventions governing the treatment and formatting of data in electronic communications systems. Basically, this boils down to the fact that without protocols, computers cannot communicate with each other online.

To clarify further with an analogy - if you call an orange a banana and I call it a pear, we would never be able to understand each other - a common agreement has to be made as to what we will both call it.

Translated to computers and the Internet, different organisations have their own proprietary way of formatting and transmitting data, so there has to be a protocol for all computers to speak the same language.

Transmission Control Protocol Internet Protocol (TCP/IP) is the accepted set of communication standards that act as a ‘universal translator’ if you will. It comes packaged by default with all major computer operating systems.

As we have previously discussed in the last guide, IP relates to the unique address of your computer which identifies it on the Internet so that communications can reach you. TCP is responsible for breaking data into smaller chunks called packets for easier transfer between different computing devices. It then reassembles these multiple packets in the correct sequence and performs error-checking to ensure that the complete data message arrives intact at its destination.

DHCP

In the early days of the Internet, IP addresses were manually coded to each computer. But once the web exploded in popularity it became extremely tricky to track which IP addresses were already in use and which ones were freed up when a computer was removed from the network.

Dynamic Host Configuration Protocol (DHCP) was then created to automate this process. Thus, a DHCP server is given a block of IP addresses that it manages. In this way, your Host (which delivers web pages) will contact the DHCP server when you turn your computer on to request an IP address. The DHCP server will then check its database of IP addresses and find one that is not in use to assign to your Host.

NAT

As more and more people in the world are now using computers online, inevitably the issue arises of IP addresses running short. While a newer IP protocol is under development which will allow for exponential increases in available IP addresses, in the mean time something called Network Address Translation (NAT) is used to tackle this problem. NAT essentially reduces the IP addresses on a local network to a single IP for external use.

To clarify further, without NAT, a company with 1000 computers that wanted all of them to be connected with the Internet would need to have 1000 separate public IP addresses. But using NAT, the company will only need 1 public IP address recognised on the Web, while all the computers on its internal network will still be uniquely recognised by each other but their IP addresses will be hidden from external view.

This hiding of internal IP addresses not only allows for more Hosts to share the Internet, it also adds an extra layer of security. This is because by not allowing the outside world to know the exact IP addresses on your internal network, you take away a crucial piece of information that cyber criminals could use to hack your system.

Conclusion

In summary of the above guide, you will now know that protocols are what allow for standardised communication between computers, that TCP/IP is the collection of these protocols and that NAT gives added cyber protection by allowing computers on the same network to hide their unique IP addresses from the outside world. With all this complexity going on in the background to facilitate the electronic transfer of information, you can also now understand that antivirus software acts as a brave soldier guarding against unauthorised breaches while computing devices communicate with each other.

Peter McKiel - About Author:
Peter McKiel is an independent IT Consultant. He research on antivirus software

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/software-articles/important-web-basics-affecting-your-computer-security.htm

Related Software Articles Subscribe to RSS

Mlm software, Australian Binary, Level Binary Plan, Matrix plan, Uni-Level Plan, Growth Plan, Board Plan
Published by Sankalp on December 20th 2011 | Software
Sankalp providing mlm software solutions for network marketing business, direct selling marketing, b...
 
Copy your data via Clone software
Published by Socialweb on February 21st 2012 | Software
Most of the users are prefer to store the data on computer. Computer is only reliable storage media ...
 
Promising offer from robust scrap software
Published by Angel on July 26th 2012 | Software
The scrap yard owner who is keen to improve his business gains good mileage out of the scrap softwar...
 
Best Ecommerce software solutions
Published by Paul on February 15th 2012 | Software
Ecommerce software solutions include Zen Car, OS Commerce and Magento, among others. These softwares...
 
Recruitment software making base for recruitment agencies
Published by Maria Warne on July 24th 2012 | Software
Recruitment software comes in a number of packages with various designs. When trying to upgrade or i...
 
Things to avoid while implementing scrap metal software
Published by Angel on May 18th 2012 | Software
In its efforts to take scrap metal business to greater heights, the metal yard wants to implement th...
 
Schedule company resources from anywhere through efficient scheduling software
Published by David Hog on July 23rd 2012 | Software
A company’s future depends on the decisions it takes. Decisions that involves saving time and mone...
 
Tips and benefits of software off shoring
Published by Top Articles on November 28th 2011 | Software
In this article, the main point is highlighted as Offshore Software Development Company, how these c...
 
What does the software development kit assist for efficient Google's Android application development?
Published by Robert Woodard on May 14th 2012 | Software
The Google's Android SDK supports creating 2 types of mobile applications. These 2 would be the nati...
 
Protect your system with the filtering software
Published by Erikhornung on February 1st 2012 | Software
The use of internet has become a lot, these days and almost, people belonging to all age groups use ...
 
Factors of Offshore software product development
Published by Calsoft Inc on April 4th 2012 | Software
Today every IT organization are looking for offshore software development, today in Offshore IT comp...
 
Effective antivirus software for complete computer security
Published by Alexs on February 23rd 2012 | Software
Computers today hold more than just the capability for word processing and number crunching. On top ...
 
Understanding what caching is within software development as well as exactly what is available together with it
Published by Waltersloan on May 25th 2012 | Software
What is considered to be crucial in newer software development program is usually concurrency. Concu...
 
Offshore software Development is the New Normal!
Published by Elan Technologies on December 2nd 2011 | Software
Offshore software development primarily referred to cheap labor and involved maintenance work predom...
 
Features that make Small business accounting software user-friendly
Published by Antony Wilmer on December 5th 2011 | Software
Scalability and customization of the small business accounting software package should be studied be...
 
Copy your data from one system to another system via Clone software
Published by Socialweb on February 21st 2012 | Software
Computers are mainly used to store and retrieve data from one source to another source. Most of the ...
 
Custom software development company
Published by Roger Lopez on February 10th 2012 | Software
The article gives a brief introduction of different custom development services....
 
Why your company needs inventory management software?
Published by Martin Tuner on December 8th 2011 | Software
Inventory management is an inherent element of a company that produces goods to meet the expectation...
 
Miami POS software: a new way to look at the selling options in retail stores
Published by Alice Mark on August 6th 2012 | Software
Miami POS software has created ripples in the retail stores, in which this software is used for prop...
 
Things to consider before buying antivirus software?
Published by Alexs on July 4th 2012 | Software
Attacks by malicious software programs such as viruses, worms, Trojans and spyware can be incessant ...