IT-Workshop Module 2 PDF
Document Details
Uploaded by StraightforwardCubism6543
Purnea College of Engineering
Prof. Tapan Kumar
Tags
Summary
This document is a syllabus for an IT workshop module. It covers topics such as web browsers, proxy settings, accessing websites, search engines, and antivirus types. The syllabus also includes details about the internet, its history, and different types of network connections.
Full Transcript
IT-Workshop Course Code : 100113 By- Prof. Tapan Kumar Purnea College of Engineering, Purnea (Bihar Engineering University, Patna) (DSTTE, Patna, Govt. of Bihar) Syllabus: Module -2. INTERNET(4 lectures) Topics to be covered: ❑Web Browsers ❑Customization of web browser...
IT-Workshop Course Code : 100113 By- Prof. Tapan Kumar Purnea College of Engineering, Purnea (Bihar Engineering University, Patna) (DSTTE, Patna, Govt. of Bihar) Syllabus: Module -2. INTERNET(4 lectures) Topics to be covered: ❑Web Browsers ❑Customization of web browsers, proxy settings, bookmarks, search toolbars, pop-up blockers. ❑ Access of websites, Surfing the Web ❑Search Engines ❑Antivirus types, Protection from various threats. Prof. Tapan Kumar @PCE, Purnea 2 INTERNET The ARPANET(in the 1970s by the Defense Advanced Research Projects Agency-DARPA) initially served as a backbone for the interconnection of regional academic and military networks in the United States to enable resource sharing. The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, and file sharing. History of Internet: https://www.youtube.com/watch?v=Bn0lk2LC_o8 Prof. Tapan Kumar @PCE, Purnea 3 Prof. Tapan Kumar @PCE, Purnea 4 Internet Vs. Intranet Vs. Extranet Prof. Tapan Kumar @PCE, Purnea 5 Web Browsers Web browsers are software applications that allow users to access, retrieve, and view content on the World Wide Web. They interpret HTML, CSS, JavaScript, and other web technologies to render websites. Some browsers are designed with a focus on speed, privacy, or user customization, while others emphasize compatibility or specific features. some of the most popular web browsers: Google Chrome, Mozilla Firefox, Apple Safari, Microsoft Edge, Opera, Internet Explorer, Chromium etc. Prof. Tapan Kumar @PCE, Purnea 6 Key Features Across Browsers: Speed & Performance: Browsers strive for fast page loading and smooth performance. Chrome and Edge are often praised for speed, but Firefox and Safari are known for strong optimization on their respective platforms. Privacy & Security: Many browsers now focus on protecting user privacy with features like ad-blocking, tracker prevention, and encrypted connections. Firefox, Brave, Safari, and Edge excel in this area. Customization: Browsers like Firefox, Opera, and Vivaldi allow extensive customization of the interface and behavior. Extensions/Add-ons: Most browsers offer add-ons or extensions to expand functionality. Chrome and Firefox have large extension ecosystems, while Safari has fewer but still popular options. Prof. Tapan Kumar @PCE, Purnea 7 Customization of web browsers Customization is one of the major reasons people choose certain web browsers over others. Many modern browsers allow a high degree of personalization, whether it's changing the appearance, adding functionality, or tweaking privacy settings. Here's a look at the ways you can customize some of the most popular web browsers: 1. Google Chrome I. Themes: You can change Chrome's appearance by installing themes from the Chrome Web Store. Themes allow you to alter the colors, background images, and general style of the browser interface. II. Extensions: Chrome has a huge library of extensions (over 200,000) that can add features like ad- blocking, password management, enhanced privacy, custom shortcuts, and much more. You can access these through the Chrome Web Store. III. Startup Options: Chrome allows you to configure the pages it opens on startup—whether it's a specific set of tabs, the new tab page, or a blank page. IV. Omnibox Customization: The address bar, or "Omnibox," can be customized to act as a search engine or a shortcut to specific sites and tools. You can also change the default search engine (Google, Bing, DuckDuckGo, etc.). V. Flags: Chrome allows you to enable or disable experimental features using the chrome://flags menu, which is a powerful but advanced customization option. Prof. Tapan Kumar @PCE, Purnea 8 2. Mozilla Firefox I. Themes & Customization: Firefox offers a wide variety of themes in its Firefox Add-ons store, allowing you to change the appearance. You can also create custom themes using the Firefox Color tool. II. Extensions/Add-ons: Firefox has a vast library of extensions to add functionality, ranging from ad-blockers to password managers and productivity tools. III. Customization of the Interface: Firefox provides a Customize mode, where you can rearrange buttons, toolbars, and even remove items from the toolbar. IV. UserChrome.css: For advanced users, Firefox allows you to further tweak the appearance and interface using custom CSS (Cascading Style Sheets) through the userChrome.css file. This gives you the ability to adjust margins, hide elements, or make any custom visual changes. V. Privacy Controls: Firefox is very customizable in terms of privacy settings. You can adjust the level of tracking protection, block third-party cookies, and block scripts. Additionally, you can tweak the settings of the Enhanced Tracking Protection (ETP) and even use containers to isolate your web activity (for example, keeping work and personal browsing separate). VI. About: A powerful tool that allows you to change many hidden preferences of the browser (e.g., enabling dark mode, changing how tabs are handled). This is similar to Chrome's flags but more accessible. Prof. Tapan Kumar @PCE, Purnea 9 3. Apple Safari I. Themes: While Safari doesn't have as much theme customization as other browsers, it offers some personalization options for your New Tab page, such as showing background images, favorites, or news. II. Extensions: Safari has a smaller but growing collection of extensions on the Safari Extensions page in the Mac App Store. You can use extensions for things like ad-blocking, password management, and custom styles. III. Smart Search Field: Safari allows you to customize the search bar, including changing the default search engine (e.g., Google, Yahoo, DuckDuckGo) and controlling which actions happen in the search bar (like using it for web searches, file searches, or even site navigation). IV. Sidebar: Safari offers a customizable sidebar where you can save bookmarks, viewing history, and reading lists. You can also drag and drop bookmarks into this sidebar for quicker access. V. Privacy Features: Safari offers Intelligent Tracking Prevention, which limits how advertisers and websites can track your activity. You can also block pop-ups, manage cookies, and control which sites can access location data. Prof. Tapan Kumar @PCE, Purnea 10 Proxy settings Proxy settings in web browsers are used to route your internet traffic through a proxy server, which can provide benefits such as anonymity, bypassing geographical restrictions, or improving performance. By configuring your browser’s proxy settings, you can control how it connects to websites and services. What is a Proxy Server? A proxy server acts as an intermediary between your computer and the internet. When you configure a proxy in your browser, all your web traffic is routed through the proxy server. The proxy server then forwards the request to the target website and sends the response back to you. Types of Proxies HTTP Proxy: Routes only HTTP traffic. HTTPS Proxy: Routes secure (HTTPS) traffic. It’s encrypted, which makes it suitable for sensitive data. SOCKS Proxy: Routes any type of traffic (HTTP, FTP, etc.) and is more flexible than an HTTP/HTTPS proxy. Transparent Proxy: The client (browser) is unaware of the proxy server, and it typically doesn’t alter requests. Anonymous Proxy: Hides your IP address but may still identify that you’re using a proxy. Prof. Tapan Kumar @PCE, Purnea 11 Setting Proxy in Popular Web Browsers For Google Chrome: Chrome does not have its own built-in proxy settings but uses the system proxy settings. Therefore, to configure the proxy, you'll need to adjust your operating system's settings. On Windows: 1. Open Settings > Network & Internet > Proxy. 2. Under "Manual proxy setup," turn on Use a proxy server. 3. Enter the proxy address and port number. 4. Click Save. On MacOS: 1. Open System Preferences > Network. 2. Select the network you're using (Wi-Fi or Ethernet) and click Advanced. 3. Go to the Proxies tab and check the type of proxy you want to use (e.g., HTTP, HTTPS, SOCKS). 4. Enter the proxy server address and port. 5. Click OK and Apply. Once the system proxy is set, Chrome will automatically use it. If you need to override it for specific cases (e.g., for incognito browsing), you'd need to use a third-party extension. Prof. Tapan Kumar @PCE, Purnea 12 Bookmarks Bookmarks in web browsers allow users to quickly save and access their favorite websites, making it easier to return to them without needing to type the URL every time. Each browser has its own method of managing and organizing bookmarks, but they all offer features like syncing across devices, categorization, and easy retrieval. How to Add Bookmarks From the address bar: When you're on a page you want to bookmark, click the star icon in the address bar. You can then choose to save it to the Bookmarks Bar, or select a specific folder for it. Keyboard shortcut: Press Ctrl + D (Windows) or Cmd + D (Mac) to quickly bookmark the current page. How to Organize Bookmarks Bookmarks Bar: The bookmarks bar is visible directly under the address bar for easy access. To show or hide it, click the three dots in the top-right corner, go to Bookmarks, and select Show bookmarks bar. You can drag bookmarks to rearrange them, or right-click to create folders for better organization. Bookmark Manager: You can manage your bookmarks by opening the Bookmark Manager. Click the three dots > Bookmarks > Bookmark Manager (or use the shortcut Ctrl + Shift + O). In the manager, you can create folders, rename bookmarks, or delete them. Searchable Bookmarks: Chrome lets you search your bookmarks using the Omnibox (address bar). Just type part of the bookmark name or URL, and it will appear in the suggestions. Other Options: Chrome allows syncing of bookmarks across devices via your Google account. To enable this, go to Settings > Sync and Google services > Manage sync, and toggle on Bookmarks. Bookmark Folder Tips: Create folders for categories like "Work," "Recipes," "News," and so on. Use subfolders to keep your bookmarks organized hierarchically, especially if you have a lot. Prof. Tapan Kumar @PCE, Purnea 13 Search toolbars A search toolbar in a web browser is a dedicated section of the browser's interface that allows you to quickly search the web or access various search tools and options without needing to navigate to a specific search engine's website. Search toolbars can be integrated into the address bar, a specific toolbar (often under the main menu), or as a separate extension or add-on. Types of Search Toolbars in Browsers: 1. Integrated Search Bar (Address Bar / Omnibox) Most modern browsers combine the address bar and search bar into one unified tool known as the Omnibox (Chrome, Edge, Opera). This means you can type both URLs and search queries directly in the address bar. For instance: Chrome/Edge/Opera: When you type a search term, the browser will use your default search engine to perform the query. Firefox: Firefox also integrates search directly into the address bar, and you can choose which search engine you want to use. 2. Search Toolbar (Dedicated) Some browsers or browser extensions still offer a dedicated toolbar for searches, allowing you to perform queries without typing directly in the address bar. Prof. Tapan Kumar @PCE, Purnea 14 Pop-up blockers A pop-up blocker is a feature in most modern web browsers that prevents unwanted or intrusive pop-up windows from appearing while you browse the web. Pop-ups are often used by advertisers or malicious sites for ads, surveys, and other purposes, but they can also be a nuisance or even a security risk. What are Pop-ups? Pop-ups are small windows that open automatically in your browser, typically without your consent. They can serve legitimate purposes, such as login prompts or important notifications. However, they are more often used for ads or spam. How Do Pop-up Blockers Work? Pop-up blockers work by detecting when a new window is being opened by a website. The browser checks if the action was triggered by a user action (like clicking a link or button) or by a script running on the page. If the pop-up is triggered by a script or something other than user interaction, it will be blocked. Prof. Tapan Kumar @PCE, Purnea 15 Surfing the web Surfing the web refers to the act of exploring and navigating the vast expanse of information available on the internet. It's an informal way of saying you're browsing websites, searching for content, or interacting with different online resources using a web browser. Whether you're reading articles, watching videos, shopping, or interacting on social media, you're essentially surfing the web. To navigate through the World Wide Web(WWW) or Internet , usually by clicking with a mouse. The term also has a generic meaning of spending time on the Internet. Prof. Tapan Kumar @PCE, Purnea 16 Search Engines A search engine is a software system designed to search for information on the internet. It indexes vast amounts of web content and helps users find relevant websites, images, videos, and other types of content based on keywords or queries entered by the user. When a user submits a search query, the search engine processes it and provides a list of results that are ranked based on relevance, popularity, or other factors. How Search Engines Work: 1. Crawling: Search engines use automated bots (called crawlers or spiders) to browse the web and collect data from websites. 2. Indexing: The collected data is then indexed, meaning it is stored and organized in a large database. This helps the search engine quickly retrieve relevant results when a user submits a query. 3. Ranking: When a user enters a search query, the search engine ranks the indexed pages based on several factors like relevance, authority, quality of content, and user experience. The search engine algorithm determines which pages appear at the top of the search results. Prof. Tapan Kumar @PCE, Purnea 17 Examples of Search Engines: 1. Google – The most widely used search engine in the world. It processes billions of search queries every day and provides a variety of results, including websites, images, videos, maps, and news. Example query: "Best Italian restaurants near me" 2. Bing – Developed by Microsoft, Bing is another popular search engine that provides similar functionality to Google, but with some differences in ranking algorithms and presentation. Example query: "Latest smartphone releases" 3. Yahoo! – Once the dominant search engine, Yahoo! now uses Bing’s technology for search results but still offers its own portal for news, finance, and other content. Example query: "Weather forecast today" Key Features of Search Engines: 1. Search Results: A list of web pages, images, videos, or other content that matches the user's query. 2. Advertisements: Many search engines display paid ads alongside organic search results. 3. Autocomplete: Suggests possible search queries as the user types. 4. Filters: Allows users to refine their searches by date, location, or content type (e.g., images, videos). Prof. Tapan Kumar @PCE, Purnea 18 Antivirus types What is a Computer Virus? A computer virus is a type of malicious software (malware) designed to replicate itself and spread from one computer to another. Viruses often attach themselves to legitimate programs or files on a system and can execute harmful activities, such as corrupting files, stealing information, or even damaging hardware. They can spread through infected files, emails, websites, or removable media such as USB drives. Examples: Worm, Trojan Horses, Boot Sector Virus, Overwrite Virus, Browser Hijacker, Web Scripting Virus. Prof. Tapan Kumar @PCE, Purnea 19 Types of Antivirus Software Antivirus software is designed to detect, block, and remove computer viruses and other malicious software. There are several types of antivirus software, each with different methods of protection and detection: 1. Signature-based Antivirus Software Description: This is the most common type of antivirus protection. It uses a database of known virus signatures (unique code patterns associated with specific viruses) to identify and remove viruses from a system. How It Works: The antivirus scans files and compares their content to the virus signature database. If a match is found, the file is flagged as infected. Example: McAfee Antivirus and Norton Antivirus. Advantages: Fast detection for known viruses. Disadvantages: Ineffective against new or unknown viruses (zero-day threats). Prof. Tapan Kumar @PCE, Purnea 20 2. Heuristic-based Antivirus Software Description: Heuristic-based detection looks for suspicious behavior or characteristics that are typical of viruses, rather than relying on predefined virus signatures. How It Works: The antivirus software analyzes the behavior of programs or files to detect potentially harmful activities. This can include monitoring unusual actions, like modifying system files or sending large amounts of data over the network. Example: Kaspersky Anti-Virus and Bitdefender Antivirus. Advantages: Can detect previously unknown or modified viruses. Disadvantages: May generate false positives, identifying safe files as threats. 3. Behavioral-based Antivirus Software Description: Behavioral-based antivirus software focuses on real-time monitoring of the actions of files and applications while they are running. How It Works: The software watches for malicious actions, such as attempting to delete important system files, change settings, or gain unauthorized access to the network. If any of these behaviors are detected, the antivirus can take action to stop it. Example: Malwarebytes (for detecting more complex threats like Trojans and ransomware). Advantages: Effective against new and polymorphic viruses, as it doesn't rely on known signatures. Disadvantages: May not catch all threats if they are cleverly disguised. Prof. Tapan Kumar @PCE, Purnea 21 4. Cloud-based Antivirus Software Description: Cloud-based antivirus software offloads much of the virus detection process to remote servers, instead of relying entirely on local resources. How It Works: Files are scanned on the cloud, which means updates to virus definitions are faster and the software typically requires less system resources. Example: Panda Security and Webroot SecureAnywhere. Advantages: Always up-to-date with the latest virus definitions and typically less resource- intensive. Disadvantages: Requires a stable internet connection and may raise privacy concerns since files are processed on remote servers. 5. Real-time Protection (On-access Scanners) Description: This type of antivirus continuously scans files, programs, and data as they are accessed by the computer, providing instant protection. How It Works: When a file is opened or executed, the antivirus checks it for potential threats immediately. If a virus is detected, it can block or quarantine the file to prevent further damage. Example: Avast Antivirus and ESET NOD32. Advantages: Provides continuous protection without requiring manual scans. Disadvantages: Can consume more system resources and slow down the computer. Prof. Tapan Kumar @PCE, Purnea 22 6. Cross-platform Antivirus Software Description: Cross-platform antivirus software is designed to protect multiple types of operating systems, such as Windows, macOS, and Android. How It Works: It ensures that all systems on a network or device ecosystem are protected against threats that may be specific to each platform. Example: Trend Micro Antivirus and Avira Antivirus. Advantages: Comprehensive protection for a wide range of devices. Disadvantages: May not provide as specialized protection for each individual operating system compared to platform-specific software. Prof. Tapan Kumar @PCE, Purnea 23 Types of threats in Computer Systems There are various types of threats that can target a computer system, ranging from malicious software (malware) to human errors and environmental risks. These threats can lead to data breaches, loss of privacy, system downtime, and other severe consequences. 1. Viruses Description: A virus is a type of malicious software (malware) that attaches itself to a legitimate program or file and spreads to other files or systems. Once executed, a virus can corrupt, delete, or modify files and disrupt system operations. Example: CIH (Chernobyl) Virus — One of the most infamous viruses that caused data loss and system failures. 2. Worms Description: Worms are standalone malware programs that self-replicate and spread across networks without the need for human interaction. They typically exploit vulnerabilities in software or operating systems. Example: SQL Slammer Worm — It spread rapidly in 2003 and caused significant network disruptions worldwide by exploiting a vulnerability in Microsoft SQL Server. Risk: Worms can overload network bandwidth, causing slowdowns and even complete system outages. Prof. Tapan Kumar @PCE, Purnea 24 3. Trojans (Trojan Horses) Description: A Trojan horse is a type of malware that disguises itself as a legitimate software or file but contains hidden malicious code. Trojans often allow unauthorized access to a system, making it vulnerable to further attacks. Example: Emotet Trojan — Initially used for spam campaigns, this Trojan evolved into a sophisticated malware tool capable of stealing sensitive data and installing additional payloads. Risk: Data theft, unauthorized remote access, or even the installation of additional malware. 4. Ransomware Description: Ransomware is a type of malware that encrypts the victim’s files or locks them out of their system, demanding a ransom payment for the decryption key or access to the system. Example: WannaCry — A global ransomware attack in 2017 that affected hundreds of thousands of computers worldwide by exploiting a vulnerability in Microsoft Windows. Risk: Loss of data, system inaccessibility, and financial loss if the ransom is paid. Prof. Tapan Kumar @PCE, Purnea 25 5. Spyware Description: Spyware is a type of malware that secretly monitors and collects user activity, often without their knowledge or consent. This can include tracking browsing habits, keystrokes, and personal information like login credentials or credit card numbers. Example: CoolWebSearch — A notorious spyware program that hijacked web browsers and redirected users to malicious websites. Risk: Privacy invasion, identity theft, and system slowdowns. 6. Adware Description: Adware is software that automatically displays or downloads unwanted advertisements on your computer. While not always malicious, it can be intrusive and affect system performance. Example: Gator — A popular adware program that displayed pop-up ads and tracked users’ browsing behavior. Risk: Annoying ads, decreased system performance, and potential privacy concerns. Prof. Tapan Kumar @PCE, Purnea 26 8. Keyloggers Description: A keylogger is a type of spyware that records the keystrokes typed on a keyboard, potentially capturing sensitive information like passwords, credit card numbers, and personal messages. Example: Perfect Keylogger — A popular keylogging tool that secretly tracks users’ keyboard activity. Risk: Identity theft, data theft, and loss of privacy. 9. Phishing Description: Phishing involves tricking users into revealing sensitive information (like usernames, passwords, or credit card details) by masquerading as a trustworthy entity in electronic communications (emails, websites, etc.). Example: Email Phishing Scam — Fraudulent emails appearing to come from legitimate companies (e.g., banks, social media platforms) that ask users to click a link and enter personal details. Risk: Identity theft, financial loss, and unauthorized access to accounts. Prof. Tapan Kumar @PCE, Purnea 27 Protection from various threats Protecting your computer from various threats is crucial to maintaining system integrity, safeguarding sensitive data, and ensuring privacy. There are a range of proactive measures you can take to defend against computer threats like viruses, malware, phishing, and network attacks. Below is a detailed explanation of how to protect your computer from various types of threats: 1. Use Antivirus Software Description: Antivirus software detects, prevents, and removes malicious programs such as viruses, worms, Trojans, and spyware. It is one of the most fundamental layers of protection against cyber threats. How It Protects: Scans files and programs for known malware signatures. Provides real-time protection by monitoring active processes. Offers automatic updates to keep definitions current and protect against new threats. Examples: Norton Antivirus, Kaspersky, Bitdefender, Avast, and Windows Defender. Prof. Tapan Kumar @PCE, Purnea 28 2. Regular Software Updates Description: Software vendors regularly release patches to fix security vulnerabilities. By keeping your operating system, applications, and drivers updated, you reduce the risk of exploitation by attackers. How It Protects: Fixes vulnerabilities that could be exploited by malware or hackers. Ensures your system has the latest security features and improvements. Helps prevent zero-day attacks (exploits for vulnerabilities that have not yet been patched). Best Practices: Enable automatic updates for operating systems and software. Regularly check for updates to all installed programs. 3. Use a Firewall Description: A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can be hardware-based or software-based. How It Protects: Blocks unauthorized access to your computer or network. Monitors network traffic and can block malicious or suspicious activity. Provides alerts when suspicious attempts to access the system are detected. Best Practices: Ensure your firewall is enabled on all devices, especially when connected to public networks. Use a hardware firewall for added protection on your home or office network. Prof. Tapan Kumar @PCE, Purnea 29 4. Enable Multi-Factor Authentication (MFA) Description: Multi-factor authentication adds an extra layer of security by requiring two or more verification methods to access an account or system. How It Protects: Even if an attacker knows your password, they cannot access your account without the second factor (e.g., a code sent to your phone or a biometric scan). Protects sensitive data like banking information, email, and work accounts. Best Practices: Enable MFA on all important accounts, such as email, social media, online banking, and cloud storage. 5. Be Cautious with Emails (Phishing Protection) Description: Phishing is a type of attack where malicious actors trick you into revealing sensitive information, such as passwords or credit card numbers, often through deceptive emails or websites. How It Protects: Avoids giving away personal information through fake emails or websites. Reduces the risk of falling victim to scams or identity theft. Best Practices: Never click on suspicious links or open attachments from unknown senders. Always verify the authenticity of emails, especially if they ask for sensitive information. Be wary of emails that create a sense of urgency (e.g., "Your account will be locked unless you act now"). Look for signs of phishing, such as poor grammar, strange email addresses, or generic greetings (e.g., "Dear Customer"). Prof. Tapan Kumar @PCE, Purnea 30 End of Module-2 Thank You Prof. Tapan Kumar @PCE, Purnea 31