SlideShare una empresa de Scribd logo
1 de 18
Webmastering BASICS Using
     Dreamweaver


           Unit 6
           Hosting and
           Maintenance
Choosing and Registering a
    Domain Name




     A WHOIS search allows you to determine whether a
     domain name is available for registration.


2
Network Solutions’ Whois Search




3
Who is search for hwscott.net




4
Registering a Domain




5
Why is Antivirus Protection
    Important




6
Security and Virus Protection

       Viruses can do everything from delete your
        files, prevent your computer from starting, or
        more commonly, use your computer to send
        spam or more viruses.
       If you run a windows machine, and are
        connected to the internet, virus scanning is a
        must.


7
What are Viruses?

       Computer viruses are named such due to their
        similarities to biological viruses.
       Computer viruses are malicious programming
        designed to replicate and spread.
       Though their purposes differ from virus to virus
        they commonly modify, delete or even steal
        data from your computer.


8
What are Viruses? continued

       They can also allow hackers access and
        control your PC over the Internet.
       Most viruses are designed to be covert, at
        least until they execute their main
        function, meaning without antivirus protection
        you may not even know when your computer
        is infected.


9
Macs and Security and Virus
     Protection

        If you run a Mac operating system, it is
         debatable whether you need virus protection.
         Generally the reason for having a virus
         scanner is to downstream check.
        Over 99.9% of viruses only work on
         windows, so your chances of getting a virus on
         a Mac system is very slim, but you can still
         pass them on.

10
Beware, viruses can be sent in
     files

        If you regularly send files to your friends via
         email (i.e., funny videos, pictures, word
         documents, games), and those friends use
         windows, you should consider virus scanning
         the files before sending them on.
        This is not necessary if you use a service that
         checks your emails for you, such as Hotmail
         or GMail. A good Mac virus scanner is
         ClamX.
11
Proxy Use

        It only takes one proxy to put a gaping hole in
         network security.
        Proxy sites help malware and other web-
         related threats to sneak into networks
         undetected.
        SSL proxies are a particular problem since
         the secure tunnels used allow viruses and
         worms to sidestep network anti-virus and web
         filtering security entirely.
12
Phishing and Password Theft

        Many proxy users are unaware of the risks to
         their own personal security and identity.
        Malicious proxy servers do exist and are
         capable of recording everything sent to the
         proxy, including unencrypted logins and
         passwords.



13
Phishing and Password Theft

        Although some proxy networks claim to only
         use „safe‟ servers, due to the „anonymous‟
         nature of these tools, proxy server safety is
         impossible to police.
        Users understand that whenever they use a
         proxy, they risk someone “in the middle”
         reading their data.


14
Copyright and Fair Use for
     Students

         Because you are a student, you can use
         copyrighted material.
        You have to follow certain guidelines when
         using copyrighted material.




15
Student Copyright Guidelines

        Web Images: You can use up to 10% or 15
         images (whichever is less) from any one
         collective work (such as a web page or a
         book) in your presentation.
        Music: You can include 10% or 30 seconds
         of a song (whichever is less) in your
         presentation.


16
Student Copyright Guidelines

        Illustrations: You may use no more than 5
         images by 1 artist.
        Motion: You may put 10% or 3 minutes
         (whichever is less) of a copyrighted film into
         your presentation.
        Any image that you find online needs a
         citation.
        Paste the URL of the image directly beneath
         it.
17
Copyright Resources

        http://www.cyberbee.com/cb_copyright.swf
        http://kb.iu.edu/data/arit.html
        http://www.copyrightkids.org/cbasicsframes.htm




18

Más contenido relacionado

La actualidad más candente

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackAvanzo net
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareSeminar Links
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9robsworld
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallBev Robb
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be rememberedwolverine0614
 

La actualidad más candente (20)

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Adware
AdwareAdware
Adware
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Internet security
Internet securityInternet security
Internet security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Web security
Web securityWeb security
Web security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Network security
Network securityNetwork security
Network security
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 

Destacado

Website Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelWebsite Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelPaulsTrainingsstuff
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide webcstenzhorn
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesJude Pugh
 
Rational Functions
Rational FunctionsRational Functions
Rational FunctionsHope Scott
 
Internet connections
Internet connectionsInternet connections
Internet connectionsentonline
 
CBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersCBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersPaulsTrainingsstuff
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highwaybh_aditya
 
Best Strategies For Website Promotion
Best Strategies For Website PromotionBest Strategies For Website Promotion
Best Strategies For Website PromotionTushar Malviya
 
Internet service provider
Internet service providerInternet service provider
Internet service providerloizazeptania
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMSJaime Delgado
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnamPham Duc
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider pptPutri Sanuria
 

Destacado (16)

Website Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelWebsite Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-model
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide web
 
Isp
IspIsp
Isp
 
CS-ISP Overview
CS-ISP OverviewCS-ISP Overview
CS-ISP Overview
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 
Rational Functions
Rational FunctionsRational Functions
Rational Functions
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
CBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersCBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelers
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highway
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Best Strategies For Website Promotion
Best Strategies For Website PromotionBest Strategies For Website Promotion
Best Strategies For Website Promotion
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMS
 
ISP
ISPISP
ISP
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 

Similar a Unit6

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesAvinash Sinha
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeSysfore Technologies
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 

Similar a Unit6 (20)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
M
MM
M
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Computer security
Computer securityComputer security
Computer security
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information security
Information securityInformation security
Information security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

Más de Hope Scott

Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Hope Scott
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Hope Scott
 
Quadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipQuadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipHope Scott
 
Polynomial Function by Desirae &
Polynomial Function by Desirae & Polynomial Function by Desirae &
Polynomial Function by Desirae & Hope Scott
 
Quadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaQuadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaHope Scott
 
Elizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionElizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionHope Scott
 
How to Print EOY Attendance Report
How to Print EOY Attendance ReportHow to Print EOY Attendance Report
How to Print EOY Attendance ReportHope Scott
 

Más de Hope Scott (7)

Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Ellipses by Tom & Ashley
Ellipses by Tom & Ashley
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia
 
Quadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipQuadratic Function by Robert & Phillip
Quadratic Function by Robert & Phillip
 
Polynomial Function by Desirae &
Polynomial Function by Desirae & Polynomial Function by Desirae &
Polynomial Function by Desirae &
 
Quadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaQuadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & Cristina
 
Elizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionElizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear Function
 
How to Print EOY Attendance Report
How to Print EOY Attendance ReportHow to Print EOY Attendance Report
How to Print EOY Attendance Report
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Unit6

  • 1. Webmastering BASICS Using Dreamweaver Unit 6 Hosting and Maintenance
  • 2. Choosing and Registering a Domain Name A WHOIS search allows you to determine whether a domain name is available for registration. 2
  • 4. Who is search for hwscott.net 4
  • 6. Why is Antivirus Protection Important 6
  • 7. Security and Virus Protection  Viruses can do everything from delete your files, prevent your computer from starting, or more commonly, use your computer to send spam or more viruses.  If you run a windows machine, and are connected to the internet, virus scanning is a must. 7
  • 8. What are Viruses?  Computer viruses are named such due to their similarities to biological viruses.  Computer viruses are malicious programming designed to replicate and spread.  Though their purposes differ from virus to virus they commonly modify, delete or even steal data from your computer. 8
  • 9. What are Viruses? continued  They can also allow hackers access and control your PC over the Internet.  Most viruses are designed to be covert, at least until they execute their main function, meaning without antivirus protection you may not even know when your computer is infected. 9
  • 10. Macs and Security and Virus Protection  If you run a Mac operating system, it is debatable whether you need virus protection. Generally the reason for having a virus scanner is to downstream check.  Over 99.9% of viruses only work on windows, so your chances of getting a virus on a Mac system is very slim, but you can still pass them on. 10
  • 11. Beware, viruses can be sent in files  If you regularly send files to your friends via email (i.e., funny videos, pictures, word documents, games), and those friends use windows, you should consider virus scanning the files before sending them on.  This is not necessary if you use a service that checks your emails for you, such as Hotmail or GMail. A good Mac virus scanner is ClamX. 11
  • 12. Proxy Use  It only takes one proxy to put a gaping hole in network security.  Proxy sites help malware and other web- related threats to sneak into networks undetected.  SSL proxies are a particular problem since the secure tunnels used allow viruses and worms to sidestep network anti-virus and web filtering security entirely. 12
  • 13. Phishing and Password Theft  Many proxy users are unaware of the risks to their own personal security and identity.  Malicious proxy servers do exist and are capable of recording everything sent to the proxy, including unencrypted logins and passwords. 13
  • 14. Phishing and Password Theft  Although some proxy networks claim to only use „safe‟ servers, due to the „anonymous‟ nature of these tools, proxy server safety is impossible to police.  Users understand that whenever they use a proxy, they risk someone “in the middle” reading their data. 14
  • 15. Copyright and Fair Use for Students Because you are a student, you can use copyrighted material.  You have to follow certain guidelines when using copyrighted material. 15
  • 16. Student Copyright Guidelines  Web Images: You can use up to 10% or 15 images (whichever is less) from any one collective work (such as a web page or a book) in your presentation.  Music: You can include 10% or 30 seconds of a song (whichever is less) in your presentation. 16
  • 17. Student Copyright Guidelines  Illustrations: You may use no more than 5 images by 1 artist.  Motion: You may put 10% or 3 minutes (whichever is less) of a copyrighted film into your presentation.  Any image that you find online needs a citation.  Paste the URL of the image directly beneath it. 17
  • 18. Copyright Resources  http://www.cyberbee.com/cb_copyright.swf  http://kb.iu.edu/data/arit.html  http://www.copyrightkids.org/cbasicsframes.htm 18