SlideShare una empresa de Scribd logo
1 de 18
Webmastering BASICS Using
     Dreamweaver


           Unit 6
           Hosting and
           Maintenance
Choosing and Registering a
    Domain Name




     A WHOIS search allows you to determine whether a
     domain name is available for registration.


2
Network Solutions’ Whois Search




3
Who is search for hwscott.net




4
Registering a Domain




5
Why is Antivirus Protection
    Important




6
Security and Virus Protection

       Viruses can do everything from delete your
        files, prevent your computer from starting, or
        more commonly, use your computer to send
        spam or more viruses.
       If you run a windows machine, and are
        connected to the internet, virus scanning is a
        must.


7
What are Viruses?

       Computer viruses are named such due to their
        similarities to biological viruses.
       Computer viruses are malicious programming
        designed to replicate and spread.
       Though their purposes differ from virus to virus
        they commonly modify, delete or even steal
        data from your computer.


8
What are Viruses? continued

       They can also allow hackers access and
        control your PC over the Internet.
       Most viruses are designed to be covert, at
        least until they execute their main
        function, meaning without antivirus protection
        you may not even know when your computer
        is infected.


9
Macs and Security and Virus
     Protection

        If you run a Mac operating system, it is
         debatable whether you need virus protection.
         Generally the reason for having a virus
         scanner is to downstream check.
        Over 99.9% of viruses only work on
         windows, so your chances of getting a virus on
         a Mac system is very slim, but you can still
         pass them on.

10
Beware, viruses can be sent in
     files

        If you regularly send files to your friends via
         email (i.e., funny videos, pictures, word
         documents, games), and those friends use
         windows, you should consider virus scanning
         the files before sending them on.
        This is not necessary if you use a service that
         checks your emails for you, such as Hotmail
         or GMail. A good Mac virus scanner is
         ClamX.
11
Proxy Use

        It only takes one proxy to put a gaping hole in
         network security.
        Proxy sites help malware and other web-
         related threats to sneak into networks
         undetected.
        SSL proxies are a particular problem since
         the secure tunnels used allow viruses and
         worms to sidestep network anti-virus and web
         filtering security entirely.
12
Phishing and Password Theft

        Many proxy users are unaware of the risks to
         their own personal security and identity.
        Malicious proxy servers do exist and are
         capable of recording everything sent to the
         proxy, including unencrypted logins and
         passwords.



13
Phishing and Password Theft

        Although some proxy networks claim to only
         use „safe‟ servers, due to the „anonymous‟
         nature of these tools, proxy server safety is
         impossible to police.
        Users understand that whenever they use a
         proxy, they risk someone “in the middle”
         reading their data.


14
Copyright and Fair Use for
     Students

         Because you are a student, you can use
         copyrighted material.
        You have to follow certain guidelines when
         using copyrighted material.




15
Student Copyright Guidelines

        Web Images: You can use up to 10% or 15
         images (whichever is less) from any one
         collective work (such as a web page or a
         book) in your presentation.
        Music: You can include 10% or 30 seconds
         of a song (whichever is less) in your
         presentation.


16
Student Copyright Guidelines

        Illustrations: You may use no more than 5
         images by 1 artist.
        Motion: You may put 10% or 3 minutes
         (whichever is less) of a copyrighted film into
         your presentation.
        Any image that you find online needs a
         citation.
        Paste the URL of the image directly beneath
         it.
17
Copyright Resources

        http://www.cyberbee.com/cb_copyright.swf
        http://kb.iu.edu/data/arit.html
        http://www.copyrightkids.org/cbasicsframes.htm




18

Más contenido relacionado

La actualidad más candente

WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
WISE KIDS
 
Network security
Network securityNetwork security
Network security
Nikhil Vyas
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
robsworld
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 

La actualidad más candente (20)

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
Adware
AdwareAdware
Adware
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Internet security
Internet securityInternet security
Internet security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Moodle security
Moodle securityMoodle security
Moodle security
 
Web security
Web securityWeb security
Web security
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Network security
Network securityNetwork security
Network security
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How to prevent WannaCry Ransomware
How to prevent WannaCry RansomwareHow to prevent WannaCry Ransomware
How to prevent WannaCry Ransomware
 
Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Robert wayman cis 1020 chpt 9
Robert wayman   cis 1020 chpt 9Robert wayman   cis 1020 chpt 9
Robert wayman cis 1020 chpt 9
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
Staying safe-on-internet
Staying safe-on-internetStaying safe-on-internet
Staying safe-on-internet
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 

Destacado

Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide web
cstenzhorn
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highway
bh_aditya
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
loizazeptania
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
Pham Duc
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
Putri Sanuria
 

Destacado (16)

Website Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-modelWebsite Promotion - 0 introduction 4C-model
Website Promotion - 0 introduction 4C-model
 
Internet and world wide web
Internet and world wide webInternet and world wide web
Internet and world wide web
 
Isp
IspIsp
Isp
 
CS-ISP Overview
CS-ISP OverviewCS-ISP Overview
CS-ISP Overview
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 
Rational Functions
Rational FunctionsRational Functions
Rational Functions
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
CBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelersCBI Website Promotion - 0 - markets and targets travelers
CBI Website Promotion - 0 - markets and targets travelers
 
Information Super Highway
Information Super HighwayInformation Super Highway
Information Super Highway
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Best Strategies For Website Promotion
Best Strategies For Website PromotionBest Strategies For Website Promotion
Best Strategies For Website Promotion
 
Internet service provider
Internet service providerInternet service provider
Internet service provider
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMS
 
ISP
ISPISP
ISP
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
 
Internet service provider ppt
Internet service provider pptInternet service provider ppt
Internet service provider ppt
 

Similar a Unit6

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Connecting Up
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
Avinash Sinha
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
backdoor
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
anbersattar
 

Similar a Unit6 (20)

Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ransomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation TechniquesRansomware Trends 2017 & Mitigation Techniques
Ransomware Trends 2017 & Mitigation Techniques
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
M
MM
M
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9Fundamentals of Computing Chapter 9
Fundamentals of Computing Chapter 9
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Marwan alsuwaidi
Marwan alsuwaidiMarwan alsuwaidi
Marwan alsuwaidi
 
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | SysforeYour Guide to tackle the Ransomware threat "WannaCry" | Sysfore
Your Guide to tackle the Ransomware threat "WannaCry" | Sysfore
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Computer security
Computer securityComputer security
Computer security
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information security
Information securityInformation security
Information security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 

Más de Hope Scott

Más de Hope Scott (7)

Ellipses by Tom & Ashley
Ellipses by Tom & Ashley Ellipses by Tom & Ashley
Ellipses by Tom & Ashley
 
Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia Quadratic Function by Taylor & Asia
Quadratic Function by Taylor & Asia
 
Quadratic Function by Robert & Phillip
Quadratic Function by Robert & PhillipQuadratic Function by Robert & Phillip
Quadratic Function by Robert & Phillip
 
Polynomial Function by Desirae &
Polynomial Function by Desirae & Polynomial Function by Desirae &
Polynomial Function by Desirae &
 
Quadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & CristinaQuadratic Function by Jasmine & Cristina
Quadratic Function by Jasmine & Cristina
 
Elizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear FunctionElizabeth& Valarie - Linear Function
Elizabeth& Valarie - Linear Function
 
How to Print EOY Attendance Report
How to Print EOY Attendance ReportHow to Print EOY Attendance Report
How to Print EOY Attendance Report
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Unit6

  • 1. Webmastering BASICS Using Dreamweaver Unit 6 Hosting and Maintenance
  • 2. Choosing and Registering a Domain Name A WHOIS search allows you to determine whether a domain name is available for registration. 2
  • 4. Who is search for hwscott.net 4
  • 6. Why is Antivirus Protection Important 6
  • 7. Security and Virus Protection  Viruses can do everything from delete your files, prevent your computer from starting, or more commonly, use your computer to send spam or more viruses.  If you run a windows machine, and are connected to the internet, virus scanning is a must. 7
  • 8. What are Viruses?  Computer viruses are named such due to their similarities to biological viruses.  Computer viruses are malicious programming designed to replicate and spread.  Though their purposes differ from virus to virus they commonly modify, delete or even steal data from your computer. 8
  • 9. What are Viruses? continued  They can also allow hackers access and control your PC over the Internet.  Most viruses are designed to be covert, at least until they execute their main function, meaning without antivirus protection you may not even know when your computer is infected. 9
  • 10. Macs and Security and Virus Protection  If you run a Mac operating system, it is debatable whether you need virus protection. Generally the reason for having a virus scanner is to downstream check.  Over 99.9% of viruses only work on windows, so your chances of getting a virus on a Mac system is very slim, but you can still pass them on. 10
  • 11. Beware, viruses can be sent in files  If you regularly send files to your friends via email (i.e., funny videos, pictures, word documents, games), and those friends use windows, you should consider virus scanning the files before sending them on.  This is not necessary if you use a service that checks your emails for you, such as Hotmail or GMail. A good Mac virus scanner is ClamX. 11
  • 12. Proxy Use  It only takes one proxy to put a gaping hole in network security.  Proxy sites help malware and other web- related threats to sneak into networks undetected.  SSL proxies are a particular problem since the secure tunnels used allow viruses and worms to sidestep network anti-virus and web filtering security entirely. 12
  • 13. Phishing and Password Theft  Many proxy users are unaware of the risks to their own personal security and identity.  Malicious proxy servers do exist and are capable of recording everything sent to the proxy, including unencrypted logins and passwords. 13
  • 14. Phishing and Password Theft  Although some proxy networks claim to only use „safe‟ servers, due to the „anonymous‟ nature of these tools, proxy server safety is impossible to police.  Users understand that whenever they use a proxy, they risk someone “in the middle” reading their data. 14
  • 15. Copyright and Fair Use for Students Because you are a student, you can use copyrighted material.  You have to follow certain guidelines when using copyrighted material. 15
  • 16. Student Copyright Guidelines  Web Images: You can use up to 10% or 15 images (whichever is less) from any one collective work (such as a web page or a book) in your presentation.  Music: You can include 10% or 30 seconds of a song (whichever is less) in your presentation. 16
  • 17. Student Copyright Guidelines  Illustrations: You may use no more than 5 images by 1 artist.  Motion: You may put 10% or 3 minutes (whichever is less) of a copyrighted film into your presentation.  Any image that you find online needs a citation.  Paste the URL of the image directly beneath it. 17
  • 18. Copyright Resources  http://www.cyberbee.com/cb_copyright.swf  http://kb.iu.edu/data/arit.html  http://www.copyrightkids.org/cbasicsframes.htm 18