1 / 14

Minding Your Manners and Playing It Safe: Tips for Searching the Web

Minding Your Manners and Playing It Safe: Tips for Searching the Web John Hubbard Electronic Resources Librarian UWM Libraries September 21, 2002 Class Overview Introduction to the Internet E-Mail etiquette – dos and don’ts Surfing safely – searching, browsing, and shopping

Download Presentation

Minding Your Manners and Playing It Safe: Tips for Searching the Web

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Minding Your Manners and Playing It Safe: Tips for Searching the Web John Hubbard Electronic Resources Librarian UWM Libraries September 21, 2002

  2. Class Overview • Introduction to the Internet • E-Mail etiquette – dos and don’ts • Surfing safely – searching, browsing, and shopping • How to protect yourself from criminals

  3. What is the Internet? • The Internet is a global connection of computers through telephone wires, cables hubs and other connections. The Internet includes the World Wide Web and Electronic Mail • The Internet has existed for a long time, but has experienced recent rapid exponential growth

  4. All about E-Mail • Programs (Clients) send messages • File formats for sending mail • File attachments – don’t run viruses • Warnings and hoaxes – think before you forward • And everyone’s favorite…

  5. Dealing with Spam • NEVER respond to unsolicited commercial e-mail • Consider complaining to the proper ISP • However, many spammers exploit “open relays” (mail servers on the Internet, often in Asia, allowing the sending of email by anyone, to anyone) and are essentially untouchable.

  6. Example of an E-Mail Virus

  7. Surfing the Web • Searching and browsing – how a Web browser works • E-Commerce, SSL, Credit Cards • Spyware, popups, and viruses • Monitoring at work • Cookies!

  8. Example of a Spyware Program

  9. How a Cookie Works

  10. Protect Yourself • Password management • Buy at secure sites only (https) • Be secure, but not paranoid (the only 100% safe computer is the one turned off) - Absolute anonymity isn't practical, in real life or on the web.

  11. For More Information • Read more about the Internet at http://www.zakon.org/robert/internet/timeline/ and http://www.microsoft.com/insider/guide/ • Spam resources at http://spam.abuse.net/ and http://spamcop.net/ • Netiquette: http://dmoz.org/Computers/Internet/Etiquette/ • Cookies: http://www.cookiecentral.com/faq/ • Campaign sites: http://www.epic.org/ and http://www.eff.org/

More Related