Professional Documents
Culture Documents
Basiccomputer PDF
Basiccomputer PDF
Introduction
ThisbookcontainscourseslessonsheldattheFreeUniversityofBolzanoBozen.Itcontainsonlythefirst
partofthecourses,namelythelessonson:
computerintroduction,
MicrosoftWindows,
computernetworks,
computerdangersandsecurity.
It does not contain the parts on Microsoft Word, Microsoft Excel, financial functions, Microsoft Access,
computer algorithms, SPSS, Visual Basic for Applications, which are very well covered by the respective
coursessuggestedbooks.
Thisbookisusuallyupdatedeveryyear,pleasetakealookattheeditiondate.
Disclaimers
This book is designed for very novice computer users. It often contains oversimplifications of reality and
everytechnicaldetailispurposelyomitted.Expertuserswillfindthisbookuselessand,forcertainaspects,
partiallywrong.
This book supposes that the user is using Microsoft Windows 7 operating system in English language.
However, most of the book is perfectly readable with other Windows versions, while some menus and
instructionscanberatherdifferentifthelanguageisnotEnglish(Windowslanguagemaybechangedon
multilanguageinstallations:seepage6forfurtherinformation).
The novice user in this book is, for simplicity, always considered male. This is not meant to be gender
discrimination.
Table of Contents
Introduction..........................................................1
1. Computers....................................................2
1.1. Storage.........................................................2
1.2. Software.......................................................3
2. MicrosoftWindows......................................5
2.1. Versionsandeditions...................................5
2.2. Regionalandlanguagesettings....................6
2.3. Filesystem....................................................7
3. Computernetworks...................................13
3.1. Technicalaspects........................................13
3.2. Communication..........................................14
3.3. Internetconnections.................................17
4. Computersecurity.....................................18
4.1. Encryption..................................................18
4.2. Passwords..................................................21
4.3. Viruses.......................................................23
4.4. Emails.........................................................24
4.5. Navigation..................................................26
4.6. Attacksfromoutside.................................27
4.7. Backup.......................................................28
Index..................................................................31
Dr.PaoloCo
oletti
BasiccComputercoursebookk
1. Com
mputerrs
Thischapteerpresentsw
withabriefd
descriptionofcomputerm
maincompo
onents,oftheemostcomm
mondevicess
andofthettypicalsoftw
warecomponentsfornovviceuser.
1.1. Sto
orage
1.1.1. Me
easures
Before starrting with the computeer descriptio
on, it is useeful to beco
ome proficieent with th
he data size
e
terminologyy,whichwilloftenbeuseedinthisbook.
Computers haveaveryelementaryywaytostorredata:theyycanremem
mberonly0o
or1.Avalueeof0or1iss
calledbitan
ndallcompu
uterdataareestoredasse
equencesofbits.Asequenceof8bittsiscalledabyte,which
h
isaquantityylargeenoughtostoreu
usuallyaletteroradigit(eventhoughsometimes2bytesareenecessary)..
Modern co
omputers aree able to deal with en
normous quaantity of byytes, forcing us to intro
oduce otherr
quantities:
Kilo
obyte(KB),approximatelyy1,000byte
es,
Megabyte(MB)),approximately1,000KBoronemillionbytes,
Gigabyte(GB),aapproximateely1,000MB
Boronebillio
onbytes,
Terabyte(TB),aapproximately1,000GBo
oronetrillio
onbytes.
Usuallythe unformatte
edtextofaw
wholebook canfitinso
omeKB,whileforanimaageinagoodresolution
n
(letssayreadytobeprrintedonA4paper)orfo
oramodernsongsomeM
MBarerequired,whileaafilminhigh
h
qualityneed
dssomeGB.
1.1.2. Mo
oores law
Over the laast 40 years, computer hardware has
h been con
ntinuously im
mproving itss performances with an
n
exponentialgrowth.Thisgrowthis summarized
dbythefamousMooresslawwhich saysthattheenumberoff
transistors in a processsor doubles every 18 mo
onths. This law
l
can be extended
e
to almost every aspect off
hardware aand we may say that thee performan
nce (be it speed or capaacity) of hard
dware doubles every 18
8
months, thus leading to
t a general exponentiaal growth. Unfortunately
U
y softwaress performancce does nott
increasewitththesamerate.
1.1.3. De
evices
The compu
uter uses sevveral devices to perman
nently store and move data, which
h vary a lot in terms off
capability,ccost,speedaandportabilitty.
Themostusedisstheinternaalharddisk,w
whichusualllyisinsideth
hecomputerrboxand
cannotbemoveed.Itssizecu
urrentlyranggesfrom500
0GBto2TB.Ontheotheerhand,an
exte
ernalharddiskisoutsidethecomputter,hasthessamesizeandobviouslyccanbe
movved.Itsonlydisadvantageisbeingslightlyslowerr.
SSD SolidState Disksarestaartingtoslow
wlyinvadethemarket.TTheyarenottdisksatall,,
but very larrgememoryy cards shapeed like an hard disks wh
hich can enttirelyreplace
ethe internaalharddisk..
Theirmain advantages arethatnotthavingmovvingparts(theydonotrrotateathigghspeedlikeeharddisks))
are more ro
obust and th
hat in most situation they are fasteer than hard disks (up to
o 10 times faaster). Theirr
disadvantaggeisthelimitedsizewhicchcurrentlyis250GBan
ndtheirhighprice.
Page2of32
2
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
PaoloColettii
Dr.P
CDandDVDaretheetwomoderrnwaystosttoredata.Th
heycontainaabout700M
MBand4GB,,
respecttively.Theyaaredividedin
ntoRwhichmayonlybeewrittenoncceandRWw
whichmaybe
e
writtenarerewritttenseveraltimes.TheyrrequireaCDreaderoraDVDreaderrtoberead,,
whichaareavailableonmostcom
mputers,and
daCDwriterorDVDwritertobewrritten,which
h
A new generation of high
are avaailable only on some computers.
c
h
capacitty discs hass
appeared
donthemarket,theBluraywith25GBsize.
MemoryystickorUSB
Bpendriveissthemostussedwaytotemporarysttoreandmovvedata.Its
sizeisno
owupto64G
GB,howeverritsreliabilittyisnotperfect,thereforreit
isusedm
mostlytomo
ovedata.
monwaystostoreandm
movedataare
ethroughamemorycard,usedby
Othercomm
externaldevvicessuchassphotocameras,cellularrphonesorm
musicplayerrs.
1.2. Sofftware
Softwarecaanbedivided
dintothreeb
bigcategorie
es:operatinggsystems,prrogramsanddata.
Theoperatiingsystemtaakescare,th
hroughthep
processorandthemothe
erboard,ofccontrollingth
hecomputerr
hardwareandthehumaancomputerrinteraction.Thereareccurrentlythreewidelyussedoperatinggsystems:
MiccrosoftWind
dows(withittsversionsXP,VistaandWindows7),whichisthe
emarketleaader,
Linux/Unix (it is
i a family of
o very similaar operatingg systems), which
w
is the new costlesss operatingg
sys
stem,
Maacintoshcom
mputershaveetheirowno
operatingsysstemMacOSSX.
Programsaresoftware whichisuseedtodoparticulartasks,e.g.Word
dfordocume
entwriting, Explorerforr
Internetnavvigation,theeCalculatorfformathemaaticaloperations.
Dataiseverrythingwhicchisproduceedeitherby theuseror byprogramss(sometime
esevenbyth
heoperatingg
system)to storeinform
mation,e.g.aadocument fileproduceedby Word isdata,adownloaded web pageiss
data.
freeeware, softw
ware which is completelyycostless. The
T producerrs of this software are either
e
publicc
insttitutionssuchasuniversities,ordeveloperswho
odoitforpe
ersonalinterrestoradverrtisementorr
privvate compan
ny who do it for dum
mping reason
ns. Some exxamples are
e Skype com
mmunication
n
pro
ogramorLinu
uxoperatingsystem;
shareware,softtwarewhichisinitiallycostlessbutaafteracertaainperiodtheuserisaskkedtopayaa
fee or delete it; or softw
ware which has two versions: a free
f
one, but
b incompleete or with
h
advvertisement banners,and
dacompleteeadvertisem
mentfreeon
ne,forwhich
htheusermustpay.The
e
mostfamousexxampleisWinZipcompre
essionprograam;
com
mmercial, so
oftware for which
w
the user has to pay
p a licensee to use it. Common exxamples are
e
MiccrosoftWind
dowsoperatingsystemorPhotoshop
pimageeditin
ngprogram;
Edition7.0(08/10/2012
2)
Page3of32
2
Dr.PaoloColetti
BasicComputercoursebook
private,softwareuniquelybuilt,underpayment,foraspecificcustomertofithisneeds.Onlythe
costumer may use it. A typical example is the universitys studentscoursesexamsprofessors
databasesystem.
The permission to be modified can seem a trivial question for the novice user, however for program
developersandcomputerexpertsbeingauthorizedtomodifyasoftwareisagreatadvantagesinceitcan
be improved, checked for errors and tailored to specific needs. The open source versus proprietary
softwareisastrongethicalandeconomicaldebateinthecomputerscientistscommunity.Subdivisionby
permissiontomodifyis:
open source software may be studied, used and especially modified by anyone. The software
developersatthesametimelegallyauthorizeanymodificationsandtheydistributethesourceof
thesoftwaretoputotherdevelopersinaconditiontoeasilymodifyit.Opensourcesoftwareisalso
automaticallyfreeware.ThemosttypicalexampleisLinuxoperatingsystem.
copyleft software is open source but carries the restriction that any modification must be
distributed as open source and copyleft, thus impeding that software becomes, after a
modification,proprietary.ThemostfamouscopyleftcontractlicenseistheGNUPublicLicense(see
http://www.gnu.org/licenses/gpl.html).
proprietarysoftwareisdistributed(costlessasAdobeAcrobatReader,orasasharewareasWinZip,
ormostoftensoldascommercialsoftwareasMicrosoftOffice)withtheexplicitlegalwarningnot
tomodifyitandtechnicallylockedtopreventotherdeveloperstoseeormodifyitssource.
closedproprietary,aformatownedbyasoftwarecompanyandkeptasatradesecret.Inthisway
only programs build by that company can use those data files and no other company is able to
endanger its monopoly. A famous example is DOC format which, until 2007, was kept secret by
Microsoft,thuspreventingcompetitorsfrombuildingalternativestoMicrosoftWordprogram.
openproprietary,,aformatpubliclyavailablebutwhoseimprovementsandcontrolareunderthe
ownershipofasoftwarecompany.AtypicalexampleisthenewWordformatDOCX.
open,apubliclyavailableformatwhichfollowsofficialstandardswhosecontrolisunderownership
of public organizations, such as American ANSI, German DIN or Italian UNI. Typical examples are
imagesformatGIForformattedtextsformatPDForwebpagesformatHTML.
Page4of32
Edition7.0(08/10/2012)
BasicComputercoursebook
Dr.PaoloColetti
2. Microsoft Windows
MicrosoftWindowsiscurrentlythemarketleaderoperatingsystem,itistheusualinterfacewhichappears
whentheuserturnsapersonalcomputeron.
StarterandHomeBasic,cheapversionswithseverelimitations,used
mostlyonsmallnotebooks;
HomePremium,homeusersedition;
Professional, personal business edition which includes more
networkprograms;
Enterprise/Ultimate,Professionaleditionwithmorenetworkutilities
available to companies/individual users. Enterprise edition is
currently(June2012)installedatUNIBZ
Starter
HomeBasic
HomePremium
Professional
Enterprise/Ultimate
Page5of32
Dr.PaoloColetti
BasicComputercoursebook
STRG
ALT
ALTGR
F1toF12
ENTF
EINFG
POS1
ENDE
BILDandBILD
Mainfunction
CTRL
ALT
ALTGR
Producecharacteronthekeysrightleft
F1toF12
CANC
Deletenextcharacter
INS
Toggleinsert/overwritemode
Gotobeginning
FINE
Gotoend
PAGandPAG
Goonepageupordown
Edition7.0(08/10/2012)
BasicComp
putercoursebook
Dr.P
PaoloColettii
PACEor
BACKSP
ENTEERor
TAB
Bor
SHIFFTor
CAPSLO
OCKor
ARROW
WS
INVIOor
TABor
Deletelasttcharacter
Enterrdata
Movethroughthewindow
M
Capitalizzeletters
KeepSHIFFTpressed
Moveth
hecursor
InthisbookktheEnglishnameforkeeyswillbeindicated.Wh
henA+Bisindicated,itm
meansthatth
heusermustt
presskeyA,,thenpresskeyB,andth
henreleasebothkeys.
2.3. File
e system
m
Beforestarttingthissecttionitisneceessarytodothefollowin
ngoperationss:
1.
2.
3.
4.
5.
6.
clickontheStarrtmenuicon
n,onthelow
werleftcorneerofthescreeen
opeentheContro
olPanel
cho
ooseAppearaanceandPerrsonalization
n
cho
ooseFolderO
Options
cho
ooseView
desselectHideeextensionsfo
orknownfile
etypes.
Inthiswayextensions(sseesection2
2.3.3)areshownandfileetypesarebe
etterrecogn
nized.
Eachstoraggedeviceisaabigdirecto
ory,accessib
blefromMy Computer
window, w
which contaains directo
ories and files.
f
Each of these
subdirectorries may con
ntain other files
f
and oth
her subsubd
directories,
andsooninahierarchicalway,forrmingatree withtheharddisk(or
anothersto
oragedevice)astheroott,directoriessasbrancheesandfiles
as leaves. O
On UNIBZ co
omputers, th
he usual harrd disk are C:
which
containsprograms,E:whichconttainscoursessinformationandF:
whichcontaainsusersreservedspace.DisksdirrectoriesA:andB:
areusuallyreservedforrfloppydiskss,andD:orZ:forCDreader.
Edition7.0(08/10/2012
2)
Page7of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
Choosing th
he Change your view menu of a directory
d
windows will provide
p
the user with fiive differentt
waystoloo
okatfilesanddirectoriess,themostimportantwaybeingtheeDetailswhiichcanshow
winterestingg
information
nonfilesand
ddirectoriessuchastheirsizeanddaateoflastmo
odification.
Eachfilean
nddirectory canbeunivo
ocallyidentifiedbyitsab
bsolutepath
horaddress.Fordirecto
oriesitisthe
e
path which appears on
n the address bar of th
he directory window, while for filess it is the path of theirr
containing directory fo
ollowed by \ and thee file name. For examp
ple, the abso
olute path of directoryy
Common in HP directory in
n Program Files direectory in the
t
C: hard
d disk is C:\Program
m
Files\HP\Co
ommonasccanbeseen fromthead
ddressbar.W
While,theHP
PeDiag.dllfillehastheab
bsolutepath
h
C:\Program
mFiles\HP\C
Common\HP
PeDiag.dll.
Notethat,fforWindowssoperatingsyystem,capitalorsmallcaapslettersin
npathsarep
perfectlyequ
ual.
Aspecialan
ndtrickyobje
ectisthelinkorshortcutt.Althoughiitsiconlooksslikeafileiccon,
thesmallcu
urvedarrow
wontheleft cornerclearrlyindicates thatthisob
bjectisalinkk.A
linkissimpllyanaddressstoafileordirectory,itisnotareallfileordirecctory.Whenthe
userclicks onthe
o
link, thecomputter behaves exactly as iffthe user is clickingon the
realfileor directory(if Windowscaanfindtherrealone,wh
hichisnotth
hecaseifin the
meantime somebody
s
deleted
d
or moved
m
it). However, anyy copy/move
e operation on the linkk will simplyy
copy/movethelinkand
dnottherealfileordirecctory;especiiallycopying/movingtheelinktoanottherdiskwilll
probablycaauseittomalfunction.Th
hereforeitisagoodideaafornoviceu
userstoavoidusinglinkssatall.
Page8of32
2
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
Dr.P
PaoloColettii
dragtheobjecttothedestination.Ifap
plussymbol does
nott appear, prress CTRL keey to have it appear while
w
dragging.Releasetheobjecctinthedestination;
seleect the obje
ect and clicck the right mouse button.
Seleect copy. Point the mouse to the destination
n and
click the right mouse buttton. Select paste. Iff the
desstinationisth
heoriginallo
ocation,theffilenamechaangestoco
opyof;
seleect the object and presss CTRL+C. Po
oint the mou
use to the destination
d
a press CTTRL+V. If the
and
e
desstinationisth
heoriginallo
ocation,theffilenamechaangestoco
opyof.
Movingafiilemeansmovingittoaanotherlocationlosingtthefileintheoriginalplace.Movinggadirectoryy
meansmovvingittoano
otherlocationtogetherw
withitsentirretreeofsub
bdirectories andfiles.To
omoveafile
e
ordirectoryywindowsofffersseveralmethods,th
hemostused
dbeing:
dragtheobjecttothedestination.Ifap
plusoralinksymboldoesappear,pressCTRLorSSHIFTkeyto
o
rem
moveit.Releaasetheobjectinthedesstination;
and th
he icon
beccomes lighte
er. Point thee mouse to the
t destinattion and clicck the right mouse
buttton.Selectpaste;
Tocreatealinktoafileordirectoryy:
dragtheobjectttothedesttinationofth
helink.Ifa linksymbol doesnotap
ppear,press CTRL+SHIFTT
unttilitappears..Releasetheeobjectinth
hedestination;
seleect the objeect and clickk the right mouse
m
butto
on. Select ccreate shorttcut. A linkk is
creaatedinthessamedirecto
ory.
Deletingaffilemeanso
oftenputtinggitintothe trashcanw
whereitcan berecuperatedunlesstthe
trashcanissemptied.D
Deletingadirrectorymeanputtingitttothetrash cantogetheerwithitsentiretreeoff
subdirectorries and file
es. Pay speccial attentio
on, since no
ot always th
he trash caan works co
orrectly and
d
sometimes filesaredelletedwithou
utpassingth
hroughthettrashcan. To
odeleteafileordirecto
orywindowss
offersseverralmethods,themostussedbeing:
dragtheobjecttothetrashcanandrele
easeit;
seleecttheobjecctandclickth
herightmou
usebutton.SSelectdelete;
seleecttheobjecctandpressDELkey.
Torename afileordirectory,simp
plyselecttheeobject,clicckonthenaameandretyypeit.UsuallyWindowss
accepts eveery name, but
b novice users
u
should
d stick with letters and numbers and
a
spaces, since otherr
charactersm
maybeforbiidden.
Tocreatea newdirecto
ory,simplyriightclicktheemouseand
dchoose
NewandFolder.Aftterthecreattion,renameeit.
SSometimesfilesoccupyaalotofspaceeandneedtobereduced
dtosavedisskspaceorto
obesentbyy
eemail;other timesfilesm
mustbeputiinapackageetoremaintogetherorttobesentassasinglefile
e
vvia email. Th
hese two op
perations aree accomplish
hed compressing a set of files and directories,,
whichmean
nsusingasp
pecialprogram(WinZipo
orIZArcorth
heoperativesystemitself)toreduce(from0%to
o
90%dependingonthe filetype)thefilesizean
ndproduceaanewsingle
efilecalledzziparchiveco
ontainingalll
theselected
dfilesanddiirectories.
Edition7.0(08/10/2012
2)
Page9of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
Tocompresssasetoffileesanddirecttories:
1. seleectthefilesaanddirectoriiesalltogeth
her,
2. clicktherightm
mousekey,
3. seleect IzArc or
o the installed compre
ession prograam and seleect somethin
ng like Add
d to Archive
e
Filee,
4. adiialogboxapp
pearsaskingyoutochoo
osetheziparrchivenameanditsdesttination;
5. inthisdialogbo
oxyoumustalsochoosethecompreessionmetho
od,whichissstronglysugggestedtobe
e
ZIPtobecompaatiblewithotherprogram
ms;
6. inthisdialogan
nencryptionmethod(seesection4.1
1onpage18
8)maybech
hosen.Ifyourziparchive
e
sho
ouldbeopen
nedbyanybo
ody,thench
hooseNonee:Otherwisse,ifyouwaanttheziparchivetobe
e
unccompressed onlybypeop
pleknowing aproperpaassword,cho
ooseanyofttheencryptio
onmethods,,
suchasAES12
28bit,andp
providethep
password.
Otherfileso
ordirectorieesmaybead
ddedlaterto
otheziparch
hivesimplyd
draggingthemonthezip
parchivefile
e
(thisisacop
pyandnotamoveoperaation)ifitisnotencrypteed.
Toextractffilesfromazziparchivefiile,simplyclicktherighttmousekey onthefileaandfromtheedropdown
n
menu choo
ose the apprropriate extrract option: the contentt will appeaar in the location you have chosen,,
togetherwiithallitsdireectoriesstru
ucture.
Whendoub
bleclickingo
onacompresssedfile,ifth
hecompresssionprogram
misproperlyyinstalled,it willopenin
n
awindowaasifitwere adirectory. Butitisnotanormaldiirectory,itisssimplyawindow,prod
ducedbythe
e
compression program, with the listt of the ziparchives content: the user
u
should not open filees from thiss
window sin
nce it is a ve
ery unreliable way to modify files! Files
F
can be copied from
m this windo
ow to a reall
directory siimply draggiing them to
o the directo
ory. When the entire co
ontent of th
he ziparchive has to be
e
extracted o
or when the user wants to preserve
e the originaal tree struccture, it is beetter to use the Extractt
buttonofth
hisspecialwindow.
Typicallprogramsthatopenit
Typicalexttensions
Program
m
itsself
.exe.com
m.bat
Compressed
WinZip
p/IZArc
.zip
p
Text
Nottepad
.txt
Documen
nt
W
Word/Acroba
at/Powerpo
oint
.
.docx.doc.rt
tf.pdf.ppt
Sheet
Exxcel
.xlsx.xls.csv
Image
Explorrer/PictureFaxViewer//Paint/
OfficePictu
ureManagerr
.jpg.jpeg.giff.bmp.png
Video
MediaaPlayer
.avi.mov.m
mpg.mpeg
Page10of3
32
Typicaalicons
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
Dr.P
PaoloColettii
Audio
p
MediaPlayer/WinAmp
.mp3..wav
Webpagge
Exp
plorer
.html..htm
readpermission
n,tocopyan
ndopentheo
object;
readandexecute,sameasread,plusru
untheobjecttifit
isaprogram;
listcontent(forrdirectories),toseetheccontent;
writte permissio
on (for direcctories), to create files and
sub
bdirectories;
modifypermisssion(alsocallled,whenreeferredtoa file,
writte permissio
on), same as
a read and
d execute, plus
deleete,move,reename,saveemodificatio
ons;
fullcontrol,sam
measmodifyy,pluschangepermission
ns.
2.3.5. Ne
etwork fold
ders at UNIBZ
OnUNIBZLLANtherearesharedharddisksonw
whichcomm
moninformattionisstored
d,sothatit isaccessible
e
fromeverycomputer.TThesearecallednetworkkfolders.Som
meofthemaare:
2.3.6. Ro
oaming use
er profile a
at UNIBZ
Whenever the
t user loggs in on a neew compute
er, usually hee should find
d a complette new profile (Desktop,,
icons,Docu
uments,conffiguration),w
whichisobviouslyveryannoying.Ino
ordertolethimfindalw
wayshisstufff
asithasbeeenleftonthelastcompu
uterused,whenevertheuserlogsofffallhisprofiileiscopiedondirectoryy
\\ubz01fst\\students\, followed
f
by year, facultty and userrs login nam
me (for example, for Diana
D
Pfeiferr
enrolled in 2012 it is \\ubz01fst\sstudents\User2012\Eco\\dpfeifer). Whenever
W
hee logs in aggain on anyy
universityscomputer,tthatcomputeerretrievesallhisprofileesstufffrom
mthisdirecto
ory.
Edition7.0(08/10/2012
2)
Page11of32
2
Dr.PaoloColetti
BasicComputercoursebook
Thismechanism,calledroaminguserprofile,worksfineonlyiftheuserisnotusingtoomuchdiskspace
(whichisusually300MB,butitisagoodideatostaybelow150MB).Iftheuserisoverquota,thesystem
sendsawarningviaemailtotheuserand,iftheuserremainsoverquota,thismechanismdoesnotwork
anymore.Moreover,iftheuserstillremainsoverquota,hewillbeforbiddenfromsavinganyfileonthe
computerheiscurrentlyusing.
ThereforeitisagoodideatoalwaysworkonaUSBpendrive(whichisthencopiedonanotherpersonal
computer)andtoperiodicallycheckthediskspacelookingattheproprietiesofthisdirectory.Ifawarning
email has been received or, even worse, roaming user profile does not work anymore, files need to be
deletednotfromthecurrentcomputer(sincethemechanismisnotworkinganymore)butdirectlygoing
throughthisdirectory.
Page12of32
Edition7.0(08/10/2012)
BasicComputercoursebook
Dr.PaoloColetti
3. Computer networks
Thispartofthebookisdedicatedtocomputernetworksfromausersperspective.Nowadaysacomputer
is very likely to belong to some companys network, or to be connected to the Internet via an Internet
provider, and is therefore exposed to all the typical network problems. Without entering into technical
details,thissectionwillexplorethesituationsinwhichanoviceusercanfindhimselfintroublesandhow
hecantrytosurvivedialoguingwithnetworkadministratorsintheirownstrangetechnicallanguage.
3.1.2. Areas
Computernetworksarecommonlydividedintothreecategories:
Local Area Network (LAN or Intranet), usually the network of computers in the same building or
belongingtothesameowner.InsidetheLANevery computeriswellidentifiedandusuallyevery
userisknown.Itisconsideredatrustedarea.
WideAreaNetwork(WANorInternet),whichiseverythingwhichconnectsLANs.Computersand
usersidentificationisveryhardandanonymityispossible.Itisconsideredadangerousarea.
Virtual Private Network (VPN) is a way to recognize a computer outside the LAN as a trusted
computer: the user is identified with a password and his computer, even though connected via
Internet,willbeconsideredaspartoftheLAN,foraslongasitremainsconnected.VPNistypically
requiredtoidentifyportablecomputersconnectedviawirelessconnection.
Page13of32
Dr.PaoloCo
oletti
BasiccComputercoursebookk
Ethernetcablesshaveaspeedof10Mb
bpsandcan thuscarry1
1.25MBeach
hsecond,meaningthat,,
for example,a 600MBmovviecanbetrransferredin
n8minutesffromoneco
omputertoaanotherone,,
sup
pposing no one
o (neitherr users nor computers)
c
is using that network tract for other purposess
durringthetranssfer.
FasttEthernetcaableshaveaspeedof10
00Mbps.
GigaEthernetcableshaveaaspeedof1G
Gbps.
Aw
wirelessnetw
work,acableelessnetworrkwherecomputersuseeradio signaalstocommunicate,hass
usu
uallyaspeedaround308
80Mbps,dependingontthewirelessgeneration.
3.2. Com
mmuniccation
Insideacom
mputernetw
workmanyco
ommunicatio
onprogramssareinstalle
edonIntraneetcomputersstoconnectt
totheInternetoreventointernalcomputers.
3.2.1. We
eb browse
er
Awebbrow
wserisaclientprogramttonavigatettheWWWaandretrieve webpages.
Itrunsdirectlyontheu
userscomputerasaclientandcon
nnectstoextternalweb
servers, ideentified with
h the www. prefix in th
he Internet name,
n
to reetrieve web
pages. The market leader (about 35% of uses according to recent statistics)
s
is
MicrosoftIn
nternetExplo
orer,afreew
wareproprietarysoftwarre.Itsmainccompetitors
are Mozilla Firefox, an open sourceesoftware, Chrome, thee browser frromGoogle
andSafari,tthebrowserforMacOSX,
3.2.2. Ma
ail reader
A mail read
der is a clien
nt program to send and
d retrieve emails. It run
ns directly on the
users computer as a client and connects
c
to a mailservver, a progrram in charrge of
collectinganddispatchiingemails.TThemarketle
eaderisMiccrosoftOutlo
ook,acomm
mercial
proprietarysoftware.Itthasmanyccompetitors,,themostfaamousbeinggtheopensource
MozillaThu
underbird.
Anotherwaaytoreadan
ndsendemaailsisthrougghwebmailssystems,whiicharewebssiteswherettheusercan
n
enter and read his re
eceived emaail and send new ones acting dirrectly on th
he mailservver, withoutt
downloadin
ng them norr using any client. It caan be useful for various reasons: it
i does not require the
e
installation ofamailreaaderprogram
m;oldreceivvedemailsarealwaysavvailableonth
hewebsiteaandcanthuss
be accessed
d fromhome
e, office and
d whiletrave
eling, evenw
withoutape
ersonal lapto
op; themailsserver takess
careofemaailsbackup.B
Butontheotherhanditrequiresacontinuousfaastconnectio
oneventow
writeasingle
e
longemail, whichcanb
becostlyand
d,insomesituations,im
mpossibleandusuallytheeemailspacceislimited..
Themostfaamouswebssite interfacees arethe MicrosoftOu
tlookWebA
M
App,where thewebinterfacelookss
exactly likee Microsoft Outlook, an
nd the Web
bmail interfaace, used and
a
personaalized by mo
ost Internett
providers.
Page14of3
32
Edition7.0(0
E
08/10/2012))
BasicComputercoursebook
Dr.PaoloColetti
Page15of32
Dr.PaoloCo
oletti
BasiccComputercoursebookk
Themostpo
opularsearcchenginesarreGoogle,th
hecurrentmarketleaderr,Yahoo!
andBing.In
nordertoch
hoosetheorderinwhich
hwebpages aredisplayeedtothe
user, search engines use
u scoring system. Thee most famo
ous one is Googles
G
which reliees on the id
dea that a linked page is very important and
d useful;
thereforeawebpagereeceivesasco
oreproportio
onaltothenumberofwe
ebpages
whichputaalinktoit.A
Accordingto recentreseaarches,thep
percentageo
ofuseof
theseengin
nesareGooggle83%,Yaho
oo6%,andB
Bing4%.
Therearem
manytricksto
ospeedupthewebsearrchandarriveequicklytottherightresult:
wheenlookingsimplyforsomeimages, itismoreco
onvenientto
ousethespeecificsearchratherthan
n
tryingtofindwebpagescon
ntainingthem
m.
Page16of3
32
Edition7.0(0
E
08/10/2012))
BasicComputercoursebook
Dr.PaoloColetti
Broadband
Names
Equipment
Effectivespeed
Notes
PSTN(PlainStandard
TelephoneNetwork)
analogical
dialup
telephoneline
modem
56Kbps
Telephoneisbusy
duringconnection
ISDN(IntegratedService
DigitalNetwork)
ISDNtelephoneline
modem
128Kbps
Telephoneisbusy
duringfullspeed
connection
GPRS(GeneralPacketRadio
Service)
GSMcellularphone
100Kbps
ADSL(AsymmetricDigital
SubscriberLine)
telephoneline
modem
500Kbpsinupload
820Mbpsdownload
Speeddependson
subscriptionfee
andnetworktraffic
Internetcable
UMTS(UniversalMobile
TelecommunicationsSystem)
3G
Wireless
WiFi
someGbps
UMTScellularphone
7Mbps
wirelesscard
3080Mbps
antennainlineofsight
modem
40Mbps
WiMax
Speeddepends
stronglyon
environment
Speeddependson
wirelessgeneration
Speeddepends
stronglyon
distance
Manyfastconnections,especiallyADSL,sufferfromnetworkcongestion:toomanyusersareconnectingat
thesametimeandtheInternetprovidersmaincablesarenotabletosupporttheusersmaximumspeed
multiplied bythenumberofusers,andthereforemustreducethepracticalconnectionspeed.Therefore
the maximum speed is often only theoretical and some providers are offering a minimum band
guaranteed:aminimumspeedunderwhichtheconnectionmayneverfall.
Unfortunately, even in technologically advanced countries, there are still many areas where nor ADSL
neitherUMTSarrives,mostlyduetothegeographicconditions(mountains,islandsorlongdesertdistances)
and to the low inhabitants density. This phenomenon is called digital divide: there are people (e.g.
5,000,000ofItalianinhabitants)thatevenwillinglytopaycannotgetabroadbandconnection,and,onthe
otherhand,InternetservicesandespeciallytheWWWiscontinuouslygoingtowardslargesizecontents,
cuttingthesepeopleoff.Inordertoovercomethissocialproblem,WiMaxisspreading,asortofverylong
rangeWirelesswhicharrivesupto10Kmbutworksonlyifthetransmittingandreceivingantennasarein
lineofsightandwhosetheoreticalspeedof70Mbpsdecreaseswithdistancestoabout40Mbps.
Edition7.0(08/10/2012)
Page17of32
Dr.PaoloCo
oletti
BasiccComputercoursebookk
4. Com
mputerr securrity
Being connected to thee Internet means
m
givingg anybody access to thee computer. Despite thee traditionall
noviceuserrsbeliefthaatheistheo
onewhogoe
esoutside,iitisinstead theInternettworldwhicchiscomingg
inside,withallitsbeneffitsanddanggers.Knowingalittlebitofsecurityisssuesisnowadaysnecessaryevento
o
thenonexp
pertuser,toavoidbeingluredintotrrapsoradop
ptingpotentiaallydangerousbehaviorss.
Moreover,ttherecentIttalianlaw19
96/2003onp
privacyissuescontainsin
ntheAllegato
oBtheminimalsecurityy
techniques whichmustbeadoptedbysystemaadministrato
orsbutalsob
bynormalussers.Everyuserwhohass
accesstopeersonaldataprotectedb
byprivacymu
usttakecareeofthesepro
ocedures,inparticular:
4.1. Enccryption
n
Encryption isatextmaskingtechnique,derived
dfrommilitaaryuse,whicchtransform
msinformatio
oninsuchaa
waythatit maybecorrrectlyreadonlywithasp
pecialpassw
wordcalledkeey.Itusestw
wokeys,apublickeyforr
encrypting,usuallyknow
wnonlytoo
onecomputeerorperson,andaprivattekeyfordeecrypting,ussuallyknown
n
byalltheccomputersor people wh
hich legitimately mayreaad the information. Thee size ofthesse keys, and
d
thus the difficulty to be guessed, is
i expressed in bits, with 128 bits being
b
the typically mostt secure size
e
used.
ThetwofolllowingscheemasillustratteshowB,C
CandDcan sendsecret messagesusingAspub
blickey
..
Thesentmessagesare encryptedaandlaterdeccryptedbyA
Awithhisprivatekey
.Incaseso
omebody
interceptsaamessage,h
heisunablettodecryptittcorrectlysin
ncehedoesnothaveAsprivatekeyy
isknownon
nlytoA.Even
nwhensomeebody
,which
h
ussesthepubliickeytodeccrypt,itdoessnotwork.
Thesamep
processhappenswheneverabrowserrtriestosen
ndapassworrdorsecretinformationttoawebsite
e
usingasecu
ureconnection(seesecttion4.5onp
page26):theewebsitetellsthebrowsseritspublickeyandthe
e
browseruseesittoencryyptinformationwhichcaanbereadon
nlybythearrivingwebsitte.
Page18of3
32
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
message 1
Dr.P
PaoloColettii
encrrypt
message 2
encry
ypt
message 3
encry
ypt
G#4hg!
G
decrypt
messaage 1
f
f@d*s
decrypt
messaage 2
^(iw,
decrypt
messaage 3
message 1
encrrypt
message 2
encry
ypt
message 3
encry
ypt
G#4hg!
G
decrypt
Trb:-
f
f@d*s
decrypt
Dr4^\|
9
^(iw,
decrypt
%$&/
L
bleexceptbyytheowner.Inthiscase
e
Anotheranalogoususaggeofencryptionistomaakestoreddaataunreadab
d public keys coincides and are kep
pt secret. The encryptio
on and decrryption proccess is done
e
private and
automatically by a proggram (PDF creation
c
proggrams or compression programs
p
can
n do it, see page 10 forr
instructionsshowtodo it)orevenb
bytheoperaativesystem(iftheentirrediskisenccrypted),wh
hichasksthe
e
passwordto
otheuserevverytime.
secrett
data
enccrypt
D(
*+]dH
decrypt
seccret
daata
secrett
data
enccrypt
D(
*+]dH
decrypt
%)(84
jhgd
ds?
Edition7.0(08/10/2012
2)
Page19of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
4.1.1. Dig
gital signa
ature
Adigitalsiggnature,ore
electronicsiggnature,isan
nencryption
ntechniqueffordocumen
ntswhichgu
uarantees,att
the same tiime, thedoccuments authors identity andthat thedocumeents conten
nt has notbeeen altered..
AccordingtoItalianlaw
w82/2005,digitalsignatureisequivalenttohandw
writtensignaature.
The two fo
ollowing scheemas illustraate instead the usage of
o encryptio
on for digital signature. A wants to
o
publishapubliclyavailaabledocumeentwithits signature.IttissufficienttforAtoen
ncryptitwith
hhisprivate
e
d all the users can try to decrypt it with As public key
. If the result of decryption iss
key
and
somethingreadable,itmeansthattthedocumentwasreallyyencryptedwithAsprivvatekeyandthuscomess
from A; on the other hand,
h
if the result is unreadable, it means thatt encryption was not do
one with Ass
privatekey..Inthisway,,digitalsignaatureusedin
ncombinatio
onwithPEC canguarante
eealsosend
dersidentityy
andemailscontent.
docum
ment
documentt
encrrypt
G#4$h
G
&
&?2y
decrypt
docum
ment
docum
ment
2?=zx:-ki
false
documentt
encrrypt
YY&:[
f
fgj?^d
decrypt
2?=zx:-ki
2?=zx
x:-ki
Whileencryyptiontorecceivesecretm
messagesortohideinformationsimplyrequirestheuserorttheprogram
m
to create itts own coup
ple of privatee and publicc keys (programs, for exxample brow
wsers, do this operation
n
automaticallywithouttheusersinttervention),ffordigitalsiggnatureitisn
notsosimple.Sinceeverrybodymustt
be sure thaat the public key is really the autthors publicc key, digitaal signature requires a certification
n
authorityto
odistribute privateand publickeys. Eventhougghtheoreticaallyasimple passwordissenough,to
o
besurethatttheuserdo
oesnotgivetheprivatep
passwordaround,thece
ertificationauthoritygiveeshim,afterr
havingiden
ntifiedhimth
hroughagovvernmentaliidentitycard
d,apasswordtogetherw
withasmart cardwhich,,
when used
d together, correspond to his privvate key. An
n automaticc signature program takes care off
automaticallyencryptin
ngdocumentts.
Page20of3
32
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
Dr.P
PaoloColettii
nstitutionsarrenowusinggthenationalhealthcarecard
SeveralItalianpublicin
asasmart cardand,ussingitascerrtificationof usersidenttity,offeraccessto
hough they do not offeer yet the digital
d
signatture of
many services, even th
ocuments. The
T service to digitally sign documents is offe
ered by
personal do
private cerrtification co
ompanies, with
w
prices currently affordable
a
also
a
by
private users and with alternative devices succh as OTP deevices (see section
s
4.2.1onpagge22).
4.1.2. Ke
eys expirattion
Themajord
drawbackoffencryption keys isthatt ifacomputeris putto
owork tryinggtoencrypttatextwith
h
insequenceeandthenttodecryptittwiththeco
manyprivatekeys
orrectpublicckey
,w
withinsome
e
yearsitwillmanagetofindtherigh
htprivatekeyywhichlead
dstoacorrecctencryption
ndecryption
n.Therefore,,
each couple of privateepublic keys has a tim
me limited duration,
d
usu
ually some years, after which it iss
necessaryto
ochangetheemandencryptagainallthepastdoccuments.
Documents for which it is importtant to deteermine the exact date of the signaature have moreover a
a
temporalm
marksignedd
directlybyth
hecertificatio
onauthority..
Whocanveerify
Digitalsign
nature
Needskeysfromcertifficationauthority
andpropertools
Everybodyy(withpropeertools)
Verification
nreliability
Sureforso
omeyears
Temporalduration
Someyearrs(canberen
newed)
Masssignattures
Someseco
ondsforalldocuments (w
with
propertoo
ols)
mesecondsp
perdocumen
nt
Som
Datereliabiility
Objectiveiiftemporalm
mark
Baseedonotherssubjectiveellements
(pap
persandinkksage)
Whocansiggn
Han
ndwrittensiggnature
Everrybodyinstantly
Handwritinganaalysts
Subjjectiveindubiouscases,notime
limitt
Untiilotherreliablesignatureesare
avaiilable
4.2. Passswordss
OntheIntraanettheuseerisidentifieedonlybyhisusername,,knowntoeeverybody,andhispassw
word,known
n
onlytohim.Thepasswordiswhat makesanun
nknownperssonanauthe
enticateduseer,withallh
hisprivilegess
and his ideentitys respo
onsibilities. If
I somebodyy else uses the
t right useers passworrd, for the Intranet thiss
otherperso
onisexactly theuser.Law196/2003
3explicitlyfo
orbidsusers fromgiving theirpasswo
ordtootherr
users, even
n when theyy are absentt from work. These are some, often
n underestim
mated, maliggn actions a
a
passwordsthiefcando
o:
steaalpersonalin
nformation:thethiefcan
nreadtheussersemailsaandpersonaalinformation;
steaal privacy prrotected datta: the thieff can gain acccess to data about oth
her people protected
p
byy
privvacy,orread
demailsreceeivedfromotherpeople..Thelegalre
esponsibleofthisprivacyyviolationiss
thethiefaswellastheuserrwhodidnottprotectoth
herpeoplesdata;
steaal money: the
t thief can
n find the users
u
bank account nu
umbers and passwords, sometimess
direectlyfromth
heusersweb
bbrowsersh
history;
Edition7.0(08/10/2012
2)
Page21of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
deleeteandmod
difydata:thethiefcand
deleteuserssimportant data,oreveenworseheecanmodifyy
these data with
hout the useers knowled
dge (bank nu
umbers, friends email addresses,
a
deegree thesiss
con
ntent,addilleegalpicturess);
steaalidentity:forthecomp
puterthethiefisnowth
heuser,and thereforehecanactto theoutside
e
worrld exactly as
a if it weree the user, for
f example answering to emails, subscribing
s
tto websites,,
withdrawingfro
omexams;
starrt illegal acttivities: anyb
body who wants
w
to starrt an illegal Internet acttivity will ob
bviously use
e
som
mebodyelseidentity,sohewillnotgetintotroub
bleswhenth
heactivityisd
discovered.
Thereforeittisabsolute
elynecessaryytokeeppasswordssecret.
However,th
herearesom
mewaystod
discovereasypasswordssby
trial: speciaal automaticc programs are
a able to try one milllion
passwords each seco
ond, and they
t
usuallyy start tryying
combinations of words and numbeers (the com
mplete set off all
Italian,Germ
manandEngglishwords canbetriedinlessthan
n30
seconds). Law 196/200
03 explicitly requires thaat password do
havesomefeatures:
chaangethepassswordoften,,atleasteve
erysixmonth
hs;
avo
oidwordsrelatedtoyourrself,suchassnames,birtthdates,birtthplacesand
daddresses;
useeminimum8
8characters.
Moreover,o
othergoodp
proceduresaare:
useeaspassword
dagoodmixxofnumberrs,strangech
haracters,sm
mallcapsand
dcapitalletteers,avoidingg
anyycommonword(otherpeoplesnamesorwordswhichcanb
befoundinadictionary);
usee different passwords
p
fo
or different purposes. Unfortunateely every weebsite asks the user to
o
registerwitha passwordan
nduserswho
ousealwayssthesamep
passwordareegivingitaw
waytoeveryy
web
bsite they register, even untrustwo
orthy ones. It is a good
d procedure to have at least three
e
passswords:oneeforimportaantuse(bankkaccount),aasecondone
eforeverydaayuseandalastoneforr
unimportantusse(registeringtounknow
wnwebsiteso
ortoserviceesthatwillno
otbeusedanymore).
bew
wareofpassw
wordsstored
dinprogram
ms:mailread
ders,InternettExploreran
ndmanyotherprogramss
storre your passsword masked with assterisks. Theey
seem to be un
nreadable, but
b compute
er experts caan
reveeal them insstantly. Storre passwords in program
ms
onlyyifthatcom
mputerhasasingleuser (i.e.thehom
me
com
mputerorthepersonallaaptop)orifaaccesstothaatcomputerisonausern
namebasis,butneverin
n
pub
blicplacessu
uchasanInteernetcaf.
4.2.1. On
ne Time Pa
assword de
evice
An OTP device is a modern password system which consists
c
of a
a
very sm
mall electronic device which displayys a password changingg
every feew seconds. The system
m is perfectlyy timealigned with the
e
OTPdevviceandeachpassword isaccepted onlyifenteredinthose
e
seconds.Therefore, evenifapaasswordisinterceptedorguessed,itt
expiresafteerafewseco
onds.
Obviouslythissystemw
worksincom
mbinationwitthanothersttandardpassswordthattheusermusstmemorize,,
toavoidthaatthephysiccallossortheeftoftheOTTPdeviceresultsinacom
mpletelysecu
uritybreach.
Page22of3
32
Edition7.0(0
E
08/10/2012))
BasicComputercoursebook
Dr.PaoloColetti
4.3. Viruses
FromtheInternetmanyunauthorizedconnectionattemptsarrive.Someofthesearemistakenlyauthorized
and manage to reach the Intranet or at least to come in contact with programs which are behind the
firewall.Iftheseconnectionscarry malignintentions, usuallytheir aim istoexploreandusethe Intranet
computers,todestroyIntranetdataortostopsomeIntranetservices(whichisadangerousattackifthese
servicesaremanagingstocktradesortelephonecalls).Defenseagainstthesekindsofattacksisincharge
systemadministrators.
While normal external attacks do not involve normal users, the virus is a special attack which arrives
directlyontheuserscomputerandmustbepreventedandstoppedbyhim.Thevirusisalittleprogram
whichhasthisnamebecauseitslifecycleisthesameofabiologicalorganism:surviveandduplicate.
1. Itarrivesonthecomputerthroughemailattachments,downloadedfiles,CDsandfloppydisksor
directlyfromtheIntranet.Itisoftenhiddeninsideothergoodfilesorprograms,whicharecalled
infected.
2. Assoonastheusermistakenlyrunsit(oftentryingtorunthegoodprogramortoopenthegood
file),thevirusordersthecomputertorunitselfeverytimethecomputeristurnedon,thusassuring
itssurvival.
3. Itstartsduplicatingitself,infectingotherfiles,CDsandfloppydisks,andtryingtosenditselfaround
byemailorontheIntranet.
4. Mostvirusesareprogrammedtododamagetothecomputerandtotheuser,alteringordeleting
files,sendingemailswithuserspersonaldata,preventingfirewallsandantivirusesfromrunning,or
turningthecomputeroff.Novirusesareknowntobeabletodamagehardware.
Manynamesareusedforvirusestypesaccordingtotheirdifferentbehaviors.
trojanhorseisaviruswhichlookslikeagoodprogramand,whendownloadedandrunbytheuser,
itperformstheuserswantedtaskbutatthesametimedoesotheractions;
keyloggerisaviruswhichrecordskeyboardsactivityandthensendsthekeystrokestoitscreator,
mostlytogetuserspasswords;
backdoorisaviruswhichopensaportonthecomputertoletexternalusersin;
adwareisaviruswhichdisplaysadvertisement;
spyware is a virus which spies users activity to get passwords or to target the user with specific
advertisement;
dialerisaviruswhichdialsexpensivenumbersusingthePSTNmodem.
These types are not exclusive: for example a Trojan horse which is at the same time a spyware and an
adware.
Aninfectedcomputercanberecognizedbysomesymptoms.Thesearethemostfrequentones:
when the computer is turned on, unwanted programs start, advertisement appears, and the
desktoppresentssomenewbarsorfeatureswhichwerenotpresentnorinstalledbefore;
thecomputerstartsveryslowlyandunknownprogramsgivestrangeoperatingsystemerrors;
commercialorpornographicwebpagesappearonthewebbrowserwithouttheusersconsent;
theanalogicalmodemmakestypicalconnectionnoisesevenwhenthecomputerisnotconnected
or the operating system asks the user to stop the current connection and start a new one to a
strangetelephonenumber;
theTaskManagerwindow(seepage5)presentsunknownprograms.
Edition7.0(08/10/2012)
Page23of32
Dr.PaoloColetti
BasicComputercoursebook
Most of the time, a responsible users behavior it the best weapon against viruses: it protects him from
getting viruses, helps him removing them and prevents him from diffusing them. Responsible behavior
means:
neveropendownloadedfilesandemailattachments,especiallywhentheycomefromafriendwith
a text such as please open it, urgent!, since simulating to be a users friend is a typical virus
tactics.Toopenthesefiles,savethemonthedesktop,checkthemwithanantivirusandthenopen
them;
donotinsertinyourcomputerCDs,DVDsandUSBpendrivescomingfromotherpeopleorwhich
were inserted inothercomputers, unlessyouhave an antivirus running or unlessyou scanthem
immediatelywithanantivirus;
avoid visiting strange websites, especially pornographic or hackers website, or websites which
openalotofpopupwindows;
have an antivirus always running or at least run an updated antivirus on your whole hard disks
everyweek(whileItalianlawcurrentlyprescribesminimumevery6months);keepyourantivirus
alwaysuptodate:morethan50newvirusesappeareveryweek;
keep communication programs and Microsoft products up to date. Microsoft and most software
companiesofferfreeupdatesandautomaticupdatingtools.
To check the computer for viruses and to try to remove viruses from the computer, the user can run a
specialprogramcalledantivirus.Theantivirusbasicallyhasthreepossibledifferentactions:
itcanscanallthestoragedevices(harddisks,thefloppydiskinsidethecomputer,theCDorDVD
insidethereader)forviruses.Ifavirusisfound,ittriestoremoveitandtorepairdamagedfiles.
Somefilescanbeunrecoverable.Completedevicesscanningtakesusuallysomehours;
itcanscanasinglefileoranentiredirectoryforviruses.Ifthereisaninfectedfile,ittriestodelete
thevirusandrepairit.Somefilescanbeunrecoverable.Singlefilescanningtakessomeseconds;
it can be always running. In this case, whenever a virus or a suspect file is run, the antivirus
preventsitfromrunningandwarnstheuser.
A lot of antivirus programs, free and commercial, exist. Their most important feature is obviously the
possibilitytobeconstantlyupdatedthroughtheInternet.
4.4. Emails
4.4.1. Attachments
Forviruses,emailattachmentsareafirstclasswayoftraveling,sincetheyareveryoftenopenedbyusers
withoutanyprecaution.Sometimesviruseshideinsidefileswhichwerereallysentbythesender,unaware
of having an infected computer.Other times avirustakescontrolof the mail readerprogram and sends
itselftothewholeaddressbook,counterfeitingthesenderaddress(oftenusinganaddresstakenfromthe
addressbook)inordertoavoidthattherealinfectedcomputerbeidentifiedandtogainthethrustofthe
receiver,andwritingintheemailtextsmartsentencespretendingtobearegularfriendofthereceiver.The
arrivalofthiskindofemailusuallycreateshavoc,sincethereceiverissurethatthefakesenderhasavirus,
whiletheoriginalinfectedcomputerisanotherone.
Thebasicruleisneveropenanyattachmentfromthemailreaderprogram.Savetheattachedfilesonthe
desktop and run an antivirus program to check these files before opening them. Even when the email
comesfromafriend:hecannotknowthattohavegotavirus,orhecannotbetherealsender.
Page24of32
Edition7.0(08/10/2012)
BasicComp
putercoursebook
Dr.P
PaoloColettii
4.4.2. Spa
am
Spammessagesareunssolicitedunw
wantedbulk emails.Theyyareunsoliccited,meaningthatthe userdidnott
asktoreceiivethem,theeyareunwanted,meaniingthattheuserdidnottwanttorecceivethem,aandtheyare
e
bulk,meaniingthattheyyaresenttomillionsofaaddresses.Th
heyareused
dmainlyforffourdifferentpurposes:
Edition7.0(08/10/2012
2)
Page25of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
Thebestbeehaviortoad
doptagainst spammessaagesistoign
norethem.C
Complaining isworthlesss,sincetheirr
senderaddressisalwayysfalse;clickkingontheirlinks,especiallyiftheyssuggesttoclicktheretoberemoved
d
from their lists, usuallyy has the only effect of letting the sspammer know that the
e users addrress is reallyy
readbysom
meone.
The best w
ways to deffend from spammers
s
a to avoid
are
d giving thee users real email add
dress duringg
registration
ninforums,n
newsgroupsandunnecessarywebsittes,andtoavvoidpublishingitontheepersonalorr
thecompan
nyswebsite.Thesearettheplacesw
wherespamm
mersgettheirmillionsoffaddresses. Ifitisreallyy
necessary,aagoodstrateegyistohaveanalternattiveemailad
ddressforregistrations,w
whichwillreeceiveallthe
e
spam.
Thereareantispampro
ograms,whicchputthesu
upposedspammessagessinaseparattejunkemaiilfolder,butt
theyareno
otcompletelyyreliableandsometimestheytrash evengood messages.Theseprogramsrelieson
n
analysis of the emailss content and on blackklists, which
h contains the Internet mailserverss which are
e
supposed to let spamm
mers send th
heir emails; it may happ
pen that a good
g
mailserrver ends up
p into those
e
blacklistsan
ndthatemailssendfrom
mcustomerssoremployeeesofthatInternetsite aremarkedasspambyy
othersites.
4.5. Nav
vigation
n
Navigation isthesecondmostdanggerousIntern
netactivity. Ithasmore orlessthessamedangerrsasemails::
theusersccomputercangetvirusesifhedoes notrunan antivirusbeforeopeningdownloadeedfiles,and
d
theusercanbeluredin
ntophishinggwebsitesif hedoesnotttypeperso
onallythebanksaddresssintheweb
b
browser.M
Moreover,theecomputerccangetvirussesevenwhensimplyvisitingsome websites,an
ndtherefore
e
twogoodssuggestionsaaretoavoid visitingstraange(pornoggraphicwebsites,websitteswithalo
otofpopup
p
windows an
nd illegal websites) or untrustwortthy websitess and to kee
ep Internet Explorer an
nd Windowss
operatingsyystemalwayysuptodate.
Theothersecurityprob
blemwhilenavigatingisd
datainterception.When
nconnectingtoawebsitee,theuserss
data travelss long distances, passin
ng through a
a large number of comp
puters (to connect from
m unibz.it to
o
Page26of3
32
Edition7.0(0
E
08/10/2012))
BasicComp
putercoursebook
Dr.P
PaoloColettii
ua,Milanan
ndBolognap
passingthrou
ughatleast 13computeers).Dataon
n
www.athesia.itthedataagotoPadu
hout any pro
otection, anyy computer administrato
or can read them. Thereefore, when
n
the Interneet travel with
sendingpassswordsandotherprivattedatatoa website,theeusershouldtakespeciialcarethat theaddresss
intheaddreessbarstarttswithhttpss://(instead ofhttp://)aandonsomeebrowsera lockiconap
ppearsinthe
e
lower rightt part of thee windows, while on others
o
the address bar becomes grreen with a lock: these
e
indicationsmeanthatth
heconnectio
onissecure((SSL)sincedataaretraveelingencryptted.BewarethattheSSLL
connection guarantees only that data
d
are nott intercepted
d and that the
t user is connected tto the same
e
websitefromwhichhestartedthecconnection,w
whileitdoessnotguaranteedthisweebsiteistherrightone.
4.6.1. Firrewall
Often proggrams securrity breachees
oncediscovveredneedssomedaysto
be fixed and somebody can take
benefit of them
t
in thiss short timee,
before the security update is
i
installed on the users computerr.
Therefore o
on every LA
AN, usually in
Edition7.0(08/10/2012
2)
Page27of32
2
Dr.PaoloColetti
BasicComputercoursebook
the point where the LAN connects to the Internet, or more often on every computer a special program
calledfirewallisrunning. The firewallexaminesalltheincomingandoutgoingtraffic,usingthe following
analysistechniques:
whichinternalprogramisoriginating/receivingthetraffic,
from/towhichexternaladdressisthetrafficoriginated/directed,
whatamountoftrafficispassingfrom/tothesameprogramto/fromthesameexternaladdress,
whichkindofdataarepassing.
Making an analysis of these data clearly slows down the connection but lets the firewall stop potential
unauthorizedconnection,puttingtheminawaitstateuntiltheusersgiveshisapprovalordenial.
WindowsSevenoperatingsystemcomeswithafirewallpreinstalled,whichletstheusercustomizewhich
kind of programs are allowed to make or receive connections and determine rules to approve or deny
automaticallyconnections.
4.7. Backup
Backup is the process of copying important data to another location to prevent their loss. Sometimes
programsandevenentireoperatingsystemsarecopied,tobeabletoimmediatelycontinueworkingeven
whenacomputerbreaks.Therearethreeverygoodreasonstodoregularbackups:
againsttheuser,whocanaccidentallydeletesomefilesorwhocanmodifyfilesandthenchange
hismind.Havingarecentbackuphandycanoftensavehoursofwork;
against thesystem, whichcan suddenly breakdue to hardware or software problems. Evenhard
diskstendtobeunreliableaftersomeyearsofcontinuousactivity.Arecentbackupsavestheuser
fromredoingalltheworkofthepreviousmonths;
againstvirusesandotherusers,whichcandeleteandalterfiles:abackupcansaveausercoming
backfromvacations.
Usuallytheoperatingsystemsandtheprogramsbackuparedonebysystemadministrators:law196/2003
explicitlyrequiresaninstantaneousbackupforallsensitivedataandthatdataarerestoredwithin7daysin
caseofloss.However,therearesomefileswhichshouldbetakeninchargebytheuserhimself:
personally created data files, including all documents and images created by the user, and any
otherfilewhichisaresultoftheuserspersonalwork;
theaddressbookandtheemails(mailreadersusuallyofferawaytosavethemintofilestobeused
forbackup),andforstrongnavigatorsalsowebbrowsersconfiguration;
some programs require a lot of configuration and store their configuration in configuration files,
whichareusuallyintheprogramsdirectory;
allthestuffwhichisdifficulttofindagain,suchasdocumentsfromotherpeopleordownloaded
fromforgottenwebsites.
Theplacewherethefilesarecopieddeterminesthereliabilityofthebackup.Itshouldbea large,cheap
andfaststoragedevice.Itshouldalsobehandy,sincethetypicalproblemwithbackupisthattheuserdoes
nottakestimetodoitregularlyand,whenthebackupistooold,itisworthless.Forhomeorsimpleoffice
users,theFridaymorningbackupisagoodtimingsolution.Goodstoragedevicestobeusedare:
asecondharddisk,usedonlyforbackup,whichisveryfastandverylargeandalwaysreadytobe
used;
Page28of32
Edition7.0(08/10/2012)
BasicComp
putercoursebook
Dr.P
PaoloColettii
onlinebackupssystems,wheereusersdaataareuploaadedandareereadyfrom
manywhere intheworld
d
(givven a broadband conneection), with
h Dropbox, Mozy, Sugarsync being the most famous
f
and
d
offeeringsomeG
GBofspacefforfree;
foursetsofrew
writableDVDss,tobeused
dincircle(on
neforeachm
monthsweek,forexamp
ple);
USB
Bpendrive,ttobeusedo
onlyinemerggencywhennootherapp
propriatesto
oragedeviceisavailable;
bigcompaniesu
usuallyhavespecialtapeedevicesforbackups.
4.7.1. RA
AID
Averypopu
ularbackupssolutionisR
RAID(Redund
dantArrayofIndepende
entDisks)tecchnology,wh
hichconsistss
of several iidentical harrd disks. There are different types of RAID implementatio
ons, which vary
v
a lot in
n
functionalittiesandsecu
urity.
JBOD (Just a Bunch Off Disks) is a primitive fo
orm of RAID in
which all th
he disks are
e seen by th
he user simp
ply as disks on
which theyy can write as usual. The
T
advantagge is that the
t
available sp
pace is the sum of the space of all the disks,
howeverth
hereisnoforrmofdatap
protection:iffadiskbreaks,
anythingon
nthatdiskislost.
disk 1
file
userd
decides
disk 2
RAID0usestwoidenticaaldiskswhichareseenb
bytheuserasa
singledisk. Everytimeh
hewritesaffile,thefirstpartoftheffile
is written on
o the first disk while tthe second on
o the seco
ond
this. This sttrategy has the big advantage that writing speeed
doubles,wiithatotalavvailablespaccewhichistthesumoftthe
size of the two disks. But
B if a disk breaks, all the
t content of
bothdisksislost,sincettheuserwilllosehalfofallthefiles.
fille
parrt1
file
f
paart2
disk 1
disk 2
Edition7.0(08/10/2012
2)
disk 1
filee
disk 2
Page29of32
2
Dr.PaoloCo
oletti
BasiccComputercoursebookk
RAID10 is an
a overlay of RAID1 and
d RAID0. It uses
u
four disks,
writing filess on the firsst and on the third as iff they were on
RAID0 and then dupliccating their content
c
on disks two and
four.Thisteechniquehasthespeed ofRAID0,th
hereliability of
RAID1, but gives the user a space equivalent to the sum of
twodiskssizes,whilefo
ourdisksareeffectivelyu
used.
file
f
paart1
disk 1
disk 3
file
paart2
disk 2
disk 4
Page30of3
32
Edition7.0(0
E
08/10/2012))
BasicComputercoursebook
Dr.PaoloColetti
Index
.avi,10
.bat,10
.bmp,10
.com,10
.csv,10
.doc,10,16
.exe,10
.gif,10
.htm,11
.html,11
.jpeg,10
.jpg,10
.mov,10
.mp3,11
.mpeg,10
.mpg,10
.pdf,10,16
.ppt,10
.rtf,10
.txt,10
.wav,11
.xls,10
.zip,10
\ubz01fst,11
128bits,18
3G,17
absolutepath,8
Acrobat,10
address,8,24,26
addressbook,28
Administrators,11
ADSL,17
ADSLmodem,17
advancedsearch,16
advertisement,25
adware,23
ALT,6
AltaVista,16
ALTGR,6
analogical,17,23
AND,16
antispam,25,26
antivirus,18,23,24,26
ARROWS,7
asterisks,22
AsymmetricDigital
SubscriberLine,17
attachment,24
audio,11
authenticateduser,21
authentication,18
backdoor,23
BACKSPACE,7
backup,3,18,28
bank,25,26
BILD,6
biometric,18
bit,2
bitspersecond,13
blacklist,26
Edition7.0(08/10/2012)
doubleclick,8
download,17
downloadedfile,26
DVD,3,24,29
DVDreader,3
DVDwriter,3
edition,4
EINFG,6
electronicsignature,20
email,9,13,22,23,24,
25,26,28
emailattachment,23,24
encrypted,27
encryption,9,18,20,21
END,6
ENDE,6
ENTER,7
Enterprise,5
ENTF,6
esternalharddisk,2
Ethernet,14
Excel,10
execute,11
Explorer,10,11
extension,10
extract,9
F1,6
F12,6
FastEthernet,14
file,7,24,28
filesystem,7
filetype,8,10
FINE,6
firewall,18,23,28
floppydisk,7,23,24
folder,7
FolderOptions,7
forum,26
fraud,25
freeware,3,14
fullcontrol,11
Gbps,14
GeneralPacketRadio
Service,17
GigaEthernet,14
Gigabyte,2
GNUPublicLicense,4
Google,16
GPRS,17
groupofusers,11
GSMcellularphone,17
harddisk,2,7,11,24,28
hardware,23,28
Hideextensions,7
hierarchical,7
HOME,6
HomePremium,5
http,27
https,27
icon,7
bps,13
broadband,17
browser,18
bulk,25
byte,2
cables,13
CANC,6
CAPSLOCK,7
CD,3,23,24
CDreader,3,7
CDwriter,3
certificationauthority,
20,21
chainletter,25
chat,13
Chrome,14
client,13
closedproprietary
format,4
commercial,3
communicationprogram,
14,15,24
compress,9
compressedfile,10
computernetwork,13
configurationfile,28
congestion,17
connection,23
Controlpanel,6
copy,8,9
copyleft,4
counterfeit,24
crawler,15
createanewdirectory,9
createshortcut,9
CTRL,6,9
CTRL+ALT+DEL,5
CTRL+C,9
CTRL+SHIFT+ESC,5
CTRL+V,9
CTRL+X,9
curvedarrow,8
cut,9
dangerousarea,13
data,3,28
datainterception,26
DEL,6,9
delete,9
DenialofService,27
desktop,23,24
Details,8
dialer,23
dialup,17
digitaldivide,17
digitalsignature,20
directory,7,24,28
distribution,4
document,10,28
documents,28
DoS,27
identity,21,22
image,10,17,28
INS,6
IntegratedServiceDigital
Network,17
interaction,13
interception,26
internalharddisk,2
Internet,13,14,17,18,
26
Internetconnection,17
Internetprovider,14
Intranet,13,14,21,23
INVIO,7
ISDN,17
ISDNmodem,17
ISDNtelephone,17
IZArc,9,10
JBOD,29
junk,26
Kbps,17
key,18
keylogger,23
keyboard,6
keyword,15,16
Kilobyte,2
LAN,11,13
language,6
law196/2003,18,21,22,
28
law82/2005,15,20
link,8,9,15,26
Linux,3
listcontent,11
localareanetwork,13
lockicon,27
locking,5
locks,11
Lycos,16
MacOSX,3,14
Macintosh,3
mailreader,14,24,28
mailserver,14
maximumspeed,17
Mbps,14,17
MediaPlayer,10,11
Megabyte,2
memorycard,3
memorystick,3
MicrosoftInternet
Explorer,14,22,26
MicrosoftOutlook,14
MicrosoftOutlookWeb
App,14
MicrosoftWindows,3,5,
26
MicrosoftWindows7,3,
5
MicrosoftWindows
Seven,28
Page31of32
Dr.PaoloColetti
MicrosoftWindows
Vista,3,5
MicrosoftWindowsXP,
3,5
minimumband,17
minimumspeed,17
modem,17,23
modify,11
Mooreslaw,2
motherboard,3
move,9
MozillaFirefox,14
MozillaThunderbird,14
mp3players,3
multilanguage,6
navigation,26
networkfolder,11
networktraffic,17
newdirectory,9
newsgroup,26
Notepad,10
OfficePictureManager,
10
OneTimePassword,22
open,8,24,26
openformat,4
openproprietaryformat,
4
opensource,4
operatingsystem,3,23,
26,27,28
OR,16
OTP,21,22
overquota,12
owner,11
PAG,6
Paint,10
password,18,20,21,22,
26,27
paste,9
PEC,15,20
permission,18
permissions,11
personaldata,18
PG,6
phishing,26
photocameras,3
PictureFaxViewer,10
PlainStandard
TelephoneNetwork,
17
plussymbol,9
POS1,6
PostaElettronica
Certificata,15
PowerArchiver,10
Powerpoint,10
printer,13
privacy,18
private,4
privatekey,18,20,21
processor,3
Professional,5
program,3,10,22,23,
28
proprietary,4,14
proprietaryformat,4
Proprieties,11
provacy,18,21
PSTN,17
publickey,18,20,21
quotationmark,16
RAID,29
RAID0,29
RAID1,29
RAID10,30
RAID5,30
read,11
readandexecute,11
RegionalandLanguage
Options,6
registration,26
rename,9
resources,13
roaminguserprofile,12
root,7
BasicComputercoursebook
run,8,24
Safari,14
save,24
scoring,16
searchengine,15,16
secure,18,27
security,18
Security,11
sender,24
senderaddress,24,26
sensitivedata,18,28
server,13
servicepack,5
shareware,3
sheet,10
SHIFT,7,9
shortcut,8
Skype,15
smartcard,20,21
software,3,28
solidstatedisk,2
spam,25,26
spammessage,25
speed,13
spyware,23
SSD,2
SSL,27
storagedevice,24,28
STRG,6
subdirectories,7
TAB,7
tapedevice,29
TaskManager,23
telephone,17
temporalmark,21
terminal,13
text,10
trashcan,9
tree,7
trojanhorse,23
trustedarea,13
Ultimate,5
UMTS,17
UMTScellularphone,17
UniversalMobile
Telecommunications
System,17
Unix,3
unsolicited,25
unwanted,25
upload,17
USBpendrive,3,29
username,18,21,22
users,11
versionnumber,4
video,10
VirtualPrivateNetwork,
13
virus,23,24,26,28
VoiceoverIP,15
VoIP,15
VPN,13
WAN,13
webbrowser,14,23,26,
28
webpage,11,14,15,16,
23
webmail,14
webserver,14
website,15,18,24,26,
27,28
WideAreaNetwork,13
WiFi,17
WiMax,17
WinAmp,11
WinZip,9,10
wireless,13,14,17
wirelesscard,17
Word,10
write,11
WWW,14,15,17,25
Yahoo!,16
ziparchive,9
zombie,27
Page32of32
Edition7.0(08/10/2012)