home glossary index



Computer Networking

Author Additions for Chapter 4


Websites that Expand on the Knowledge in Chapter 4


Go to the top of the page

Browser Review

There are other browsers besides Internet Explorer. This page has reviews of 5 browsers, all are free.

Firefox. If you use Firefox, see this site. "Protect Your Laptop With Seven Must-Have Firefox Add-Ons" by By Paul Rubens

Browser Helps

10 Tips to Make Your Browser Less Annoying. Could also be titled, tips to make it easier to browse. Includes key presses to do many things with any browser, links to a program to simplify printing a page, and finding a missing tool bar among others. If you want to save time, worth a visit!

Cookies (Web - regular)

FAQ's about cookies. Answers many questions including how to delete a cookie

How Internet Cookies Work. An excellent article that describes how cookies work, what they do and what they don't do.

What you need to know about cookies. A good description of cookies, along with information on how to get rid of them.

Domain Names

List of Domain Names. Provides links to information about each domain name including countries.

Go to the top of the page


How to set up Microsoft Outlook 2010 (2 starts) and Mozilla Thunderbird (free - 5 stars), as well as how to download either one, price and ratings.

A good guide to the many features of email.
http://www.onlinehelp-uk.com/guide/email.htm and http://dawn.thot.net/cd/1.html

Deciphering Internet E-mail: A Quick Reference. A Webopedia's "Do You Know?" series that describes how email work and defines and discusses SMAP, POP and IMAP email protocols. Good information.

History of the @ Sign. A fun piece from Webopedia's "Did You Know?"Series that gives the history of the @sign in computers, but also before computers. Includes a list of many countries with what the @ sign means there.

Why Emails Bounce. From Webopedia's "Did you know?" series, this article describes some of the background workings in email.

How to back up and to restore Outlook Express data. Detailed how to instructions from Microsoft.

Email Abbreviations, Smileys & Emoticons

Description of smileys and list of some common ones.

FAQs about Smileys including their origin.

Go to the top of the page

Email Etiquette

The online complete book of net etiquette. You can choose which section to visit using the table of contents. Contains good advice to assist in using the Internet professionally. Some of the many topics are respecting bandwidth, anatomy of an email message, and help for using discussion groups. Provides a good reference.

101 Email tips in bullet format that covers all aspects of emailing including attachments and Blackberries, minus information about the use of an email signature (an important item!)

Email Etiquette. Good tips and do's and don't for email for multiple reasons.

A site that explains how to send effective email replies. It discusses why email etiquette is necessary, lists email etiquette rules, and explains how to enforce these rules by creating a company email policy.

Information about why email etiquette is important.


Two very helpful sites in understanding this concept.

Differentiate between extranet and intranet with links to more information about both.

Go to the top of the page



A page from the Internet Society that presents the history of the Internet from many different viewpoints.

A history of the Internet tied in with other communication breakthroughs. Interesting.

World Wide Web

A brief history of the World Wide Web (WWW) and the dream that engendered it by its creator, Tim Berners Lee.

History of the Web from the World Wide Web Society presented in a list format with dates.


Two sites that describe intranets.

Differentiate between extranet and intranet with links to more information about both.

Go to the top of the page


Glossary of Internet Terms.

What type of network do you need? Despite it's age, the information about the various types of computer networking available is still valid.

IP Addresses (The numbers behind Internet Addresses)

Webopedia description of IP addresses with links to many good articles.


Fiber Optics: A tutorials on the Basics of fiber optic cable. Written in easily understood words.

What Makes a Virtual Private Network Private? From Webopedia. An excellent description of the topic.

Troubleshooting Network Connectivity: Talking Tech: Troubleshooting Network Connectivity. Some good trouble shooting tips for locating any network problems.

How to Use Wireless Routers With Satellite Internet. Excellent information.

Go to the top of the page

Scams and other Internet harassment (Identity Theft)

Clickjacking or forcing you to do what you don't want to do. This page defines it and provides links for help.

ID Theft. Information on what to do if you suspect that your ID has been stolen. http://www.ftc.gov/bcp/edu/microsites/idtheft/

OnGuardOnline.gov. Suggestions for keeping safe online.

This commercial site provides summary information about various online rip-offs including email scams, identity theft, money transfer and online dating scams, and mystery shopping.

To keep up on the latest social media threats search for either "Twitter virus" or "Facebook virus," "Myspace virus," etc.

Security Software That Isn't

Beal, V. (2009, April 24) Rogue Anti-Virus Software Explained. Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you're prompted to buy the full-version of the anti virus software (which is really rogue anti virus software)

Be on guard against security products that are actually malware. http://www.practicallynetworked.com/security/be_on_guard_against_insecurity_software.htm


Great place to start learning about the WWW. Offers an overview of the web, hints about search engines and many more things.
http://www.imagescape.com/he lpweb/www/www.html

Tutorial designed specifically for nurses on using the Internet.

Test Speed of your Internet Connection

Speednet. Click on the location nearest you on the map and select city. Test of download, then upload will start.

Go to the top of the page

Usability in Web pages

From the usability guru, Jakob Neilsen, the Top 10 Information Architecture Mistakes

A chapter from the John Krug book on Web design, Don't Make Me Think. Great book too.

Research-based Web Design & Usability Guidelines. A very complete list of organized links to information on many aspects of usability including, but not limited to topics such as design process, reading, content organization, and accessibility.

Step-by-Step Usability Guide. The primary government source for information on usability. There are tools for creating Web sites and making them more usable and useful. Guidelines are research based.

Ten Usability Heuristics (Jacob Nielsen). Listed and described are ten general principles for user interface design.

Usability First. Although theoretically designed primarily for Web Site designers, this is valuable information for any software designer. Best information is found by scrolling down and clicking on "Introduction to Usability" and "Glossary."

Go to the top of the page

Virtual Private Net word (VPN)

What Makes a Virtual Private Network Private? From Webopedia. An excellent description of the topic including intranets and extranets.


Inside Spyware: A Guide to Finding, Removing and Preventing Online Pests. This article and its links discuss another hazard, spyware, with the Internet as well as information for both detecting and avoiding spyware.

Virus Encyclopedia. Just like a real encyclopedia except this one contains information about viruses, worms, trojan horses and all types of computer pests. Has a glossary too.

Trojans, viruses, worms: How does malware get on PCs and Macs? (2011). An excellent discussion with links to many other useful resources.


See also Safe Computing on this site.

Go to the top of the page

Wireless Networks

Merrill, Molly (May 20, 2009) Study identifies top five wireless challenges in healthcare facilities. Describes each challenge.


Websites from the Text in Chapter 4

Page 58 http://www.microsoft.com/athome/organization/wirelesssetup.aspx

Page 58 http://www.cnet.com/1990-7390_1-6213817-3.html

Page 58 http://download.cnet.com/FileZilla/3000-2160_4-10308966.html?tag=mncol

Page 58 http://download.cnet.com/Ipswitch-WS-FTPHome/3000-2160_4-10018456.html?tag=mncol

Page 67 http://dlthede.net/Informatics/Informatics.html

Page 68 http://edition.cnn.com/video/#/video/us/2009/03/02/barnett.facebook.

Page 72 http://www.trendmicro.com/vinfo/hoaxes/default.asp Does not yield approriate information.

Page 72 http://urbanlegends.about.com/cs/nethoaxes/ht/emailhoax.htm

Page 73 http://www.snopes.com/

Go to the top of the page

Websites From the Reference List in Chapter 4

Barnett, E. (2009, March 10). New Facebook worm threat. Retrieved March 28, 2010, from http://edition.cnn.com/video/#/video/us/2009/03/02/barnett.facebook.worm.cnn?iref=videosearch

Beal, V. (2004, November 11). The difference between adware & spyware. Retrieved March 26, 2010, from http://www.webopedia.com/DidYouKnow/Internet/2004/spyware.asp

Beal, V. (2005, June 3). Cable vs. DSL. Retrieved March 26, 2010, from http://webopedia.com/DidYouKnow/Internet/2005/cable_vs_dsl.asp

Beal, V. (2008, September 4). What are cookies and what do cookies do? Retrieved March 26, 2010, from http://www.webopedia.com/DidYouKnow/Internet/2007/all_about_ cookies.asp

Beal, V. (2009, September 18). What is a virtual private network (VPN)? Retrieved March 26, 2010 from http://www.webopedia.com/DidYouKnow/Internet/2007/virtual_private_network_VPN.asp

Bode, K. (2010, February 23). Comcast P2P throttling settlement nets users “up to” $16. Retrieved March 27, 2010, from http://www.dslreports.com/shownews/Comcast- P2P-Throttling-Settlement-Nets-Users-Up-To-16-107031

CNET. (2009, November 3). Wireless network buying guide. Retrieved March 26, 2010, from http://reviews.cnet.com/2719-7605_7-277-1.html?tag=page;page

Deb, B. (2010). Rich Internet applications: A look into available technology choices. Retrieved March 27, 2010, from http://www.jaxmag.com/itr/online_artikel/psecom,id,828,nodeid,147.html (No longer available at this URL)

Ferguson, R. (2010, March 1). A variant of Koobface worm spreading on Facebook. Retrieved March 28, 2010, from http://blog.trendmicro.com/new-variant-of-koobface-worm-spreading-on-facebook/

Franklin, C. (2000, August 7). How DSL works. Retrieved January 22, 2011 from http://www.howstuffworks.com/dsl.htm

Gardena, E. (2008, January 23). Satellite Internet. Retrieved March 26, 2010, from

Hitchcock, R. (2007, May 8). Copper and glass: A guide to network cables. Retrieved March 27, 2010, from http://www.windowsnetworking.com/articles_tutorials/Copper-Glass-Guide-Network-Cables.html

Howe, W. (2010, March 24). A brief history of the Internet. Retrieved March 26, 2010, from http://www.walthowe.com/navnet/history.html

International Corporation for Assigned Names and Numbers. (2010, January 5). What does ICANN do? Retrieved March 28, 2010, from http://www.icann.org/en/participate/what-icann-do.html

Internet Society. (2010). A brief history of the Internet and related networks. Retrieved March 26, 2010, from http://www.isoc.org/internet/history/cerf.shtml

ISP compared.com. (2010). Internet providers directory – find an ISP – compare Internet service providers. Retrieved March 27, 2010, from http://www.ispcompared.com/

Kawamoto, W. (2005, February 1). Satellite equals broadband lite. Retrieved March 27, 2010, from http://www.smallbusinesscomputing.com/webmaster/article.php/3466881

Joan, B. (2009a, November 9). Difference between WEP and WPA. Retrieved March 26, 2010, from http://www.differencebetween.net/technology/difference-between-wep-and-wpa/

Joan, B. (2009b, October 26). Difference between WPA and WPA2. Retrieved March 26, 2010, from http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/

Landesman, M. (2010a). Review: Free antivirus software. Retrieved March 26, 2010, from http://antivirus.about.com/od/antivirussoftwarereviews/a/freeav.htm

Landesman, M. (2010b). What is a keylogger trojan? Retrieved from http://antivirus.about.com/od/whatisavirus/a/keylogger.htm

Leydon, J. (2009, March 2). Koobface variant worms across social networking sites. Retrieved March 28, 2010, from http://www.theregister.co.uk/2009/03/02/koobface_worm_returns/

Marsan, C. D. (2009). ICANN: New domains coming in 2010. Retrieved March 26, 2010, from http://www.networkworld.com/news/2009/062409-icann-new-domains.html Moved to http://www.computerworld.com/s/article/9134766/ICANN_New_domains_coming_in_2010

McDowell, M. (2008, October 15). Cyber security tip ST06-002: Debunking some common myths. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST06-002.html

McDowell, M., & Householder, A. (2009a, June 30). Cyber security tip ST04-005: Understanding anti-virus software. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST04-005.html

McDowell, M., & Householder, A. (2009b, June 25). Cyber security tip ST04-009: Identifying hoaxes and urban legends. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST04-009.html

Microsoft. (2009). 4 steps to set up your home wireless network. Retrieved March 27, 2010, from http://www.microsoft.com/athome/organization/wirelesssetup.aspx

Mills, E. (2010, March 22). Malware delivered by Yahoo, Fox, Google ads. Retrieved March 27, 2010, from http://news.cnet.com/8301-27080_3-20000898-245.html?tag=rtcol;pop

Morgan, T. P. (2008, February 19). Net neutrality comes around on the ferris wheel again. Retrieved March 26, 2010, from http://www.itjungle.com/tlb/tlb021908-story06.html

Nelson, D. J. (2009, June 5). Malware prevention with Spotbot, Defender, and Malwarebytes. Retrieved March 27, 2010, from http://security-antivirus-software.suite101.com/ article.cfm/malware_prevention (No longer available at this URL)

Olechoswski, S., & Taylor, A. (2010, January 12). Web 2.0, social media and the dark web – A web criminal’s paradise? Retrieved March 28, 2010, from http://www.experts123.com/q/web-2.0-social-media-and-the-dark-web-a-web-criminals-paradise.html

PC Magazine. (2011). Net neutrality. Retrieved January 22, 2011, from http://www.pcmag.com/encyclopedia_term/0,2542,t=Net+neutrality&i=55962,00.asp

Schroeter, G. (n.d.). How XML is improving data exchange in healthcare. Retrieved March 27, 2010, from http://www.softwareag.com/xml/library/schroeter_healthcare.htm

Shadowserver. (2007a, November 12). Botnets. Retrieved March 28, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets

Shadowserver. (2007b, November 12). Honeypots. Retrieved March 28, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Honeypots

TechTarget. (2011). What is rich Internet application? Retrieved January 22, 2011, from http://searchsoa.techtarget.com/definition/Rich-Internet-Application-RIA

Vaughn-Nichols, S. J. (2009, August 14). What is a botnet anyway? Retrieved March 28, 2010, from http://www.itworld.com/security/74656/what-botnet-anyway

Web Exordium. (2010). Satellite Internet service providers – High speed satellite Internet for rural areas. Retrieved March 26, 2010, from http://www.high-speed-internet-accessguide.com/satellite/

Webopedia. (2011). Markup language. Retrieved January 22, 2011, from http://www.webopedia.com/TERM/M/markup_language.html

Web Wiz Guide. (2010). What are active server pages (classic ASP). Retrieved March 26, 2010, from http://www.webwizguide.com/kb/asp_tutorials/what_is_asp.asp

Wilton-Jones, M. (n.d.). The early Internet and the first generation browsers. Retrieved March 26, 2010, from http://www.howtocreate.co.uk/jshistory.html

Go to the top of the page

Created October 24, 2011

home glossary index Home Glossary Contents of this page