Computer Networking
Author Additions for Chapter 4
- Attaching a file to email
- Checking a Web Link for Safety Before Clicking (off site)
- Email attachments (safe computing)
- Flash Cookies (that have been created by Flash Player)
- Finding Something on an Open Webpage
- Copying and Using an URL (web address from the location bar)
- Keeping You and Your Computer Safe
- Creating a signature to be automatically affixed to all email
- Save a file as a different type, (i.e. a word files as an rtf file)
Websites that Expand on the Knowledge in Chapter 4
- Accessibility (Chapter 14)
- Browser Reviews
- Browser Helps
- Color, Online Use (Chapter 7)
- Cookies (Web)
- Domain Names
- Extranet
- History
- Intranet
- Internet
- IP Addresses
- Networking
- Nurse Created Health Web Pages (Chapter 14)
- Readability (Chapter 10)
- Security Software That Isn't
- Specialized Search Tools (Chapter 10)
- Scams and other Internet Harassment
- Test Speed of Your Internet Connection
- Tutorials (Using the WWW and WWW for Nurses)
- Usability in Web pages
- Usability in Informatics (Chapter 17)
- Viruses
- Web site Creation (Chapter 14)
- Wireless Networks in Healthcare Agencies
Browser Review
There are other browsers besides Internet Explorer. This page has reviews of 5 browsers, all are free.
http://www.consumersearch.com/web-browser-reviews
Firefox. If you use Firefox, see this site. "Protect Your Laptop With Seven Must-Have Firefox Add-Ons" by
By Paul Rubens
http://practicallynetworked.com/security/protect_your_laptop_with_seven_firefox_add-ons.htm
Browser Helps
10 Tips to Make Your Browser Less Annoying. Could also be titled, tips to make it easier to browse. Includes key presses to do many things with any browser, links to a program to simplify printing a page, and finding a missing tool bar among others. If you want to save time, worth a visit!
http://www.itworld.com/software/236491/10-tips-make-your-web-browser-less-annoying
Cookies (Web - regular)
FAQ's about cookies. Answers many questions including how to delete a cookie
http://www.cookiecentral.com/faq/
How Internet Cookies Work. An excellent article that describes how cookies work, what they do and what they don't do.
http://computer.howstuffworks.com/cookie.htm
What you need to know about cookies. A good description of cookies, along with information on how to get rid of them.
http://www.webopedia.com/DidYouKnow/Internet/2007/all_about_cookies.asp
Domain Names
List of Domain Names. Provides links to information about each domain name including countries.
http://www.iana.org/cctld/cctld-whois.htm
How to set up Microsoft Outlook 2010 (2 starts) and Mozilla Thunderbird (free - 5 stars), as well as how to download either one, price and ratings.
http://www.seniorsguidetocomputers.com/email.asp
A good guide to the many features of email.
http://www.onlinehelp-uk.com/guide/email.htm and http://dawn.thot.net/cd/1.html
Deciphering Internet E-mail: A Quick Reference. A Webopedia's "Do You Know?" series that describes how email work and defines and discusses SMAP, POP and IMAP email protocols. Good information.
http://www.webopedia.com/quick_ref/e_mail.asp
History of the @ Sign. A fun piece from Webopedia's "Did You Know?"Series that gives the history of the @sign in computers, but also before computers. Includes a list of many countries with what the @ sign means there.
http://www.webopedia.com/DidYouKnow/Internet/2002/HistoryofAtSign.asp
Why Emails Bounce. From Webopedia's "Did you know?" series, this article describes some of the background workings in email.
http://www.webopedia.com/DidYouKnow/Internet/2002/BouncedEmail.asp
How to back up and to restore Outlook Express data. Detailed how to instructions from Microsoft.
http://support.microsoft.com/kb/q270670/
Email Abbreviations, Smileys & Emoticons
Description of smileys and list of some common ones.
http://www.robelle.com/smugbook/smiley.html
FAQs about Smileys including their origin.
http://www.newbie.net/SmileyFAQ/index.html
Email Etiquette
The online complete book of net etiquette. You can choose which section to visit using the table of contents. Contains good advice to assist in using the Internet professionally. Some of the many topics are respecting bandwidth, anatomy of an email message, and help for using discussion groups. Provides a good reference.
http://www.albion.com/netiquette/book/index.html
101 Email tips in bullet format that covers all aspects of emailing including attachments and Blackberries, minus information about the use of an email signature (an important item!)
http://www.101emailetiquettetips.com/
Email Etiquette. Good tips and do's and don't for email for multiple reasons.
http://www.opencolleges.edu.au/careers/email-etiquette/
A site that explains how to send effective email replies. It discusses why email etiquette is necessary, lists email etiquette rules, and explains how to enforce these rules by creating a company email policy.
http://www.emailreplies.com/
Information about why email etiquette is important.
http://careerplanning.about.com/od/communication/a/email_etiquette.htm
Extranet
Two very helpful sites in understanding this concept.
http://searchenterprisewan.techtarget.com/sDefinition/0,,sid200_gci212089,00.html
http://en.wikipedia.org/wiki/Extranet
Differentiate between extranet and intranet with links to more information about both.
http://compnetworking.about.com/od/filetransferprotocol/Intranets_and_Extranets.htm
History
Internet
A page from the Internet Society that presents the history of the Internet from many different viewpoints.
http://www.isoc.org/internet/history/
A history of the Internet tied in with other communication breakthroughs. Interesting.
http://www.netvalley.com/intval1.html
World Wide Web
A brief history of the World Wide Web (WWW) and the dream that engendered it by its creator, Tim Berners Lee.
http://www.w3.org/People/Berners-Lee/ShortHistory.html
History of the Web from the World Wide Web Society presented in a list format with dates.
http://www.w3.org/History.html
Intranet
Two sites that describe intranets.
http://searchwindevelopment.techtarget.com/sDefinition/0,,sid8_gci212377,00.html
http://en.wikipedia.org/wiki/Intranet
Differentiate between extranet and intranet with links to more information about both.
http://compnetworking.about.com/od/filetransferprotocol/Intranets_and_Extranets.htm
Internet
Glossary of Internet Terms.
http://www.matisse.net/files/glossary.html
What type of network do you need? Despite it's age, the information about the various types of computer networking available is still valid.
http://www.practicallynetworked.com/qa/qa20021007.shtml
IP Addresses (The numbers behind Internet Addresses)
Webopedia description of IP addresses with links to many good articles.
http://www.webopedia.com/TERM/I/IP_address.html
Networking
Fiber Optics: A tutorials on the Basics of fiber optic cable. Written in easily understood words.
http://www.arcelect.com/fibercable.htm)
What Makes a Virtual Private Network Private? From Webopedia. An excellent description of the topic.
http://www.webopedia.com/DidYouKnow/Internet/2007/virtual_private_network_VPN.asp
Troubleshooting Network Connectivity: Talking Tech: Troubleshooting Network Connectivity. Some good trouble shooting tips for locating any network problems.
http://winnews.com/2011/10/07/troubleshooting-network-connectivity/
How to Use Wireless Routers With Satellite Internet. Excellent information.
http://smallbusiness.chron.com/use-wireless-routers-satellite-internet-52128.html
Scams and other Internet harassment (Identity Theft)
Clickjacking or forcing you to do what you don't want to do. This page defines it and provides links for help.
http://networking.webopedia.com/TERM/c/clickjack_attack.html
ID Theft. Information on what to do if you suspect that your ID has been stolen. http://www.ftc.gov/bcp/edu/microsites/idtheft/
OnGuardOnline.gov. Suggestions for keeping safe online.
http://www.onguardonline.gov/topics/avoid-scams
This commercial site provides summary information about various online rip-offs including email scams, identity theft, money transfer and online dating scams, and mystery shopping.
https://www.moneysavingpro.com/identity-theft-protection/ultimate-guide-to-avoiding-online-scams/
To keep up on the latest social media threats search for either "Twitter virus" or "Facebook virus," "Myspace virus," etc.
Security Software That Isn't
Beal, V. (2009, April 24) Rogue Anti-Virus Software Explained. Rogue anti-virus programs usually appears in the form of a fake Windows warning on your computer system that reads something like, you have a specific number of viruses on your computer (usually in the hundreds) and that this software has detected those viruses. To get rid of these viruses, you're prompted to buy the full-version of the anti virus software (which is really rogue anti virus software)
http://www.webopedia.com/DidYouKnow/Internet/2009/Rogue_AntiVirus_Software.asp
Be on guard against security products that are actually malware. http://www.practicallynetworked.com/security/be_on_guard_against_insecurity_software.htm
Tutorials
Great place to start learning about the WWW. Offers an overview of the web, hints about search engines and many more things.
http://www.imagescape.com/he lpweb/www/www.html
Tutorial designed specifically for nurses on using the Internet.
http://www.vts.rdn.ac.uk/tutorial/nurse/
Test Speed of your Internet Connection
Speednet. Click on the location nearest you on the map and select city. Test of download, then upload will start.
http://www.speedtest.net/
Usability in Web pages
From the usability guru, Jakob Neilsen, the Top 10 Information Architecture Mistakes
http://www.useit.com/alertbox/ia-mistakes.html
A chapter from the John Krug book on Web design, Don't Make Me Think. Great book too.
http://www.sensible.com/chapter.html
Research-based Web Design & Usability Guidelines. A very complete list of organized links to information on many aspects of usability including, but not limited to topics such as design process, reading, content organization, and accessibility.
http://usability.gov/guidelines/
Step-by-Step Usability Guide. The primary government source for information on usability. There are tools for creating Web sites and making them more usable and useful. Guidelines are research based.
http://usability.gov/
Ten Usability Heuristics (Jacob Nielsen). Listed and described are ten general principles for user interface design.
http://www.useit.com/papers/heuristic/heuristic_list.html
Usability First. Although theoretically designed primarily for Web Site designers, this is valuable information for any software designer. Best information is found by scrolling down and clicking on "Introduction to Usability" and "Glossary."
http://www.usabilityfirst.com/
Virtual Private Net word (VPN)
What Makes a Virtual Private Network Private? From Webopedia. An excellent description of the topic including intranets and extranets.
http://www.webopedia.com/DidYouKnow/Internet/2007/virtual_private_network_VPN.asp
Viruses
Inside Spyware: A Guide to Finding, Removing and Preventing Online Pests. This article and its links discuss another hazard, spyware, with the Internet as well as information for both detecting and avoiding spyware.
http://www.intranetjournal.com/spyware/
Virus Encyclopedia. Just like a real encyclopedia except this one contains information about viruses, worms, trojan horses and all types of computer pests. Has a glossary too.
http://www.viruslist.com/en/viruses/encyclopedia
Trojans, viruses, worms: How does malware get on PCs and Macs? (2011). An excellent discussion with links to many other useful resources.
http://www.zdnet.com/blog/bott/trojans-viruses-worms-how-does-malware-get-on-pcs-and-macs/3491
See also Safe Computing on this site.
Wireless Networks
Merrill, Molly (May 20, 2009) Study identifies top five wireless challenges in healthcare facilities. Describes each challenge.
http://www.healthcareitnews.com/news/study-identifies-top-five-wireless-challenges
Websites from the Text in Chapter 4
Page 58 http://www.microsoft.com/athome/organization/wirelesssetup.aspx
Page 58 http://www.cnet.com/1990-7390_1-6213817-3.html
Page 58 http://download.cnet.com/FileZilla/3000-2160_4-10308966.html?tag=mncol
Page 58 http://download.cnet.com/Ipswitch-WS-FTPHome/3000-2160_4-10018456.html?tag=mncol
Page 67 http://dlthede.net/Informatics/Informatics.html
Page 68 http://edition.cnn.com/video/#/video/us/2009/03/02/barnett.facebook.
worm.cnn?iref=videosearch
Page 72 http://www.trendmicro.com/vinfo/hoaxes/default.asp Does not yield approriate information.
Page 72 http://urbanlegends.about.com/cs/nethoaxes/ht/emailhoax.htm
Page 73 http://www.snopes.com/
Websites From the Reference List in Chapter 4
Barnett, E. (2009, March 10). New Facebook worm threat. Retrieved March 28, 2010, from http://edition.cnn.com/video/#/video/us/2009/03/02/barnett.facebook.worm.cnn?iref=videosearch
Beal, V. (2004, November 11). The difference between adware & spyware. Retrieved March 26, 2010, from http://www.webopedia.com/DidYouKnow/Internet/2004/spyware.asp
Beal, V. (2005, June 3). Cable vs. DSL. Retrieved March 26, 2010, from http://webopedia.com/DidYouKnow/Internet/2005/cable_vs_dsl.asp
Beal, V. (2008, September 4). What are cookies and what do cookies do? Retrieved March 26, 2010, from http://www.webopedia.com/DidYouKnow/Internet/2007/all_about_ cookies.asp
Beal, V. (2009, September 18). What is a virtual private network (VPN)? Retrieved March 26, 2010 from http://www.webopedia.com/DidYouKnow/Internet/2007/virtual_private_network_VPN.asp
Bode, K. (2010, February 23). Comcast P2P throttling settlement nets users “up to” $16. Retrieved March 27, 2010, from http://www.dslreports.com/shownews/Comcast- P2P-Throttling-Settlement-Nets-Users-Up-To-16-107031
CNET. (2009, November 3). Wireless network buying guide. Retrieved March 26, 2010, from http://reviews.cnet.com/2719-7605_7-277-1.html?tag=page;page
Deb, B. (2010). Rich Internet applications: A look into available technology choices. Retrieved March 27, 2010, from http://www.jaxmag.com/itr/online_artikel/psecom,id,828,nodeid,147.html (No longer available at this URL)
Ferguson, R. (2010, March 1). A variant of Koobface worm spreading on Facebook. Retrieved March 28, 2010, from http://blog.trendmicro.com/new-variant-of-koobface-worm-spreading-on-facebook/
Franklin, C. (2000, August 7). How DSL works. Retrieved January 22, 2011 from http://www.howstuffworks.com/dsl.htm
Gardena, E. (2008, January 23). Satellite Internet. Retrieved March 26, 2010, from
http://ezinearticles.com/?Satellite-Internet&id=944996
Hitchcock, R. (2007, May 8). Copper and glass: A guide to network cables. Retrieved March 27, 2010, from http://www.windowsnetworking.com/articles_tutorials/Copper-Glass-Guide-Network-Cables.html
Howe, W. (2010, March 24). A brief history of the Internet. Retrieved March 26, 2010, from http://www.walthowe.com/navnet/history.html
International Corporation for Assigned Names and Numbers. (2010, January 5). What does ICANN do? Retrieved March 28, 2010, from http://www.icann.org/en/participate/what-icann-do.html
Internet Society. (2010). A brief history of the Internet and related networks. Retrieved March 26, 2010, from http://www.isoc.org/internet/history/cerf.shtml
ISP compared.com. (2010). Internet providers directory – find an ISP – compare Internet service providers. Retrieved March 27, 2010, from http://www.ispcompared.com/
Kawamoto, W. (2005, February 1). Satellite equals broadband lite. Retrieved March 27, 2010, from http://www.smallbusinesscomputing.com/webmaster/article.php/3466881
Joan, B. (2009a, November 9). Difference between WEP and WPA. Retrieved March 26, 2010, from http://www.differencebetween.net/technology/difference-between-wep-and-wpa/
Joan, B. (2009b, October 26). Difference between WPA and WPA2. Retrieved March 26, 2010, from http://www.differencebetween.net/technology/difference-between-wpa-and-wpa2/
Landesman, M. (2010a). Review: Free antivirus software. Retrieved March 26, 2010, from http://antivirus.about.com/od/antivirussoftwarereviews/a/freeav.htm
Landesman, M. (2010b). What is a keylogger trojan? Retrieved from http://antivirus.about.com/od/whatisavirus/a/keylogger.htm
Leydon, J. (2009, March 2). Koobface variant worms across social networking sites. Retrieved March 28, 2010, from http://www.theregister.co.uk/2009/03/02/koobface_worm_returns/
Marsan, C. D. (2009). ICANN: New domains coming in 2010. Retrieved March 26, 2010, from http://www.networkworld.com/news/2009/062409-icann-new-domains.html Moved to http://www.computerworld.com/s/article/9134766/ICANN_New_domains_coming_in_2010
McDowell, M. (2008, October 15). Cyber security tip ST06-002: Debunking some common myths. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST06-002.html
McDowell, M., & Householder, A. (2009a, June 30). Cyber security tip ST04-005: Understanding anti-virus software. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST04-005.html
McDowell, M., & Householder, A. (2009b, June 25). Cyber security tip ST04-009: Identifying hoaxes and urban legends. Retrieved March 26, 2010, from http://www.us-cert.gov/cas/tips/ST04-009.html
Microsoft. (2009). 4 steps to set up your home wireless network. Retrieved March 27, 2010, from http://www.microsoft.com/athome/organization/wirelesssetup.aspx
Mills, E. (2010, March 22). Malware delivered by Yahoo, Fox, Google ads. Retrieved March 27, 2010, from http://news.cnet.com/8301-27080_3-20000898-245.html?tag=rtcol;pop
Morgan, T. P. (2008, February 19). Net neutrality comes around on the ferris wheel again. Retrieved March 26, 2010, from http://www.itjungle.com/tlb/tlb021908-story06.html
Nelson, D. J. (2009, June 5). Malware prevention with Spotbot, Defender, and Malwarebytes. Retrieved March 27, 2010, from http://security-antivirus-software.suite101.com/ article.cfm/malware_prevention (No longer available at this URL)
Olechoswski, S., & Taylor, A. (2010, January 12). Web 2.0, social media and the dark web – A web criminal’s paradise? Retrieved March 28, 2010, from http://www.experts123.com/q/web-2.0-social-media-and-the-dark-web-a-web-criminals-paradise.html
PC Magazine. (2011). Net neutrality. Retrieved January 22, 2011, from http://www.pcmag.com/encyclopedia_term/0,2542,t=Net+neutrality&i=55962,00.asp
Schroeter, G. (n.d.). How XML is improving data exchange in healthcare. Retrieved March 27, 2010, from http://www.softwareag.com/xml/library/schroeter_healthcare.htm
Shadowserver. (2007a, November 12). Botnets. Retrieved March 28, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets
Shadowserver. (2007b, November 12). Honeypots. Retrieved March 28, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Honeypots
TechTarget. (2011). What is rich Internet application? Retrieved January 22, 2011, from http://searchsoa.techtarget.com/definition/Rich-Internet-Application-RIA
Vaughn-Nichols, S. J. (2009, August 14). What is a botnet anyway? Retrieved March 28, 2010, from http://www.itworld.com/security/74656/what-botnet-anyway
Web Exordium. (2010). Satellite Internet service providers – High speed satellite Internet for rural areas. Retrieved March 26, 2010, from http://www.high-speed-internet-accessguide.com/satellite/
Webopedia. (2011). Markup language. Retrieved January 22, 2011, from http://www.webopedia.com/TERM/M/markup_language.html
Web Wiz Guide. (2010). What are active server pages (classic ASP). Retrieved March 26, 2010, from http://www.webwizguide.com/kb/asp_tutorials/what_is_asp.asp
Wilton-Jones, M. (n.d.). The early Internet and the first generation browsers. Retrieved March 26, 2010, from http://www.howtocreate.co.uk/jshistory.html
Created October 24, 2011