basic information of internet



internet
basic information of internet 


www: the term www refers to world wide web or simply the web the world wide web consists of all the public website connected the internet worldwide including the client devices ( such as a computer or cell phone ) that access web content the www is just one of many application of the internet and computer networks

the world web is based on these technologies:

HTML hypertext transfer protocol
HTPP hypertext transfer protocol
web servers and web browsers

researchers Tim Berners lee led the development of the original worldwide web in the late 1980s. he helped build prototypes of the above web technologies and coined the term "www" web site and web browsing exploded in popularity during the mid-1990s.
also known as world wide web

website


a website is a collection of web pages (documents that are accessed through the internet,) such as the one you re looking  at now a web page is what you see on the screen when you type in a web address click on a link or put a query in a search engine a web pages can contain any type of information and can include text color graphics animation and sound. when someone gives you their web address it generally takes you to their websites home page which should introduce you to what that site offers in terms of information or other services from the home page you can click on link to reach other section of the site a website can consist of one page or of tens of thousands of pages depending on what the site owner is trying to accomplish


domain

the web is the busiest place we know today with millions of websites now available online competing to catch the users attention apart from the common marketing and search engine optimization techniques one of the key weapons website owner use in fighting for thair visitors attention is the name of thair website i.e thair domain.


subdomain


a subdomain  is also called a child domain a domain that is part of a larger domain name in DNS hierarchy. DNS hierarchy consists of the root-level domain at the top underneath which are the top-level domain followed by second-level domains and finally subdomain for example in the domain name webopedia.internet.com "internet.com


HTPP


 short for hypertext transfer protocol the underlying protocol used by the world wide web HTTP defines how messages are formatted and transmitted and what action web servers and browsers should take in response to various commands for example when enter a URL in your browser this actually sends an HTTP command to the web server directing it to fetch and transmit the requested web page

 Some people distinguish between common viruses and worms is a special type of virus that can replicate itself and Inci1ory but can not also be connected to other programs, 



Virus


A computer virus is a program or piece of code that is loaded into your computer without your knowledge and runs against your wishes.  Viruses can also replicate themselves.  All computer viruses are man-made  A simple virus that can make a copy of itself over and over again is relatively easy to produce.  Even such a simple virus is dangerous.  An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.  

Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available.  These programs periodically check your computer system for the best-known types of viruses. Some people distinguish between common viruses and worms is a special type of virus that can replicate itself and use memory  but 
cannot also be connected to other programs, 



Computer Worms


Computer Worms are malicious software applications. to spread via  Computer network. computer Worms are a form of malware along with viruses and Trojans, a person typically installs Worms by  inadvertently opening an email attachment or message that contains executable scripts, 

Once installed on a computer, Worms spontaneously generate additional email messages containing copies of the worm.  They may attempt to  open TCP ports to create networks Security holes for other applications, and they may attempt to flood the LAN the LAN with spurious denial of service (DOS) data transmissions 


 vulnerability scanning



The automated process of proactively identifying vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened.  While public servers are important for communication and data transfer over the internet, 

the open the door to potential security breaches by threat agents such as malicious hackers vulnerability scanning employs software that seeks out security flaws based on a database of known flaws testing system for the  are known as malicious hackers, such as malicious hackers, vulnerability scanning employs software, known flaws, testing systems of database based on security flaws based
seeking out  for the occurrence of these flaws and generating a report of the findings security  that an individual or an enterprise can use to tighten the networks 



Vulnerability scanning typically refers to the scanning of systems that are connected to the internet but can also refer to system audits on internal networks, that are not connected to the internet in order to assess the threat of rogue software or malicious employees in an enterprise.




thanks for reading this article