"Contents of 'Bulletin Boards'",1,0.wpf,a,"5_1intro.wav"
This section provides information about:
ò \IThe origins of bulletin boards\i
ò \INecessary system requirements\i
ò \IBulletin board system (BBS) uses, topics, and types\i
ò \IFinding a BBS\i
#
"Bulletin Boards Overview",2,0.wpf,g,0
Computer messaging services, electronic mail, chat services, and newsgroups first became prominent in the 1970s when Computer Bulletin Board System (CBBS) software was first produced. The designers wanted to electronically simulate the cork bulletin boards found in public areas such as company staff rooms and public libraries. The software allowed people to electronically "post" messages about all kinds of subjects, and anyone who had access to the bulletin board could view and respond to these messages.
The only equipment needed to access a computer bulletin board system (BBS) is a computer, a modem, modem software (called communications software or "comms" software), and a phone line. In the early days of computerized bulletin boards they were used only by computer and communications professionals or experts. Today, the home user with a computer and a modem has easy access to thousands of different bulletin boards. Today's comms software is becoming easier to use, and the software used on the BBS itself (the front end) has also become easier for new users to navigate. Additionally, modems are becoming more reliable, faster, and cheaper.
#
"Origins of Bulletin Boards - (a)",3,0.wpf,g,0
Bulletin boards originated to provide users who have similar interests with a method of keeping in touch and sharing information. Nearly all bulletin boards offer group messaging systems, private e-mail facilities and access to huge libraries of shareware files and documentation. Other systems also have real-time chat facilities, role-playing games, and access to special interest groups (SIGs) and databases.
The rapid growth of the Internet has not affected the growth of bulletin boards in any way. More likely it has helped to improve and expand the existing systems as a result of many bulletin board system operators (SysOps) providing access from their BBS to the Internet, or from the Internet to their BBS. This allows users from all over the world to log on to a BBS in Japan for the cost of a local phone call when using the Internet.
#
"Origins of Bulletin Boards - (b)",4,0.wpf,g,0
Using a bulletin board you can get the latest software, games, information, or advice for your computer. Files on a bulletin board are public-domain or shareware files that can be legally distributed in this manner (for example, you could not share a copy of Microsoft Windows 95 on a bulletin board). Public-domain, or "freeware," files are ones that you can use free of charge. "Shareware" files are ones that you can freely distribute, but must pay for if you want to use them after the evaluation period has expired.
Bulletin boards also let you communicate with other people in your area and around the world. You can get help with just about any question, discuss issues of importance to you, and meet people who share your interests. A BBS commonly offers exciting multi-player games, news and publication services, the latest shareware programs, and many other services you have difficulty finding elsewhere.
#
"Origins of Bulletin Boards - (c)",5,0.wpf,g,0
Bulletin boards are mostly run by hobbyists who provide everything free of charge and the systems are usually very easy to use once you are familiar with them. A bulletin board is created by setting up communications software on a computer. There are now commercial bulletin boards established which charge a fee to join. These systems are generally quite elaborate and offer many more features than the free bulletin boards. The more features available, the more time and money the SysOps incur, which means that they must charge to offset the expense. However, bulletin boards still remain largely a hobbyist's venture, free of charge to anyone who wants to participate.
It is important to know that bulletin boards are as diverse and plentiful as the many different people who use them. There are small hobbyist systems with only a few files or message areas, but with a very friendly atmosphere. Then there are large, commercially-run bulletin boards with many lines and a multitude of features. Some bulletin boards offer features of general interest while others are aimed at a particular group of people or interests.
#
"The Bulletin Board network",6,0.wpf,g,0
Many private and commercial bulletin boards are also part of a larger bulletin board network. The largest and most popular of these is FidoNet. Setting up a bulletin board to use the FidoNet structure lets all FidoNet boards communicate with each other, and lets you communicate with users on other boards. As FidoNet boards add more "gateways" to the Internet, the local BBS is becoming a world-wide venture. Users with an Internet account can e-mail FidoNet, CompuServe, and The Microsoft Network users, and vice versa.
As mentioned earlier, many bulletin boards are also providing Internet access for their customers (although this will nearly always incur a fee, even on a hobbyist system), giving the user access to the standard range of Internet services as introduced throughout this CD. Bulletin boards on the Internet are generally accessible using Telnet (a comms program for the Internet, see \JThe Telnet Service\j), which lets you log on to a remote bulletin board anywhere in the world for only the cost of a local phone call.
#
"Finding a BBS",7,0.wpf,g,0
If you take five minutes to think of all the computerized services you come across daily, you may realize that many of these are bulletin boards that are already available to you. For example, your school or university may run a bulletin board and have an Internet presence. Accessing and searching a library using a remote computer is becoming increasingly common as more libraries offer bulletin board systems as well as a presence on the Internet. Your local computer shop (for example Dick Smith, or Rod Irving Electronics) probably operates a bulletin board offering technical and trouble-shooting advice for its products.
To find out which bulletin boards are located in your area, the quickest approach is to ask at your local computer shop. New and updated bulletin boards are also listed monthly in some computer magazines. Once you get access to a bulletin board, it generally lists other boards available in the area.
In Section 1.2 \BCommunciations Software\b, we show you how to download a list of all the bulletin boards in your State.
#
"commercial bulletin boards",8,0.wpf,g,0
Many large commercial bulletin boards are worldwide boards, with local access available from many countries. Such boards can be helpful to travellers, who are able to use their single account within any country offering a dial-in point. This is compared with the Internet service providers that only have a dial-in point in the one city.
#
"EWorld",9,0.wpf,g,0
eWorld is Apple Computer's support network containing databases of software, technical references, educational information, and electronic mail facilities. Of course, the bulletin board is specifically geared to Macintosh users, but others may want the benefit of the technical information and press releases also available.
New members receive two free hours for use in the first 30 days, after which they are billed at $US9.95 per month, which includes one hour of online time. Additional time is billed at $US9.95 an hour.
These prices may seem steep compared to other bulletin board providers, however there is no extra charge for Internet access from eWorld. If you already have an account on the Internet, you can go to eWorld's Internet home page at \Bhttp://www.eworld.com\b.
#
"CompuServe - (a)",10,0.wpf,g,0
CompuServe is probably the largest commercial bulletin board, with over 2 million subscribers worldwide. Its strongest features have always been its user-friendly interface and worldwide access availability. CompuServe provides hundreds of different forums where people can chat in real-time, as well as electronic mail, newsgroups, and many shareware files and programs.
Business users have been especially interested in CompuServe because many hardware and software vendors usually have their own forum where they can provide technical advice and keep interested people up-to-date with new or upgraded products.
#
"CompuServe - (b)",11,0.wpf,g,0
CompuServe has only recently added Internet access to its list of offerings, making it even more attractive to businesses. However, the biggest downfall often seems to be the cost of access. At the time of writing, access is available at $US9.00 per hour during business hours, or $US6.00 per hour after hours (7.00 p.m. - 8.00 a.m.). Internet access is also available at a flat rate of $US4.80 per hour. You will also incur a monthly fee of $US9.95, however, there is no joining fee payable.
New subscribers will receive the first five hours free, and an additional two hours free per month. In addition to these fees, access to CompuServe's premium services (including searchable databases) may incur additional charges per transaction. Electronic mail services and access to many of the forums are now provided free of charge. For further information about current rates and services, visit CompuServe's home page on the Internet at \Bhttp://www.compuserve.com\b.
#
"the microsoft network - (a)",12,0.wpf,g,0
The wonderful thing about using the Microsoft Network (MSN) is that all the required software is included with Windows 95 and access is a simple mouse click away.
MSN is designed to operate just like your other Windows programs, with the same type of dialog boxes, folders, and icons. Learning to master MSN is as easy as learning to use Windows. Using Microsoft's Internet Explorer, you can access the Internet without using a Web browser.
#
"the microsoft network - (b)",13,0.wpf,g,0
MSN is a worldwide network with local dial-in points all over the world. The system offers chat forums, technical information, news and reviews, shareware files, and electronic mail services which work with Microsoft Exchange (also free in Windows 95). Support for Microsoft and other vendors' products is easily available by opening different folders on the system.
At the time of writing, a Standard subscription to MSN costs $US4.95 per month for three hours, with an additional charge of $US2.50 per hour for any time over the three hours.
#
!,!,!,!,!
2#
31,0
"Contents of 'Internet History'",1,0.wpf,a,"5_2intro.wav"
This section provides:
ò \IBackground information about the Internet\i
ò \IDescriptions of client/server computing and Internet computing concepts\i
ò \IReasons to use the Internet\i
ò \IDescriptions of the many Internet services that are available\i
#
"Background to the Internet",2,0.wpf,g,0
In order to understand the current state of the Internet and to put forward any ideas about its future, it is necessary to understand a little about its past. In the development of most technological areas, a reasonably accurate timeline can point to its beginnings and its conclusion.
However, the Internet has not been developed by any one person or any one company. It has been a concerted effort by many people across the world, all working on different areas of advancement at the same time. Ever since the first few networks were linked together, things have been constantly changing, sometimes gradually and sometimes dramatically, but development has certainly never remained static.
The Internet is not owned or operated by a single company or group and as such, there is no policy-making body (in the traditional sense), and no immediate documentation available about the changes the Internet has gone through since its inception. The following pages highlight some of the more important developments that have helped evolve the Internet into what you will use today.
#
"internet beginnings - (a)",3,0.wpf,g,0
The idea of the Internet began over 30 years ago with the RAND Corporation in the United States. RAND existed to provide US authorities with solutions to unforseen and expected problems. One of the strategic problems they faced was to determine how the US authorities could successfully communicate after a nuclear war.
It was obvious that some form of network would be needed, and that such a network should be linked through each state and city. A traditional network, such as a local area network (or LAN), requires a central computer to operate as a "host" or "server." In its most basic form, a compatible computer using a compatible communications language could then be linked to the server using data cables or standard telephone lines. The workstation would then have access to all of the server's resources, and access to the resources available on any other computer also connected to the server. The major problem with using a traditional network would be that its switches, wiring, and any central host or server would always be vulnerable to a nuclear attack.
#
"Internet Beginnings - (b)",4,0.wpf,g,0
In 1964, RAND proposed that a network be developed which has no central authority and could continue to operate even when parts of it had been shut down. To achieve this, each computer (node) on the network would have the same status as any other node, and each would send information in "packets." Each packet would pass through the network individually and be reassembled only at its final location.
The first such network based on these principles was developed in 1968 to test the effectiveness of a "packet-switching" network. Following this, the Advanced Research Projects Agency (ARPA) decided to fund a much larger version of the project.
By December of 1969, there were four nodes connected to ARPA's network, which was named ARPANET. Scientists and researchers could share each other's computing facilities using long-distance communications. By 1971, there were fifteen nodes in ARPANET; by 1972 there were thirty-seven nodes.
#
"Internet Beginnings - (c)",5,0.wpf,g,0
Throughout the 1970s, ARPA's network grew, and its decentralized structure made expansion easy. Unlike standard corporate networks, the ARPA network could connect many different kinds of machines. As long as each machine could speak the "packet-switching" language, their brand name, content, and ownership, were irrelevant.
ARPA's original communication standard (protocol) was known as NCP (Network Control Protocol), but as the technique became more advanced, NCP was replaced by a more sophisticated protocol known as TCP/IP (Transmission Control Protocol/Internet Protocol). This protocol is still used as the communications protocol for the Internet today.
#
"Internet Beginnings - (d)",6,0.wpf,g,0
By 1977, TCP/IP was being used by other networks to link to ARPANET, and although ARPANET continued to grow, it became far outnumbered by the many other machines and networks being linked into it.
In 1984, the National Science Foundation's NSFNET connected to the Internet. By 1990, ARPANET ceased to exist, having been merged into, and replaced by, the ever-expanding NSFNET and offering a larger number of people access to the Internet. The number of "host" machines with direct connection to TCP/IP and the Internet has been doubling every year since 1988.
#
"the internet today",7,0.wpf,g,0
By the end of 1991, the Internet had grown to include some 5,000 networks connected from over three dozen countries, having over 700,000 host computers used by over 4 million people. In 1992, the number of host computers reached one million. Today, there are more than 60,000 networks, with over 6 million hosts.
The number of users actually having access to the network is a figure impossible to calculate with any accuracy. Any count taken today will have changed by tomorrow. It has been estimated that as many as 20 million users, or perhaps more, have access to the Internet today. This figure is expected to reach 100 million by the year 2000.
#
"what is the internet? - (a)",8,0.wpf,g,0
The Internet is essentially a number of different computer networks all linked together. Several million individual computers are connected to these computer networks. In theory, if you have access to any one of these computers, you will have access to all the other computers.
The majority of computers on the Internet are connected using standard telephone lines, while others use direct connections by way of a computer cable. This means that virtually everyone can have access to the whole world for the cost of a local telephone call. A call goes from your computer to a computer nearby, which then handles all the information to and from the Internet.
#
"What is the Internet? - (b)",9,0.wpf,g,0
All the Internet really does is deliver data from one place to another, in a highly technical manner. The end result is that over 20 million people around the world have access to other people, other computers, and mountains of information, in a relatively easy-to-operate way. This CD explains the various tools you can use to take advantage of the vast store of information, computers, and people that are available on the Internet.
#
"Client/Server Computing - (a)",10,0.wpf,g,0
The Internet uses client/server computing to control the sending and receiving of information across the Internet. The idea of client/server computing is quite simple: one computer (the server), has a supply of information; another computer (the client), wants to use that information, generally because a person has asked the computer to use it. The two computers are connected, in this case, through the Internet networks. The client can request something from the server, and the server can send back a response.
On the Internet, any computer can take on the role of either client or server, or both. If the computer runs a server program, it is a server; if it runs a client program, it is a client; if it runs both client and server programs (as most Internet computers do), it is both a server and a client.
#
"Client/Server Computing - (b)",11,0.wpf,g,0
All the wonderful things you can do on the Internet are provided by servers; file transfers are controlled by file transfer servers; World Wide Web information is provided by World Wide Web servers; and so on. Throughout this CD, you will be shown how to retrieve client programs so that you can instruct your computer (as a client) to request or use information from a server.
#
"Identifying host computers",12,0.wpf,g,0
Computers on the Internet that allow other computers to use them to gain access to Internet features are called hosts. Host computers are identified by names and numbers.
Every host on the Internet has a specific address called the Internet Protocol (IP) address. The IP address is made up of four numbers, each separated by a period (called a "dot"). Every machine on the Internet has a number, and this number is used to locate and work with a specific machine.
#
"Domain Names",14,c02f003.bmp,c,0
Fortunately, the Internet also provides us with domain names which are easier to remember than numbers. Domain names and IP addresses are interchangeable, and using either one will reach the intended destination.
#
"Domain Names and Internet Addresses - (a)",15,21pg10.bmp,c,0
The person who uses a computer has a user name that is linked to the IP address or the domain name. The "at" symbol (@) is used to separate the user name from the domain name or IP address. This becomes the person's e-mail address. The e-mail address allows other people to contact you.
#
"Domain Names and Internet Addresses - (b)",16,c02f005.bmp,c,0
You will notice that similar types of domain names appear quite frequently. The last part of the domain name indicates the type of network the machine is connected to (for example "edu" for education; and "com" for commercial).
The first part of the domain name indicates the name of the specific computer you are talking to, and the name or names used between them can identify the country or organization that the computer belongs to.
#
"Why Use the Internet? - (a)",17,0.wpf,g,0
It all sounds very exciting - being able to connect to millions of people and thousands of computers all over the world, but what good does it all do? The Internet offers so many sources of information, features, and useful resources that it would be impossible to list them all. However, some of the Internet's major advantages are listed below.
ò You can stay in touch with friends, relatives, and colleagues around the world at a fraction of the cost of phone calls or even air mail.
ò With the vast number of Internet news groups, you can join discussions on topics ranging from adoption and aliens, to zoology and zen religion.
ò Thousands of databases and libraries will be at your fingertips.
ò You can retrieve thousands of documents, journals, books, and computer programs - all free!
ò You can stay up-to-date with news, sports and official weather reports.
ò You can play live, "real-time" games with many other people at once.
#
"Why Use the Internet? - (b)",18,0.wpf,g,0
Connecting to the Internet definitely requires a willingness to learn new concepts. It is akin to visiting a foreign country. When you first arrive, you won't know your way around, and you'll probably get lost. There's a possibility that you may even run into some locals who'd rather you hadn't come at all.
On top of all this, the country you are visiting is constantly changing; every day, it seems like there's something new for you to learn.
Fortunately, most of the users on the Internet are friendly. Until recently, there were few written guides about the Internet, and it developed largely through a verbal tradition where the old-timers helped the newcomers. So when you connect, don't be afraid to ask for help when needed. You'll be surprised by how many people will lend a hand!
#
"Services Available on the Internet",19,0.wpf,g,0
Services on the Internet are offered by commercial organizations, educational institutions, and private companies. The range of services includes information, support and advice, shopping, news and reviews, and many other useful items.
#
"Electronic Mail",20,c02f006.bmp,c,0
Electronic mail (e-mail) is probably the most popular service on the Internet. E-mail is nothing more than a simple text message that you type at your keyboard. It is then sent to another user on the network. In the same way that a letter must be addressed correctly to reach its destination, an e-mail message must also specify the address of the person it is being sent to.
Eudora is a popular Windows program used for sending electronic mail messages all over the world. E-mail travels extremely quickly. You can send a message to England and receive a reply within minutes. The only delay is in how long it takes recipients to check if they have received any incoming mail.
E-mail is becoming more and more accepted as a means of conducting business between offices, and between different countries. It is cheap, reliable, and quick.
#
"Newsgroups",21,24pg29.bmp,c,0
E-mail is a messaging service between two people. To tell many people about something, or to become involved in a group discussion, you could send individual e-mail to each person, or you could converse using a Usenet newsgroup.
The Usenet system controls conversations about many different topics. Each topic is called a newsgroup. There are currently over 8,000 different newsgroups available. In order to read, follow, and reply to conversations, a news-reading program such as Trumpet, shown here, is required.
#
"FTP - File Transfer Protocol",22,c02f008.bmp,c,0
One of the great attractions of the Internet is the abundance of free software that it contains. There are many, many sites which keep databases of the latest public domain and shareware programs, and just about every type of computer and operating system is catered for somewhere on the Internet. Some sites keep collections of pictures, songs, jokes, movies, and just about anything else that can be stored electronically.
Most sites offer an anonymous ftp service, which means that anyone can download any files found on the system. Using an ftp client, (WS_FTP is shown here), you can view the directory of a remote site and choose which files you want to download to your own computer.
#
"Telnet - (a)",23,0.wpf,g,0
Telnet allows you to access a remote computer in the same way that you access a bulletin board system (BBS), or even log on to a network at your office. Many libraries and universities provide a Telnet session so that you can access your university account from a remote computer, although it appears in the same manner as if you logged on at a terminal within the library.
#
"Telnet - (b)",24,24pg33.bmp,c,0
A Telnet client is required to log on to a remote computer. Most host computers also contain a Telnet service so you can, for example, "telnet" to your local university, and from there telnet to a BBS in the US and so on.
You cannot just telnet to any computer that is on the Internet. You require either an account with that provider, or it must be a system that anyone is allowed to access. If your office network is also connected to the Internet, you should be able to telnet to your usual work account any time you are on the Internet.
#
"Gopher, Archie, and Veronica",25,0.wpf,g,0
The Internet contains such a vast amount of material that actually finding what you are looking for is sometimes quite difficult. Fortunately, there are services such as those explained on the following pages that provide indexes to services and allow searches across the Internet.
#
"Gopher",26,c02f010.bmp,c,0
Gopher is a menu-based system for quickly and easily navigating your way around the Internet in GopherSpace. A Gopher client such as HGopher, shown here, is a simple-to-use Windows-based program, available free on the Internet.
#
"Archie and Veronica",27,0.wpf,g,0
Archie is an electronic directory service for locating files that are available using anonymous ftp. The service is now being expanded to track other online directories and resource listings.
Veronica works in the same way as Gopher, and has been specifically designed to work with Gopher. It allows users to search through all the index titles of Gopher menu items by typing in keywords.
#
"World Wide Web",28,0.wpf,g,0
The World Wide Web (WWW or "the Web") is a "hypermedia" project developed in Switzerland. It links global information using hypertext, and has the ability to link ftp sites, Gophers, and news servers.
The most remarkable thing about WWW is that you do not need to know where you are going, and who you should be connected to. The hypertext links jump around and call information from whichever computer they need to without direct user interaction. As a research tool, WWW is probably the most useful of all the Internet services.
#
"Netscape Navigator",29,c02f011.bmp,c,0
Netscape Navigator is by far the most popular WWW browser (or client) and is available for the IBM-PC, the Amiga, and the Apple Macintosh. It provides a graphical front-end which can locate and display information from all over the world, and from thousands of computers.
#
"Wide Area Information Server",30,24pg40.bmp,c,0
The Wide Area Information Server (WAIS, pronounced "ways") allows users to search for and retrieve information from remote databases, called sources. These are collections of files that consist mainly of text.
By running a WAIS client, such as WINWAIS, (shown here), you can search the Internet for a list of documents that contain text that matches your search text. The document with the highest number of matches found appears at the top of the list. Clicking on a document displays it and also allows you to save it, print it, or copy parts of it.
#
"Online Games and Education",31,0.wpf,g,0
Multiple-User Dungeons (MUDs - now so common they are referred to simply as "muds"), and Multi-user Object-Oriented environments (MOOs) allow users to interact in real-time in a virtual environment similar to those in text-based adventure games. Users can talk with one another, move around, use objects, and take on different personas. A "mud" utilises text only, whereas MOOs are capable of both text and graphics.
Distance education is an area where MUDs and other real-time games are used to enhance learning. Teacher and students can "meet" in virtual classrooms for tutorial sessions and lectures.
#
!,!,!,!,!
3#
25,0
"Contents of 'Internet Netiquette'",1,0.wpf,a,"5_3intro.wav"
This section discusses:
ò \IUnofficial guidelines\i
ò \IAcceptable use policies and commercial activities\i
ò \IGlobal ethical standards\i
ò \ILegalities of use (copyright infringements, censorship, and pornography)\i
ò \IInternet security (personal and company)\i
#
"Netiquette guidelines - (a)",2,0.wpf,g,0
As the Internet is not owned by any particular body, there is no set of hard and fast rules that must be followed when using it. However, the Internet has definitely developed into a community made up of Netizens (Net citizens) who take advantage of the resources it has to offer. As with any society or group, there are guidelines for acceptable and unacceptable behaviour on the Internet, commonly known as "netiquette."
There has always existed on the Internet, an unwritten "agreement" among users to act and respond to others in a particular way. If this agreement is broken, the guilty user can generally expect to be "flamed" (an Internet term meaning to receive an argumentative or insulting response via e-mail) or possibly even be "killed" (lose their Internet access), depending upon how severly the unwritten "rules" are being abused or broken.
#
"Netiquette Guidelines - (b)",3,0.wpf,g,0
Any guidelines that describe acceptable customs are meant only to provide advice about common "standards." Knowing some basic principles of acceptable use can assist new users of the Internet to be aware of what is considered to be a breach of the rules, and it also helps users to be responsible about the way they access or transmit information.
In this section, we discuss some of the global standards, policies, and legal issues that apply whenever you are connected to the Internet.
#
"Acceptable Use Policies - (a)",4,0.wpf,g,0
Each commercial organization and public Internet provider should provide and inform you of the standards of conduct it expects from you when you are connected to the Internet. This set of standards is commonly referred to as an Acceptable Use Policy (AUP), and is usually provided to you with your application. The consequences of not following the standards set forward in an AUP should also be provided, and it is recommended that you read and understand your provider's AUP \Ibefore\i you breach it!
#
"Acceptable Use Policies - (b)",5,0.wpf,g,0
One of the major issues that has faced Internet users since its inception is that it was designed to be used as a research tool and to facilitate the flow of data between research and educational institutes. Because of this, many AUPs specifically prohibit the use of the Internet for commercial or "for profit" activities.
As the Internet has been changing rapidly over the last few years, commercialization - or at least commercial use and advertising on the Internet - seems inevitable. Thus, many AUPs allow for commercial activities quite freely. Most providers do, however, offer a separate fee structure for commercial users, and private or hobbyist users. The AUP for private users generally prohibits the use of the Internet for profit or advertising.
#
"Acceptable Commercial Activities",6,0.wpf,g,0
Assuming that your AUP allows you to engage in commercial activities, the following methods of advertising and marketing are usually considered to be acceptable behaviour on the Internet.
ò Marketing using a dedicated server (such as Gopher, FTP, WWW, or WAIS) where the user must specifically look for and find the information.
ò Dedicated Gophers or Web pages for standard product information, price lists, document retrieval, announcements, newsletters, and so on.
ò The use of mail distribution lists (called Listservs) designed for the purposes of marketing. The user must specifically subscribe to the list in order to receive information.
ò Small and relevant product announcements can be made to appropriate Usenet newsgroups or mailing lists.
ò Company contact information or product announcements can be included in a signature file of five lines or less.
#
"Unacceptable Commercial Activities",7,0.wpf,g,0
Generally, it is \Inot\i acceptable to:
ò Post unsolicited e-mail, or perform bulk mailings (called "in your face" or IYF advertising).
ò Post and cross-post announcements and messages to unrelated groups or lists.
ò Perform "cold calling" where an unsuspecting consumer receives mail and attention uninvited. Direct mail advertising on the Internet is only acceptable if it is solicited.
#
"Global Ethical Standards - (a)",8,0.wpf,g,0
Whenever you are connected to the Internet, through any provider, there are some ethical standards that should be adhered to at all times.
ò DO NOT use a computer to harm other people or their work.
ò DO NOT pry into other people's files.
ò DO NOT use a computer to steal or perform any other illegal activity.
ò DO NOT use or copy software which you have not paid for.
ò DO NOT use other people's computer resources without express authorization.
ò DO NOT plagiarize or copy other people's intellectual output.
ò DO think about the social consequences of any actions you perform.
ò DO use a computer in way that shows consideration and respect for other users.
#
"Global Ethical Standards - (b)",9,0.wpf,g,0
If your provider offers you storage space with your connection, there are also some guidelines to be kept in mind. The maintenance and content of your storage space is your responsibility.
ò Keep the number of files in your storage space to a minimum. Download the files to your personal computer or delete unwanted files as necessary.
ò Frequently scan your own computer for viruses, especially when downloading files from other systems, to prevent the spread of a virus.
ò Do not keep anything private in your disk storage area as your files may be accessible by persons with system privileges.
#
"Legalities of Internet Use",10,0.wpf,g,0
Attempting to prescribe activities that are illegal on the Internet is not an easy process. The Internet has no boundaries, nationally or internationally, and hence what one jurisdiction may cite as being illegal, may be quite legal in another. However, there are some activities that are considered illegal globally, and others that simply comply with an international "code of ethics."
#
"Copyright Infringement - (a)",11,0.wpf,g,0
Copyright law applies to many products that are freely available on the Internet. Documentation, software, journals, graphic images, and even e-mail messages can all be subject to copyright law. Every original item is automatically copyrighted, whether or not it is specifically stated that the item is subject to copyright. The only items that are not subject to copyright are those that have specifically been donated to the public domain (usually by a clause or statement in a text file, or at the end of a document).
\BWARNING!\b
If you want to reproduce, distribute, use, or copy another's work and you are unsure of its copyright status - find out! The creator of a piece of work will generally provide details about how to contact them using e-mail. To ensure there are no recriminations, you should e-mail the creator and ask for permission to use his/her work.
#
"Copyright Infringement - (b)",12,0.wpf,g,0
When downloading software and applications, you will find that many programs are shareware products which require the payment of a license fee for continued usage. Others are "freeware" programs where no payment is required, but donations are accepted. Remember, it is your responsibility when downloading programs to check for any copyright or licensing agreements. If the program is beneficial to you, pay any registration or license fee. If there is any doubt, don't copy it or use it.
#
"censorship and pornography - (a)",13,0.wpf,g,0
The publication or distribution of obscene or offensive material, where that material is made publicly available, is a violation of the law. However, the task of classifying material as offensive, obscene, or publicly available, is not an easy one. Is it offensive to make a racist comment when posting to a newsgroup? Would sharing a smutty joke with a colleague via e-mail be considered making it publicly available? These are but some of the issues that are yet to be decided.
Another issue that has not yet been decided is whether the viewing or downloading of offensive or pornographic material is considered to be a crime. And if it is, how could laws be enforced, and how could the perpetrator be identified?
#
"censorship and pornography - (b)",14,0.wpf,g,0
The area of the Internet that seems to attract the most criticism is the availability of pornographic materials to minors and the problem of how to control it. Any attempt to ban information and materials altogether will cause a public outcry from those who believe the Internet should be free of government control and regulation. This lack of action is already causing anxious parents to ban their children from using the Internet.
#
"censorship and pornography - (c)",15,0.wpf,g,0
Neither of these methods will satisfy everybody and it is probable that no solution will. However, until a solution or standard has been arrived at, some companies have been providing software "filters" to aid parents, educators, and employers by filtering out access to any pornographic or offensive material.
One such company is SurfWatch whose home page is available at \Bhttp://www.surfwatch.com\b, or they can be contacted in the United States on 1-800-458-6600. SurfWatch is an alternative to Internet censorship, providing users with the opportunity to limit unwanted material locally, without restricting the access rights of others. You can purchase the SurfWatch software for Windows 95 for approximately $US50.00 and subscribe to the database for an additional $US6.00 per month. This provides an update to your local database filter to constantly keep it up-to-date with new or relocated material.
#
"Internet Security",16,0.wpf,g,0
"Crackers" are people who want to hack into your Internet account or your company's network and use it for purposes other than for what it was originally intended. Without implementing some personal and company security measures, your account and/or your company's network is not automatically safe from intruders simply because they are password-protected.
#
"Personal Security Measures - (a)",17,0.wpf,g,0
Your personal protection against crackers of all kinds is your account password. When you select a password to use, it is automatically encrypted and stored in a file on your provider's computer. If you select a password that can be found in a dictionary, a cracker can easily discover it by breaking into the password file, encrypting every word in the dictionary and then looking for a match.
Don't use the same password for other systems or network accounts, and don't select a password that relates to you personally - especially for your user ID - as this is the easiest password to crack. Some of the most common passwords, and the easiest to crack, include: your name, the name of a relative, a nickname, birthdates, license plate numbers, and telephone numbers.
#
"Personal Security Measures - (b)",18,0.wpf,g,0
The best passwords are those that are the easiest for you to remember, and the hardest for the cracker to crack. Passwords must be at least four characters long but eight characters are recommended; many systems enforce a password of at least eight characters.
The password should contain a mix of letters and numbers or other non-alphabetic characters in a way you can remember! Several experts have suggested that forming your own acronyms from sentences you can remember make the best passwords and are almost impossible to crack. For example, think of a sentence or phrase you can easily remember, such as "Essendon defeated North Melbourne by 24 points." By extracting the first letter of each word, you can create the password: \Bednmb24p\b.
#
"Personal Security Measures - (c)",19,0.wpf,g,0
Once you have chosen a password, never give it to anyone; if necessary, advise them to obtain their own account. Don't write your password down and then leave it lying around where someone could find it. The most common way that accounts are cracked is by people watching over your shoulder as you enter your password (called "shoulder surfing"). Never let someone look over your shoulder while you enter your password and finally, never e-mail your password to anyone.
A special warning exists for anyone who frequently uses a Telnet service. Whenever you use a Telnet service, your password is sent over the Internet in plain text. Crackers have been known to monitor Internet "gateways" (links between networks) with programs that automatically locate and copy passwords as they are sent. If you telnet often, change your password often.
You should change your password on a regular basis as a matter of course, and if you notice strange things happening to your account, don't assume it's a technical problem with the system; change your password immediately and contact your network administrator or service provider.
#
"Personal Security Measures - (d)",20,0.wpf,g,0
One of the great things about using the Internet is the ease of its online shopping. You can browse, view, select, and order goods and items of all kinds directly from your screen. Most vendors offering this type of service allow you to pay for your purchases using credit card information you send to them electronically.
When using the Internet, extra security measures are required as you can never be sure just who is "watching." You wouldn't want somebody obtaining the number of your credit card and then using it to order and pay for items and services you didn't know anything about. Fortunately, the combined efforts of Netscape Communications and CommerceNet have resulted in a reasonably secure method of transmitting this type of sensitive data across the Internet, specifically on Web pages.
#
"Personal Security Measures - (e)",21,0.wpf,g,0
Secure documents are encoded at the sender's end and only decoded once they arrive at the receiver's end. When using Netscape Navigator, a dialog box warns you whenever you are about to transmit data that is not secured. A special icon on the status bar indicates whether or not the page you are currently viewing is secured or not (see \JThe Netscape Window - (c)\j).
If you don't want to send your credit card information from an unsecured page, you may want to e-mail the vendor or provider and ask for alternative methods of payment.
#
"Company Security Measures - (a)",22,0.wpf,g,0
Just as important as individual personal security, is the security of an organization's computer network. The first step in preventing unauthorized access is to ensure that each person with an account on the network is aware of the requirements for selecting and protecting their password. However, many other security measures are required for a network connected to the Internet.
Connecting your local area network to another network such as the Internet makes each machine in your network potentially accessible to everyone on the Internet. The installation of a "firewall" is usually the solution to maintain the advantages and freedom that come with Internet access, but also limit the exposure to crackers.
#
"Company Security Measures - (b)",23,0.wpf,g,0
A firewall acts as a "gateway" between the local network and the outside world. The gateway is either a computer or a "router," and monitors all network traffic. It rejects all incoming traffic that is not directed to the gateway, and selectively forwards communications such as e-mail between the inside and outside networks.
A "proxy server" is a program that controls the flow of traffic through the firewall, but is specific to a particular application, such as ftp.
The firewall deals with the security of the network by assuming that all machines inside the network can trust one another. It also provides a single entry point to the local network that can be closely monitored for security problems by an administrator.
#
"Company Security Measures - (c)",24,0.wpf,g,0
A firewall can run on relatively inexpensive hardware, and when implemented correctly, should be very easy to set up and require little ongoing maintenance. The ideal firewall should also provide a record of defined events and should not interfere or be noticeable to legitimate users of the local network, even when they access resources outside the local network.
Most importantly, the firewall should keep unauthorized people outside the local network from accessing the local network. A firewall can minimize your risk by making it the only computer on your local network that is publicly available and hiding the rest of the computers behind it. You can then focus on the exposed gateway computer and make it as secure as you can.
#
"Company Security Measures - (d)",25,0.wpf,g,0
However, even with such a system in place, it is not a complete security measure. One of the main things that a firewall can't prevent is the leakage of confidential information from the local network to the Internet or another network.
In short, implementing a secure network requires planning, forethought, and a little research. If you find your network under attack by an intruder, a Computer Emergency Response Team (CERT) is available to respond to any security incidents.
#
!,!,!,!,!
4#
20,0
"Contents of 'Public Access Providers - United States of America'",1,0.wpf,g,5_4intro.wav
This section provides a list of Internet access providers based in the USA.
#
"Providers Based in the United States of America - (A)",2,0.wpf,g,0
\BAlterNet\b
\IService Area:\i US and International
A service of UUNET Technologies, Inc.
\IEmail:\i alternet-info@uunet.uu.net
\IPhone:\i (800) 4UUNET3
\BANS\b
\IService Area:\i US and International
\IContact:\i Sales and Information
\IEmail:\i info@ans.net
\IPhone:\i (800) 456-8267
\IFax:\i (703) 758-7717
#
"Providers Based in the United States of America - (B)",3,0.wpf,g,0