Beruflich Dokumente
Kultur Dokumente
WAN (Wide Area Network) is a main network hosting subnetworks and creating a web in a geographic rea, like a continent or a country. Its cheaper to big ISPs (internet services providers) to manage a main network instead of many little networks. Its based in many subnetworks interconnecteds. The biggest WAN existing today is the Internet, which includes many WANs from countries and continents connected by undersea cables called backbones.
A backbone, showing its layers. Backbones are undersea cables which connect the WANs in a main network, the Internet. If one of this cables break, a big area wont have internet access until its repaired.
Network topologies
A network in ring topology is a closed circle where each station is connected to two other stations and a signal will run to all the network until find the target station. The signal trips only to one direction. One of the stations must be the HUB, something as server, to manage the signals. The main problem is, if one of the stations, part of (or all) the network wont work. Nowadays this topology is not used (although this doesnt mean its impossible to exist). It was used mainly in optical fiber communications. A network in tree is a main network based in subnetworks, something like grandparents, parents and children in a Family tree. Its used in big companies, where each area or office has its own network, and all the networks are connected in a main network. A network in bus were constantly LANs, where a main cable (the backbone - dont confuse with the undersea cable with the same name) is used to connect all the computers, and each computer had a conector in T, to get the cables signal, but transfer it again to the remaining stations. The used cables (coaxial) are no longer used (they were replaced by UTP cables, the ones with connectors like cubes). Coaxial cables are nowadays used only for UHF (open TV) channels, from the antenna to the television. A network in star is the most used. Its where all the computers and devices (stations) are connected to a main host (sometimes just a router). The data sent from a computer to the other must be transfered to this host first. Its good because if one of the devices fails, the network is still working. But, if the host fails, all the network stops to work. Since its the most used, its easy to find a star network, like in the computers room in a school, where all the computers is connected to a main computer/gateway, or at home, where all computers and cellphones are connected to a router, by cable or Wi-Fi. Its worth to remember that a network may include many of the topologies. For example, imagine a main tree network with subnetworks in star topology. Its possible and often used.
Bus
Star
Ring
UTP cable
Coaxial cable
Tree
Computers nomeclature
E-commerce are online stores and shopping (commerce) websites. Remember the word commerce. E-banking is online banking service online, like Money transfering or bills paying from the internet. Remember: e banking comes from bank, its like an online bank. E-learning are schools or university from internet. My mother (mother of your owner) is almost finishing pedagogy university from distance, using e-learning. Hacker: someone who understands about computers, mainly about network (security, most of the times). He may be White hat (the good guy. If finds a vulnerability, tells the network owner), gray hat (hes not really bad, but if he finds a vulnerability, will request your Money to tell or fix it, like the security analysts) or black hat (all he wants is to destroy, sometimes just to get famous. Example: Yudhistira :P ). Its come from rat, because rats poke around. Cracker: most of the peoples and ICT teachers say that cracker is the same of black hat hacker from above, the one who wants only to destroy. But, truly, cracker is reverse engineer, who makes warez (illegal copies of softwares and movies, by removing its licenses). My love, verify your notebook for what your teacher calls cracker, but im almost sure about the first option (the wrong one), so i think it will be better if you say that cracker is a guy who knows as much as hackers, but wants only to destroybut verify it first in your notebook! And remember the verb to crack: they crack and destroy everything. Carder: (or bankerdont confuse with e-banking) is the black hat hacker (or cracker, right?) who steals banking card or online payment sites accounts (like PayPal). They can steal it by hacking e-banking sites and getting its database or by sending keyloggers to many peoples. Then they can sell it to other carders or use it, by buying what they want or transfering some Money to their own accounts. The name carder comes from card or carding. Carding is also used as the crimes name, as well as banking (do not confuse with e -banking and avoid this name. Its used mostly only by carders. Prefer carding).
2.
In my work, we use a private software called TronSolution (wont find in internet) to manage products and clients, send e-mails and make reserves for bedrooms or tables. Theres a computer being used to store the database, and all the computers are using the same database. Its in a LAN, but if my father or I must access it, we use TeamViewer from our home to our computers in our office, so whats the name of the network architecture used: internet, intranet or extranet? My friend, Guilherme, when we created a website, attacked his network with DNS Spoofing (that makes possible to redirect users from a site to the other) and made many users who tried to visit Google.com to be redirected to our website. But we verified that he was using a small provider and we received only visitors from his city, So Paulo. What network type did he hack (LAN, MAN, WAN, WLAN)? In february 2012, a ships anchor made the Africas east lose the internet access. What happened to make it possible? While WhiteCollarGroup was active, me and some friends like Guilherme, Rodrigo, Luan, Yudhistira and Irfan have done too many activities. What weve been (black/white/gray hat hacker, cracker, carder/banker...) when doing: (Dont kill me :) ) A) Homepage defacement: modifying websites and putting our own messages.
3.
4.
5.
B) Entering virtual stores and rewritting its code to send to our email all the clients cards and selling it to turkish friends. C) Discovering vulnerabilities, telling the programmer and writting exploits codes to show off the vulnerability. D) Entering websites to steal all its source-codes and selling it, but not modifying it. E) Writting tutorials about hacking and publishing it for free. F) Getting paid softwares or scripts, studying it and removing its protection (or understanding it and creating our own serial, as if we paid for it), and giving it for free in our website. 6. 7. 8. My works manager pays his bills by internet. What did he use? My mothers university is from distance, in the internet. What is she using? My mother bought our sofa in a brazilian known virtual store. What did she use?
Tests (answers)
1. A) LAN (although mixed with WLAN, we can just call LAN) B) Yes, my desktop computer is being used as file and printing server. C) A tree network mixed with stars.
2.
Intranet. When I use teamviewer I can access the computer, and then i use the computer to access the intranet. Thats why its not na extranet. MAN, since it was only for his city. The anchor broke a backbone undersea cable. When WhiteCollarGroup was active, me and some friends have done too many activities. What weve been (black/white/gray hat hacker, cracker, carder/banker...) when doing: (Dont kill me :) ) A) Black hat hacker or cracker B) Carder or banker C) White hat hackers D) Gray hat hackers E) White hat hackers F) Crackers
3. 4. 5.
6. 7. 8.