BasicComputercoursebookFreeUniversityofBolzano Bozen– Dr.PaoloColetti‐Edition 7.0(8October2012)
IntroductionThis book contains course’s lessons held at the Free University of Bolzano Bozen. It contains only the first
part of the courses, namely the lessons on:
computer introduction,
Microsoft Windows,
computer networks,
computer dangers and security.
It does not contain the parts on Microsoft Word, Microsoft Excel, financial functions, Microsoft Access,
computer algorithms, SPSS, Visual Basic for Applications, which are very well covered by the respective
courses’ suggested books.
This book is usually updated every year, please take a look at the edition date.
Disclaimers
This book is designed for very novice computer users. It often contains oversimplifications of reality and
every technical detail is purposely omitted. Expert users will find this book useless and, for certain aspects,
partially wrong.
This book supposes that the user is using Microsoft Windows 7 operating system in English language.
However, most of the book is perfectly readable with other Windows versions, while some menus and
instructions can be rather different if the language is not English (Windows language may be changed on
multi‐language installations: see page 6 for further information).
The novice user in this book is, for simplicity, always considered male. This is not meant to be gender
discrimination.
TableofContentsIntroduction .......................................................... 1
1. Computers .................................................... 2 1.1. Storage ......................................................... 2 1.2. Software ....................................................... 3
2. Microsoft Windows ...................................... 5 2.1. Versions and editions ................................... 5 2.2. Regional and language settings .................... 6 2.3. File system .................................................... 7
3. Computer networks ................................... 13 3.1. Technical aspects........................................ 13 3.2. Communication .......................................... 14
3.3. Internet connections ................................. 17
4. Computer security ..................................... 18 4.1. Encryption .................................................. 18 4.2. Passwords .................................................. 21 4.3. Viruses ....................................................... 23 4.4. Emails ......................................................... 24 4.5. Navigation .................................................. 26 4.6. Attacks from outside ................................. 27 4.7. Backup ....................................................... 28
Index .................................................................. 31
Dr. Paolo Co
Page 2 of 32
1. ComThis chapte
and of the t
1.1. Sto
1.1.1. Me
Before star
terminology
Computers
called bit an
is a quantity
Modern co
quantities:
Kilo
Me
Gig
Ter
Usually the
(let’s say re
quality need
1.1.2. Mo
Over the la
exponentia
transistors
hardware a
months, th
increase wit
1.1.3. De
The compu
capability, c
but very lar
Their main
are more ro
disadvantag
oletti
2
mputerer presents w
typical softw
orage
easures
rting with t
y, which will
have a very
nd all compu
y large enou
omputers are
obyte (KB), a
gabyte (MB)
abyte (GB), a
abyte (TB), a
unformatte
ady to be pr
ds some GB.
oore’slaw
ast 40 years
l growth. Th
in a process
and we may
us leading t
th the same
evices
uter uses sev
cost, speed a
The
can
exte
mov
SSD
rge memory
advantages
obust and th
ge is the limi
rswith a brief d
ware compon
he compute
often be use
elementary
uter data are
gh to store u
e able to d
pproximately
), approxima
approximate
approximate
ed text of a w
rinted on A4
, computer
is growth is
sor doubles
say that the
to a general
rate.
veral device
and portabilit
most used is
not be move
ernal hard di
ved. Its only
Solid State
y cards shape
are that not
hat in most
ted size whic
description o
ents for nov
er descriptio
ed in this bo
y way to stor
e stored as se
usually a lett
eal with en
y 1,000 byte
tely 1,000 K
ely 1,000 MB
ly 1,000 GB o
whole book
paper) or fo
hardware h
summarized
every 18 mo
e performan
exponentia
s to perman
ty.
s the interna
ed. Its size cu
sk is outside
disadvantag
Disks are sta
ed like an h
t having mov
situation th
ch currently
f computer m
vice user.
on, it is use
ok.
re data: they
equences of
er or a digit
normous qua
es,
B or one mil
B or one billio
or one trillio
can fit in so
or a modern
has been con
d by the fam
onths. This l
nce (be it sp
al growth. U
nently store
al hard disk, w
urrently rang
the comput
e is being sli
arting to slow
ard disks wh
ving parts (t
ey are faste
is 250 GB an
main compo
eful to beco
y can remem
bits. A sequ
(even thoug
antity of by
lion bytes,
on bytes,
on bytes.
ome KB, whil
song some M
ntinuously im
ous Moore’s
law can be e
eed or capa
Unfortunately
and move
which usuall
ges from 500
ter, has the s
ghtly slower
wly invade t
hich can ent
hey do not r
er than hard
nd their high
Basic
E
onents, of the
ome proficie
mber only 0 o
ence of 8 bit
h sometime
ytes, forcing
e for an ima
MB are requ
mproving its
s law which
extended to
acity) of hard
y software’s
data, which
ly is inside th
0 GB to 2 TB.
same size an
r.
he market. T
tirely replace
rotate at hig
disks (up to
price.
c Computer
Edition 7.0 (0
e most comm
ent with th
or 1. A value
ts is called a
s 2 bytes are
us to intro
age in a goo
ired, while a
s performan
says that the
almost eve
dware doub
s performanc
h vary a lot
he computer
On the othe
d obviously c
They are not
e the interna
gh speed like
o 10 times fa
course book
08/10/2012)
mon devices
he data size
e of 0 or 1 is
byte, which
e necessary).
oduce other
d resolution
a film in high
ces with an
e number of
ry aspect of
les every 18
ce does not
in terms of
r box and
er hand, an
can be
t disks at all,
al hard disk.
e hard disks)
aster). Their
k
)
s
e
s
h
.
r
n
h
n
f
f
8
t
f
,
.
)
r
Basic Comp
Edition 7.0
Other comm
external dev
1.2. SofSoftware ca
The operati
hardware a
Mic
Lin
sys
Ma
Programs a
Internet nav
Data is ever
system) to
data.
1.2.1. Sof
Software ca
to be modif
Subdivision
free
inst
priv
pro
sha
fee
adv
mo
com
Mic
puter course
(08/10/2012
CD and
respect
written
which a
are ava
appeared
Memory
size is no
is used m
mon ways to
vices such as
ftwarean be divided
ing system ta
nd the huma
crosoft Wind
ux/Unix (it i
stem,
acintosh com
re software
vigation, the
rything whic
store inform
ftwarelice
an be divided
fied.
by cost is:
eware, softw
titutions suc
vate compan
ogram or Linu
reware, soft
or delete
vertisement
st famous ex
mmercial, so
crosoft Wind
book
2)
DVD are the
tively. They a
are re‐writt
are available
ailable only
d on the ma
y stick or USB
ow up to 64 G
mostly to mo
store and m
s photo cam
d into three b
akes care, th
an‐computer
dows (with it
is a family o
mputers have
which is use
e Calculator f
ch is produce
mation, e.g. a
enses
d, from a com
ware which i
h as univers
ny who do
ux operating
tware which
it; or softw
banners, and
xample is Wi
oftware for w
dows operati
e two moder
are divided in
ten several t
on most com
on some c
rket, the Blu
B pen drive is
GB, however
ove data.
move data are
eras, cellular
big categorie
hrough the p
r interaction
ts versions X
of very simila
e their own o
ed to do pa
for mathema
ed either by
a document
mmercial po
s completely
ities, or dev
it for dum
system;
is initially c
ware which
d a complete
nZip compre
which the u
ng system o
rn ways to st
nto R which
imes. They r
mputers, and
computers.
‐ray with 25
s the most us
r its reliabilit
e through a
r phones or m
es: operating
processor an
. There are c
P, Vista and
ar operating
operating sys
rticular task
atical operat
the user or
file produce
oint of view,
y costless. T
elopers who
mping reason
ostless but a
has two v
e advertisem
ession progra
ser has to p
r Photoshop
tore data. Th
may only be
require a CD
d a CD‐write
A new gen
GB size.
sed way to t
ty is not perf
memory car
music player
g systems, pr
d the mothe
currently thr
Windows 7)
g systems), w
stem Mac OS
s, e.g. Word
ions.
by programs
ed by Word
using two fe
The producer
o do it for pe
ns. Some ex
after a certa
ersions: a f
ment‐free on
am;
pay a license
p image editin
hey contain a
e written onc
‐reader or a
r or DVD‐wr
eration of h
emporary st
ect, therefor
d, used by
rs.
rograms and
erboard, of c
ee widely us
, which is the
which is the
S X.
d for docume
s (sometime
is data, a d
eatures: the
rs of this so
ersonal inter
xamples are
ain period th
free one, b
ne, for which
e to use it.
ng program;
Dr. P
about 700 M
ce and RW w
DVD‐reader
iter to be wr
high capacit
tore and mov
re it
data.
controlling th
sed operating
e market lea
new costles
ent writing,
es even by th
ownloaded
cost and the
ftware are e
rest or adver
e Skype com
e user is ask
but incomple
h the user m
Common ex
Paolo Coletti
Page 3 of 32
MB and 4 GB,
which may be
r to be read,
ritten, which
ty discs has
ve data. Its
he computer
g systems:
ader,
ss operating
Explorer for
he operating
web page is
e permission
either public
rtisement or
mmunication
ked to pay a
ete or with
ust pay. The
xamples are
i
2
,
e
,
h
s
r
g
r
g
s
n
c
r
n
a
h
e
e
Dr. Paolo Coletti Basic Computer course book
Page 4 of 32 Edition 7.0 (08/10/2012)
private, software uniquely built, under payment, for a specific customer to fit his needs. Only the
costumer may use it. A typical example is the university’s students‐courses‐exams‐professors
database system.
The permission to be modified can seem a trivial question for the novice user, however for program
developers and computer experts being authorized to modify a software is a great advantage since it can
be improved, checked for errors and tailored to specific needs. The “open source versus proprietary
software” is a strong ethical and economical debate in the computer scientists’ community. Subdivision by
permission to modify is:
open source software may be studied, used and especially modified by anyone. The software
developers at the same time legally authorize any modifications and they distribute the source of
the software to put other developers in a condition to easily modify it. Open source software is also
automatically freeware. The most typical example is Linux operating system.
copyleft software is open source but carries the restriction that any modification must be
distributed as open source and copyleft, thus impeding that software becomes, after a
modification, proprietary. The most famous copy left contract license is the GNU Public License (see
http://www.gnu.org/licenses/gpl.html).
proprietary software is distributed (costless as Adobe Acrobat Reader, or as a shareware as WinZip,
or most often sold as commercial software as Microsoft Office) with the explicit legal warning not
to modify it and technically locked to prevent other developers to see or modify its source.
1.2.2. Softwarenaming
Software is usually identified by a name, for example “Linux” or “Microsoft Office”, sometimes by a
distribution/edition name “Linux Ubuntu”, “Microsoft Office Professional” and very often by a version
number, a sequence of numbers, points and letters (sometimes, as for Windows, commercial names) which
distinguishes the changes made by developers with time, such as “Linux Ubuntu 12.10” or “Microsoft Office
Professional 2010”. Obviously the version numbers of open source software changes rapidly, due to the
many developers working on them.
1.2.3. Dataformatlicenses
Data need to be saved with a certain structure, called formats. For example, a plain text file may be simply
saved as a sequence of letters and symbols, which corresponds to the TXT format. More complex
structures, such as images, videos, but also formatted texts, need more elaborated formats to be stored.
These formats may be:
closed proprietary, a format owned by a software company and kept as a trade secret. In this way
only programs build by that company can use those data files and no other company is able to
endanger its monopoly. A famous example is DOC format which, until 2007, was kept secret by
Microsoft, thus preventing competitors from building alternatives to Microsoft Word program.
open proprietary,, a format publicly available but whose improvements and control are under the
ownership of a software company. A typical example is the new Word format DOCX.
open, a publicly available format which follows official standards whose control is under ownership
of public organizations, such as American ANSI, German DIN or Italian UNI. Typical examples are
image’s format GIF or formatted text’s format PDF or web page’s format HTML.
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 5 of 32
2. MicrosoftWindowsMicrosoft Windows is currently the market leader operating system, it is the usual interface which appears
when the user turns a personal computer on.
2.1. VersionsandeditionsMicrosoft released Windows XP in 2001 and for many years it has been the main Microsoft operative
system. In May 2012 it is still installed on approximately 30% of computers (source gs.statcounter.com).
Windows Vista was released in 2007 and it was not a market success.
Currently it is installed on less than 10% of computers.
Microsoft released Windows 7 in 2009, which is the currently default
Microsoft operative system. It is installed on approximately 50% of
computers. Its editions are:
Starter and Home Basic, cheap versions with severe limitations, used
mostly on small notebooks;
Home Premium, home user’s edition;
Professional, personal business’ edition which includes more
network programs;
Enterprise/Ultimate, Professional edition with more network utilities
available to companies/individual users. Enterprise edition is
currently (June 2012) installed at UNIBZ
2.1.1. Computerlockingproblem
Microsoft Windows sometimes becomes unstable: it can unpredictably, without any warning and when the
user does not expect it and typically when he is doing something very important and urgent, lock and
refuse to respond to user’s actions. When this happens, it is usually caused by the program that was used
and therefore the first thing to do is to try to close the current program. If this does not improve the
situation, the only other solution left is to turn off the computer. The list of operations to try until the
computer answers to user’s commands is:
1. if the mouse works, click the X button on the
program window or otherwise press ALT+F4;
2. press CTRL+SHIFT+ESC; select the program from the
list and press End Program;
3. press CTRL+ALT+DEL and, from the bottom right icon,
choose Shut Down;
4. press the computer on/off button;
5. unplug the electric power.
In any case all the current unsaved work will be lost; in the
last two cases the operating system can sometimes be
damaged but very often it will repair by itself the next time
the computer is turned on. Therefore it is always a very
good idea to save very often the current work, especially
when it is important, urgent, or difficult to redo.
Home Premium
Professional
Enterprise/Ultimate
Home Basic
Starter
Dr. Paolo Coletti Basic Computer course book
Page 6 of 32 Edition 7.0 (08/10/2012)
2.2. Regionalandlanguagesettings With a multilanguage Windows installation, keyboard settings or menus’ languages may be changed
clicking on the Start icon”, choosing “Control panel”, then “Clock, Language and Region”, then “Change
Display Language”, and modifying the appropriate setting.
Another interesting
option, available on
every Windows
installation, is the
numbers’ and dates’
formats. When in
“Clock, Language and
Region”, choosing
“Region and
Language” and
clicking on “Formats”
then on “Additional
Settings” the user is
able to change the
format of numbers,
especially the
decimal separator,
the currency and the
date format,
especially the English
(month‐day) and
European (day‐
month) formats.
While the keyboard settings can be adjusted from this menu, it is easier to adjust it directly from the right
side of the application bar, simply clicking on keyboard icon and selecting the appropriate one.
2.2.1. Keyboardsandlanguages
Before starting this section it is necessary to take a close look at your keyboard. Locate these keys since
they will be used in the rest of this manual and are very useful in many programs:
English keyboard German keyboard Italian Keyboard Main function
CTRL STRG CTRL
ALT ALT ALT
ALTGR ALTGR ALTGR Produce character on the key’s right left
F1 to F12 F1 to F12 F1 to F12
DEL ENTF CANC Delete next character
INS EINFG INS Toggle insert/overwrite mode
HOME or POS1 Go to beginning
END ENDE FINE Go to end
PG and PG BILD and BILD PAG and PAG Go one page up or down
Basic Comp
Edition 7.0
BACKSP
ENTE
TAB
SHIF
CAPS LO
ARROW
In this book
press key A,
2.3. FileBefore start
1. clic
2. ope
3. cho
4. cho
5. cho
6. des
In this way
2.3.1. Fil
Software is
a lot of files
its data, an
icon.
Another spe
directories
clicking on a
Each storag
window, w
subdirector
and so on i
another sto
as leaves. O
contains pr
which conta
are usually
puter course
(08/10/2012
PACE or
ER or B or
FT or
OCK or
WS
k the English
, then press
esystemting this sect
k on the Star
en the Contro
oose Appeara
oose Folder O
oose View
select “Hide e
extensions (s
esanddir
stored on st
s for itself an
d the user u
ecial object
and is repr
a directory o
ge device is a
which conta
ries may con
n a hierarch
orage device
On UNIBZ co
ograms, “E:”
ains user’s r
reserved for
book
2)
name for ke
key B, and th
mtion it is nece
rt menu icon
ol Panel
ance and Per
Options
extensions fo
see section 2
rectories
torage devic
nd for its dat
uses some fi
is the direct
esented wit
opens a new
a big directo
ains directo
ntain other f
ical way, for
) as the root
omputers, th
” which cont
eserved spa
r floppy disks
eys will be in
hen release
essary to do
n, on the low
rsonalization
or known file
2.3.3) are sh
ces in a spec
ta, a program
les for his d
tory or folde
th an icon d
window whi
ory, accessib
ories and f
files and oth
rming a tree
t, directories
he usual har
tains courses
ce. Disks dir
s, and “D:” o
INVIO or TAB or
dicated. Wh
both keys.
the followin
wer left corne
n
e types”.
own and file
ial container
m usually us
ata. A file is
r, which is b
depicting a y
ich presents
ble from My
files. Each
her subsubd
with the ha
s as branche
rd disk are “
s informatio
rectories “A:
r “Z:” for CD
M
hen A+B is in
ng operations
er of the scre
e types are be
r called file. T
ses one file f
s represented
basically a co
yellow close
the director
Computer
of these
directories,
rd disk (or
es and files
“C:” which
n and “F:”
” and “B:”
‐reader.
Delete last
Enter
Move throug
Capitaliz
Keep SHIF
Move th
dicated, it m
s:
een
etter recogn
The operatin
for itself and
d by a small
ontainer for
ed or open f
ry content.
Dr. P
t character
r data
h the windo
ze letters
FT pressed
he cursor
means that th
nized.
ng system us
d other files f
l picture call
files and oth
folder. Doub
Paolo Coletti
Page 7 of 32
w
he user must
ses
for
led
her
ble
i
2
t
Dr. Paolo Co
Page 8 of 32
Choosing th
ways to loo
information
Each file an
path which
containing
“Common”
Files\HP\Co
“C:\Program
Note that, f
A special an
the small cu
link is simpl
user clicks o
real file or
meantime s
copy/move
probably ca
2.3.2. Fil
When doub
important d
double
double
the pro
which p
Copying a f
Copying a d
name, toge
copy a file
used being:
oletti
2
he “Change
ok at files an
n on files and
nd directory
appears on
directory fo
in “HP”
ommon” as c
m Files\HP\C
for Windows
nd tricky obje
urved arrow
ly an address
on the link,
directory (if
somebody d
the link and
ause it to ma
es’operat
ble clicking
difference:
clicking on a
clicking on a
ogram to ope
program sho
file means r
directory me
ether with it
or directory
your view”
d directories
d directories
can be univo
n the addre
ollowed by
directory in
can be seen
Common\ HP
s operating sy
ect is the lin
w on the left
s to a file or
the comput
Windows ca
deleted or m
d not the rea
lfunction. Th
tions
on a file, W
a program ru
a file calls th
en the file.
uld open the
eproducing
eans reprod
ts entire tree
y windows o
menu of a d
s, the most i
such as thei
ocally identi
ss bar of th
“\” and the
n “Program
from the ad
PeDiag.dll”.
ystem, capit
k or shortcut
corner clear
directory, it
ter behaves
an find the r
moved it). H
l file or direc
herefore it is
Windows usu
uns the progr
e program a
If no progra
e file.
it to anothe
ucing it to a
e of subdire
ffers severa
directory wi
mportant w
r size and da
fied by its ab
he directory
e file name.
Files” dire
ddress bar. W
al or small ca
t. Although i
rly indicates
is not a real
exactly as if
real one, wh
owever, any
ctory; especi
a good idea
ually starts
ram which w
associated w
m is associa
er location o
another loca
ectories and
l methods, t
ndows will p
ay being the
ate of last mo
bsolute path
window, w
For examp
ectory in t
While, the HP
aps letters in
its icon looks
that this ob
l file or direc
f the user is
hich is not th
y copy/move
ially copying
a for novice u
a program.
was double cl
with that file
ated with th
or to the sa
ation, or to
files. To
the most
Basic
E
provide the
e Details whi
odification.
h or address
hile for files
ple, the abso
the C: hard
PeDiag.dll fil
n paths are p
s like a file ic
bject is a link
ctory. When
clicking on
he case if in
e operation
/moving the
users to avoi
The user is
icked
and runs it,
at file type,
me location
the same lo
c Computer
Edition 7.0 (0
user with fi
ich can show
. For directo
s it is the p
olute path
d disk is “
le has the ab
perfectly equ
con,
k. A
the
the
the
on the link
e link to anot
d using links
s totally una
at the same
Windows as
with a diffe
ocation with
course book
08/10/2012)
ive different
w interesting
ories it is the
ath of their
of directory
“C:\Program
bsolute path
ual.
k will simply
ther disk will
s at all.
aware of an
e time telling
sks the user
erent name.
h a different
k
)
t
g
e
r
y
m
h
y
l
n
g
r
.
t
Basic Comp
Edition 7.0
dra
not
dra
sele
Sele
clic
des
sele
des
Moving a fi
means mov
or directory
dra
rem
sele
bec
but
sele
des
To create a
dra
unt
sele
crea
Deleting a f
trash can is
subdirector
sometimes
offers sever
dra
sele
sele
To rename
accepts eve
characters m
To create a
“New” and
S
e
v
which mean
90% depen
the selected
puter course
(08/10/2012
g the object
t appear, pr
gging. Relea
ect the obje
ect “copy”.
k the right
stination is th
ect the obje
stination is th
ile means m
ving it to ano
y windows of
g the object
move it. Relea
ect the obje
comes lighte
tton. Select “
ect the obje
stination and
link to a file
g the object
til it appears.
ect the obje
ated in the s
file means o
s emptied. D
ries and file
files are del
ral methods,
g the object
ect the objec
ect the objec
a file or dir
ery name, b
may be forbi
new directo
“Folder”. Aft
Sometimes fi
email; other
via email. Th
ns using a sp
ding on the
d files and di
book
2)
to the desti
ress CTRL ke
se the objec
ect and clic
Point the m
mouse but
he original lo
ct and press
he original lo
oving it to a
other locatio
ffers several
to the desti
ase the obje
ect and click
er. Point the
“paste”;
ect and pre
d press CTRL+
or directory
t to the dest
. Release the
ect and click
same directo
often putting
Deleting a dir
es. Pay spec
leted withou
the most us
to the trash
ct and click th
ct and press
ectory, simp
but novice u
idden.
ory, simply ri
ter the creat
les occupy a
times files m
hese two op
pecial progra
file type) th
irectories.
nation. If a p
ey to have
ct in the dest
ck the right
ouse to the
tton. Select
ocation, the f
s CTRL+C. Po
ocation, the f
another loca
n together w
methods, th
nation. If a p
ct in the des
k the right
e mouse to t
ess CTRL+X
+V.
y:
tination of th
e object in th
k the right m
ory.
g it into the
rectory mea
cial attentio
ut passing th
sed being:
can and rele
he right mou
DEL key.
ply select the
users should
ight click the
tion, rename
a lot of space
must be put i
perations are
m (WinZip o
e file size an
plus symbol
it appear w
ination;
mouse bu
destination
“paste”. If
file name cha
oint the mou
file name cha
tion losing t
with its entir
he most used
plus or a link
stination;
mouse butt
the destinat
and the ico
he link. If a
he destinatio
mouse butto
trash can w
n putting it t
on, since no
hrough the t
ease it;
use button. S
e object, clic
d stick with
e mouse and
e it.
e and need t
in a package
e accomplish
or IZArc or th
nd produce a
does
while
tton.
n and
f the
anges to “co
use to the d
anges to “co
the file in th
re tree of sub
d being:
symbol doe
on. Select “
tion and clic
on becomes
link symbol
n;
on. Select “c
where it can
to the trash
ot always th
trash can. To
Select “delet
ck on the na
letters and
d choose
o be reduced
e to remain t
hed compre
he operative
a new single
opy of …”;
destination a
opy of …”.
e original pl
bdirectories
s appear, pr
“cut” and th
ck the right
s lighter. Po
does not ap
create short
be recupera
can togethe
he trash ca
o delete a fi
e”;
ame and rety
numbers a
d to save dis
ogether or t
ssing a set
system itsel
e file called z
Dr. P
and press CT
ace. Moving
and files. To
ess CTRL or S
he icon
mouse
oint the mo
ppear, press
tcut”. A link
ted unless t
er with its e
an works co
le or directo
ype it. Usua
and spaces,
sk space or to
to be sent as
of files and
f) to reduce
zip‐archive co
Paolo Coletti
Page 9 of 32
TRL+V. If the
g a directory
o move a file
SHIFT key to
ouse to the
CTRL+SHIFT
k is
the
ntire tree of
orrectly and
ory windows
lly Windows
since other
o be sent by
s a single file
directories,
(from 0% to
ontaining all
i
2
e
y
e
o
e
T
f
d
s
s
r
y
e
,
o
l
Dr. Paolo Co
Page 10 of 3
To compres
1. sele
2. clic
3. sele
File
4. a di
5. in t
ZIP
6. in t
sho
unc
suc
Other files o
(this is a cop
To extract f
menu choo
together wi
When doub
a window a
compressio
window sin
directory si
extracted o
button of th
2.3.3. Fil
Windows id
it is a 3 or 4
program wi
page 7. The
File type
Program
Compress
Text
Documen
Sheet
Image
Video
oletti
32
ss a set of file
ect the files a
k the right m
ect “IzArc” o
e…”,
ialog box app
his dialog bo
to be compa
his dialog an
ould be open
compressed
h as “AES 12
or directorie
py and not a
files from a z
ose the appr
ith all its dire
ble clicking o
as if it were
n program,
nce it is a ve
imply draggi
or when the
his special w
etypes
dentifies a fil
4 character
ill open that
e most impor
Typical
m
ed
nt W
Explor
es and direct
and directori
mouse key,
or the insta
pears asking
ox you must
atible with o
n encryption
ned by anybo
only by peop
28 bit”, and p
es may be ad
move opera
zip‐archive fi
ropriate extr
ectories’ stru
on a compres
a directory.
with the list
ery unreliabl
ing them to
user wants
indow.
e type by its
acronym. Us
file. If the fi
rtant file type
l programs t
its
WinZip
Not
Word / Acroba
Ex
rer / Picture
Office Pictu
Media
tories:
ies all togeth
lled compre
you to choo
also choose
ther program
method (se
ody, then ch
ple knowing
provide the p
dded later to
ation) if it is
ile, simply cl
ract option:
ucture.
ssed file, if th
But it is not
t of the zip‐
e way to m
o the directo
to preserve
s extension, w
sing the file
le extension
es are:
hat open it
self
p / IZArc
tepad
at / Powerpo
xcel
Fax Viewer /
ure Manager
a Player
her,
ession progra
ose the zip‐ar
the compre
ms;
e section 4.1
hoose “None
a proper pa
password.
o the zip‐arch
not encrypte
ick the right
the content
he compress
a normal di
archive’s co
odify files! F
ory. When t
e the origina
which is ever
extension, W
n does not sh
oint .
/ Paint /
r .
am and sele
rchive name
ession metho
1 on page 18
e”: Otherwis
assword, cho
hive simply d
ed.
t mouse key
t will appea
sion program
irectory, it is
ntent: the u
Files can be
he entire co
al tree struc
rything after
Windows kno
how up, follo
Typical ext
.exe .com
.zip
.tx
.docx .doc .rt
.xlsx .xl
jpg .jpeg .gif
.avi .mov .m
Basic
E
ect somethin
and its dest
od, which is s
8) may be ch
se, if you wa
oose any of t
dragging the
on the file a
ar in the loc
m is properly
s simply a w
user should
copied from
ontent of th
cture, it is be
r the last dot
ows the file
ow the instru
tensions
m .bat
p
t
tf .pdf .ppt
s .csv
f .bmp .png
mpg .mpeg
c Computer
Edition 7.0 (0
ng like “Add
tination;
strongly sugg
hosen. If you
ant the zip‐a
the encryptio
m on the zip
and from the
ation you h
y installed, it
indow, prod
not open file
m this windo
he zip‐archiv
etter to use
t in the filena
type and de
uctions at se
Typica
course book
08/10/2012)
d to Archive
gested to be
r zip‐archive
rchive to be
on methods,
p‐archive file
e drop‐down
ave chosen,
will open in
duced by the
es from this
ow to a real
e has to be
the Extract
ame. Usually
ecides which
ection 2.3 on
al icons
k
)
e
e
e
e
,
e
n
,
n
e
s
l
e
t
y
h
n
Basic Comp
Edition 7.0
Audio
Web pag
2.3.4. Fil
For each fil
Click the rig
select “Pro
shows the l
object, whil
group this
important b
rea
rea
is a
list
writ
sub
mo
writ
dele
full
The owner
groups or u
administrat
2.3.5. Ne
On UNIBZ L
from every
\\u
The
sect
\\u
nam
\\u
stud
2.3.6. Ro
Whenever t
icons, Docu
as it has bee
\\ubz01fst\
enrolled in
university’s
puter course
(08/10/2012
ge
epermiss
le Windows
ght button o
oprieties” an
list of users
le not listed
dialog box
being:
d permission
d and execu
program;
content (for
te permissio
bdirectories;
dify permiss
te permissio
ete, move, re
control, sam
of the file u
users. A spe
tion of comp
etworkfold
LAN there ar
computer. T
bz01fst\cour
ese files mus
tion 2.3.4 on
bz01fst\cour
me, which wi
bz01fst\stud
dent’s disk F
oaminguse
the user log
uments, conf
en left on th
\students\, f
2012 it is
computer, t
book
2)
Media Play
Exp
ions
7 operative
of the mous
nd “Security
or groups of
users may n
x displays t
n, to copy an
te, same as
r directories)
on (for direc
sion (also cal
on), same a
ename, save
me as modify
usually has f
ecial group is
uters) which
dersatUN
e shared ha
These are cal
rses\course_
st never be
n page 11); th
rses\exam_c
ill contain ex
dents\, follow
F, desktop, an
erprofilea
gs in on a ne
figuration), w
e last compu
followed by
\\ubz01fst\s
that compute
er / WinAmp
plorer
e system use
se on a file o
y”. The secu
f users who
ot access it.
the permiss
nd open the o
read, plus ru
, to see the c
ctories), to
lled, when re
as read and
e modificatio
y, plus chang
full control
s the Admin
h has full con
IBZ
rd disks on w
led network
_coletti whic
opened dou
hey should b
coletti\, follo
xam files and
wed by yea
nd configura
atUNIBZ
ew compute
which is obvi
uter used, w
year, facult
students\Us
er retrieves
p
es a permiss
or directory
urity dialog
may access
For each use
sions, the m
object;
un the object
content;
create files
eferred to a
d execute,
ons;
e permission
on it and m
nistrators gro
ntrol on every
which comm
k folders. Som
ch contains u
uble‐clicking
be copied on
owed by use
d which is acc
r, faculty an
tion.
er, usually he
ously very a
henever the
ty and user
er2012\Eco\
all his profile
.mp3 .
.html .
sion.
and
box
this
er or
most
t if it
and
file,
plus
ns.
may change p
oup (contain
y object.
mon informat
me of them a
utility files t
from here,
each user’s
r’s login nam
cessible only
nd user’s lo
e should find
nnoying. In o
user logs of
r’s login nam
\dpfeifer). W
e’s stuff from
.wav
.htm
permissions
ning the use
tion is stored
are:
hat will be
otherwise t
desktop bef
me or the us
y by the user
gin name, c
d a complet
order to let
ff all his profi
me (for exa
Whenever he
m this directo
Dr. P
P
or add new
ers involved
d, so that it
used during
they will be
fore opening
ser’s last nam
r;
contains a c
te new profi
him find alw
ile is copied
mple, for D
e logs in ag
ory.
Paolo Coletti
age 11 of 32
w authorized
in technical
is accessible
the course.
locked (see
g them;
me and first
opy of the
le (Desktop,
ways his stuff
on directory
Diana Pfeifer
gain on any
i
2
d
l
e
.
e
t
e
,
f
y
r
y
Dr. Paolo Coletti Basic Computer course book
Page 12 of 32 Edition 7.0 (08/10/2012)
This mechanism, called roaming user profile, works fine only if the user is not using too much disk space
(which is usually 300 MB, but it is a good idea to stay below 150 MB). If the user is over quota, the system
sends a warning via email to the user and, if the user remains over quota, this mechanism does not work
anymore. Moreover, if the user still remains over quota, he will be forbidden from saving any file on the
computer he is currently using.
Therefore it is a good idea to always work on a USB pen drive (which is then copied on another personal
computer) and to periodically check the disk space looking at the proprieties of this directory. If a warning
email has been received or, even worse, roaming user profile does not work anymore, files need to be
deleted not from the current computer (since the mechanism is not working anymore) but directly going
through this directory.
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 13 of 32
3. ComputernetworksThis part of the book is dedicated to computer networks from a user’s perspective. Nowadays a computer
is very likely to belong to some company’s network, or to be connected to the Internet via an Internet
provider, and is therefore exposed to all the typical network problems. Without entering into technical
details, this section will explore the situations in which a novice user can find himself in troubles and how
he can try to survive dialoguing with network administrators in their own strange technical language.
3.1. TechnicalaspectsA computer network is a set of devices which communicate and share resources. These devices are mostly
computers, and sometimes stand‐alone hard disks, telephones, printers and terminals (processorless
computers which must rely on other computers to work).
3.1.1. Serverandclient
A computer network interaction is based on the client server architecture. When considering a single
interaction, one computer is the server and the other one is the client. The server is the computer which is
offering its resource, usually programmed to wait until someone asks for its resource. The client is the
computer which uses the resource, which sends the request to a waiting server.
For example, when sending a document to the printer, the user’s computer is the client while the printer is
the server; when retrieving personal emails, the user’s computer is the client which connects to the
mailserver asking for available emails. When talking to a friend on an Internet chat, the interaction is
composed of two different interactions: the user’s computer as a client is connected to the chat room’s
computer acting as a server, and the friend’s computer does the same interaction.
The same computer may be the client for a service and the server for another service. For example, a
library computer may have a CD inside its reader shared to the network (server for the CD) and may be at
the same time used by a user to print his own documents (client for the printer).
3.1.2. Areas
Computer networks are commonly divided into three categories:
Local Area Network (LAN or Intranet), usually the network of computers in the same building or
belonging to the same owner. Inside the LAN every computer is well identified and usually every
user is known. It is considered a trusted area.
Wide Area Network (WAN or Internet), which is everything which connects LANs. Computers’ and
users’ identification is very hard and anonymity is possible. It is considered a dangerous area.
Virtual Private Network (VPN) is a way to recognize a computer outside the LAN as a trusted
computer: the user is identified with a password and his computer, even though connected via
Internet, will be considered as part of the LAN, for as long as it remains connected. VPN is typically
required to identify portable computers connected via wireless connection.
3.1.3. Transferspeed
The network connecting components are the cables, which determine the speed of the LAN. Cables have a
speed measure in bps (bits per second) which indicates how many bits can flow through the cable in one
second.
Dr. Paolo Co
Page 14 of 3
Eth
for
sup
dur
Fast
Gig
A w
usu
To find out
connection
to find out
through an
second) and
48 seconds.
3.2. ComInside a com
to the Inter
3.2.1. We
A web brow
It runs dire
servers, ide
pages. The
Microsoft In
are Mozilla
and Safari, t
3.2.2. Ma
A mail read
user’s com
collecting a
proprietary
Mozilla Thu
Another wa
enter and
downloadin
installation
be accessed
care of ema
long email,
The most fa
exactly like
providers.
oletti
32
ernet cables
example, a
pposing no o
ring the trans
t Ethernet ca
a Ethernet c
wireless netw
ually a speed
t how much
speed in bp
the numbe
Fast Ethern
d then divide
.
mmunicmputer netw
net or even
ebbrowse
wser is a clie
ctly on the u
entified with
market lea
nternet Explo
Firefox, an
the browser
ailreader
der is a clien
puter as a
nd dispatchi
software. It
underbird.
ay to read an
read his re
ng them nor
of a mail rea
d from home
ails backup. B
which can b
amous webs
e Microsoft
s have a spe
600 MB mov
one (neither
sfer.
ables have a
ables have a
work, a cable
around 30‐8
h time does
s by 8 to find
er of second
net connecti
e 600 MB (o
cationwork many co
to internal c
er
nt program t
user’s comp
h the www.
der (about
orer, a freew
open source
for Mac OS
nt program
client and c
ing emails. T
t has many c
nd send ema
eceived ema
r using any
ader program
e, office and
But on the o
be costly and
site interface
Outlook, an
ed of 10 Mb
vie can be tr
r users nor c
speed of 10
a speed of 1 G
eless networ
80 Mbps, de
s it take to
d out the by
s it takes fo
ion, find out
or 600,000,00
ommunicatio
omputers.
to navigate t
uter as a cli
prefix in th
35% of use
ware proprie
e software,
X,
to send and
connects to
The market le
competitors,
ails is throug
ail and sen
client. It ca
m; old receiv
d while trave
ther hand it
d, in some s
es are the M
nd the Web
bps and can
ransferred in
computers)
00 Mbps.
Gbps.
rk where co
pending on t
transfer a f
te rate per s
or the file tr
t the speed
00 bytes) by
on programs
the WWW a
ent and con
he Internet n
s according
tary softwar
Chrome, the
d retrieve e
a mail‐serv
eader is Mic
, the most fa
gh webmail s
d new one
an be usefu
ved emails a
eling, even w
requires a c
ituations, im
Microsoft Ou
bmail interfa
thus carry 1
n 8 minutes f
is using tha
mputers use
the wireless
file with a s
second and t
ransfer. For
of 12.5 MB
y 12.5 (or by
s are installe
and retrieve
nnects to ext
name, to re
to recent s
re. Its main c
e browser fr
mails. It run
ver, a progr
crosoft Outlo
amous being
systems, whi
s acting dir
l for variou
re always av
without a pe
ontinuous fa
mpossible an
tlook Web A
ace, used a
Basic
E
1.25 MB each
from one co
t network t
e radio signa
generation.
size express
then divide t
example, to
B per second
12,500,000
ed on Intrane
web pages.
ternal web‐
etrieve web
statistics) is
competitors
rom Google
ns directly o
ram in char
ook, a comm
g the open s
ich are webs
rectly on th
s reasons: i
vailable on th
ersonal lapto
ast connectio
d usually the
App, where
and persona
c Computer
Edition 7.0 (0
h second, m
omputer to a
ract for oth
als to comm
ed in bytes
the file size b
o transfer a
d (12,500,00
) to find out
et computers
n the
rge of
mercial
ource
sites where t
he mail‐serv
it does not
he website a
op; the mails
on even to w
e email spac
the web int
alized by mo
course book
08/10/2012)
eaning that,
another one,
er purposes
unicate, has
, divide the
by the speed
600 MB file
00 bytes per
t the time of
s to connect
the user can
ver, without
require the
and can thus
server takes
write a single
ce is limited.
erface looks
ost Internet
k
)
,
,
s
s
e
d
e
r
f
t
n
t
e
s
s
e
.
s
t
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 15 of 32
3.2.3. PostaElettronicaCertificataPEC
When sending an email, the sender has no proof that it has been sent, for example to be used in a court of
justice, and no guarantee that the email has been dispatched. Some mail readers use a receipt system, but
the receiver is not obliged to send back the receipt.
In order to overcome these problems, many solutions have been proposed. The Italian Posta Elettronica
Certificata (PEC) system has become one of the most widespread solutions, thanks to law Decreto
Ministeriale 6 May 2009 which guarantees a free PEC email address to every citizen and thanks to law
82/2005 which determines that PEC receipts are legal proves.
When an email is sent from a PEC address to another PEC address, the sender receives two receipt: the first
one is a proof that the email has been sent with date and time, while the second one is a proof that the
email has been dispatched to the mailbox of the receiver. This does not represent a proof that the email
has been actually read, but from the moment the email is dispatched to the mailbox it is the receiver’s
responsibility to read it. Under this circumstances, it is perfectly equivalent to “raccomandata con ricevuta
di ritorno”. Emails can be send also from a PEC address to a non‐PEC address, and in this case the receiver
gets only the sent proof but not the dispatched proof, like the “raccomandata semplice”. When an email is
sent from a non‐PEC address to a PEC address, no receipt is produced and this is equivalent to a standard
letter.
Moreover, even though it is not officially required, PEC to PEC also guarantees that content be not altered
and that sender’s email address is the indicated one. However, it is important to note that PEC alone does
not guarantee that the sender is really the person who claims to be and that content remains unread until
it reaches destination. In order to overcome these last two problems, encryption and digital signature (see
section 4.1 on page 18) must be used.
3.2.4. VoiceoverIPprograms
Voice over IP (VoIP) programs are able to use the computer connection as a substitute for standard
telephone. Equipped with either microphone and headphones or with a real telephone‐like device, the user
can send his voice through the Internet to remote computers or even to real remote telephones, thus
saving on telephone bills.
VoIP requires a subscription to a VoIP’s website, the most famous being Skype, who decides the telephone
fares. Typically calling other VoIP’s users is free all over the world, while calling fixed telephones depends
only on the destination country and is independent from the caller’s country, with a fare which is
comparable to the standard local telephone call (about 2 €cent/minute in June 2012). On the other hand,
calling mobile telephones is, for the moment, still very expensive (about 30 €cent/minute in June 2012); for
this reason, special VoIP telephones, which can be programmed to automatically decide between VoIP and
the standard telephone line according to the dialed number, are appearing on the market.
3.2.5. Searchengines
A search engine is a special program running on a website which offers to the user the possibility of
searching other websites for specific web pages. The user needs to connect to the search engine website
and digit the keywords, or sometimes even a complete question, and the website returns the list of
relevant web pages.
Search engines use a crawler technique: they continuously go through the known web pages memorizing
their content and trying to discover other web pages through the contained links. In this way they are able
to memorize most of the WWW’s pages (more than 8 billion pages), even though some not linked websites
can remain unknown to search engines.
Dr. Paolo Co
Page 16 of 3
The most po
and Bing. In
user, searc
which relie
therefore a
which put a
these engin
There are m
mo
resu
Isla
tho
put
phr
in t
a sp
whe
tryi
oletti
32
opular searc
n order to ch
h engines u
es on the id
web page re
a link to it. A
nes are Goog
many tricks to
st novice us
ult but in so
nd using sim
ough sometim
tting some w
rase, i.e. exac
he advanced
pecified lang
en looking s
ng to find w
ch engines ar
hoose the or
use scoring
dea that a
eceives a sco
According to
gle 83%, Yaho
o speed up t
ers search t
me cases ca
mply “java”.
mes returns n
words betwe
ctly for those
d search men
uage or only
imply for so
eb pages con
re Google, th
der in which
system. The
linked page
ore proportio
recent resea
oo 6%, and B
he web sear
the WWW u
n result in lo
Using as ma
no pages if t
een quotati
e words in th
nu often the
y in a specifie
me images,
ntaining them
he current m
h web pages
e most famo
is very im
onal to the n
arches, the p
Bing 4%.
rch and arrive
sing only a s
ong lists of w
any keyword
oo many wo
on marks fo
hat order and
re are very g
ed format, fo
it is more co
m.
arket leader
are displaye
ous one is G
portant and
umber of we
percentage o
e quickly to t
single keywo
wrong results
ds as possib
ords are used
orces the se
d with no wo
good options
or example .d
onvenient to
Basic
E
r, Yahoo!
ed to the
Google’s
d useful;
eb pages
of use of
the right res
ord, which o
s, for examp
le often avo
d;
earch engine
ords in betw
s, such as the
doc or .pdf;
o use the spe
c Computer
Edition 7.0 (0
ult:
often produc
le when look
oids wrong r
e to look fo
een;
e search of p
ecific search
course book
08/10/2012)
ces the right
king for Java
results, even
or the exact
pages only in
rather than
k
)
t
a
n
t
n
n
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 17 of 32
3.3. InternetconnectionsThere are many different ways to connect to the Internet, divided by the physical mean of connection: the
telephone cable, a dedicated cable or electromagnetic signals.
Broadband
ADSL (Asymmetric Digital Subscriber Line)
telephone line modem
500 Kbps in upload 8‐20 Mbps download
Speed depends on subscription fee
and network traffic
Internet cable some Gbps
UMTS (Universal Mobile Telecommunications System)
3G UMTS cellular phone 7 Mbps
Speed depends strongly on environment
Wireless Wi‐Fi
wireless card 30‐80 Mbps Speed depends on wireless generation
WiMax antenna in line of sight
modem 40 Mbps
Speed depends strongly on distance
Many fast connections, especially ADSL, suffer from network congestion: too many users are connecting at
the same time and the Internet provider’s main cables are not able to support the users’ maximum speed
multiplied by the number of users, and therefore must reduce the practical connection speed. Therefore
the maximum speed is often only theoretical and some providers are offering a “minimum band
guaranteed”: a minimum speed under which the connection may never fall.
Unfortunately, even in technologically advanced countries, there are still many areas where nor ADSL
neither UMTS arrives, mostly due to the geographic conditions (mountains, islands or long desert distances)
and to the low inhabitants’ density. This phenomenon is called digital divide: there are people (e.g.
5,000,000 of Italian inhabitants) that even willingly to pay cannot get a broadband connection, and, on the
other hand, Internet services and especially the WWW is continuously going towards large size contents,
cutting these people off. In order to overcome this social problem, WiMax is spreading, a sort of very long
range Wireless which arrives up to 10 Km but works only if the transmitting and receiving antennas are in
line of sight and whose theoretical speed of 70 Mbps decreases with distances to about 40 Mbps.
Names Equipment Effective speed Notes
PSTN (Plain Standard Telephone Network)
analogical dial‐up
telephone line modem
56 Kbps Telephone is busy during connection
ISDN (Integrated Service Digital Network)
ISDN telephone line modem
128 Kbps Telephone is busy during full speed
connection
GPRS (General Packet Radio Service)
GSM cellular phone 100 Kbps
Dr. Paolo Co
Page 18 of 3
4. ComBeing conn
novice user
inside, with
the non‐exp
Moreover, t
techniques
access to pe
eac
(fin
eac
per
use
resp
a fi
pre
fire
soft
eve
all d
sen
case
4.1. EncEncryption
way that it
encrypting,
by all the c
thus the di
used.
The two fol
The sent m
intercepts a
is known on
The same p
using a secu
browser use
oletti
32
mputerected to the
r’s belief tha
all its benef
pert user, to
the recent It
which must
ersonal data
ch user must
gerprint, han
ch user has
rmissions mu
ers must rece
ponsibilities,
rewall (see
sent, either
wall, are) or
tware used t
ery 6 months
data must be
sitive data r
e of loss, mu
cryptionis a text ma
may be corr
usually know
computers o
fficulty to b
llowing sche
essages are
a message, h
nly to A. Even
process happ
ure connecti
es it to encry
rsecure Internet m
at he is the o
fits and dang
avoid being
talian law 19
be adopted
protected b
t be authent
nd shape, ey
its own pe
ust be revoke
eive specific
, duties and t
section 4.6.
installed ei
at the LAN e
to handle da
s;
e backed up
receive spec
ust be restore
nsking techni
rectly read o
wn only to o
r people wh
e guessed, i
emas illustrat
encrypted a
he is unable t
n when some
ens whenev
on (see sect
ypt informat
ritymeans giving
one who goe
gers. Knowin
lured into tr
96/2003 on p
by system a
by privacy mu
ticated by a
ye);
ermissions, l
ed when the
training to b
the possible
1 on page 2
ither on eac
entrance (as
ata must be
(see section
ial care: the
ed within 7 d
que, derived
nly with a sp
one compute
hich legitima
is expressed
tes how B, C
and later dec
to decrypt it
ebody us
er a browser
tion 4.5 on p
ion which ca
g anybody a
es outside, i
g a little bit
raps or adop
privacy issue
administrato
ust take care
personal us
imited only
user does n
be able to us
dangers;
27) and an a
ch computer
usually the f
updated at
4.6 on page
ey must be s
days.
d from milita
pecial passw
er or person,
tely may rea
in bits, wit
C and D can
crypted by A
t correctly sin
ses the publi
r tries to sen
page 26): the
an be read on
ccess to the
it is instead
of security is
pting potentia
s contains in
ors but also b
e of these pro
sername and
to the dat
ot need them
se their auth
antivirus (se
r (as usually
firewall is);
least every
e 27) at least
stored and tr
ary use, whic
word called ke
and a privat
ad the infor
h 128 bits b
send secret
A with his pri
nce he does
ic key to dec
nd a passwor
e website tel
nly by the ar
Basic
E
e computer.
the Internet
ssues is now
ally dangero
n the Allegato
by normal us
ocedures, in
d a passwor
a he needs
m anymore;
hentication a
e section 4.
y the antivir
year and se
every week;
ransmitted u
ch transform
ey. It uses tw
te key for de
mation. The
being the ty
messages u
vate key
not have A’
crypt, it does
rd or secret i
ls the brows
riving websit
c Computer
Edition 7.0 (0
Despite the
t world whic
adays neces
us behaviors
o B the mini
sers. Every u
particular:
rd or a biom
for his wo
and to be aw
.3 on page 2
rus, and som
ecurity softw
;
using encryp
ms informatio
wo keys, a p
ecrypting, us
e size of thes
pically most
sing A’s pub
. In case so
s private key
s not work.
nformation t
ser its public
te.
course book
08/10/2012)
e traditional
ch is coming
sary even to
s.
mal security
ser who has
metric device
ork, and the
ware of their
23) must be
metimes the
ware at least
ption and, in
on in such a
ublic key for
sually known
se keys, and
t secure size
blic key .
omebody
y , which
to a website
key and the
k
)
l
g
o
y
s
e
e
r
e
e
t
n
a
r
n
d
e
.
h
e
e
Basic Comp
Edition 7.0
Another an
private and
automatica
instructions
password to
puter course
(08/10/2012
alogous usag
d public key
lly by a prog
s how to do
o the user ev
message
message
message
message
message
message
secret
data
secret
data
book
2)
ge of encryp
s coincides
gram (PDF c
it) or even b
very time.
encr1
2
3
encry
encry
1
2
3
encr
encry
encry
t enc
t enc
tion is to ma
and are kep
creation prog
by the opera
Grypt
f
È
ypt
ypt
G
f
È
rypt
ypt
ypt
crypt
crypt
ake stored da
pt secret. T
grams or co
ative system
G#4hg!
f@çd*s
È^£(iw,
G#4hg!
f@çd*s
È^£(iw,
D(£ò§
*+]dH
D(£ò§
*+]dH
ata unreadab
he encryptio
mpression p
(if the entir
decrypt
decrypt
decrypt
decrypt
decrypt
decrypt
decrypt
decrypt
ble except by
on and decr
programs can
re disk is enc
messa
messa
messa
Trb:-ò°
Dr4^\|ò
%$&/ò
secda
%£)jhgd
Dr. P
P
y the owner
ryption proc
n do it, see
crypted), wh
age 1
age 2
age 3
°§
ò9
òL
cret ata
(“84ds?ì
Paolo Coletti
age 19 of 32
. In this case
cess is done
page 10 for
hich asks the
i
2
e
e
r
e
Dr. Paolo Co
Page 20 of 3
4.1.1. Dig
A digital sig
the same ti
According t
The two fo
publish a p
key and
something
from A; on
private key.
and email’s
While encry
to create it
automatica
be sure tha
authority to
be sure that
having iden
when used
automatica
oletti
32
gitalsigna
gnature, or e
ime, the doc
o Italian law
ollowing sche
ublicly availa
d all the us
readable, it
the other h
. In this way,
content.
yption to rec
ts own coup
lly without t
at the publ
o distribute
t the user do
ntified him th
d together,
lly encryptin
document
false
document
ature
electronic sig
cument’s au
w 82/2005, di
emas illustra
able docume
ers can try
means that t
hand, if the
, digital signa
ceive secret m
ple of private
he user’s int
ic key is re
private and
oes not give
hrough a gov
correspond
ng document
t encr
t encr
gnature, is an
thor’s ident
gital signatu
ate instead
ent with its
to decrypt
the docume
result is un
ature used in
messages or
e and public
tervention), f
ally the aut
public keys.
the private p
vernmental i
to his priv
ts.
rypt G
&
rypt Y
f
n encryption
ity and that
re is equival
the usage o
signature. It
it with A’s
nt was really
readable, it
n combinatio
to hide info
c keys (prog
for digital sig
thor’s public
Even thoug
password ar
identity card
vate key. An
G#4$h
&à?‐2y
Y&”:ò[
fgj?’^d
n technique f
the docume
ent to handw
of encryptio
t is sufficient
public key
y encrypted
means that
on with PEC
rmation sim
rams, for ex
gnature it is n
c key, digita
gh theoretica
ound, the ce
d, a passwor
n automatic
decrypt
decrypt
Basic
E
for documen
ent’s conten
written signa
on for digita
t for A to en
. If the
with A’s priv
t encryption
can guarante
ply requires
xample brow
not so simpl
al signature
ally a simple
ertification a
d together w
c signature
docum
docum
docum
2?=zx
2?=zx
2?=zx
c Computer
Edition 7.0 (0
nts which gu
nt has not be
ature.
l signature.
ncrypt it with
result of d
vate key and
was not do
ee also send
the user or t
wsers, do th
e. Since ever
requires a
password is
uthority give
with a smart
program ta
ment
ment
ment
:-ki
:-ki
x:-ki
course book
08/10/2012)
uarantees, at
een altered.
A wants to
h his private
ecryption is
thus comes
one with A’s
der’s identity
the program
is operation
rybody must
certification
s enough, to
es him, after
card which,
kes care of
k
)
t
.
o
e
s
s
s
y
m
n
t
n
o
r
,
f
Basic Comp
Edition 7.0
Several Ital
as a smart
many servi
personal do
private cer
private use
4.2.1 on pag
4.1.2. Ke
The major d
many priva
years it will
each coupl
necessary to
Documents
temporal m
4.1.3. Co
Who can sig
Who can ve
Verification
Temporal d
Mass signat
Date reliabi
4.2. PasOn the Intra
only to him
and his ide
other perso
users, even
passwords’
stea
stea
priv
the
stea
dire
puter course
(08/10/2012
ian public in
card and, us
ces, even th
ocuments. T
rtification co
rs and with
ge 22).
eysexpirat
drawback of
te keys
manage to
e of private
o change the
for which
mark signed d
mparison
gn
erify
n reliability
uration
tures
ility
sswordsanet the use
. The passw
entity’s respo
on is exactly
n when they
thief can do
al personal in
al privacy pr
vacy, or read
thief as wel
al money: t
ectly from th
book
2)
nstitutions ar
sing it as cer
hough they
The service
ompanies, w
alternative
tion
f encryption
in sequence
find the righ
e‐public key
em and encr
it is import
directly by th
withhandDigital sign
Needs keyand prope
Everybody
Sure for so
Some year
Some secoproper too
Objective i
ser is identifie
ord is what
onsibilities. I
the user. La
y are absent
o:
nformation:
rotected dat
d emails rece
l as the user
the thief can
he user’s web
re now using
rtification of
do not offe
to digitally
with prices
devices suc
keys is that
e and then t
ht private key
s has a tim
ypt again all
tant to dete
he certificatio
dwrittensinature
s from certifr tools
y (with prope
ome years
rs (can be ren
onds for all dols)
if temporal m
ed only by hi
makes an un
If somebody
w 196/2003
t from work
the thief can
ta: the thief
eived from o
r who did not
n find the u
b browser’s h
g the nation
user’s ident
er yet the d
sign docum
currently a
ch as OTP de
t if a compu
to decrypt it
y which lead
me limited d
the past doc
ermine the
on authority.
ignature
fication auth
er tools)
newed)
ocuments (w
mark
s username,
nknown pers
y else uses t
3 explicitly fo
. These are
n read the us
f can gain ac
ther people.
t protect oth
user’s bank
history;
al health ca
tity, offer ac
digital signat
ents is offe
affordable a
evices (see s
ter is put to
t with the co
ds to a correc
duration, usu
cuments.
exact date
.
Han
ority Ever
Han
Subjlimit
Untiavai
with Som
Base(pap
, known to e
son an authe
the right use
orbids users
some, often
ser’s emails a
ccess to dat
. The legal re
her people’s
account nu
re card
cess to
ture of
ered by
also by
section
o work trying
orrect public
ct encryption
ually some
of the signa
ndwritten sig
rybody insta
dwriting ana
jective in dut
il other reliailable
me seconds p
ed on other sper’s and ink
everybody, a
enticated use
er’s passwor
from giving
n underestim
and persona
a about oth
esponsible o
data;
umbers and
Dr. P
P
g to encrypt
c key , w
n‐decryption
years, after
ature have
gnature
ntly
alysts
bious cases,
ble signature
per documen
subjective elk’s age)
nd his passw
er, with all h
rd, for the I
their passwo
mated, malig
al informatio
her people p
f this privacy
passwords,
Paolo Coletti
age 21 of 32
t a text with
within some
n. Therefore,
which it is
moreover a
no time
es are
nt
lements
word, known
his privileges
ntranet this
ord to other
gn actions a
n;
protected by
y violation is
sometimes
i
2
h
e
,
s
a
n
s
s
r
a
y
s
s
Dr. Paolo Co
Page 22 of 3
dele
the
con
stea
wor
wit
star
som
Therefore it
However, th
trial: specia
passwords
combinatio
Italian, Germ
seconds). L
have some
cha
avo
use
Moreover, o
use
any
use
reg
web
pas
uni
bew
stor
see
reve
only
com
pub
4.2.1. On
expires afte
Obviously t
to avoid tha
oletti
32
ete and mod
se data with
ntent, add ille
al identity: f
rld exactly a
hdrawing fro
rt illegal act
mebody else
t is absolute
here are som
al automatic
each seco
ns of words
man and Eng
aw 196/200
features:
ange the pass
oid words rel
e minimum 8
other good p
e as password
y common w
e different p
ister with a
bsite they r
sswords: one
mportant us
ware of passw
re your pas
m to be un
eal them ins
y if that com
mputer or th
blic places su
neTimePa
er a few seco
his system w
at the physic
dify data: th
hout the use
egal pictures
or the comp
as if it were
om exams;
tivities: anyb
identity, so
ely necessary
me ways to d
c programs a
ond, and t
and numbe
glish words
03 explicitly
sword often,
ated to your
8 characters.
procedures a
d a good mix
ord (other p
passwords fo
password an
egister, eve
e for importa
se (registerin
words stored
ssword mas
nreadable, b
stantly. Stor
mputer has a
e personal la
uch as an Inte
asswordde
onds.
works in com
cal loss or the
e thief can d
er’s knowled
s);
puter the thi
e the user, f
body who w
he will not g
y to keep pa
discover eas
are able to
they usually
ers (the com
can be tried
requires tha
, at least eve
rself, such as
are:
x of number
eople’s nam
or different
nd users who
n untrustwo
ant use (bank
g to unknow
d in program
ked with as
but compute
re password
single user
aptop) or if a
ernet café.
evice
An OTP
very sm
every fe
OTP dev
seconds
mbination wit
eft of the OT
delete user’s
dge (bank nu
ef is now th
for example
wants to star
et into troub
sswords sec
y passwords
try one mill
y start try
mplete set of
in less than
at password
ery six month
s names, birt
rs, strange ch
es or words
purposes.
o use always
orthy ones.
k account), a
wn websites o
ms: mail read
sterisks. The
er experts ca
s in program
(i.e. the hom
access to tha
device is a
mall electron
ew seconds.
vice and eac
. Therefore,
th another st
TP device res
s important
umbers, frie
he user, and
answering
rt an illegal
bles when th
ret.
s by
lion
ying
f all
n 30
do
hs;
th dates, birt
haracters, sm
which can b
Unfortunate
s the same p
It is a good
a second one
or to service
ders, Internet
ey
an
ms
me
at computer
modern pa
ic device w
The system
h password
even if a pa
tandard pass
ults in a com
Basic
E
data, or eve
nd’s email a
therefore h
to emails, s
Internet act
he activity is d
th places and
mall caps and
be found in a
ely every we
password are
d procedure
e for everyda
es that will no
t Explorer an
is on a usern
ssword syst
hich display
m is perfectly
is accepted
assword is in
sword that t
mpletely secu
c Computer
Edition 7.0 (0
en worse he
addresses, de
e can act to
subscribing t
tivity will ob
discovered.
d addresses;
d capital lette
dictionary);
ebsite asks
e giving it aw
to have at
ay use and a
ot be used a
nd many oth
name basis,
em which c
ys a passwo
y time‐align
only if ente
tercepted o
he user mus
urity breach.
course book
08/10/2012)
e can modify
egree thesis
the outside
to websites,
bviously use
ers, avoiding
the user to
way to every
least three
last one for
nymore).
er programs
but never in
consists of a
rd changing
ed with the
red in those
r guessed, it
st memorize,
k
)
y
s
e
,
e
g
o
y
e
r
s
n
a
g
e
e
t
,
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 23 of 32
4.3. VirusesFrom the Internet many unauthorized connection attempts arrive. Some of these are mistakenly authorized
and manage to reach the Intranet or at least to come in contact with programs which are behind the
firewall. If these connections carry malign intentions, usually their aim is to explore and use the Intranet
computers, to destroy Intranet data or to stop some Intranet services (which is a dangerous attack if these
services are managing stock trades or telephone calls). Defense against these kinds of attacks is in charge
system administrators.
While normal external attacks do not involve normal users, the virus is a special attack which arrives
directly on the user’s computer and must be prevented and stopped by him. The virus is a little program
which has this name because its life cycle is the same of a biological organism: survive and duplicate.
1. It arrives on the computer through email attachments, downloaded files, CDs and floppy disks or
directly from the Intranet. It is often hidden inside other good files or programs, which are called
infected.
2. As soon as the user mistakenly runs it (often trying to run the good program or to open the good
file), the virus orders the computer to run itself every time the computer is turned on, thus assuring
its survival.
3. It starts duplicating itself, infecting other files, CDs and floppy disks, and trying to send itself around
by email or on the Intranet.
4. Most viruses are programmed to do damage to the computer and to the user, altering or deleting
files, sending emails with user’s personal data, preventing firewalls and antiviruses from running, or
turning the computer off. No viruses are known to be able to damage hardware.
Many names are used for viruses’ types according to their different behaviors.
trojan horse is a virus which looks like a good program and, when downloaded and run by the user,
it performs the user’s wanted task but at the same time does other actions;
key logger is a virus which records keyboard’s activity and then sends the keystrokes to its creator,
mostly to get user’s passwords;
back door is a virus which opens a port on the computer to let external users in;
adware is a virus which displays advertisement;
spyware is a virus which spies user’s activity to get passwords or to target the user with specific
advertisement;
dialer is a virus which dials expensive numbers using the PSTN modem.
These types are not exclusive: for example a Trojan horse which is at the same time a spyware and an
adware.
An infected computer can be recognized by some symptoms. These are the most frequent ones:
when the computer is turned on, unwanted programs start, advertisement appears, and the
desktop presents some new bars or features which were not present nor installed before;
the computer starts very slowly and unknown programs give strange operating system errors;
commercial or pornographic web pages appear on the web browser without the user’s consent;
the analogical modem makes typical connection noises even when the computer is not connected
or the operating system asks the user to stop the current connection and start a new one to a
strange telephone number;
the Task Manager window (see page 5) presents unknown programs.
Dr. Paolo Coletti Basic Computer course book
Page 24 of 32 Edition 7.0 (08/10/2012)
Most of the time, a responsible user’s behavior it the best weapon against viruses: it protects him from
getting viruses, helps him removing them and prevents him from diffusing them. Responsible behavior
means:
never open downloaded files and email attachments, especially when they come from a friend with
a text such as “please open it, urgent!”, since simulating to be a user’s friend is a typical virus
tactics. To open these files, save them on the desktop, check them with an antivirus and then open
them;
do not insert in your computer CDs, DVDs and USB pendrives coming from other people or which
were inserted in other computers, unless you have an antivirus running or unless you scan them
immediately with an antivirus;
avoid visiting strange websites, especially pornographic or hackers’ website, or websites which
open a lot of pop‐up windows;
have an antivirus always running or at least run an updated antivirus on your whole hard disks
every week (while Italian law currently prescribes minimum every 6 months); keep your antivirus
always up to date: more than 50 new viruses appear every week;
keep communication programs and Microsoft products up to date. Microsoft and most software
companies offer free updates and automatic updating tools.
To check the computer for viruses and to try to remove viruses from the computer, the user can run a
special program called antivirus. The antivirus basically has three possible different actions:
it can scan all the storage devices (hard disks, the floppy disk inside the computer, the CD or DVD
inside the reader) for viruses. If a virus is found, it tries to remove it and to repair damaged files.
Some files can be unrecoverable. Complete devices scanning takes usually some hours;
it can scan a single file or an entire directory for viruses. If there is an infected file, it tries to delete
the virus and repair it. Some files can be unrecoverable. Single file scanning takes some seconds;
it can be always running. In this case, whenever a virus or a suspect file is run, the antivirus
prevents it from running and warns the user.
A lot of antivirus programs, free and commercial, exist. Their most important feature is obviously the
possibility to be constantly updated through the Internet.
4.4. Emails
4.4.1. Attachments
For viruses, email attachments are a first class way of traveling, since they are very often opened by users
without any precaution. Sometimes viruses hide inside files which were really sent by the sender, unaware
of having an infected computer. Other times a virus takes control of the mail reader program and sends
itself to the whole address book, counterfeiting the sender address (often using an address taken from the
address book) in order to avoid that the real infected computer be identified and to gain the thrust of the
receiver, and writing in the email text smart sentences pretending to be a regular friend of the receiver. The
arrival of this kind of email usually creates havoc, since the receiver is sure that the fake sender has a virus,
while the original infected computer is another one.
The basic rule is never open any attachment from the mail reader program. Save the attached files on the
desktop and run an antivirus program to check these files before opening them. Even when the email
comes from a friend: he cannot know that to have got a virus, or he can not be the real sender.
Basic Comp
Edition 7.0
4.4.2. Spa
Spam mess
ask to recei
bulk, meani
adv
vers
info
soft
mes
mis
inte
cha
circ
luck
tras
des
terr
old,
imm
com
frau
sem
aim
furt
sma
ima
puter course
(08/10/2012
am
ages are uns
ive them, the
ing that they
vertisement
sion. The em
ormation us
tware or
ssages are p
stakes or wit
ercepted by a
ain letters a
culating in th
k to anyone
shing it, or th
siring postca
rible virus: th
, and a sea
mediately. Se
mplains from
uds are usua
mi‐legal barg
ms are to ge
ther illicit ac
all expense
aginary mone
book
2)
solicited unw
ey are unwa
y are sent to
emails are
mail messag
sually on m
investment
purposely wr
h strange ch
antispam pro
are electron
he XX centu
resending it
hey contain a
ards or an u
heir content
rch on the
ending it aro
m other users
ally long lette
ain or a big
et the user’s
ctivities and
s hoping t
ey;
wanted bulk
nted, meani
millions of a
e the most
ge contains
edicines, po
ts. Sometim
ritten with o
haracters, to
ograms;
nic versions
ury. They pro
and bad luc
a sad story o
urgent warni
is probably
WWW will
ound will pro
s;
ers proposing
lottery prize
s bank coor
to lure him
to get the
emails. They
ing that the
addresses. Th
innocuous
commercial
ornography,
mes these
orthographic
avoid being
s of letters
omise good
k to anyone
of an ill child
ing about a
false or too
reveal this
bably cause
g the user a
e. Their only
rdinates for
into paying
e promised
y are unsolic
user did not
hey are used
cited, meani
t want to rec
d mainly for f
Dr. P
P
ng that the
ceive them, a
four differen
Paolo Coletti
age 25 of 32
user did not
and they are
t purposes:
i
2
t
e
Dr. Paolo Co
Page 26 of 3
phis
ema
ask
his
ofte
the
rea
this
be
like
his
has
syst
ent
add
clic
call
whe
phis
The best be
sender add
from their
read by som
The best w
registration
the compan
necessary, a
spam.
There are a
they are no
analysis of
supposed t
blacklists an
other sites.
4.5. NavNavigation
the user’s c
the user ca
browser. M
two good s
windows an
operating sy
The other s
data travels
oletti
32
shing email
ails from ba
ing the user
passwords
en carry real
correct ban
l bank’s ant
s website ad
sent to a fa
e the bank’s
passwords o
s become a b
tem, and t
ering the ba
dress directl
king on add
ing immedia
enever belie
shing.
ehavior to ad
ress is alway
lists, usually
meone.
ways to def
n in forums, n
ny’s website
a good strate
ntispam pro
ot completely
the email’s
o let spamm
nd that ema
vigationis the secon
computer ca
n be lured in
Moreover, the
suggestions a
nd illegal w
ystem alway
ecurity prob
s long dista
s look as c
anks and cre
to enter the
or credit
l bank logos,
nk’s website
ti‐phishing c
dress is a tra
alse website
one, whose
or credit car
big problem
the user’s
ank’s websit
ly in the w
resses conta
ately the ba
eving of hav
dopt against
ys false; click
y has the on
fend from s
newsgroups
. These are t
egy is to hav
ograms, whic
y reliable an
s content a
mers send th
ils send from
nd most dang
n get viruse
nto phishing
e computer c
are to avoid
ebsites) or
ys up to date
blem while n
nces, passin
completely p
edit card com
eir website to
card numbe
, seem to ad
e and even
campaign! H
ap, and the
e, who looks
only scope
rd number.
for Internet
best defen
te always ty
web browse
ained in em
nk at the te
ving been v
spam messa
king on their
ly effect of
spammers a
and unnece
the places w
e an alternat
ch put the su
d sometime
nd on black
heir emails;
m customers
gerous Intern
s if he does
g websites if
can get virus
visiting stra
untrustwort
.
avigating is d
ng through a
plausible
mpanies,
o update
er. They
ddress to
cite the
However,
user will
s exactly
is to get
Phishing
banking
nses are
ping the
r (never
ails) and
elephone
victim of
ages is to ign
links, espec
letting the s
are to avoid
ssary websit
where spamm
tive email ad
upposed spa
s they trash
klists, which
it may happ
s or employe
net activity.
not run an
he does not
ses even wh
ange (pornog
thy websites
data interce
a large num
nore them. C
ially if they s
spammer kn
d giving the
tes, and to av
mers get the
ddress for re
m messages
even good
h contains t
pen that a g
ees of that I
It has more
antivirus be
t type perso
en simply vi
graphic web
s and to kee
ption. When
ber of comp
Basic
E
Complaining
suggest to cl
ow that the
e user’s rea
void publish
ir millions of
gistrations, w
s in a separat
messages. T
he Internet
good mailser
nternet site
or less the s
fore openin
onally the ba
siting some
sites, websit
ep Internet
n connecting
puters (to c
c Computer
Edition 7.0 (0
is worthless
ick there to
e user’s addr
l email add
ing it on the
f addresses.
which will re
te junk emai
hese progra
mailservers
rver ends up
are marked
same danger
g downloade
nk’s address
websites, an
tes with a lo
Explorer an
to a website
onnect from
course book
08/10/2012)
s, since their
be removed
ress is really
dress during
e personal or
If it is really
eceive all the
il folder, but
ms relies on
s which are
p into those
as spam by
rs as emails:
ed files, and
s in the web
nd therefore
ot of pop‐up
nd Windows
e, the user’s
m unibz.it to
k
)
r
d
y
g
r
y
e
t
n
e
e
y
:
d
b
e
p
s
s
o
Basic Comp
Edition 7.0
www.athes
the Interne
sending pas
in the addre
lower right
indications
connection
website fro
4.6. AttAny compu
subject to a
access to t
running pro
best defens
communica
The most fa
defense, is
companies
pretend to
its resource
own comp
attack, ot
would pro
server, bu
unaware u
called zom
hacked in t
the attack
several doz
from many
world and
difficult to
up to him.
4.6.1. Fir
Often prog
once discov
be fixed a
benefit of t
before th
installed o
Therefore o
puter course
(08/10/2012
ia.it the data
et travel with
sswords and
ess bar start
t part of the
mean that th
guarantees
m which he
acksfrouter attached
attacks from
the compute
ograms whic
se is keeping
ation program
amous attac
the DoS D
offering serv
use the serv
es (bandwidt
uter to carr
herwise hi
bably crash
ut uses c
sers around
mbies, which
he past days
ker has the
en compute
y different
at the sam
trace the
rewall
grams’ secur
vered need s
nd somebo
them in this
e security
n the user’
on every LA
book
2)
a go to Padu
hout any pro
other privat
ts with https
e windows,
he connectio
only that d
started the c
omoutsd to the Int
m the outside
er using ope
ch open som
g the compu
ms (as sugge
ck from outs
enial of Ser
vices over th
vice but stay
th, speed, m
ry on a Do
s compute
before th
omputer o
d the world
h have bee
s. In this wa
e power o
ers connecte
parts of th
me time it i
responsibilit
rity breache
some days t
dy can tak
s short time
update i
’s computer
AN, usually i
ua, Milan an
otection, any
te data to a
s:// (instead
while on o
on is secure (
data are not
connection, w
ideternet, eithe
e WAN. The
erating syste
me compute
uter’s progra
sted in secti
side, and the
rvice attack.
he Internet. I
y simply conn
memory) unt
S
er
e
of
d,
n
y
of
d
e
is
y
es
o
e
e,
is
r.
n
nd Bologna p
y computer
website, the
of http://) a
others the a
(SSL) since d
t intercepted
while it does
er directly th
typical attac
em known p
r’s parts to
am always u
on 4.5 on pa
e one from w
. It is an at
t consists in
nected, in su
til the server
passing throu
administrato
e user shoul
and on some
ddress bar
ata are trave
d and that t
s not guaran
hrough a mo
ck consists i
problems or
outside con
up‐to‐date, e
age 26).
which it is v
ttack which
sending mil
uch a way to
r crashes. Th
ugh at least
or can read
d take speci
e browser a
becomes gr
eling encrypt
the user is
teed this we
odem or ind
n external c
r hoping tha
nections. Fr
especially th
very difficult
does not st
lions of inco
o overcrowd
he attacker
Dr. P
P
13 compute
them. There
ial care that
lock icon ap
reen with a
ted. Beware
connected t
ebsite is the r
directly insid
omputers tr
at the user
rom the use
e operating
to have an
trike private
ming connec
the server a
clearly does
Paolo Coletti
age 27 of 32
ers). Data on
efore, when
the address
ppears in the
lock: these
that the SSL
to the same
right one.
de a LAN, is
rying to gain
is currently
r’s side, the
system and
appropriate
e users, but
ctions which
and drain all
not use his
i
2
n
n
s
e
e
L
e
s
n
y
e
d
e
t
h
l
s
Dr. Paolo Coletti Basic Computer course book
Page 28 of 32 Edition 7.0 (08/10/2012)
the point where the LAN connects to the Internet, or more often on every computer a special program
called firewall is running. The firewall examines all the incoming and outgoing traffic, using the following
analysis techniques:
which internal program is originating/receiving the traffic,
from/to which external address is the traffic originated/directed,
what amount of traffic is passing from/to the same program to/from the same external address,
which kind of data are passing.
Making an analysis of these data clearly slows down the connection but lets the firewall stop potential
unauthorized connection, putting them in a wait state until the user’s gives his approval or denial.
Windows Seven operating system comes with a firewall preinstalled, which lets the user customize which
kind of programs are allowed to make or receive connections and determine rules to approve or deny
automatically connections.
4.7. BackupBackup is the process of copying important data to another location to prevent their loss. Sometimes
programs and even entire operating systems are copied, to be able to immediately continue working even
when a computer breaks. There are three very good reasons to do regular backups:
against the user, who can accidentally delete some files or who can modify files and then change
his mind. Having a recent backup handy can often save hours of work;
against the system, which can suddenly break due to hardware or software problems. Even hard
disks tend to be unreliable after some years of continuous activity. A recent backup saves the user
from redoing all the work of the previous months;
against viruses and other users, which can delete and alter files: a backup can save a user coming
back from vacations.
Usually the operating system’s and the programs’ backup are done by system administrators: law 196/2003
explicitly requires an instantaneous backup for all sensitive data and that data are restored within 7 days in
case of loss. However, there are some files which should be taken in charge by the user himself:
personally created data files, including all documents and images created by the user, and any
other file which is a result of the user’s personal work;
the address book and the emails (mail readers usually offer a way to save them into files to be used
for backup), and for strong navigators also web browser’s configuration;
some programs require a lot of configuration and store their configuration in configuration files,
which are usually in the program’s directory;
all the stuff which is difficult to find again, such as documents from other people or downloaded
from forgotten websites.
The place where the files are copied determines the reliability of the backup. It should be a large, cheap
and fast storage device. It should also be handy, since the typical problem with backup is that the user does
not takes time to do it regularly and, when the backup is too old, it is worthless. For home or simple office
users, the Friday morning backup is a good timing solution. Good storage devices to be used are:
a second hard disk, used only for backup, which is very fast and very large and always ready to be
used;
Basic Comp
Edition 7.0
onl
(giv
offe
fou
USB
big
4.7.1. RA
A very popu
of several i
functionalit
JBOD (Just
which all th
which they
available sp
however th
anything on
RAID0 uses
single disk.
is written o
this. This st
doubles, wi
size of the
both disks i
RAID1 is th
two identic
second disk
the first on
improve an
but in case
its identica
protect dat
services. Ho
or user’s in
the first dis
puter course
(08/10/2012
ine backup s
ven a broad
ering some G
r sets of rew
B pen drive, t
companies u
AID
ular backup s
identical har
ties and secu
a Bunch Of
he disks are
y can write
pace is the
here is no for
n that disk is
two identica
Every time h
on the first
trategy has
ith a total av
two disks. B
s lost, since t
e most com
cal disks but
k is simply a
ne. The disa
nd the availa
a disk break
al copy. This
a against ph
owever, it is
ncidental can
k is immedia
book
2)
systems, whe
band conne
GB of space f
writable DVDs
to be used o
usually have
solution is R
rd disks. Th
urity.
f Disks) is a
e seen by th
as usual. T
sum of th
rm of data p
lost.
al disks whic
he writes a f
disk while t
the big adv
vailable spac
But if a disk
the user will
mmon implem
the user se
n identical a
dvantage is
able space is
ks, no file is
s is a very
hysical failure
not a backu
ncellations,
ately perform
ere user’s da
ection), with
for free;
s, to be used
only in emerg
special tape
RAID (Redund
ere are diff
primitive fo
he user simp
The advantag
e space of
protection: if
h are seen b
file, the first
the second o
antage that
ce which is t
breaks, all t
lose half of
mentation o
ees only the
and instanta
that the sp
s the size of
lost since th
good backu
e, especially
up solution a
since any m
med on the s
ata are uploa
h Dropbox,
d in circle (on
gency when
e devices for
dant Array o
erent types
orm of RAID
ply as disks
ge is that t
all the dis
f a disk brea
by the user a
part of the f
on the seco
writing spe
the sum of t
the content
all the files.
f RAID. It us
first one. T
aneous copy
peed does n
one disk on
he other one
up solution
suited for 2
against virus
modification
econd one.
aded and are
Mozy, Suga
ne for each m
no other app
backups.
f Independe
of RAID im
in
on
the
ks,
ks,
s a
file
ond
eed
the
of
ses
The
of
not
nly,
e is
to
24h
ses
on
f
pa
f
file
fil
par
e ready from
rsync being
month’s wee
propriate sto
ent Disks) tec
plementatio
file
art 2
user dile
e
le
rt 1
Dr. P
P
m anywhere
the most f
k, for examp
orage device
chnology, wh
ons, which v
decides
Paolo Coletti
age 29 of 32
in the world
famous and
ple);
is available;
hich consists
vary a lot in
disk 1
disk 2
disk 1
disk 2
disk 1
disk 2
i
2
d
d
s
n
Dr. Paolo Co
Page 30 of 3
RAID10 is a
writing files
RAID0 and
four. This te
RAID1, but
two disks si
All the RAI
hardware fa
another for
another har
oletti
32
an overlay o
s on the firs
then duplic
echnique ha
gives the u
zes, while fo
ID technique
ailure, but a
rm of backu
rd disk for ho
f RAID1 and
st and on th
cating their c
s the speed
ser a space
our disks are
es are good
re not good
up, such as t
ome users.
d RAID0. It u
e third as if
content on
of RAID0, th
equivalent
effectively u
d at either
against oth
tape backup
uses four dis
f they were
disks two a
he reliability
to the sum
used.
improving t
er threats a
p for large c
ks,
on
nd
of
of
the speed o
nd therefore
companies o
f
pa
pa
Basic
E
or improving
e they must
or weekly/da
file
art 1
file
art 2
c Computer
Edition 7.0 (0
g the reliab
always be c
aily copy on
course book
08/10/2012)
bility against
coupled with
DVD or on
disk 1
disk 2
disk 3
disk 4
k
)
t
h
n
Basic Computer course book Dr. Paolo Coletti
Edition 7.0 (08/10/2012) Page 31 of 32
Index.avi, 10 .bat, 10 .bmp, 10 .com, 10 .csv, 10 .doc, 10, 16 .exe, 10 .gif, 10 .htm, 11 .html, 11 .jpeg, 10 .jpg, 10 .mov, 10 .mp3, 11 .mpeg, 10 .mpg, 10 .pdf, 10, 16 .ppt, 10 .rtf, 10 .txt, 10 .wav, 11 .xls, 10 .zip, 10 \ubz01fst, 11 128 bits, 18 3G, 17 absolute path, 8 Acrobat, 10 address, 8, 24, 26 address book, 28 Administrators, 11 ADSL, 17 ADSL modem, 17 advanced search, 16 advertisement, 25 adware, 23 ALT, 6 AltaVista, 16 ALTGR, 6 analogical, 17, 23 AND, 16 antispam, 25, 26 antivirus, 18, 23, 24, 26 ARROWS, 7 asterisks, 22 Asymmetric Digital
Subscriber Line, 17 attachment, 24 audio, 11 authenticated user, 21 authentication, 18 back door, 23 BACKSPACE, 7 backup, 3, 18, 28 bank, 25, 26 BILD, 6 biometric, 18 bit, 2 bits per second, 13 blacklist, 26
bps, 13 broadband, 17 browser, 18 bulk, 25 byte, 2 cables, 13 CANC, 6 CAPS LOCK, 7 CD, 3, 23, 24 CD‐reader, 3, 7 CD‐writer, 3 certification authority,
20, 21 chain letter, 25 chat, 13 Chrome, 14 client, 13 closed proprietary
format, 4 commercial, 3 communication program,
14, 15, 24 compress, 9 compressed file, 10 computer network, 13 configuration file, 28 congestion, 17 connection, 23 Control panel, 6 copy, 8, 9 copyleft, 4 counterfeit, 24 crawler, 15 create a new directory, 9 create shortcut, 9 CTRL, 6, 9 CTRL+ALT+DEL, 5 CTRL+C, 9 CTRL+SHIFT+ESC, 5 CTRL+V, 9 CTRL+X, 9 curved arrow, 8 cut, 9 dangerous area, 13 data, 3, 28 data interception, 26 DEL, 6, 9 delete, 9 Denial of Service, 27 desktop, 23, 24 Details, 8 dialer, 23 dial‐up, 17 digital divide, 17 digital signature, 20 directory, 7, 24, 28 distribution, 4 document, 10, 28 documents, 28 DoS, 27
double click, 8 download, 17 downloaded file, 26 DVD, 3, 24, 29 DVD‐reader, 3 DVD‐writer, 3 edition, 4 EINFG, 6 electronic signature, 20 email, 9, 13, 22, 23, 24,
25, 26, 28 email attachment, 23, 24 encrypted, 27 encryption, 9, 18, 20, 21 END, 6 ENDE, 6 ENTER, 7 Enterprise, 5 ENTF, 6 esternal hard disk, 2 Ethernet, 14 Excel, 10 execute, 11 Explorer, 10, 11 extension, 10 extract, 9 F1, 6 F12, 6 Fast Ethernet, 14 file, 7, 24, 28 file system, 7 file type, 8, 10 FINE, 6 firewall, 18, 23, 28 floppy disk, 7, 23, 24 folder, 7 Folder Options, 7 forum, 26 fraud, 25 freeware, 3, 14 full control, 11 Gbps, 14 General Packet Radio
Service, 17 Giga Ethernet, 14 Gigabyte, 2 GNU Public License, 4 Google, 16 GPRS, 17 group of users, 11 GSM cellular phone, 17 hard disk, 2, 7, 11, 24, 28 hardware, 23, 28 Hide extensions, 7 hierarchical, 7 HOME, 6 Home Premium, 5 http, 27 https, 27 icon, 7
identity, 21, 22 image, 10, 17, 28 INS, 6 Integrated Service Digital
Network, 17 interaction, 13 interception, 26 internal hard disk, 2 Internet, 13, 14, 17, 18,
26 Internet connection, 17 Internet provider, 14 Intranet, 13, 14, 21, 23 INVIO, 7 ISDN, 17 ISDN modem, 17 ISDN telephone, 17 IZArc, 9, 10 JBOD, 29 junk, 26 Kbps, 17 key, 18 key logger, 23 keyboard, 6 keyword, 15, 16 Kilobyte, 2 LAN, 11, 13 language, 6 law 196/2003, 18, 21, 22,
28 law 82/2005, 15, 20 link, 8, 9, 15, 26 Linux, 3 list content, 11 local area network, 13 lock icon, 27 locking, 5 locks, 11 Lycos, 16 Mac OS X, 3, 14 Macintosh, 3 mail reader, 14, 24, 28 mail‐server, 14 maximum speed, 17 Mbps, 14, 17 Media Player, 10, 11 Megabyte, 2 memory card, 3 memory stick, 3 Microsoft Internet
Explorer, 14, 22, 26 Microsoft Outlook, 14 Microsoft Outlook Web
App, 14 Microsoft Windows, 3, 5,
26 Microsoft Windows 7, 3,
5 Microsoft Windows
Seven, 28
Dr. Paolo Coletti Basic Computer course book
Page 32 of 32 Edition 7.0 (08/10/2012)
Microsoft Windows Vista, 3, 5
Microsoft Windows XP, 3, 5
minimum band, 17 minimum speed, 17 modem, 17, 23 modify, 11 Moore’s law, 2 motherboard, 3 move, 9 Mozilla Firefox, 14 Mozilla Thunderbird, 14 mp3 players, 3 multilanguage, 6 navigation, 26 network folder, 11 network traffic, 17 new directory, 9 newsgroup, 26 Notepad, 10 Office Picture Manager,
10 One Time Password, 22 open, 8, 24, 26 open format, 4 open proprietary format,
4 open source, 4 operating system, 3, 23,
26, 27, 28 OR, 16 OTP, 21, 22 over quota, 12 owner, 11 PAG, 6 Paint, 10 password, 18, 20, 21, 22,
26, 27 paste, 9 PEC, 15, 20 permission, 18 permissions, 11
personal data, 18 PG, 6 phishing, 26 photo cameras, 3 Picture Fax Viewer, 10 Plain Standard
Telephone Network, 17
plus symbol, 9 POS1, 6 Posta Elettronica
Certificata, 15 PowerArchiver, 10 Powerpoint, 10 printer, 13 privacy, 18 private, 4 private key, 18, 20, 21 processor, 3 Professional, 5 program, 3, 10, 22, 23,
28 proprietary, 4, 14 proprietary format, 4 Proprieties, 11 provacy, 18, 21 PSTN, 17 public key, 18, 20, 21 quotation mark, 16 RAID, 29 RAID0, 29 RAID1, 29 RAID10, 30 RAID5, 30 read, 11 read and execute, 11 Regional and Language
Options, 6 registration, 26 rename, 9 resources, 13 roaming user profile, 12 root, 7
run, 8, 24 Safari, 14 save, 24 scoring, 16 search engine, 15, 16 secure, 18, 27 security, 18 Security, 11 sender, 24 sender address, 24, 26 sensitive data, 18, 28 server, 13 service pack, 5 shareware, 3 sheet, 10 SHIFT, 7, 9 shortcut, 8 Skype, 15 smart card, 20, 21 software, 3, 28 solid state disk, 2 spam, 25, 26 spam message, 25 speed, 13 spyware, 23 SSD, 2 SSL, 27 storage device, 24, 28 STRG, 6 subdirectories, 7 TAB, 7 tape device, 29 Task Manager, 23 telephone, 17 temporal mark, 21 terminal, 13 text, 10 trash can, 9 tree, 7 trojan horse, 23 trusted area, 13 Ultimate, 5 UMTS, 17
UMTS cellular phone, 17 Universal Mobile
Telecommunications System, 17
Unix, 3 unsolicited, 25 unwanted, 25 upload, 17 USB pen drive, 3, 29 username, 18, 21, 22 users, 11 version number, 4 video, 10 Virtual Private Network,
13 virus, 23, 24, 26, 28 Voice over IP, 15 VoIP, 15 VPN, 13 WAN, 13 web browser, 14, 23, 26,
28 web page, 11, 14, 15, 16,
23 webmail, 14 web‐server, 14 website, 15, 18, 24, 26,
27, 28 Wide Area Network, 13 Wi‐Fi, 17 WiMax, 17 WinAmp, 11 WinZip, 9, 10 wireless, 13, 14, 17 wireless card, 17 Word, 10 write, 11 WWW, 14, 15, 17, 25 Yahoo!, 16 zip‐archive, 9 zombie, 27