The Summary of the Internet for People in a Hurry- Part 1

Do not expect a five-sentence summary.

This is the internet explained in the simplest explanation possible.

Note: We do not own any copyrights of these contents. The context is below is a research on the we. Refer below for sources.

Alright! No preamble, let’s get started!

What is the Internet?

  • Internet is a network that allows computers to talk to one another which pretty much works like postal services. Originated from the ARPAnet, created in the 1960s, for the purpose of researchers and scientists in different universities communicating with each other, and for military purposes.
  • To communicate with each other, every device need an IP address, short for Internet Protocol address, just like building and home addresses, IP addresses differentiate one device from the other.

And an IP address??

  • IP addresses are needed when using the internet, just like how we need to attach our home addresses, and the receivers’ home addresses, to the letters we’re about to send. IP addresses are numbers uniquely formed into a string of numbers like this:
    • ‘nnn.nnn.nn.nnn’ or
    •  ‘nnnn:nnnn:nnnn::nnnn’. or whatever
  • But when we want to access websites, we don’t look them up with their IP addresses, because obviously who does that? We normally look up the domain name of the sites we want to visit in our web browser, for example, http://www.carpediemintelligently.com, and the DNS servers would translate that into nnn.nnn.nn.nnn IP address and find it for us. Okay we’ll get to know the  types of IP addresses in a moment.

DNS server?

  • A DNS server can also be called a name server, nameserver, and domain name server. It is a house, of IP addresses and their FQDN, it is the translator between the two. Read more about DNS serverdns-and-how-it-works
  • FQDN stands for ‘Fully Qualified Domain Name‘, ‘qualified’ here basically means ‘specified’.  FQDN is written with the hostname, the domain name, and the top-level domain, separated by dots- [hostname].[domain].[top-level domain].
    • So for example in this FQDN: http://www.tesla.com, “www” is the hostname, “tesla” is the domain name, and “com” is the top-level domain. or in this ‘mail.google.com’, then “mail” is the hostname, “google” is the domain, and “com” is the top-level domain.
    • See, we most of the time have provide the FQDN, not just the hostname, not just the domain name because otherwise the DNS server wouldn’t be able to find the exact location of it’s IP address with its system. Thus, the search engines such as google, bing, yahoo and so on, help us with that. We type in the domain name, or the content we want to search about in the search engines, and it in turns, provides us with the FQDN and we click on that.
    • But sometimes we can also use PQDN, which is just another acronym for ‘Partially Qualified Domain Name‘, its just a domain name that is not fully specified. It is used for convenience, but only for well-known websites, for example, we can just type ‘en‘, and the engine would assume it’s “en.wikipedia.org“. Read more about FQDN and PQDN here
  • Malware & DNS Servers

    It is recommended to install an antivirus program as it shields your computer against malware that mostly causes trouble such as changing the DNS server settings. Under legitimate DNS/web server like Google, bing or Yahoo, accessing your bank’s URl would load the correct website and you can log in your account safely. But with a malware infected the corrupted server might direct you to a completely deceitful website, and you could incautiously give away your credentials to scammers, or a website full of advertisements that might trick you into buying fake programs.

    Although the malware can redirect our websites, we can also do that with our DNS servers with a feature called “OpenDNS”. The feature are usually used for maintaining how web is used, mostly in a good way, such as blocking adult websites, gambling websites, social media, etc.

Different types of IP addresses

IP addresses are used differently according to their types. There are private IP addresses, and public IP addresses.

1. Private IP addresses

Private IP addresses are used within your own private network, like the one you probably run at home, and it’s not connect to the outside world, which is the internet. These types of IP addresses are used to provide a way for your devices to communicate with your router (refer to the bottom of the page for explanation) and all the other devices in your private network such as your wireless printer, file server, etc.

Private IP addresses can be set manually, (which would get you static IP addresses) or assigned automatically by your router DHCP without overlapping one another (Dynamic Host Configuration Protocol), which would get you dynamic IP addresses. In most homes and small businesses, the router acts as the DHCP server.

In large networks, a single computer might act as the DHCP server. As your private IP address is only used with your router, it does not need to be unique, there are millions of devices out there having an IP address exactly the same like yours.

2. Public IP addresses

Public IP addresses are used on the “outside” of your network, and can’t be used in your private network and are assigned by your ISP using NAT (Network Address Translation).

NAT is a system used to convert private IP addresses into public addresses by keeping a table with its records, in order to send and receive data to the right devices. It allows the devices within the private network to use one unregistered public IP address with its “port number” to connect to the internet. The port number represent the specific device, apps or tabs in your web browser, etc.

The public IP address is the main address that your home or business network uses to communicate with the rest of the networked devices around the world (i.e. the internet), so the devices with the same network would be given ‘one’ public IP address. This acts like a firewall that protects your computers by hiding your personal IP addresses behind one public address. The Demonstration of IP addresses in Private and Public Network

What is a Router?

Other than issuing private IP addresses to different devices in the internal network, a router can also act as a form security to the devices from attack as it serves as a border between the private IP addresses and the public IP addresses. Most routers are manufactured by companies like Linksys, 3Com, Belkin, D-Link, Motorola, TRENDnet, and Cisco, but there are many others.

This is the end of “The Summary of the Internet for People in a Hurry-Part 1”. Thank you for reading. Stay tuned for part 2.

Sources:

http://www.lifewire.com

http://www.cisco.com

http://www.quora.com

http://www.siliconindia.com

http://www.searchenterprisewan.techtarget.com

 

A Girl’s Letter to Her Missing Peace

It’s almost all the time that I feel this prickling tingling at the back of my neck, the intensifying goose bumps encompassing my whole body, the butterflies in my stomach, swarming conspiring with each other to take away my sanity for good.

It shakes up my sense, filling it with adrenaline, making a smoothie of nervousness that would win me over again as it always has for quite a while now. It gets on my nerves to just think about going out to just have fun, and enjoy life, I get tensed when actually going out, I get worried and feared of not being liked by others, even my own friends, I get annoyed by little things, I have too much emotionally-attached opinions, I get offended and discouraged by possibly anything.

My days are spent trying to fight this anxiety upon the cursed awareness of the acceleration of time passing by each day, the sound of the clock ticking, and changing colors of the sky. It is just too fast and overwhelming. The awareness of yourself aging every second that has pushed me once too often into this abyss of the paralysis of thoughts and actions, having me trapped and stuck in this figuratively zero-gravity space.

Eyes closed or not, you feel like you’re not attached to any items, to any particular thoughts,  just an abstract body floating in darkness, in whiteness, in peace, waiting for something, for her sense to come back maybe, for her beginning? for her restart? or maybe just maybe her damnation to come and end her. I do imagine it would be ultimately and comfortably relaxing if we can actually float like that.

1311766-girl-floating-in-space

My days are spent striving to hold on to a surface, to just grab a hold on to something, to have a solid thought, a purpose, a goal to just keep my mind calm, to keep progressing, to have some sense of security that I really need. The security of friends, the security of family, the security of not losing people, the security of good friends being good friends no matter what, how do we not lose people? How do love people forever? And how do people not change? How do families stay together? How do we not mess up like ever How?

Do some people have this kinda thoughts too? Do they feel it too? Is this why people smoke weed? Became alcoholic? Do self-inflicted harms?

“What is this? What are you trying to say? Can you try to make more sense? Are you out of your mind?”, these are how most people typical people are going to react to these kind of thoughts, this is how they would comfort us and take care of us, and will always be there for us, as they always claimed. In reality, who cares, except your psychiatrist because you’d have to pay him/her for it.

 

How Vulnerable are You to a Hacker?

In one of these days, each and every one of us, without a doubt have stumbled upon, at least once, an article or a video of a particular person, a business, a government site, a corporation being victims of data breaches from anonymous hackers either for good intention or vicious self-gain. Throughout the history there are countless breakout of these incidents, these criminal activities, and some of those are known and made available of the public eyes, but what about those that are not found out, those hackers who got away harming other people? Somehow that already crossed your mind about all of this things that’s happening in the world, or some might say this is obvious.

But it also crossed your mind, why does it matter? besides, you got nothing to hide, and the chance of you being targeted is nothing compared to a celebrity, or a politician. Well, my friend, you got everything to hide from a hacker.

THE CURRENT ISSUE:

1. Social media

The issue is that users of social networks, as uninformed as they may be, take this issue very lightly. Most, as vulnerable as they may be, take it with a grain of salt of how vulnerable they are to potential hackers out there. With the perks of being able to communicate and share general  or  personal going-ons to their friends and family to see, folks tend to undermine the importance and safety of their privacy. It’s not opinionated to say that some get recklessly negligent on their security like passwords for instance, not just ordinary people but also cyber security professionals.

rsa_report_17.jpgAnother of the things that are taken for granted most of time is how advanced technologies has become nowadays, and how untrustworthy they are. A certain lot of people are too generous, and too trusting on social media, for example conforming to log in their Facebook or email accounts on a game app to invite friends, giving in to completing random quizzes about your personal interests or opinions to just volunteer more information about themselves to unreliable websites.

It’s hard to break this to you but even statuses, pictures, locations and other voluntary information that you put out there can also be harmfully used against you.

People use Facebook to contact each other privately, whether to their family, friends, colleagues, and their bosses, and unless you are a very conservative person (as you should moderately be on the internet), it is natural that you have sent and received a lot of personal information, confidential and non-confidential stuff about yourself and others, and your opinion on things in your private messages. And imagine what could happen if someone gets hold of your accounts, not so private now, are they?

One case of a cyber-crime involved a hacker who used just Facebook status updates, pictures, and other personal details posted publicly to hack email accounts, and then posted embarrassing photos of the victims on Facebook, and most of the victims are females. Terrified yet?

Reported a while ago, 0.06% of the billions users of Facebook are hacked daily. Now that doesn’t sound like much right, but wake up! it’s 600,000 accounts being hacked ‘daily’. And the report was seven years ago, when technology and IT studies were undoubtedly advanced than now.

On top of that here’s a reminder of recent incidents…

87 million Facebook users affected by data breach

Beginning since 2014, Cambridge Analytica was found to have collected Facebook users information without their consent, for the purpose of influencing the US presidential election.

The company which was alleged to conspire with Donald Trump’s election team, has said to be compiled millions of US citizen’s data, to experiment their propaganda strategy and influence voters. According to Zuckerberg, the number of users affected has reach 87 million. Read more>>

However, it’s not only Facebook accounts that have hacked, reported in 2017, about six million Instagram accounts have been tragically uncovered on the internet

A bunch of hackers created a dark web forum selling data of personal information database of personal information, revealing private phone numbers and email addresses.

According Telegraph, “photo hacks soared after an incident of compromised photos of the singer Selena Gomez.

Claimed by the UK security research that hundreds of contact details of celebrities including Emma Watson, Taylor Swift and Harry Styles were found on the dark web.

There were even sales of personal data that could be accessed for a price of $10 per search.

2. Emails and Cloud storage hacks

The cases involving the hacks of social media accounts such as Facebook and Instagram are barely the tip of the iceberg. Regardless, those are less than a fraction of what they can do with the information they got from your social media accounts. Those vicous hackers with their vicious wit can ‘phish’ out bits and bits of details, and use those compiled details to get the gist of answers to security questions and answers or even passwords to your email account.

The ‘phished’ details might include birthdays (even if you don’t put it on your profile, they can still scroll through your wall posts or pictures, trust me, it’s easier than you think), your address, your mother’s name, the town you met your boyfriend/girlfriend/spouse and so on. And it’s even worse if you put out your email that you use for your cloud storage, banks, credit cards and other important, financial related platforms, it’s so much less of a pain in the neck for those cyber criminals, you’re just basically asking for it. And if your social media profiles are an aquarium, your emails are the ocean! No, I’m not exaggerating!

iCloud Photos of Celebrities Hacked, 2014

Jennifer Lawrence

And as more people are increasingly using the cloud to keep their personal and confidential data. With the emails hacked they could get their hands on a lot of useful information for their own gain. And of course people with high profiles stand very high chance of being targeted by those culprits, as seen by what fell upon an Academy Award winner Jennifer Lawrence one day in 2014.

The famous actress had involuntarily became one of the several celebrities who had learned it the hard way that storing your nudes in Apple iCloud probably wasn’t the best idea. It was just a part of a huge leak of nude and nearly nude photographs of Rihanna, Kate Upton, Kaley Cuoco, Adrianne Curry, and almost three hundred other celebrities, most of them women, whose smart phone images had been accessed remotely. Just imagine one day, waking up in one summer morning having to face the ‘seemingly impossible’ incident of your nudes splashing around on the net, for everyone to see, including everyone you know, your friends, your family. It is the nightmare of every single human being.

Nonetheless, Apple, who barely ever provided any details on security issues, did not own the blame on their part. Instead, they claimed the breach was a “very targeted attack on user names, passwords, and security question” and added that “none of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone.”

500 million Yahoo accounts were stolen

Nothing could be as catastrophic as an infiltration into a big company and seizes a billion passwords of users. Despite the fact that this large-scale is thankfully very hard to maneuver, it still happens.

Yahoo Voice hacked, 400,000 yahoo passwords leaked

Back in 2014, the biggest email hack  in the history of the world was revealed. Almost half a billion users of Yahoo accounts were compromised with unencrypted security questions and answers which are mostly link to other accounts as well as. Therefore, users were forced to change their passwords and basically everything else related to security on other networks.

LinkedIn Lost 167 Million Account Credentials in Data Breach in 2012

linkedin-blunders1.jpg

According to Fortune, 6.5 million encrypted passwords were seized by a Russian hacker, who goes by the name “Peace” was selling 117 email and password combinations on the dark web for bitcoins, which was about $2,300. Read more>>

Here are the top five other major data breaches:

1.  Adult Friend Finder

Impacted for than 412.2 million accounts. Datas included names, email addresses and passwords.

2. eBay

145 million users compromised. Names, addresses, dates of birth and encrypted passwords were exposed.

3. Equifax

Personal information (including Social Security Numbers, birth dates, addresses, and in some cases drivers’ license numbers) of 143 million consumers; 209,000 consumers also had their credit card data exposed.

4.  Heartland Payment Systems 

134 million credit cards exposed through SQL injection to install spyware on Heartland’s data systems.

 5. Target Stores 

Credit/debit card information and/or contact information of up to 110 million people compromised.

And the list goes on and on and on…..So the next time you’re about to post things on social media, send emails, setting passwords, or taking pictures, think about how much nuisance you stand to face, if shit happens.

See also:

The summary of internet for people in a hurry – Part 1

How to protect your credit/debit card

The summary of the dark web for people in a hurry

Advices from Kevin Mitnick

 

 

 

Why I Created This Site

Have you ever at some point, in the midst of any tasks you’re occupied with, stopped and asked yourself, with a frown on your face, WHY? what am I doing? why am I doing this? who am I doing this for? is this it? or does my life have a bigger purpose? a purpose that no one expected of you? a purpose to make an impact on this world? to help people? to them smile? laugh? Or do I exist to just curl up and disappear into a horrifying abyss of oblivion?! By far to this day, I’ve discovered, that if so, I would just be as useful to this world as a gender studies degree to a college graduate (Jokes intended, lol).

“Life’s most persistent and urgent question is, ‘what are you doing for others?’ ” ~ Martin Luther King, Jr.

So on this day, at this hour, at this point, at the time I am writing this post (or have written this post as you are undeniably reading this at anytime in the future), after throwing myself into a pool of existential crisis and self-doubts, swimming through excuses after excuses, debates after debates, internally,  I have decided to break up with my invisible life for good. And just out of the blue, it dawns on me that life is not about waiting for the right time, or waiting to be ready, or worse yet! thinking you need more time, because TIME, time is the luxury we don’t have. It is rather about MAKING IT THE RIGHT TIME, MAKING YOURSELF READY, AND HELPING OTHERS IS HELPING YOURSELF, both mentally and spiritually. Dare to make change, dare to take the journey, not just for yourself, but also for the things that define you, for the people you love, for your friends and family, because for goodness sake, they need that spark of light too, whether it’s bright enough or not for them to see, they need it, the motivation, the hope, the inspiration to be something different, to know they can be anything if they want to, to be brave! At the end of the day, you are owner of your life, you only have your self to blame for the dreams that are killed, the hopes that are faded. So BOTTOM LINE: It’s now or never!

According to Denis Waitley, ” There are two primary choices in life: to accept the conditions as they exist, or accept the responsibility for changing them.”