| < draft-ietf-uswg-fyi4-00.txt | draft-ietf-uswg-fyi4-01.txt > | |||
|---|---|---|---|---|
| INTERNET-DRAFT R. Plzak | INTERNET-DRAFT R. Plzak | |||
| draft-ietf-uswg-fyi4-00.txt SAIC | draft-ietf-uswg-fyi4-01.txt SAIC | |||
| A. Wells | A.T. Wells | |||
| UWisc-Mad | UWisc-Mad | |||
| E. Krol | E. Krol | |||
| Univ IL | Univ IL | |||
| November 1998 | May 1999 | |||
| FYI on Questions and Answers | FYI on Questions and Answers | |||
| Answers to Commonly asked New Internet User Questions | Answers to Commonly AskedNew Internet User Questions | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft. Internet-Drafts are working | This document is an Internet-Draft and is in full conformance with | |||
| documents of the Internet Engineering Task Force (IETF), its areas, | all provisions of Section 10 of RFC2026. | |||
| and its working groups. Note that other groups may also distribute | ||||
| working documents as Internet-Drafts. | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | ||||
| other groups may also distribute working documents as Internet- | ||||
| Drafts. | ||||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet- Drafts as reference | time. It is inappropriate to use Internet- Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| To view the entire list of current Internet-Drafts, please check the | The list of current Internet-Drafts can be accessed at | |||
| "1id-abstracts.txt" listing contained in the Internet-Drafts Shadow | http://www.ietf.org/ietf/1id-abstracts.txt | |||
| Directories on ftp.is.co.za (Africa), ftp.nordu.net (Northern | ||||
| Europe), ftp.nis.garr.it (Southern Europe), munnari.oz.au (Pacific | ||||
| Rim), ftp.ietf.org (US East Coast), or ftp.isi.edu (US West Coast). | ||||
| "Copyright(C) The Internet Society (1998). All Rights Reserved." | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | ||||
| Abstract | Abstract | |||
| This memo provides an overview to the new Internet User. The | This memo provides an overview to the new Internet User. The | |||
| intended audience is the common Internet user of today, thus it | intended audience is the common Internet user of today, thus it | |||
| attempts to provide a more consumer oriented approach to the Internet | attempts to provide a more consumer oriented approach to the Internet | |||
| rather than going into any depth about a topic. Unlike its | rather than going into any depth about a topic. Unlike its | |||
| predecessors, this edition seeks to answer the general questions that | predecessors, this edition seeks to answer the general questions that | |||
| an unsophisticated consumer would ask as opposed to the more pointed | an unsophisticated consumer would ask as opposed to the more pointed | |||
| questions of the more a technically sophisticated Internet user. | questions of a more technically sophisticated Internet user. Those | |||
| Users desiring a more in-depth discussion are directed to FYI 7 that | desiring a more in-depth discussion are directed to FYI 7 that deals | |||
| deals with intermediate and advanced Q/A topics. A conscious effort | with intermediate and advanced Q/A topics. A conscious effort has | |||
| has been made to keep this memo brief but at the same time provide | been made to keep this memo brief but at the same time provide the | |||
| the new user with enough information to generally understand the | new user with enough information to generally understand the | |||
| Internet. | Internet. | |||
| 1. Acknowledgements | 1. Acknowledgements | |||
| The following people deserve thanks for their help and contributions | The following people deserve thanks for their help and contributions | |||
| to thei FYI Q/A: Albert Lunde (NWU). | to this FYI Q/A: Chris Burke (Motorola), John Curran (BBN Planet), | |||
| Albert Lunde (NWU), and April Marine (Internet Engines, Inc.). | ||||
| 2. Questions About the Internet | 2. Questions About the Internet | |||
| 2.1. What is the Internet? | 2.1. What is the Internet? | |||
| The Internet is the worldwide group of networks that are connected | People use computers to perform a wide assortment of tasks. A | |||
| together. It consists of the computers used by users that are | connected group of computers is known as a network. Because people | |||
| connected to these networks, the specialized computers (routers) that | are connected via this network, they can use their computers to | |||
| are the interconnection points between these networks, and the | exchange ideas and information. Some computers are connected | |||
| communications lines. Most home users connect to a network via a | directly to the network while others (primarily those in homes) are | |||
| telephone line and a communication device (modem). A company known as | connected via a telephone line and a communication device known as a | |||
| an Internet Service Provider (ISP) connects this network to the | modem. By connecting networks together with specialized computers | |||
| Internet. The Internet was put together from normal telephone | known as routers, people on one network can engage in activities with | |||
| communication products which are offered by telephone companies, but | people on other networks. This INTER-connected group of NETworks is | |||
| they are used in a different way which allows everyone to share them | known as the INTERNET. | |||
| which makes the whole thing cheaper. | ||||
| The Internet is structured much like any other business. You buy | 2.2. What Can I do on the Internet? | |||
| your service from a retail ISP. Your ISP takes its profit and buys | ||||
| bulk services from a bigger provider who does the same thing. This | ||||
| may happen a couple of times until there gets a point where there are | ||||
| places where the big providers all connect together and communicate | ||||
| with each other. There are only a few of these in each area of the | ||||
| world and they pay a fee to connect at these points. The connection | ||||
| points are connected together by international providers, so that if | ||||
| you connect to the Internet at one point, you can get anywhere in the | ||||
| world. | ||||
| 2.2. Who Runs the Internet? | There is a large variety of activities that users can do on the | |||
| Internet. These activities include surfing, searching, sending mail, | ||||
| transfering programs and documents, chatting, and playing games. | ||||
| The Internet is operated as a cooperative effort among the ISPs, | SURFING | |||
| software companies, volunteer organizations, and a few facilities | ||||
| that tie the whole thing together. The ISPs and software companies | ||||
| are completely independent and most of them compete with each other. | ||||
| The ISPs agree to connect to each other and transmit information | ||||
| following an established set of rules (protocols). The software | ||||
| companies agree to manufacture programs (such as email or web | ||||
| browsers) that also follow protocols. These protocols are developed | ||||
| by a group of volunteers (Internet Engineering Task Force IETF) that | ||||
| come together regularly and discuss how the Internet is running and | ||||
| how to standardize new services. | ||||
| But, there are things that must be unique in the Internet, just like | Surfing is one of the most popular Internet activities. To surf, a | |||
| your phone number must be unique in the world. To keep these things | user needs a program known as a web browser. The web browser enables | |||
| straight there are groups identified in the community which allocate | the user to connect to a location that contains information. Many | |||
| addresses (IP Registries ARIN, RIPE, APNIC), allocate names (domain | locations contain links to other sites that contain related | |||
| registries), and generally keep track of things (ICANN). This is | information. These links are usually identified by underlined text | |||
| keeps the Internet working well, adding new services, and running on | that is of a different color from the rest of the text in an article. | |||
| a wide variety of computers. | By clicking on one of these links the user is then connected to that | |||
| information. This information may be at the same location or may be | ||||
| at a different location. This new information may, in turn, have | ||||
| links to other information. So just like a footnote or reference in | ||||
| a print publication, links can be used to find related or non-related | ||||
| information. | ||||
| 2.3. What Can I do on the Internet? | SEARCHING | |||
| There are a variety of applications and activities on the Internet. | Searching involves using a special program known as a seach engine. | |||
| These include the ability to surf, use search tools, send mail, | There are several of these engines that are located at various search | |||
| transfer programs and documents, and chat. | sites. The popular web browsers have location information about | |||
| these search sites. Searching is similar to using a card catalog in | ||||
| a library. Just as a person would look up a topic in a card catalog | ||||
| and find one or more references to that topic with library location | ||||
| information, a search engine provides the user with a list of sites | ||||
| that may contain relevant information. This list is actually a set | ||||
| of links to these sites so that all the user has to do is click on | ||||
| the link to go to the location. Just as different library card | ||||
| catalogs will contain different reference cards, different search | ||||
| engines will provide different reference lists. | ||||
| Surfing is one of the two most popular activities. To surf, a user | ||||
| uses a program known as a web browser. The web browser enables the | ||||
| user to connect to a location that contains information. From one | ||||
| location a user can follow various links by clicking on them to | ||||
| explore the Internet. Like following a footnote or reference in a | ||||
| print publication, links can be used to find related or non-related | ||||
| information. | ||||
| Typically surfing begins by connecting to a site that contains a | E-mail is another very popular activity. It is very similar to | |||
| search engine. Since the Internet contains many, many different kinds | sending letters through the post office or notes and memos around the | |||
| of material on a wide variety of topics, finding exactly what you are | office. It is used to exchange messages between two or more people. | |||
| looking for can be challenging. This is where search engines come in | Because email can be misunderstood or abused, users should be | |||
| since they can help you locate specific information. But, remember | familiar with email netiquette. For more information see Netiquette | |||
| just as using a dictionary versus the yellow pages to locate | Guidlines [FYI 28, RFC 1855]. | |||
| information on automobiles will yield very different results, so too | ||||
| will different search engines. | ||||
| E-mail is the second most popular activity and is very similar to | Many people also participate in mailing lists. Usually mailing lists | |||
| sending letters through the post office. It is both an application | are dedicated to a particular topic or interest. Some mailing lists | |||
| and an activity which allows for the exchange of messages between two | are used to provide information to subscribers, such as product | |||
| or more people. Additionally, many people use e-mail to join and | update information for something an individual may have purchased | |||
| participate in what are known as listserv discussions or mail lists. | while others are used for discussion. In the latter instance people | |||
| A listserv is simply a forum wherein people exchange e-mail and is | participate in the discussion by sending email to a "list" address | |||
| typically on a defined topic i.e. home buying, politics, or even | which in turn distributes it to all members of a list. Abuse of mail | |||
| running the Internet. | lists is probably the biggest source of junk email (also known as | |||
| "spam"). Everyone should take care that they aren't the source of | ||||
| junk mail. | ||||
| FILE TRANSFER | ||||
| Programs and documents are transferred in several ways. The most | Programs and documents are transferred in several ways. The most | |||
| common way this is done between individual users is to attach the | common way this is done between individual users is to attach the | |||
| program or document to an e-mail message. Programs and documents are | program or document to an e-mail message. Programs and documents are | |||
| usually transferred from sites to users using the save feature of a | usually transferred from sites to users using the save feature of a | |||
| web browser or the file transfer protocol (FTP). This enables users | web browser or the file transfer protocol (FTP). Such transfers | |||
| to obtain a variety of programs, documents, audio files, and video | enable users to obtain a variety of programs, documents, audio files, | |||
| files. | and video files. | |||
| Another application and activity known as chat takes place with | CHAT | |||
| another person or persons who are also on the Internet. Chatting is | ||||
| very similar to going to a party. Just as people congregate in small | ||||
| groups and discuss things, chatters meet in chat rooms to discuss a | ||||
| topic. Chat rooms are generally sponsored or operated by an | ||||
| organization that has an interest in the topic area. For example, an | ||||
| online news organization would have a chat room for chatters to | ||||
| discuss current events. To chat one person writes a message which | ||||
| can be read, as it is being written, by the others who can respond to | ||||
| it in turn. Persons who enter a chat room but dont enter the | ||||
| discussion are said to be lurking. Chatters come and go to chat | ||||
| rooms the same way people move about groups at a party. | ||||
| Some popular activities that have recently sprung up include | Chat takes place between one or more persons who are on the Internet. | |||
| electronic shopping, banking, and investing. Major and specialty | Chatting is very similar to going to a party. Just as people | |||
| retail stores around the nation and many around the world describe | congregate in small groups and discuss things, chatters meet in chat | |||
| and display pictures of their products on the Internet for people to | rooms to discuss a topic. Chat rooms are generally sponsored or | |||
| buy directly or indirectly. Shopping can also include purchasing | operated by an organization that has an interest in the topic area. | |||
| services such as an airline ticket or ordering groceries. | For example, an online news organization would have a chat room for | |||
| Additionally, many banks allow people to transfer funds, check | chatters to discuss current events. To chat one person writes a | |||
| message which can be read, as it is being written, by the others who | ||||
| can respond to it in turn. First time chatters should be aware that | ||||
| just as at a party where some people never say anything, so there may | ||||
| be people in the room who are just listening. Also, just like at a | ||||
| party, some people may portray themselves to be someone different | ||||
| than who they really are. Lastly, remember that chatters come and go | ||||
| to chat rooms the same way people move about groups at a party. | ||||
| GAMES | ||||
| Some people use the Internet to play games. These games can be role | ||||
| playing games, action/adventure games, or online versions of old | ||||
| standbys like chess. Some games require the user to purchase a copy | ||||
| of the game and install it on their computer, while others are played | ||||
| by going to a game site. Just like other forms of game playing, | ||||
| Internet game playing can be challenging, entertaining, and an | ||||
| enjoyable social experience. Don't be afraid to have fun. | ||||
| OTHER ACTIVITIES | ||||
| Other popular activities include electronic shopping, banking, and | ||||
| investing. Many retailers describe and display pictures of their | ||||
| products on the Internet enabling people to buy on line. Shopping | ||||
| also includes purchasing services such as an airline ticket or | ||||
| ordering groceries. Many banks allow people to transfer funds, check | ||||
| available funds, pay bills and other such activities while on the | available funds, pay bills and other such activities while on the | |||
| Internet with an account number and ID. Lastly, many people invest | Internet with an account number and ID. Lastly, many people invest | |||
| while on the Internet in everything from stocks and bonds to real | while on the Internet in everything from stocks and bonds to real | |||
| estate. | estate. One word of caution, if you are using a credit card, check | |||
| to see if there are security features in place to protect your credit | ||||
| card information. Reputable sites should tell you how they are | ||||
| protecting your information. If you are in doubt about how your | ||||
| information will be protected, don't use your credit card at that | ||||
| site. | ||||
| 2.4. How Does the Internet Work? | 2.3. What is an Address? | |||
| The Internet allows people to conduct activities, whether it is web | Two commonly asked questions these days are "What's your e-mail | |||
| browsing, e-mail, a file transfer, or a chat session between two | address?" and "What's the URL?" Generally, the first question is | |||
| computers (source and destination) that can be located anywhere. To | asking where to send information, while the second is asking where to | |||
| make this happen several things occur. An activity is started, the | get information. The answer to the first question is usually | |||
| address of the destination is identified, a path to the destination | something like myname@company.com. The answer to the second question | |||
| is created, an activity session is started, and then the activity | is usually something like "http://www.newspaper.com". What do these | |||
| takes place. This is done by a variety of programs that follow | answers mean? | |||
| standards (protocols) of Internet activity. | E-MAIL ADDRESS | |||
| Lets look at how this would happen for an e-mail session. The user | As stated previously an e-mail address is something like | |||
| creates a message using an e-mail program. The user identifies the | "myname@company.com", pronounced "MYNAME at COMPANY dot COM". An | |||
| destination by specifying an e-mail address. Since humans are more | email address consists of two parts that are divided by an "@" sign. | |||
| comfortable with names the e-mail protocol specifies that this | The portion to the left is like the name line on a letter, it | |||
| address is the name of the user at the destination. It looks like | identifies a particular person and usually is composed of the | |||
| jones@ietf.org. However, the computers that move information about | person's name. Typical names look like this: | |||
| the Internet use numeric addresses called Internet Protocol (IP) | ||||
| addresses. IP addresses are used to move (route) the message along | ||||
| the best path to the destination. Thus the name has to be translated | ||||
| into an IP address. The name-to-address mapping system called the | ||||
| Domain Name System (DNS) does this. Once the address has been | ||||
| determined, a set of protocols called routing protocols find the best | ||||
| path to the destination. Then an activity session is created between | ||||
| the source and the destination computer. The e-mail protocol checks | ||||
| the destination to make sure that it will accept the message. | ||||
| Finally the message is transmitted. As it moves from the source to | ||||
| the destination it may cross several networks that belong to several | ||||
| ISPs. All of this activity takes place within the time it takes to | ||||
| read this paragraph! | ||||
| 2.5. Are There Any Rules of Behavior? | john_doe | |||
| john.doe | ||||
| jdoe | ||||
| doej | ||||
| In general common sense, courtesy, and decency govern good Internet | The name is assigned by the system or network adminstrator who is | |||
| managing the email system and follows rules that have been | ||||
| established by the company providing the e-mail service. Sometimes | ||||
| the name portion of the e-mail address is referred to as a mailbox. | ||||
| The portion to the right of the "@" sign is the name of the computer | ||||
| system that is providing the e-mail service. This name is usually | ||||
| the name of the company that owns the computer system followed by a | ||||
| "dot" and an abbreviation that represents the "domain" or group of | ||||
| names which the organization falls under. Examples of these "top | ||||
| level" domains are "edu", "com", and country codes such as "fr" for | ||||
| France and "jp" for Japan. When an e-mail is sent the portion of the | ||||
| address to the right of the "@" sign is used to find the destination | ||||
| computer of the email. | ||||
| URL | ||||
| A Uniform Resource Locator (URL) is commonly used to identify a | ||||
| computer that provides world wide web service. It usually looks | ||||
| something like "http://www.newspaper.com". This address also | ||||
| consists of two parts. In this case the two parts are separated by | ||||
| the "//". The portion to the left means find the world wide web | ||||
| service that is located at the computer identified to the right of | ||||
| the "//". The portion to the right is the name of the computer that | ||||
| is providing the world wide web service. Its name is composed of | ||||
| parts that are similar to those described for the name of an email | ||||
| computer. Sometines the portion of the right contains additional | ||||
| information that identifies a particular document at the web site. | ||||
| For example, http://www.newspaper.com/sports/article1.html would | ||||
| identify a specific article in the sports section of the newspaper. | ||||
| 2.4. Are There Any Rules of Behavior on the Internet? | ||||
| In general, common sense, courtesy, and decency govern good Internet | ||||
| behavior. There is no single formal rulebook that governs behavior on | behavior. There is no single formal rulebook that governs behavior on | |||
| the Internet. However many e-mail discussion lists and chat rooms | the Internet. FYI 28 that was mentioned previously is a good guide. | |||
| have an Acceptable Use Policy (AUP). Before you join in one of these | Many activities such as game sites, chat rooms, or e-mail lists may | |||
| activities check and see if there is an AUP, make sure you understand | have rules of their own. What may be acceptable behavior in one chat | |||
| it, and then follow it. The IETF has published RFC 1855 (Netiquette | room may be totally out of bounds in another. It never hurts to | |||
| Guidelines) and is publishing other RFCs that deal with subjects such | check the water temperature before jumping in the pool. Users should | |||
| as advertising and Internet junk mail (spam). | use the same precautions before joining in any online activity. | |||
| E-mail in particular can lead to misunderstandings between people. | ||||
| Users should remember that the reader only has the text to determine | ||||
| what is being said. Other conversation cues such as "tone of voice" | ||||
| and body signals like winking are not present in the text. Because | ||||
| of this, users of the Internet have developed cues to put in the | ||||
| text. Text techniques such as capitalization and symbols known as | ||||
| emoticons (also called "smilies") are used. | ||||
| A typical smiley looks like this :-) | ||||
| Additionally, acronyms have evolved over time (for example IMHO - In | ||||
| My Humble Opinion). More information about this can be found by | ||||
| searching. Use keywords like "netiquette" and "emoticon" with your | ||||
| search engine to find more information. | ||||
| Users should also be aware that their particular programs such as | Users should also be aware that their particular programs such as | |||
| word processors or e-mail might produce documents and messages that | word processors or e-mail might produce documents and messages that | |||
| are not readable by everyone. You should make sure that the intended | are not readable by everyone. Very often, a reader must have the | |||
| recipient can read what you are sending them. | same program in which a document was written in order to read it. | |||
| So, before sending an attached document, it is a good idea to make | ||||
| sure that the intended receiver of your document has the capability | ||||
| to read it. If in doubt, send a text (ascii) version of the | ||||
| document. | ||||
| As in any group, the users of the Internet have, over time, developed | 2.5. How Does the Internet Work? | |||
| language short cuts. These primarily take the form of acronyms and | ||||
| emoticons (smilies). Lists of these acronyms and emoticons can be | Each of the activities mentioned in the section describing what one | |||
| found by surfing. | can do on the Internet requires that computers exchange information. | |||
| Computers take turns sending and receiving information. When a | ||||
| computer is sending information, it is known as the "source"; when it | ||||
| is receiving information, it is known as the "destination." (The | ||||
| same computer can be both a source and destination at different | ||||
| times. This is especially clear when one thinks of sending and | ||||
| receiving e-mail.) | ||||
| Every computer on the Internet has a unique Internet "address" that | ||||
| identifies it from among the millions of computers. The Internet has | ||||
| specialized computers between the source and destination located at | ||||
| network inter-connection points. These computers are known as | ||||
| "routers." The routers understand how to use a computer's address to | ||||
| appropriately point information from one computer to another over the | ||||
| Internet. | ||||
| In an exchange of information the following occurs: | ||||
| * The source finds the address of the destination. | ||||
| * The source contacts the destination and says "hello". | ||||
| * The destination responds back with a "hello" of its own. | ||||
| * The source tells the destination that it has information to | ||||
| send. | ||||
| * The destination tells the source that it is ready to receive the | ||||
| information. | ||||
| * The source breaks the information into small pieces called | ||||
| packets and sends each packet on its way to the destination. | ||||
| * The routers guide each packet to the destination. | ||||
| * The destination takes the packets and puts them back together to | ||||
| form the information. | ||||
| * The destination tells the source that it has received the | ||||
| information and asks the source if it has anything more to send. | ||||
| * If the source says no, the destination will say "good bye" | ||||
| unless it has something to send back. If it does, it will break | ||||
| the information into packets and send them. | ||||
| * Once both end users are done "talking" they say both say "good | ||||
| bye". | ||||
| Clearly our simplified introduction to this section did not explain | ||||
| many steps in this process, such as how a computer discovers the | ||||
| address of another computer or how packets are divided and | ||||
| reassembled. Fortunately, these are specifics that people using the | ||||
| Internet never really need to deal with! | ||||
| 2.6 Who Runs the Internet? | ||||
| No one. The Internet is a cooperative effort among Internet Service | ||||
| Providers (ISPs), software companines, volunteer organizations, and a | ||||
| few facilities that tie the whole thing together. The ISPs and | ||||
| software companies are completely independent and most of them | ||||
| compete with each other. The ISPs provide internet service to people | ||||
| much the same way that they obtain telephone service from a telephone | ||||
| company. ISPs agree to connect their networks to each other and | ||||
| transmit information following an established set of rules | ||||
| (protocols). The software companies agree to manufacture programs | ||||
| (such as email or web browsers) that also follow protocols. There | ||||
| are other organizations that keep things straight. Some assign | ||||
| Internet addresses in much the same manner as telephone numbers are | ||||
| assigned, others keep track of names used by Internet users and | ||||
| groups, and a large volunteer organization called the Internet | ||||
| Engineering Task Force (IETF) develops the protocols computers follow | ||||
| to make network communications succeed. | ||||
| 3. Security Considerations | 3. Security Considerations | |||
| It is important to realize that not Internet user is a good netizen. | The question "is the Internet secure?" can be a confusing one for | |||
| Therefore, users should learn to protect themselves. The IETF has | people, who will hear many assurances that it is secure and many | |||
| published several RFCs that provide security information and | scary stories saying it is not secure. There are a few basic rules | |||
| guidance. Additionally, users can protect themselves from sites and | of thumb to remember that will address most concerns. | |||
| documents that have unwanted content by using baby sitting software. | ||||
| First, make it a rule never to share account passwords with anyone. | ||||
| Learning a password is the easiest way for someone to break into a | ||||
| system. Most people feel that their files are not that interesting | ||||
| to anyone, but someone may be able to get a foothold from one | ||||
| innocuous account to other places in the same computer system. Many | ||||
| good security practices can be found in the Users Security Handbook | ||||
| [FYI 34, RFC 2504]. | ||||
| Second, understand that there are means for people to track the | ||||
| information a user sends via email, the files one downloads, and the | ||||
| sites visited on the web. The system administrators and network | ||||
| engineers who oversee a sites' computers require access to | ||||
| information that an individual may think is secret. In practice, no | ||||
| responsible system administrator or network engineer will violate a | ||||
| person's privacy out of personal curiousity. However, if someone | ||||
| less legitimate attains illegal access to a system, they also will | ||||
| have access to this information. This situation is not a problem for | ||||
| most people, but it should be understood that things like email sent | ||||
| a year ago or a log of users web pages browsed may still exist in | ||||
| some system's backup archive tape and can be easily resurrected and | ||||
| published widely. | ||||
| Third, before giving personal information over the Internet, such as | ||||
| filling in a form on a Web page, users should realize that there is | ||||
| no assurance of confidentiality or privacy. It could be compared to | ||||
| faxing such information to a party that you've never dealt with | ||||
| before. While many organizations on the Internet are responsible | ||||
| with information received via the web and email, this cannot always | ||||
| be determined in advance. | ||||
| 4. References | 4. References | |||
| References to be inserted here. | [1] Guttman, E., Leong, G., and Malkin, G., "Users' Security | |||
| Handbook", RFC 2504, FYI 34, Sun Microsystems, COLT, Bay Networks, | ||||
| February 1999. | ||||
| [2] Hambridge, S., "Netiquette Guidelines", RFC 1855, FYI 28, Intel | ||||
| Corporation, October 1995. | ||||
| 5. Authors' Address | 5. Authors' Address | |||
| Raymond Plzak | Raymond Plzak | |||
| SAIC | SAIC | |||
| 1710 Goodridge Drive | 1710 Goodridge Drive | |||
| McLean, Virginia 22102 | McLean, Virginia 22102 | |||
| Phone: (703) 821-6535 | Phone: (703) 821-6535 | |||
| EMail: plzakr@saic.com | EMail: plzakr@saic.com | |||
| Amy Tracy Wells | Amy Tracy Wells | |||
| Internet Scout Project | Internet Scout Project | |||
| University of Wisconsin-Madison | University of Wisconsin-Madison | |||
| Computer Sciences Department | Computer Sciences Department | |||
| 1210 W. Dayton St. | 1210 W. Dayton St. | |||
| Madison, WI 53706 | Madison, WI 53706 | |||
| Phone: (608)263-2611 | Phone: (608)263-2611 | |||
| skipping to change at line 287 ¶ | skipping to change at page 11, line 4 ¶ | |||
| The limited permissions granted above are perpetual and will not be revoked | The limited permissions granted above are perpetual and will not be revoked | |||
| by the Internet Society or its successors or assigns. | by the Internet Society or its successors or assigns. | |||
| This document and the information contained herein is provided on an "AS IS" | This document and the information contained herein is provided on an "AS IS" | |||
| basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE | basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE | |||
| DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO | DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO | |||
| ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY | ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY | |||
| RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A | RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A | |||
| PARTICULAR PURPOSE. | PARTICULAR PURPOSE. | |||
| Appendix A | ||||
| Glossary of Terms | ||||
| Emoticon Combination of punctuation marks used to provide sense of | ||||
| the senders tone of voice in an e-mail message | ||||
| IETF Internet Engineering Task Force [see text for a description] | ||||
| Internet An interconnected group of networks | ||||
| ISP Internet Service Provider [see text for a description] | ||||
| Network A connected group of computers | ||||
| Router A specialized computer that connects networks together and | ||||
| guides information packets to their destination | ||||
| Spam A slang term for junk e-mail | ||||
| URL Uniform Resource Locator [see text for a description] | ||||
| Web Browser A program that provides the capablility to read | ||||
| information that is located at a world wide web site | ||||
| End of changes. 35 change blocks. | ||||
| 160 lines changed or deleted | 318 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||