Why Do People Visit Websites ?
Basic information of internet and some terms explain are below. Why Do People Visit Websites ? Web servers and Web browsers ,vulnerability scanning etc.
Terms Of website And Internet :
World Wide Web ( www ) :
The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet worldwide, including the client devices (such as computers and cell phones) that access Web content. The WWW is just one of many applications of the Internet and computer networks. The World Web is based on these technologies:
HTML-Hypertext Markup Language HTTP-Hypertext Transfer Protocol
Web servers and Web browsers :
Researcher Tim Berners-Lee led the development of the original World Wide Web in the late 1980s and early 1990s. He helped build prototypes of the above Web technologies and coined the term "WWW." Web sites and Web browsing exploded in popularity during the mid-1990s. Also Known As: World Wide Web
Website :
A website is a collection of web pages (documents that are accessed through the Internet), such as the one you're looking at now. A web page is what you see on the screen when you type in a web address, click on a link, or put a query in a search engine. A web page can contain any type of information, and can include text, color, graphics, animation and sound.
When someone gives you their web address, it generally takes you to their website's home page, which should introduce you to what that site offers in terms of information or other services. From the home page, you can click on links to reach other sections of the site. A website can consist of one page, or of tens of thousands of pages, depending on what the site owner is trying to accomplish.
Why Do People Visit Websites?:
Generally, people look at websites for two primary reasons:
1. To find information they need. This could be anything from a student looking for pictures of frogs for a school project, to finding the latest stock quotes, to getting the address of the nearest Thai restaurant.
2. To complete a task. Visitors may want to buy the latest best seller, download a software program, or participate in an online discussion about a favorite hobby.
The main thing to remember in creating a website is that you're not creating the website for you; you already know about the information or service you have to offer.
You're creating the site for your visitors, so it should contain the content they want, and be organized in a way that makes sense, even to an outsider.
We'll tell you how to create and improve your website in further articles, but the main thing to remember is this: A website is a means of communication, and it is only successful when its message is received by the intended user.
Domain:
The web is the busiest place we know today, with millions of websites now available online, competing to catch the users' attention. Apart from the common marketing and search engine optimization techniques, one of the key weapons website owners use in 'fighting' for their visitors' attention is the name of their website - i.e. their domain.
Subdomain:
Subdomain Also called a child domain, a domain that is part of a larger domain name in DNS hierarchy. DNS hierarchy consists of the root-level domain at the top, underneath which are How to Break Security & Hack it!!!!!
the top-level domains, followed by second-level domains and finally subdomains. For example, in the domain name webopedia.internet.com, "webopedia" is a subdomain of the larger second-level domain "internet.com."
HTTP:
Short for Hypertext Transfer Protocol, the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.
For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. The other main standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and displayed.
HTTP is called a stateless protocol because each command is executed independently, without any knowledge of the commands that came before it. This is the main reason that it is difficult to implement Web sites that react intelligently to user input.
This shortcoming of HTTP is being addressed in a number of new technologies, including ActiveX, Java, JavaScript and cookies. HTTPS: HyperText Transfer Protocol Secure.
Virus:
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce.
Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.
Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.
Computer worms:
Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and Trojans.
A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts.
Once installed on a computer, worms spontaneously generate additional email messages containing copies of the worm.
They may also open TCP ports to create networks security holes for other applications, and they may attempt to "flood" the LAN with spurious Denial of Service (DoS) data transmissions.
vulnerability scanning:
The automated process of proactively identifying vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened. While public servers are important for communication and data transfer over the Internet, they open the door to potential security breaches by threat agents, such as malicious hackers.
Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security.
Vulnerability scanning typically refers to the scanning of systems that are connected to the Internet but can also refer to system audits on internal networks that are not connected to the Internet in order to assess the threat of rogue software or malicious employees in an enterprise.