Computer(Course_Book)
Computer(Course_Book)
This book contains courses’ lessons held at the Free University of Bolzano Bozen. It contains only the
first part of the courses, namely the lessons on:
computer introduction,
Microsoft Windows,
computer networks,
computer dangers and security.
It does not contain the parts on Microsoft Word, Microsoft Excel, financial functions, Microsoft Access,
computer algorithms, SPSS, Visual Basic for Applications, which are very well covered by the respective
courses’ suggested books.
This book is usually updated every year, please take a look at the edition date.
Disclaimers
This book is designed for very novice computer users. It often contains oversimplifications of reality and
every technical detail is purposely omitted. Expert users will find this book useless and, for certain aspects,
partially wrong.
This book supposes that the user is using Microsoft Windows 8 operating system in English language.
However, most of the book is perfectly readable with other Windows versions, while some menus and
instructions can be rather different if the language is not English (Windows language may be changed on
multi-language installations).
The novice user in this book is, for simplicity, always considered male. This is not meant to be gender
discrimination.
Table of Contents
Introduction .......................................................... 1 3.2. Communication ......................................... 15
3.3. Internet connections ................................. 18
1. Computers .................................................... 2
1.1. Storage ......................................................... 2 4. Computer security ..................................... 20
1.2. Software ....................................................... 3 4.1. Encryption.................................................. 20
4.2. Passwords .................................................. 23
2. Microsoft Windows ...................................... 6
4.3. Viruses ....................................................... 25
2.1. Versions and editions ................................... 6
4.4. Emails......................................................... 27
2.2. Regional and language settings .................... 7
4.5. Navigation.................................................. 29
2.3. File system .................................................... 8
4.6. Attacks from outside ................................. 30
3. Computer networks ................................... 14 4.7. Backup ....................................................... 31
3.1. Technical aspects........................................ 14
Dr. Paolo Coletti Basic Computer course book
1. Computers
This chapter presents with a brief description of computer main components, of the most common devices
and of the typical software components for novice user.
1.1. Storage
1.1.1. Measures
Before starting with the computer description, it is useful to become proficient with the data size
terminology, which will often be used in this book.
Computers have a very elementary way to store data: they can remember only 0 or 1. A value of 0 or 1 is
called bit and all computer data are stored as sequences of bits. A sequence of 8 bits is called a byte, which
is a quantity large enough to store usually a letter or a digit (even though sometimes 2 bytes are necessary).
Modern computers are able to deal with enormous quantity of bytes, forcing us to introduce other
quantities:
Kilobyte (KB), approximately 1,000 bytes,
Megabyte (MB), approximately 1,000 KB or one million bytes,
Gigabyte (GB), approximately 1,000 MB or one billion bytes,
Terabyte (TB), approximately 1,000 GB or one trillion bytes.
Usually the unformatted text of a whole book can fit in some KB, while for an image in a good resolution
(let’s say ready to be printed on A4 paper) or for a modern song some MB are required, while a film in high
quality needs some GB.
1.1.3. Devices
The computer uses several devices to permanently store and move data, which vary a lot in terms of
capability, cost, speed and portability.
The most used is the internal hard disk, which usually is inside the computer box and
cannot be moved. Its size currently ranges from 1 to 2 TB. On the other hand, an
external hard disk is outside the computer, has the same size and obviously can be
moved. Its only disadvantage is being slightly slower.
SSD Solid State Drives are starting to invade the market and will soon replace traditional
hard disks. They are not disks at all, but very large memory cards shaped like a hard disks which can entirely
replace the internal hard disk. Their main advantages are that not having moving parts (they do not rotate
at high speed like hard disks) are more robust and that in most situations they are faster than hard disks
(up to 10 times faster). Their disadvantage is the limited size which currently is 500 GB and their high price.
CD, DVD and Blu-ray are an alternative way to store data. They contain about 700 MB, 4 GB
and 25 GB, respectively. They required an appropriate reader to be read, which is available
on many computers, and an appropriate writer device to be written, which is available only
on some computers. This technology is, however, rapidly fading, as disks are much larger
and easier to damage compared to USB pen drivers or memory cards.
Memory stick or USB pen drive is the most used way to temporary store and move data. Its
size is now up to 128 GB, however its reliability is not perfect, therefore
it is used mostly to move data.
Another common way to store and move data is through a memory
card, used by external devices such as photo cameras or to expand mobile phones’
memory.
1.2. Software
Software can be divided into three big categories: operating systems, programs and data.
The operating system takes care of controlling computer hardware and human-computer interaction. There
are currently three widely used operating systems:
Linux (it is a family of very similar operating systems), which is a costless operating system,
Android, a family of very similar Linux-based operating systems for mobile devices,
Programs are software which is used to do particular tasks, e.g. Word for document writing, Explorer for
Internet navigation, the Calculator for mathematical operations.
Data is everything which is produced either by the user or by programs (sometimes even by the operating
system) to store information, e.g. a document file produced by Word is data, a downloaded web page is
data.
shareware, software which is initially costless but after a certain period the user is asked to pay a
fee or delete it; or software which has two versions: a free one, but incomplete or with
advertisement banners, and a complete advertisement-free one, for which the user must pay. The
most popular examples are mobile phones apps;
commercial, software for which the user has to pay a license to use it. Common examples are
Microsoft Windows operating system or Photoshop image editing program;
subscription-based, software for which the user pays a periodic fee to use it. This software typically
is also offered on the web and in this case the user does not have to care about installation nor
updates. Example are Microsoft Office 365 and Photoshop Creative Clouds;
private, software uniquely built, under payment, for a specific customer to fit his needs. Only the
costumer may use it. A typical example is the university’s students-courses-exams-professors
database system.
The permission to be modified can seem a trivial question for the novice user, however for program
developers and computer experts being authorized to modify a software is a great advantage since it can
be improved, checked for errors and tailored to specific needs. The “open source versus proprietary
software” is a strong ethical and economical debate in the computer scientists’ community. Subdivision by
permission to modify is:
open source software may be studied, used and especially modified by anyone. The software
developers at the same time legally authorize any modification and they distribute the source of
the software to put other developers in a condition to easily modify it. Open source software is also
automatically freeware. The most typical example is Linux operating system.
copyleft software is open source but carries the restriction that any modification must be
distributed as open source and copyleft, thus impeding that software becomes, after a
modification, proprietary. The most famous copy left contract license is the GNU Public License (see
http://www.gnu.org/licenses/gpl.html).
proprietary software is distributed (costless as Adobe Acrobat Reader, or as a shareware as WinZip,
or most often sold as commercial software as Microsoft Office) with the explicit legal warning not
to modify it and technically locked to prevent other developers to see or modify its source.
endanger its monopoly. A famous example is DOC format which, until 2007, was kept secret by
Microsoft, thus preventing competitors from building alternatives to Microsoft Word program.
open proprietary, a format publicly available but whose improvements and control are under the
ownership of a software company. A typical example is the new Word format DOCX.
open, a publicly available format which follows official standards whose control is under ownership
of public organizations, such as American ANSI, German DIN or Italian UNI. Typical examples are
image’s format GIF or formatted text’s format PDF or web page’s format HTML.
2. Microsoft Windows
Microsoft Windows is currently the market leader operating system, it is the usual interface which appears
when the user turns on a personal computer with Windows operating system.
At unibz some computers have a multi-boot system. When the computer is switched on, it asks the user
which operating system he would like to use and, after a short time, it starts with the default operating
system. In case the user wants to use a different operating systems, he obviously must restart the
computer.
Choosing the “View” menu of a directory windows provides the user with several different ways to look at
files and directories, the most important way being the Details which can show interesting information on
files and directories such as their size and date of last modification.
Each file and directory can be univocally identified by its absolute path or address. For directories it is the
path which appears on the address bar of the directory window, while for files it is the path of their
containing directory followed by “\” and the file name. For example, the absolute path of directory
“Common” in “HP” directory in “Program Files” directory in the C: hard disk is “C:\Program
Files\HP\Common” as can be seen from the address bar. While, the HPeDiag.dll file has the absolute path
“C:\Program Files\HP\Common\HPeDiag.dll”.
Note that, for Windows operating system, capital or small caps letters in paths are perfectly equal.
A special and tricky object is the link or shortcut. Although its icon looks like a file icon,
the small curved arrow on the left corner clearly indicates that this object is a link. A
link is simply an address to a file or directory, it is not a real file or directory. When the
user clicks on the link, the computer behaves exactly as if the user is clicking on the
real file or directory (if Windows can find the real one, which is not the case if in the
meantime somebody deleted or moved it). However, any copy/move operation on the link will simply
copy/move the link and not the real file or directory; especially copying/moving the link to another disk will
probably cause it to malfunction. Therefore it is a good idea for novice users to avoid using links at all.
File type Typical programs that open it Typical extensions Typical icons
\\ubz01fst\courses\course_coletti which contains utility files that will be used during the course.
These files must never be opened double-clicking from here, otherwise they will be locked (see
section 2.3.4 on page 12); they should be copied on each user’s desktop before opening them;
\\ubz01fst\courses\exam_coletti\, followed by user’s login name or the user’s last name and first
name, which will contain exam files and which is accessible only by the user;
\\ubz01fst\students\, followed by year, faculty and user’s login name, contains a copy of the
student’s disk F, desktop, and configuration.
While connecting to these directories from a unibz computer is straightforward, if you are using a notebook
you must take care that you are connected to ScientificNetwork WiFi. If you are using a VPN connection
from home, or sometimes even when connected from a notebook, digit \\ubz01fst.unibz.it instead of
simply \\ubz01fst and, when asked for login name and password, digit unibz.it\login name instead of simply
your login name. Finally, Mac users may find it much easier to map it permanently: make sure you are
connected to ScientificNetwork WiFi, Finder Go Connect to Server, use as address \\ubz01fst.unibz.it
(try smb://ubz01fst.unibz.it if that one does not work) then enter unibz.it\login name and your password
and click OK.
3. Computer networks
This part of the book is dedicated to computer networks from a user’s perspective. Nowadays a computer
is very likely to belong to some company’s network, or to be connected to the Internet via an Internet
provider, and is therefore exposed to all the typical network problems. Without entering into technical
details, this section will explore the situations in which a novice user can find himself in troubles and how
he can try to survive dialoguing with network administrators in their own strange technical language.
3.1.2. Areas
Computer networks are commonly divided into three categories:
Local Area Network (LAN or Intranet), usually the network of computers in the same building or
belonging to the same owner. Inside the LAN every computer is well identified and usually every
user is known. It is considered a trusted area.
Wide Area Network (WAN or Internet), which is everything which connects LANs. Computers’ and
users’ identification is very hard and anonymity is possible. It is considered a dangerous area.
Virtual Private Network (VPN) is a way to recognize a computer outside the LAN as a trusted
computer: the user is identified with a password and his computer, even though connected via
Internet, will be considered as part of the LAN, for as long as it remains connected. VPN is typically
required to identify portable computers connected via wireless connection.
Ethernet cables have a speed of 10 Mbps and can thus carry 1.25 MB each second, meaning that,
for example, a 600 MB movie can be transferred in 8 minutes from one computer to another one,
supposing no one (neither users nor computers) is using that network tract for other purposes
during the transfer.
Fast Ethernet cables have a speed of 100 Mbps.
Gigabit Ethernet cables have a speed of 1 Gbps.
A wireless network, a cableless network where computers use radio signals to communicate, has
usually a speed around 30-80 Mbps, depending on the wireless generation.
To find out how much time does it take to transfer a file with a size expressed in bytes, divide the
connection speed in bps by 8 to find out the byte rate per second and then divide the file size by the speed
to find out the number of seconds it takes for the file transfer. For example, to transfer a 600 MB file
through an Fast Ethernet connection, find out the speed of 12.5 MB per second (12,500,000 bytes per
second) and then divide 600 MB (or 600,000,000 bytes) by 12.5 (or by 12,500,000) to find out the time of
48 seconds.
3.2. Communication
Inside a computer network many communication programs are installed on Intranet computers to connect
to the Internet or even to internal computers.
Another way to read and send emails is through webmail systems, which are websites where the user can
enter and read his received email and send new ones acting directly on the mail-server, without
downloading them nor using any client. It can be useful for various reasons: it does not require the
installation of a mail reader program; old received emails are always available on the website and can thus
be accessed from home, office and while traveling, even without a personal laptop; the mailserver takes
care of emails backup. But on the other hand it requires a continuous fast connection even to write a single
long email, which can be costly and, in some situations, impossible and usually the email space is limited.
The most famous website interfaces are the Microsoft Outlook Web App, where the web interface looks
exactly like Microsoft Outlook, and the Webmail interface, used and personalized by most Internet
providers.
There are many tricks to speed up the web search and arrive quickly to the right result:
most novice users search the WWW using only a single keyword, which often produces the right
result but in some cases can result in long lists of wrong results, for example when looking for Java
Island using simply “java”. Using as many keywords as possible often avoids wrong results, even
though sometimes returns no pages if too many words are used;
putting some words between quotation marks forces the search engine to look for the exact
phrase, i.e. exactly for those words in that order and with no words in between;
in the advanced search menu often there are very good options, such as the search of pages only in
a specified language or only in a specified format, for example .doc or .pdf;
when looking simply for some images, it is more convenient to use the specific search rather than
trying to find web pages containing them.
Speed depends on
ADSL (Asymmetric Digital telephone line 500 Kbps in upload
subscription fee and
Subscriber Line) modem 8-20 Mbps download
network traffic
Optical fiber Special contract some Gbps
UMTS (Universal Mobile
Telecommunications System) 5 Mbps in upload Speed depends
3G 3G mobile phone 40 Mbps in strongly on
HSDPA (High Speed Downlink download environment
Packet Access)
LTE (Long Term Evolution) Depends on coverage
LTE mobile phone up to 100 Mbps
4G and contract
Wireless Speed depends on
wireless card 30-300 Mbps
Wi-Fi wireless generation
antenna in line of sight Speed depends
WiMAX 40 Mbps
modem strongly on distance
Page 18 of 33 Edition 8.0 (01/03/2016)
Basic Computer course book Dr. Paolo Coletti
Many fast connections, especially ADSL, suffer from network congestion: too many users are connecting at
the same time and the Internet provider’s main cables are not able to support the users’ maximum speed
multiplied by the number of users, and therefore must reduce the practical connection speed. Therefore
the maximum speed is often only theoretical and some providers are offering a “minimum band
guaranteed”: a minimum speed under which the connection may never fall.
Unfortunately, even in technologically advanced countries, there are still many areas where nor ADSL
neither UMTS arrives, mostly due to the geographic conditions (mountains, islands or long desert distances)
and to the low inhabitants’ density. This phenomenon is called digital divide: there are areas where
broadband connection does not arrive (8.8% of Italian families, while 16% of Italian companies do not have
access to 20 Mbps connections), and, on the other hand, Internet services and especially the WWW is
continuously going towards large size contents, cutting these people and companies off. In order to
overcome this social problem, WiMAX is spreading, a sort of very long range Wireless which arrives up to
10 Km but works only if the transmitting and receiving antennas are in line of sight and whose theoretical
speed of 70 Mbps decreases with distances to about 40 Mbps.
4. Computer security
Being connected to the Internet means giving anybody access to the computer. Despite the traditional
novice user’s belief that he is the one who goes outside, it is instead the Internet world which is coming
inside, with all its benefits and dangers. Knowing a little bit of security issues is nowadays necessary even to
the non-expert user, to avoid being lured into traps or adopting potentially dangerous behaviors.
Moreover, the recent Italian law 196/2003 on privacy issues contains in the Allegato B the minimal security
techniques which must be adopted by system administrators but also by normal users. This law
requirements apply clearly to all companies and professionals which handle data, but they also apply to
personal users who communicate data. To personal users who do not communicate data still the security
requirements to avoid data theft apply.
Law 196/2003 in particular splits data into:
personal data
sensitive data: data about race and ethnicity, religious / philosophical / political opinions, belonging
to religious / philosophical / political / workers organization
sensitive data about health and sex
justice data, which have the same prescriptions as sensitive data
genetic data, which need extremely particular procedures which will not be described here.
Law 196/2003 prescribes that:
each user must be authenticated by a personal username and a password or a biometric device or a
personal token;
each user must have its own permissions, limited only to the data he needs for his work, and the
permissions must be revoked when the user does not need them anymore;
users must receive specific training or instructions to be able to use their authentication and to be
aware of their responsibilities, duties and the possible dangers;
all data must be backed up (see section 4.7 on page 31) at least every week;
security software must be updated at least every year and or 6 months when handling sensitive
data;
sensitive data receive special care: they must be stored and transmitted using encryption or the
people must be unidentifiable, for example by assigning to each person’s data a numeric code
instead of his name and surname.
4.1. Encryption
Encryption is a text masking technique, derived from military use, which transforms information in such a
way that it may be correctly read only with a special password called key. It uses two keys, a public key for
encrypting, usually known only to one computer or person, and a private key for decrypting, usually known
by all the computers or people which legitimately may read the information. The size of these keys, and
thus the difficulty to be guessed, is expressed in bits, with 128 bits being the typically most secure size
used.
The two following schemas illustrates how B, C and D can send secret messages using A’s public key .
The sent messages are encrypted and later decrypted by A with his private key . In case somebody
intercepts a message, he is unable to decrypt it correctly since he does not have A’s private key , which
is known only to A. Even when somebody uses the public key to decrypt, it does not work.
The same process happens whenever a browser tries to send a password or secret information to a website
using a secure connection (see section 4.5 on page 29): the website tells the browser its public key and the
browser uses it to encrypt information which can be read only by the arriving website.
f@çd*s decrypt
message 2 encrypt message 2
Another analogous usage of encryption is to make stored data unreadable except by the owner. In this case
private and public keys coincides and are kept secret. The encryption and decryption process is done
automatically by a program (PDF creation programs or compression programs can do it, see page 11 for
instructions how to do it) or even by the operative system (if the entire disk is encrypted), which asks the
password to the user every time.
document
document G#4$h
encrypt decrypt
&à?-2y document
document
2?=zx:-ki
false Y&”:ò[
encrypt decrypt
document fgj?’^d 2?=zx:-ki
2?=zx:-ki
While encryption to receive secret messages or to hide information simply requires the user or the program
to create its own couple of private and public keys (programs, for example browsers, do this operation
automatically without the user’s intervention), for digital signature it is not so simple. Since everybody must
be sure that the public key is really the author’s public key, digital signature requires a certification
Page 22 of 33 Edition 8.0 (01/03/2016)
Basic Computer course book Dr. Paolo Coletti
authority to distribute private and public keys. Even though theoretically a simple password is enough, to
be sure that the user does not give the private password around, the certification authority gives him, after
having identified him through a governmental identity card, a password usually together with another
identification tool (a smart card, a telephone number for an OTP to be send), which, when used together,
correspond to his private key. An automatic signature program takes care of automatically encrypting
documents.
Several Italian public institutions are now using the national health care card
as a smart card and, using it as certification of user’s identity, offer access to
many services, even though they do not offer yet the digital signature of
personal documents. The service to digitally sign documents is offered by
private certification companies, with prices currently affordable also by
private users and with alternative devices such as smartcards or OTP devices
(see section 4.2.1 on page 25).
many private keys in sequence and then to decrypt it with the correct public key , within some
years it will manage to find the right private key which leads to a correct encryption-decryption. Therefore,
each couple of private-public keys has a time limited duration, usually some years, after which it is
necessary to change them and encrypt again all the past documents.
Documents for which it is important to determine the exact date of the signature have moreover a
temporal mark signed directly by the certification authority.
4.2. Passwords
On the Intranet the user is identified only by his username, known to everybody, and his password, known
only to him. The password is what makes an unknown person an authenticated user, with all his privileges
and his identity’s responsibilities. If somebody else uses the right user’s password, for the Intranet this
other person is exactly the user. Law 196/2003 explicitly forbids users from giving their password to other
users, even when they are absent from work. These are some, often underestimated, malign actions a
passwords’ thief can do:
steal personal information: the thief can read the user’s emails and personal information;
steal privacy protected data: the thief can gain access to data about other people protected by
privacy, or read emails received from other people. The legal responsible of this privacy violation is
the thief as well as the user who did not protect other people’s data;
steal money: the thief can find the user’s bank account numbers and passwords, sometimes
directly from the user’s web browser’s history;
delete and modify data: the thief can delete user’s important data, or even worse he can modify
these data without the user’s knowledge (bank numbers, friend’s email addresses, degree thesis
content, add illegal pictures);
steal identity: for the computer the thief is now the user, and therefore he can act to the outside
world exactly as if it were the user, for example answering to emails, subscribing to websites,
withdrawing from exams;
start illegal activities: anybody who wants to start an illegal Internet activity will obviously use
somebody else identity, so he will not get into troubles when the activity is discovered.
Therefore it is absolutely necessary to keep passwords secret.
Unfortunately many people use very trivial passwords. This is the list
of the most common passwords in 2014: password, 123456,
12345678, 1234, qwerty, dragon, pussy, baseball, football, letmein,
monkey, 696969, abc123, 12345.
There exist automatic programs which are able to try 4 billion passwords each second, and they usually
start trying combinations of words and numbers (the complete set of all Italian, German and English words
can be tried in less than 1 second). Check on https://howsecureismypassword.net how much time does it
take to one of these programs to discover your easy passwords.
Law 196/2003 explicitly requires that password do have some features:
change the password often, at least every six months (3 if sensitive data are handled);
avoid words related to yourself, such as names, birth dates, birth places and addresses;
use minimum 8 characters.
Moreover, other good procedures are:
use as password a good mix of numbers, strange characters, small caps and capital letters, avoiding
any common word (other people’s names or words which can be found in a dictionary);
use different passwords for different purposes. Unfortunately every website asks the user to
register with a password and users who use always the same password are giving it away to every
website they register, even untrustworthy ones. It is a good procedure to have at least three
passwords: one for important use (bank account), a second one for everyday use and a last one for
unimportant use (registering to unknown websites or to services that will not be used anymore).
beware of passwords stored in programs: mail readers, Internet Explorer and many other programs
store your password masked with asterisks. They
seem to be unreadable, but computer experts can
reveal them instantly. Store passwords in programs
only if that computer has a single user (i.e. the home
computer or the personal laptop) or if access to that computer is on a username basis, but never in
public places such as an Internet café.
4.3. Viruses
From the Internet many unauthorized connection attempts arrive. Some of these are mistakenly authorized
and manage to reach the Intranet or at least to come in contact with programs which are behind the
firewall. If these connections carry malign intentions, usually their aim is to explore and use the Intranet
computers, to destroy Intranet data or to stop some Intranet services (which is a dangerous attack if these
services are managing stock trades or telephone calls). Defense against these kinds of attacks is in charge
system administrators.
While normal external attacks do not involve normal users, the virus is a special attack which arrives
directly on the user’s computer and must be prevented and stopped by him. The virus is a little program
which has this name because its life cycle is the same of a biological organism: survive and duplicate.
1. It arrives on the computer through email attachments, downloaded files, CDs and floppy disks or
directly from the Intranet. It is often hidden inside other good files or programs, which are called
infected. In the last years many free programs deliberately install small advertisement programs
without the user’s explicit consent; this kind of behaviors is considered borderline between a virus
and a way of financing the program’s development.
2. As soon as the user mistakenly runs it (often trying to run the good program or to open the good
file), the virus orders the computer to run itself every time the computer is turned on, thus assuring
its survival.
3. It starts duplicating itself, infecting other files, CDs and floppy disks, and trying to send itself around
by email or on the Intranet.
4. Most viruses are programmed to do damage to the computer and to the user, altering or deleting
files, sending emails with user’s personal data, preventing firewalls and antiviruses from running, or
turning the computer off. No viruses are known to be able to damage hardware.
Many names are used for viruses’ types according to their different behaviors.
trojan horse is a virus which looks like a good program and, when downloaded and run by the user,
it performs the user’s wanted task but at the same time does other actions;
key logger is a virus which records keyboard’s activity and then sends the keystrokes to its creator,
mostly to get user’s passwords;
back door is a virus which opens a port on the computer to let external users in;
adware is a virus which displays advertisement;
spyware is a virus which spies user’s activity to get passwords or to target the user with specific
advertisement;
ransomware is a virus which makes its
presence public and demands to the
user money to be removed,
threatening to damage him in a variety
of ways, such as encrypting files or
pretending to be an authority’s tool
and asking the payment of a fine, as
the famous Italian “Polizia di stato”
virus does.
These types are not exclusive: for example a Trojan horse which is at the same time a spyware and an
adware.
An infected computer can be recognized by some symptoms. These are the most frequent ones:
when the computer is turned on, unwanted programs start, advertisement appears, and the
desktop presents some new bars or features which were not present nor installed before;
the computer starts very slowly and unknown programs give strange operating system errors;
commercial or pornographic web pages appear on the web browser without the user’s consent;
the analogical modem makes typical connection noises even when the computer is not connected
or the operating system asks the user to stop the current connection and start a new one to a
strange telephone number;
the Task Manager window (see page 7) presents unknown programs.
Most of the time, a responsible user’s behavior it the best weapon against viruses: it protects him from
getting viruses, helps him removing them and prevents him from diffusing them. Responsible behavior
means:
never open downloaded files and email attachments, especially when they come from a friend with
a text such as “please open it, urgent!”, since simulating to be a user’s friend is a typical virus
tactics. To open these files, save them on the desktop, check them with an antivirus and then open
them;
do not insert in your computer CDs, DVDs and USB pendrives coming from other people or which
were inserted in other computers, unless you have an antivirus running or unless you scan them
immediately with an antivirus;
avoid visiting strange websites, especially pornographic or hackers’ website, or websites which
open a lot of pop-up windows;
have an antivirus always running or at least run an updated antivirus on your whole hard disks
every week (while Italian law currently prescribes minimum every 6 months); keep your antivirus
always up to date: more than 50 new viruses appear every week;
keep communication programs and Microsoft products up to date. Microsoft and most software
companies offer free updates and automatic updating tools;
beware of free programs which often try to install adware programs, asking the permission very
quickly during installation’s steps, relying on the novice user’s habit of clicking always “yes”.
To check the computer for viruses and to try to remove viruses from the computer, the user can run a
special program called antivirus. The antivirus basically has three possible different actions:
it can scan all the storage devices (hard disks, the floppy disk inside the computer, the CD or DVD
inside the reader) for viruses. If a virus is found, it tries to remove it and to repair damaged files.
Some files can be unrecoverable. Complete devices scanning takes usually some hours;
it can scan a single file or an entire directory for viruses. If there is an infected file, it tries to delete
the virus and repair it. Some files can be unrecoverable. Single file scanning takes some seconds;
it can be always running. In this case, whenever a virus or a suspect file is run, the antivirus
prevents it from running and warns the user.
A lot of antivirus programs, free and commercial, exist. Their most important feature is obviously the
possibility to be constantly updated through the Internet.
4.4. Emails
4.4.1. Attachments
For viruses, email attachments are a first class way of traveling, since they are very often opened by users
without any precaution. Sometimes viruses hide inside files which were really sent by the sender, unaware
of having an infected computer. Other times a virus takes control of the mail reader program and sends
itself to the whole address book, counterfeiting the sender address (often using an address taken from the
address book) in order to avoid that the real infected computer be identified and to gain the thrust of the
receiver, and writing in the email text smart sentences pretending to be a regular friend of the receiver. The
arrival of this kind of email usually creates havoc, since the receiver is sure that the fake sender has a virus,
while the original infected computer is another one.
The basic rule is never open any attachment from the mail reader program. Save the attached files on the
desktop and run an antivirus program to check these files before opening them. Even when the email
comes from a friend: he cannot know that to have got a virus, or he can not be the real sender.
4.4.2. Spam
Spam messages are unsolicited unwanted bulk emails. They are unsolicited, meaning that the user did not
ask to receive them, they are unwanted, meaning that the user did not want to receive them, and they are
bulk, meaning that they are sent to millions of addresses. They are used mainly for four different purposes:
advertisement emails are the most innocuous
version. The email message contains commercial
information usually on medicines, pornography,
software or investments. Sometimes these
messages are purposely written with orthographic
mistakes or with strange characters, to avoid being
intercepted by antispam programs;
chain letters are electronic versions of letters
circulating in the XX century. They promise good
luck to anyone resending it and bad luck to anyone
trashing it, or they contain a sad story of an ill child
desiring postcards or an urgent warning about a
terrible virus: their content is probably false or too
old, and a search on the WWW will reveal this
immediately. Sending it around will probably cause
complains from other users;
frauds are usually long letters proposing the user a
semi-legal bargain or a big lottery prize. Their only
aims are to get the user’s bank coordinates for
further illicit activities and to lure him into paying
small expenses hoping to get the promised
imaginary money;
4.5. Navigation
Navigation is the second most dangerous Internet activity. It has more or less the same dangers as emails:
the user’s computer can get viruses if he does not run an antivirus before opening downloaded files, and
the user can be lured into phishing websites if he does not type personally the bank’s address in the web
browser. Moreover, the computer can get viruses even when simply visiting some websites, and therefore
two good suggestions are to avoid visiting strange (pornographic websites, websites with a lot of pop-up
windows and illegal websites) or untrustworthy websites and to keep Internet Explorer and Windows
operating system always up to date.
The other security problem while navigating is data interception. When connecting to a website, the user’s
data travels long distances, passing through a large number of computers (to connect from unibz.it to
www.athesia.it the data go to Padua, Milan and Bologna passing through at least 13 computers). Data on
the Internet travel without any protection, any computer administrator can read them. Therefore, when
sending passwords and other private data to a website, the user should take special care that the address
in the address bar starts with https:// (instead of http://) and on some browser a lock icon appears in the
lower right part of the windows, while on others the address bar becomes green with a lock: these
indications mean that the connection is secure (SSL) since data are traveling encrypted. Beware that the SSL
connection guarantees only that data are not intercepted and that the user is connected to the same
website from which he started the connection, while it does not guaranteed this website is the right one.
4.6.1. Firewall
Often programs’ security breaches
once discovered need some days to
be fixed and somebody can take
benefit of them in this short time,
before the security update is
installed on the user’s computer. Therefore on every LAN, usually in the point where the LAN connects to
the Internet, or more often on every computer a special program called firewall is running. The firewall
examines all the incoming and outgoing traffic, using the following analysis techniques:
which internal program is originating/receiving the traffic,
from/to which external address is the traffic originated/directed,
what amount of traffic is passing from/to the same program to/from the same external address,
which kind of data are passing.
Making an analysis of these data clearly slows down the connection but lets the firewall stop potential
unauthorized connection, putting them in a wait state until the user’s gives his approval or denial.
Windows Seven operating system comes with a firewall preinstalled, which lets the user customize which
kind of programs are allowed to make or receive connections and determine rules to approve or deny
automatically connections.
4.7. Backup
Backup is the process of copying important data to another location to prevent their loss. Sometimes
programs and even entire operating systems are copied, to be able to immediately continue working even
when a computer breaks. There are three very good reasons to do regular backups:
against the user, who can accidentally delete some files or who can modify files and then change
his mind. Having a recent backup handy can often save hours of work;
against the system, which can suddenly break due to hardware or software problems. Even hard
disks tend to be unreliable after some years of continuous activity. A recent backup saves the user
from redoing all the work of the previous months;
against viruses and other users, which can delete and alter files: a backup can save a user coming
back from vacations.
Usually the operating system’s and the programs’ backup are done by system administrators: law 196/2003
explicitly requires an instantaneous backup for all sensitive data and that data are restored within 7 days in
case of loss. However, there are some files which should be taken in charge by the user himself:
personally created data files, including all documents and images created by the user, and any
other file which is a result of the user’s personal work;
in case emails are not handled with an online system: the contacts, calendar and the emails (mail
readers usually offer a way to save them into files to be used for backup);
some programs require a lot of configuration and store their configuration in configuration files,
which are usually in the program’s directory;
all the stuff which is difficult to find again, such as documents from other people or downloaded
from forgotten websites.
The place where the files are copied determines the reliability of the backup. It should be a large, cheap
and fast storage device. It should also be handy, since the typical problem with backup is that the user does
not takes time to do it regularly and, when the backup is too old, it is worthless. For home or simple office
users, the Friday morning backup is a good timing solution. Good storage devices to be used are:
a second hard disk, used only for backup, which is very fast and very large and always ready to be
used;
online backup systems, where user’s data are uploaded and are ready from anywhere in the world
(given a broadband connection), with Dropbox, Google Drive, Box and Amazon Cloud being the
most famous and offering some GB of space for free;
USB pen drive, to be used only in emergency when no other appropriate storage device is available;
big companies usually have special tape devices for backups.
4.7.1. RAID
A very popular backup solution is RAID (Redundant Array of Independent Disks) technology, which consists
of several identical hard disks. There are different types of RAID implementations, which vary a lot in
functionalities and security.
JBOD (Just a Bunch Of Disks) is a primitive form of RAID in
which all the disks are seen by the user simply as disks on
disk 1
which they can write as usual. The advantage is that the
available space is the sum of the space of all the disks, file user decides
however there is no form of data protection: if a disk breaks,
disk 2
anything on that disk is lost.
RAID0 uses two identical disks which are seen by the user as a
single disk. Every time he writes a file, the first part of the file
file
is written on the first disk while the second on the second disk 1
part 1
this. This strategy has the big advantage that writing speed
doubles, with a total available space which is the sum of the file
size of the two disks. But if a disk breaks, all the content of part 2 disk 2
both disks is lost, since the user will lose half of all the files.
file
part 2 disk 2
disk 4
All the RAID techniques are good at either improving the speed or improving the reliability against
hardware failure, but are not good against other threats and therefore they must always be coupled with
another form of backup, such as tape backup for large companies or weekly/daily copy on DVD or on
another hard disk for home users.