Educational CyberPlayGround ®☰ Menu

INTERNET - What It Is Now

The 9th Wonder of the World

Internet Now Page 2

2015 Etherium the utopia algorithm offers Encrypted P2P Networks. Ethereum is an open-source project which is available to everyone that does two things. It’s building ‘deep infrastructure’ Ethereum links all that spare power and space and allows people to build apps, websites and software that other users can access. Because it runs with strong encryption and the network is ‘distributed’ across all those individual computers, it’s more or less impossible for anyone to censor or control what’s on it. Second, it allows people to create immutable, public transaction records. Borrowing the idea from the digital currency bitcoin, Ethereum uses something called a ‘block chain’ to record information on a public database in a chronological way that prevents copying, tampering, fraud or deletion. It’s a new anonymous, decentralised, uncensored internet, and a new way of controlling and storing information. This will change the internet.

 

2014 The New Editors of the Internet
In a small number of Silicon Valley conference rooms, decisions are being made about what people should and shouldn't see online—without the accountability or culture that has long accompanied that responsibility. By Dan Gillmor theatlantic.com/
Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled down videos and photos of his murder. They had every right to do so, and in my view they did the right thing. So why am I so uncomfortable with this? Because it's not clear what's too vile to host. And, even more, because Twitter and YouTube are among a tiny group of giant companies with greater and greater power—and less and less accountability—over what we read, hear, and watch online.
Who gave them this power? We did. And if we don’t take back what we’ve given away—and what’s being taken away—we’ll deserve what we get: a concentration of media power that will damage, if not eviscerate, our tradition of free expression.

For the moment, it's reasonable to dismiss the widely repeated accusation that removing the Foley videos was an act of censorship. When Twitter worked with the Turkish regime to remove certain accounts, that was censorship, if by proxy, because it was done on the orders of a government. And, of course, when governments directly block Twitter, YouTube, Facebook, and other services, as some do, that is direct censorship. But when Twitter and YouTube took down a murder-as-propaganda video, that was editing. (Show me evidence that the U.S. government persuaded Twitter and YouTube to do this, as it almost certainly did when the major payment systems cut off Wikileaks' funding several years ago, and I'll revise that view.)

Editing, yes, but on an epic scale—and critics are absolutely right to raise some stark questions. What precedent does this set? What actual policies are at work? Are the policies being applied consistently? If it's appropriate to take down these videos and pictures, why not the images of so many others who've been the victims of ISIS and other criminals?

All are important questions, but the reason they're so important, again, is the clout these services exert in the information marketplace. There was little uproar, after all, when the anything-goes LiveLeak—which hosts videos that most others find beyond the pale—vowed not to post any ISIS beheading videos, on the reasonable grounds that it’s wrong to help murderers do public relations.

What makes so many free-speech protectors fret in the current situation, again, is not the instinct to protect an unwary public from encountering the worst of humanity, or to avoid helping barbarian propagandists. It is the slippery slope issue, and this is getting more worrisome every day with the growing domination of Facebook, Google, and Twitter over our media flow.

They’re dominant not because they’ve taken control, but because we’ve given them control—and not for all bad reasons. These services are enormously useful and convenient. But because we aren’t paying for these services, we users are, as the saying goes, the products being sold to advertisers. We have no rights beyond what the companies give us in their terms of service, where quaint ideas like the First Amendment have no application. When Facebookdecides what you see in your timeline, you have no recourse—because you “agreed” to terms of service that are grossly one-sided and not constrained by the Bill of Rights.

I’m a frequent Twitter user, in part because the company has for the most part been a strong protector of free speech. I confess to some misgivings about my own tendency to put so much of what I do into a proprietary service that increasingly makes clear that it controls the experience. Even as it was taking down the Foley videos, Twitter was expanding its unilateral tweaking of users’ timelines,inserting posts that the users did not ask for—a major breach in the bargain Twitter made with us from its early days. (I don’t trust Facebook at all, and use it rarely, and have been using DuckDuckGo, which doesn’t track users, as an alternative search engine—though I do use some Google services.)

Journalists have been especially short-sighted in their eagerness to use social networks, feeding enormous amounts of content into third-party services they do not in any way control and which get, by far, the best of the bargain in the long run. Guess what, journalism companies? Facebook is going to be your biggest competitor in the long run. Twitter is a media company, too. And Google’s eating your lunch every day.

[snip]

2014 This Map Shows Every Connected Device On The Internet

Shodan, a search engine for connected devices. brought to you by Earth System Research Laboratory Global Monitoring Division

2014 Here is an archive of email header list discussions from 1979. I don’t know whether to be impressed or depressed by the degree to which it is the same people who are still discussing the same kind of issues now as was discussed 35 years ago !!!!!
The first file starts with complaining about a 64K [actually (2**19-1)/9 characters] limit on messages message imposed by Multics FTP.

2014 China bans use of Microsoft's Windows 8 on government computers and According to StatCounter, IE is used more than 25% of the time worldwide. Chrome is at about 40%, and Firefox is in third at about 20%. In the U.S. specifically, IE is about 30% and FF is about 15%. Source: http://gs.statcounter.com/

2014 EU Pushes to Globalize Internet Governance

Everybody demands their divine right for a monopoly whether its domestic FonHedz or Soluable States, er, "Soverign" States.
It's the "Tooltime School of Political Sociology".
The only thing Power wants is... "MORE POWER!" and to expect any other behavior is either irrational or delusional, depending on where you're standing.

 

CHANGE THE WORLD

 

We are all sitting on the cusp between the old physical and new virtual worlds of information.

2013 The Internet in general and "big data" is like a "planetary" or "global" nervous system. Can you believe the weakness in stupid password identity protocols? Can you believe they built up a whole digital society that rested on such a weak foundation? Can you believe the flow of power plants, electricity, water, weapons systems, healthcare services, money, and social interaction were built on top of protocols that were easily spoofed, stolen and replayed?

2014 On October 30–31, 2013, The New York Review of Books held a conference, “Power, Privacy, and the Internet,” at Scandinavia House in New York City, with generous support from The Fritt Ord Foundation of Oslo, PEN America, Sarah and Landon Rowland, The Europaeum of Oxford, The Lead Bank of Kansas City, and the Institute for Public Knowledge at New York University.
Simon Head, director of programs for The New York Review of Books Foundation, addressed the theme of the conference:
The Internet is a transformative technology of our times and it is changing our lives as perhaps nothing else has done since the coming of the telephone, the telegraph, and the mass production automobile a century and more ago. Where the Internet surpasses these earlier technologies is in the speed with which its reach is expanding—in our contacts with one another through Twitter and Facebook, in what we read, hear, and buy; in our dealings with business, government, colleges and schools, and they in their dealings with us. Whether we like it or not we are caught up in these flows of technology and as we are carried along by the flows, some barely visible to us, it becomes increasingly difficult to stand back and distinguish between what is good about these innovations and what is not.

Bob Dylan...
"If my thought dreams could be seen,
they'd probably put my head in a guillotine"...


Power And The Internet by Bruce Schneier
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that's only half the story. The Internet empowers everyone. Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use it more effectively. Governments and corporations have woken up to the fact that not only can they use the Internet, they can control it for their interests. Unless we start deliberately debating the future we want to live in, and information technology in enabling that world, we will end up with an Internet that benefits existing power structures and not society in general. <snip>

2012 Internet Society Board of Trustees Election Results 6/19/12
Subject: [ISOC] ANNOUNCEMENT: 2012 Internet Society Board of Trustees Election Results
To: isoc-members-announce@elists.isoc.org
isoc-members-announce@elists.isoc.org
Message from Jason Livingood, Chair of Internet Society Election Committee:

On behalf of the Internet Society’s Election Committee, I wish to extend our appreciation and thanks to all of the nominees and final candidates for the Board of Trustees. We are quite honoured to have such well-qualified people so interested in serving the Internet Society!
The election results were certified on 24 May 2012 and the challenge period concluded 10 June 2012. The process ran smoothly and the Election Committee does not have any issues or concerns to report. The new Trustees will be seated at the Internet Society Board Meeting in Vancouver, Canada, on 4 August 2012.

CHAPTERS
In the Chapter membership election, we had three candidates:
1. Gihan Dias
2. Sala Tamanikaiwaimaro
3. Rudi Vansnick

55 out of the 86 Chapters voted, which is a vote participation rate of 63.95%. In the previous election, the vote participation was 79.49%.
Rudy Vansnick received the highest number of the votes and has been elected for a three-year term.

ORGANISATIONS
In the Organisation membership election, we had six candidates:
1. Keith Davidson
2. Marshall Eubanks
3. David Farber
4. Demi Getschko
5. Byron Holland
6. Bevil Wooding

52 of the 109 Organisation Members, or 47.71%, voted. They had the opportunity to vote for up to two candidates, with votes weighted by the class of membership. In the previous election the vote participation was 50.47%, on a group size of 107 organizations.
Keith Davidson and David Farber, receiving the largest weighted vote counts, have been elected for three-year terms.

INTERNET ENGINEERING TASK FORCE (IETF)
Using the process documented in RFC 3677, the IAB has re-appointed Eric Burger as the IETF appointee to the ISOC Board.

We congratulate all of the new and returning trustees and look forward to working with them soon on the Board of Trustees. We also thank all nominees and final candidates for their participation, as well as ISOC staff for their support of this critical process.

Respectfully submitted,

Jason Livingood, Chair
Alain Aina and Theresa Swinehart, Election Committee Members

 --

What the Internet Is and How to Stop Mistaking It for Something Else By Doc Searls and David Weinberger March 10, 2003 http://worldofends.com

There are mistakes and there are mistakes. Some mistakes we learn from. For example: Thinking that selling toys for pets on the Web is a great way to get rich. We're not going to do that again. Other mistakes we insist on making over and over.

For example, thinking that:

the Web, like television, is a way to hold eyeballs still while advertisers spray them with messages....the Net is something that telcos and cable companies should filter, control and otherwise "improve."

it's a bad thing for users to communicate between different kinds of instant messaging systems on the Net.

the Net suffers from a lack of regulation to protect industries that feel threatened by it.

When it comes to the Net, a lot of us suffer from Repetitive Mistake Syndrome. This is especially true for magazine and newspaper publishing, broadcasting, cable television, the record industry, the movie industry, and the telephone industry, to name just six.

Thanks to the enormous influence of those industries in Washington, Repetitive Mistake Syndrome also afflicts lawmakers, regulators and even the courts. Last year Internet radio, a promising new industry that threatened to give listeners choices far exceeding anything on the increasingly variety-less (and technologically stone-age) AM and FM bands, was shot in its cradle. Guns, ammo and the occasional "Yee-Haw!" were provided by the recording industry and the Digital Millennium Copyright Act, which embodies all the fears felt by Hollywood's alpha dinosaurs when they lobbied the Act through Congress in 1998.

"The Internet interprets censorship as damage and routes around it," John Gilmore famously said. And it's true. In the long run, Internet radio will succeed. Instant messaging systems will interoperate. Dumb companies will get smart or die. Stupid laws will be killed or replaced. But then, as John Maynard Keynes also famously said, "In the long run, we're all dead.

"All we need to do is pay attention to what the Internet really is. It's not hard. The Net isn't rocket science. It isn't even 6th grade science fair, when you get right down to it. We can end the tragedy of Repetitive Mistake Syndrome in our lifetimes — and save a few trillion dollars' worth of dumb decisions — if we can just remember one simple fact: the Net is a world of ends. You're at one end, and everybody and everything else are at the other ends.

Sure, that's a feel-good statement about everyone having value on the Net, etc. But it's also the basic rock-solid fact about the Net's technical architecture. And the Internet's value is founded in its technical architecture. Fortunately, the true nature of the Internet isn't hard to understand. In fact, just a fistful of statements stands between Repetitive Mistake Syndrome and Enlightenment...

--

HOW DOES THE INTERNET WORK?

"The Internet is a way for all the things that call themselves networks to coexist and work together. It's an inter-network. Literally. What makes the Net inter is the fact that it's just a protocol — the Internet Protocol, to be exact. A protocol is an agreement about how things work together." [SOURCE]

Despite all of our high-tech stuff, some basic truths remain unchanged.

PEERING TECHNOLOGY

Peering economics is an interesting discipline with a wide variety of literature backing it.
This 1999 paper by Geoff Huston, now chief scientist at APNIC, is the most cogent explanation your readers will ever get about the issue. 
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_2-1/peering_and_settlements.html

and
http://www.cisco.com/
The paper is summarized in this presentation  http://www.potaroo.net/presentations/1999-07-05-peering.pdf

 

the 3 pillars of privacy (consent, notice, and de-identification)

Control over the access to information, whether on scrolls, in books, or flashing onto computer screens, is power.  And those persons and organizations who would restrict such access are always the first to realize and manipulate this fact -- to the detriment of society at large.  This has been true all throughout human history, and our fancy machines and networks have not made us immune to the same dark traps.  ~ Lauren Weinstein

 

 

THE FIRST ARCHIVE OF K-12 SCHOOL SITES

 

In1991 when I started out on the net.

Before there were websites, before it went commercial, before you could buy anything on it, and way before regular people ever heard of it, I was there. We are known as "netizens", a citizen of the net. The internet is the biggest playground in the history of the world because there are no walls, where there should be no boundaries of any kind.

Meet some of the other K - 12 Teachers who were internet pioneers here on the Educational CyberPlayGround responsible for getting schools wired.

SCHOOL DIRECTORY ©1993 K-12 SCHOOLS GO ONLINE
Educational CyberPlayGround hosts the School Directory

Look up Arbor Heights Elementary in Seattle, Washington. One of the first 9 or 10 elementary schools in the US with a web site. Until the summer of 1995, all pages were all written and maintained on a 386-33, 4mb RAM, 110mb HD computer using a 14,400 bps modem for file uploads to the server. The browsers used to check this page were NCSA Mosaic, Cello, and Lynx - Netscape and Internet Explorer weren't around yet.

TEACHERS
How do you
want to teach?

We learn by imitation. We want to integrate technology into the classroom, so Teachers Must Model what we want future teachers to be able to do in their classrooms. This is a perfect example of ideas and concepts put into present day action. Watch an Old style Talk and Chalk video lesson now distributed on the net. Then discuss the changes in the medium, storage and delivery differences from 1972 compared to 2007 and how the ideas and concepts discussed in the film came true or not.

WHAT DO YOU NEED TO KNOW RIGHT NOW

HOW TO FIND

HOW WE THINK ABOUT THE INTERNET TODAY

 

 

Shaping the Web: Why the politics of search engines matters PDF
This article argues that search engines raise not merely technical issues but also political ones. Our study of search engines suggests that they systematically exclude (in some cases by design and in
some accidentally) certain sites, and certain types of sites, in favor of others, systematically give prominence to some at the expense of others.

GFS: Evolution on Fast-forward by Marshall Kirk McKusick, Sean Quinlan | August 7, 2009 PDF
A discussion between Kirk McKusick and Sean Quinlan about the origin and evolution of the Google File System. During the early stages of development at Google, the initial thinking did not include plans for building a new file system. While work was still being done on one of the earliest versions of the company's crawl and indexing system, however, it became quite clear to the core engineers that they really had no other choice, and GFS (Google File System) was born.

Anthology of Youtube

It's Silicon Valley vs. Telcos in Battle for Wireless Spectrum ~ Bob Frankston bobf.frankston.com May 16, 2007
If you want to carry a television signal over a long distance then use that darn Internet. The problem is that we have layers upon layers of simplifying assumptions and we pile them on instead of rethinking. This is a key point in Robert Laughlin's "A Different Universe".
We tend to solve problems as if they exist in isolation. We do need to decompose problems in order to deal with them but there isn't a unique decomposition and we have to be open to rethinking the decomposition.
In the early 1900's the first decomposition was to assume that "communications" is a unit. We then decomposed that into voice and video. We also had wired vs wireless. The accidental properties of wires led us to use them for one-to-one communications because they were point to point connections. Wireless signals couldn't be contained hence they were broadcast to all. It doesn't help that "radio" and "telephony" are now used to describe business rather than technologies thus making it hard to talk about the basic assumptions separate from the market assumptions. 
This is why TV over wires is not treated as a point to point medium -- it was originally implemented as shared antenna system and our policies continue to make that implicit assumption.
Today this decomposition is extremely dysfunctional. We now understand the concept of bits as a common representation for information and that is a very effective point of decoupling as we've seen with the Internet. 
We can then use packets to organize the bit transports.
This decoupling of the communications from the bit transport (as in  TCP/UDP vs IP) is very hard for people to accept because we base our understanding on the nave assumption that we are simply relaying sound waves through electronic tubes. There is assumption that you must preserve the relationships between the bits as in isochronous and QoS models. This was a defining assumption for analog telephony and the solution, eventually, was digital telephony and then packet telephony. We treated the answer as  way to make analog telephony work better without using the new understanding to question whether we were asking the right question in light of our understanding. Digital technology freed us from the constraint of isochronicity and thus allowed us to get many orders of magnitude in improvement (by various measures). But it was an answer the put a lie to the decomposition that defined the industry that asked the question in the first place and thus they had a stake in failing to understand the answer they got.
Once you decouple the bits from the interpretation you can view wired and wireless bits indifferently and can dispense with the complexity and expense of slicing and dicing the transports and the use of special kinds of wires and gear for each particular message.
Yet we continue to argue as if it is still 1934 and every bit is  special - sort of like the $100 Japanese Honeydew Melons but far pricier.
These concepts extend far beyond "telecom" into our basic understanding of how systems work. The isochronous assumption has a parallel in the assumption that we have to solve problems as stated and that if any component fails the system fails. Thus the Y2K scare and the presumption that we must govern systems lest people do things the "wrong" way --  alas wrong often means finding that we've solved far more interesting  problems -- we may have wanted a guidance system for airplanes but we got digital computers instead. We presume music comes from record companies and not musicians and thus we preserve a particular industry structure rather than allowing for musicians to be heard.
Telecom is useful case study because it's a simple problem and the price of continuing to live in 1900 is higher than we should have to bear.
Too bad this fight over slivers of spectrum is treated as if it were any more real than the rest of professional wrestling. The entertainment value doesn't make up for the collateral damage.

New Academic Ideas ~ Noel Chiappa MIT
All this neat packet networking stuff only exists now (2007) because for many years (during Baran's first RAND work ca. 1960-64, then during the ARPANet development in the late 60's-early-70's, and then the early internet work in the 1975-1982 time-frame) this stuff was all funded by "bureaucrats in DC".
There was *no* commercial market for any of this stuff back then, so there was no other way to make it happen. (A fact of which I am well aware, because I was one of the first people - maybe the first, actually - to make money selling IP routers commercially - and that was in 1984 or so, almost 10 years after the bureacrats starting putting money into TCP/IP.)
In fact, to add a nice topping of irony, many commercial communications people of the day (circa 1980) said much the same things about TCP/IP that they are now saying about other efforts: I distinctly recall the TCP/IP people being told to "roll up our toy academic network" (and yes, they explicitly and definitely used the work "academic") and go home.


THE COMMERCIAL INTERNET

 

The Commercial Internet Exchange and the Board Members

Protecting your IP, your website content: How do you keep it from being copied - NO STORE: Cache Control, the Cache busting Option.

Google is Big Brother:

- Spent about 1 billion dollars on infrastructure (think disk storage)
- A monopoly with a vast trove of world wide search data..
- Knows everything about you and can PREDICT behavior, that is the real value.
- Can sell that information to any business, or government.
- Laws restrict government from collecting it themselves.
- Won't tell anyone about their own "secrets".
- Worldview: content is individually valueless. 
- Corporate philosophy: organizing and giving away other people's content, creating space for advertisements in the process, but won't discuss specifically how it detects bad clicks or what percent it deems fraudulent.
- Google's Gmail spook heaven?
- Security Tools you need to know about and use.

When the Net became commercial Cash became more important than cooperation. Unrestricted information flow soon stopped. The culture of the Net was the culture of science, like science, information was shared; the technology was more important than the credentials of who invented it; rewards came mostly through the recognition of your peers and money was the last thing on anyone's mind.

THE EARLY DAYS OF THE  COMMERCIAL INTERneT

WHAT DID
THEY LOOK LIKE?

 

Read the December 1993 article John Markoff wrote about the Web and Mosaic in "The New York Times" (US) business section; "The Guardian" (UK) publishes a page on the Web; "The Economist" (UK) analyses both the Internet and the Web.

Feb. 4 1994 "Newsday" (US), a Long Island, NY, newspaper, publishes this sentence: "Following the lead of their sister in the motion-picture business, "content providers" like Paramount Publishing are aggressively seeking to buy up electronic rights and submarkets." Guy Jackson, Editor of "The Cambridge International Dictionary of English," finds this the earliest U.S. citation for "content provider" in the Cambridge International corpus, noting "the use of quotation marks, which indicates that the term was not yet widely known."

March 1994 Marc Andreessen and colleagues leave NCSA to form "Mosaic Communications Corp" (now Netscape).

Founded in 1994, World Wide Web Consortium http://www.w3.org/ has been primarily concerned with developing protocols and guidelines that ensure long-term growth for the Web. To do so, they draw on a set of international professionals and experts throughout the field of computer science and related fields. The W3C is led by Tim Berners-Lee, who directs the project and who was also responsible for inventing the World Wide Web. Carbon-dating the Internet

This anti-authoritarian impulse is a Hippie trait.

 

OSI Open Source Indicators Program
The all seeing surveillance state
Primary Point of Contact:
Jason Matheny
Program Manager
dni-iarpa-baa-11-11@ugov.gov

LARPA defines public data as “lawfully obtained data available to any member of the general public, to include by purchase, subscription or registration.” The intelligence community can and does register a fake profile on Facebook, in order to “friend” people and obtain more information.
Intelligence Community Wants to Monitor Social Media. Intelligence Advanced Research Projects Activity, or Iarpa, a relatively new part of the spy community that's supposed to help investigate breakthrough technologies and wants to sweep up public data to predict the future. The idea is to use automated analysis to sift through publicly available data such as web search queries, blogs, micro-blogs, internet traffic, financial markets, traffic webcams, Wikipedia edits, andto help predict significant societal events, like a popular revolution, early detection of events such as disease outbreaks, political crises, and macroeconomic trends.

 

Richard Stallman  is the father of "copyleft", which he called "a mirror image" of copyright. Stallman points out how Net culture has strayed far from its early days of open software to closed, proprietary systems like Microsoft Windows and suggests the Linux operating system as a free alternative.  "What Stallman means by free: you can charge money to cover your distribution costs, but the software itself carries no charge, and the recipient is free to pass it on. Because the software comes with its source code, the user can make any modifications he pleases. If and when he passes on the software and its modifications, he must also pass along the source code. Free does not mean that no money changes hands at all, but it does mean free from the external control of the software police, or of the government. Hippie sentiments." [1]

1994 Revolution and Craigslist Culture of Trust one of the few people who remains true to some of the earliest ideals of the Internet. "It's good to make a good living. It's good to do well for your staff. I feel that one of the best things a person can do for another is to create a job. So you do OK commercially, and then you try to make a difference of some sort. We're still looking for new and other ways of doing that." Nerd values are simple. Doing Well by Doing Good, we don't think of ourselves as being owned. We're like a commons in the sense that we're providing a public service.

Yahoo started in 1994

August 9, 1995 -- Netscape IPO'd, and ushered in the Dot Com Boom that has brought us to where we are today.

Mar. 1 1995 "The Daily Telegraph" (UK) quotes a Mr. Connell that "People want better control over their lives, they want to see things when it's convenient for them, and we will give time and attention to linking up with existing content providers." Guy Jackson finds this the earliest British citation for "content provider" in the Cambridge International corpus.

WHO IS ONLINE - STATISTICS FROM 2002
A nation online - How Americans are expanding their use of the internet.

2005 INTERNET STATS
Google has the largest share of U.S. Web searches with 46 percent, according to November 2005 figures from Nielsen//NetRatings. Yahoo is second with 23 percent, and MSN third with 11 percent. [Please note that each reduction is by just about eactly half!]
46% Google --  23% Yahoo --  11% MSN =  80% Top 3
From "Estimating the number of Internet users:"
Using this technique, the author computes a total of 471 million internet users. This is the average who are online in a particular day, and represents 7.2% of the world population.
Using different methods, http://www.nielsen-netratings.com/ estimates a total of 880+ million users, or 13.6% of the world population.

Top 12 Languages Used on the Internet

11/9/06 In 10 years, the U.S. share of the world's online population reportedly has fallen from 64 percent to less than 25 percent, although U.S. Web surfers evidently visit more pages each.  More than three-fourths of Web visitors to large U.S. Web sites such as Google, Microsoft, and Yahoo come from overseas. The three companies are among 14 of the top 25 U.S. Web sites that draw more foreign traffic than U.S.-based traffic, according to market research company ComScore Networks.

Daily Internet and demographics Dump A collection of Web sites that track statistical data about the Internet. Internet Traffic statistics include reports on the current speed of the Internet. Specialty Internet Statistics contains links to data-based surveys of servers, domains and search engines on the Internet. Statistics Portals link to other extensive lists of Internet statistics and Market Research connects to e-commerce research firms which make some of their data publicly available.

SOCIAL NETWORKING
2009 Corporate's bastardization of social media and marketing's poor use of what could be a great conversational media form. "Social BS" corporate marketing has beaten us into submission as the social media sphere simply moves on and finds more interesting content rather than voicing distrust.

SECURITY
WE ALL NEED TO KNOW HOW TO PROTECT OUR COMPUTERS

 

INTERNET SECURITY TOOLS

Security by Obscurity
People have turnedfrom consumers of the Internet into participants in it—whether they're publishing websites, or teenagers sharing their cell phone numbers in MySpace. The problem with the super-connected, Web-centered world we live in is that we have made it easier to share information than to share it right. We've made it easier to post information on websites than to take it down. We've made it easier to open online accounts than to close them. We've made it easier to reveal our mother's maiden names, our elementary schools, our first pets, our favorite color or our childhood street than to keep track of who knows what information and how long it will stay on servers located who knows where. We've made it easier to be fast than good and we've lost control of our privacy.

The goal of an attacker is to install a Trojan on your machine that will allow them to control your machine. They turn it into what is called a a Zombie machine - a machine not under your control  NOW YOUR COMPUTER is under their control.
Hundreds of thousands if not millions of machines are "owned" by someone other that the user sitting in front of the keyboard and monitor. These bad people control your PC, grab your passwords, and get lots of machines together to organize DDOS attacks and jump from machine to machine to machine in order to hide their tracks. Trojans are also used to mess with you. You MIGHT actually be using a zombie machine, a vicious cracker be able to surreptitiously turn on your Webcam on your computer if you have one in order to watch you work, or watch what you type on your computer screen and then send you popup messages insulting you.

These Are The Rules  ~ From Internet Rules
"The rules are subject to change, but you are always advised to follow the current set of rules. They are not all of the rules. They are some of the rules. The absence in this list of a particular rule does not mean you don't have to follow it, if indeed it is a rule. These are intended to be a simple set of general rules for dealing with the kinds of interactions that are prevalent on the internet (web/email). Some of them also apply to the telephone. Use of the rules is at your own risk (as is use of the internet).
But you do have to follow these, even if you've lost your rulebook under the stack of AOL CDs. Remember, there are lots of people out there trying to scam you. Don't make it easier for them. These rules derive from the core principles of "don't execute untrusted code" and "verify your contacts"."
Watch the Chain of Trust
Do not ever give out any information to anyone who contacts you first, no matter how inconspicuous it seems. Find an alternate way to find out their contact information (or use contact information you already have, which has been verified), and contact them yourself. For example, if you get a voicemail from your credit card company telling you to contact them about some suspected fraud, don't use the number they leave. Call the number on the back of your card instead.
You don't control the links
If you're going to give out any information - financial info, username / password, etc..., even if it seems like inconspicuous information - do not click on links that are emailed to you. Always type in URLs by hand (or use bookmarks that you saved from typing URLs in by hand).
You don't control attachments
Do not open attachments unless you are expecting the specific attachment and you know what it is. Even then, this is risky. If you're not expecting that specific attachment, it's probably an email worm or something else bad. Even if you are expecting the attachment, rather than clicking on it directly to run it, you're much better off saving it to disk, opening the program you think it should be run with, and then opening it manually. This takes a bit more time, but think of the time you save by not having your data randomly deleted by malicious attachments.
HTML can be used to hide things from you
If you can, use a plaintext mailreader. HTML mail is fraught with all sorts of security problems.
Do not use Microsoft products to browse random websites or read random emails. In a controlled environment, these products do have advantages. When used with untrusted content, they behave badly and will run code without your permission or knowledge. This includes all versions of Internet Explorer, Outlook, and Outlook Express.
Instead, use Mozilla/Firefox/Thunderbird, Opera, http://www.scroogle.org/
http://www.scroogle.org/cgi-bin/scraper.htm
And source: http://www.scroogle.org/changes.html
products that are better about executing (or not) untrusted system code - If you absolutely must use Microsoft products, make sure they are up to date with the latest patches.
© Educational CyberPlayGround ® All rights reserved world wide.