2022




 meaning

The abbreviation "www" stands for "World Wide Web." It is often used as a prefix in web addresses (URLs) to indicate that the address is for a website on the Internet. For example, "www.example.com" is a web address for a website called "Example" on the World Wide Web. The "www" is not always necessary to include in the web address, as many websites can be accessed without it. However, it is often included as a standard practice when writing out web addresses.



definition

The World Wide Web (WWW or Web) is a vast network of interconnected documents and other resources, linked by hyperlinks and URLs. It is a system that allows users to access and share information, communicate with others, and perform a wide range of other activities online. The Web is accessed through a web browser, which is a software application that retrieves and displays web pages and other content. Web browsers interpret HTML (Hypertext Markup Language) and other web technologies, which are used to create and format the content that is displayed on the Web. The Web has become an essential part of modern life, as it enables people to access a wealth of information and resources from around the world.



The World Wide Web has a long and fascinating history that stretches back to the late 1960s. Here is a timeline of some key events in the development of the Web:

(1) 1969: The first computer network, ARPANET, is created by the U.S. Department of Defense.

(2) 1989: Tim Berners-Lee, a British computer scientist, proposes a new way of organizing and accessing information on the internet, which he calls the World Wide Web.

(3) 
1990: Berners-Lee develops the first web browser, called WorldWideWeb, and the first web server, CERN httpd. He also writes the first version of HTML (Hypertext Markup Language), which is used to create and format web pages.

(4) 1991: The first website, info.cern.ch, goes live. It contains information about the World Wide Web project and is hosted on a NeXT computer at CERN (the European Organization for Nuclear Research).

(5) 1993: The first search engine, Archie, is created. It allows users to search for files on anonymous FTP (File Transfer Protocol) servers.

(6) 1994: The first online shopping website, NetMarket, is launched.

(7) 1995: The first popular web browser, Netscape Navigator, is released.

(8) 1996: Google, the world's most popular search engine, is founded.

(9) 1998: Google launches its first search index.

(10) 2002: The first version of the Firefox web browser is released.

(11) 2007: The first version of the iPhone, which includes a built-in web browser, is released.

(12) 2010: The iPad, a tablet computer with a built-in web browser, is released.

(13) 2016: The World Wide Web celebrates its 27th anniversary.

This timeline only scratches the surface of the rich history of the World Wide Web. The development of the Web has had a profound impact on society and has changed the way we communicate, access information, and do business













 Computers play a role in every field of life. They are used in homes, businesses, educational institutions, research organizations, the medical field, government offices, entertainment, etc.

Home

Computers are used at home for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They communicate through electronic mail. They help corporate employees work from home. Computers help the student community to access online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients' history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays utilize robotic surgical devices to perform delicate operations and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help us to watch movies online, play games online; act as virtual entertainers in playing games, listening to music, etc. In the entertainment industry, MIDI instruments are crucial to recording music with artificial instruments. Videos can be fed from computers to full-screen televisions. There are many photo editors available with great features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purposes, creating virtual sample products, interior designing, video conferencing, etc. With online marketing, it is now possible to sell products to remote areas such as the interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in the education sector through online classes, online examinations, referring to e-books, online tutoring, etc. They help promote the use of audiovisual aids in the education field.

Government

In the government sector, computers are used for data processing, maintaining a database of citizens, and supporting a paperless environment. The country’s defined organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a significant extent through the extensive use of computers.

Business

Nowadays, computers are seamlessly integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees, or customers. Computers can make these transactions easy and accurate. People can analyse investments, sales, expenses, markets, and other aspects of business using computers.    

 








Computer: an electronic device that operates (works) under the control of programs stored in its own memory unit. A computer is an electrical machine that processes raw data to give information as output. An electronic device that accepts data as input, and transforms it under the influence of a set of special instructions called Programs, to produce the desired output (referred to as Information).

 Explanations;

A computer is described as an electronic device because it is made up of electronic components and uses electric energy (such as electricity) to function. Information and instructions are stored in a computer's internal memory awaiting processing, and the intermediate result (information) is also held before it is communicated to recipients through output devices. The data is processed based on the instructions given. This means the computer is unable to do anything useful on its own. It can only work as per the set of instructions issued. A computer will accept data in one form and produce it in another form. The data is normally held in the computer as it is being processed.

Program: A computer program is a set of related instructions written in the language of the computer & is used to make the computer perform a specific task (or, to direct the computer on what to do). A set of related instructions that specify how the data is to be processed. A set of instructions used to guide a computer through a process.

Data: This is a collection of raw facts, figures, or instructions that do not have much meaning for the user. Data may be in the form of numbers, alphabets/letters, or symbols, and can be processed to produce information.

 

TYPES OF DATA.

There are two types of data:

Digital (discrete) data: Digital data is discrete in nature. It must be represented in the form of numbers, alphabets, or symbols for it to be processed by a computer. Digital data is obtained by counting.

Analogue (continuous) data: Analogue data is continuous in nature. It must be physically represented to be processed by a computer. Analog data is obtained by measurement. E.g. Pressure, Temperature, Humidity, Length or currents, etc. The output is in the form of smooth graphs from which the data can be read.

Data Processing: It is the process of collecting all items of data together & converting them into information.

The term processing refers to the way in which data is manipulated (or handled) to make it into information. Calculations, comparisons, or any other logic may be used to obtain the result. The processing of data usually results in some meaningful information being produced.

The data has been refined, summarized & manipulated in the way that you want it, or in a more meaningful form for decision-making. The information must be accurate, timely, complete, and relevant.

 

Characteristics / Features of a Computer.


 Before the 20th century, most information was processed manually or by the use of simple machines. Today, millions of people use computers in offices and at home to produce and store all types of information.

 The following are some of the attributes that make computers widely accepted & used in day-to-day activities in our society:

 

1. Speed.

A computer's speed allows it to perform a wide range of tasks very quickly. They can perform much more complicated tasks much faster than anyone else. The speed of a computer is measured in.

Millisecond – a thousandth of a second (10-3)

Microsecond—a millionth of a second (10-6)

Nanosecond—a thousand millionth of a second (10-9)

Microsecond—a million millionth of a second (10-12)

 

2. Accuracy:

Unlike humans, computers are very accurate, so they never make a mistake. A computer can work for very long periods without doing anything wrong. However, when an error occurs the computer has several in-built, self-checking features in its electronic components that can detect & correct such errors.

3. Reliability:

The computer can be relied upon to produce the correct answer if it is given the correct instructions & supplied with the correct data.

 

4. Consistency:

Computers are usually consistent. This means that, given the same data & the same instructions, they will produce the same answer every time that particular process is repeated.

 

5. Storage:

A computer can store a large amount of information in a small space. It is possible for a computer to store data & instructions for later use and to retrieve/produce this data when needed by the user.

6. Diligence:

Unlike humans, computers can work continuously without getting tired or bored. Even if it has to do a million calculations, it will do the last one with the same speed and accuracy as the first one.

 

7. Automation:

 Automated devices, such as computers, perform tasks automatically. Upon receiving instructions, it is guided by them and can carry out its job automatically until it is completed. It can also perform a variety of jobs as long as there is a well-defined procedure.

8. Imposition of a formal approach to working methods:

Because a computer can only work with a strict set of instructions, it identifies and imposes rigid rules for dealing with the data it is given to process. 

 

In this section, we describe the system architecture along with implementation details. Functional diagram of the clearing house subsystem.


Clearing House Module:

The Inter-Bank Clearing and Settlement System consists of two subsystems (1) E-Check Clearing and Settlement System (2) Bank Gateway. ECCH interacts with participating bank gateway And Inter Bank Settlement System named Real Time Gross Settlement System (RTGS). This system has been recently implemented by the Reserve Bank of India (RBI). Communication between ECCH and bank Gateway is through JMS (Java Messaging Service) bridge. The communication between ECCH and RTGS is Through MQ (Message Queuing) bridge. ECCH has software modules, which carry out the following Activities: 

  • Receives E-Check batches from the collecting bank gateway.

  • Performs verifications and validations of these batches after decrypting them.

  • Sorts E-Checks issuing bank-wise.

  •  Creates E-Check batches for each issuing bank.

  • encrypts the batch for each bank with the public key of that bank. The batches are digitally signed using private

  • Key of the ECCH and forwarded to the issuing bank gateway.

  • Receives confirmation or returned messages from the issuing bank gateway.

  • Sorts returned E-Checks by collecting banks and forward them to respective collecting banks.

  • for confirmed E-Checks, a net settlement matrix is prepared and the net settlement amount for each bank is arrived at.

  • the net settlement file is digitally signed, encrypted, and sent to the RTGS

  • Receives net settlement response from RTGS (can be either confirmation or rejection)

  • decrypts the message received from RTGS.

A batch containing settlement confirmations is created for each collecting bank are encrypted and forwarded to the respective collecting bank gateway.



FUNCTION DIAGRAM OF CLEARING HOUSE




Bank Gateway Module:


The bank gateway receives E-Checks from the bank’s web server and performs necessary validations. The bank gateway functions both as the collecting bank gateway and the issuing bank gateway. The collecting bank gateway creates E-Check batches. The batches are digitally signed using their private key and sent to the ECCH. The issuing bank gateway is designed to accept E-Check batches from ECCH, validate the instruments, and send them to the core banking / TBA system of the bank. The transmission of E-Checks between the branches and the gateway system is the responsibility of the respective banks.


The functionality of these modules is Collecting Bank.

1. Receives E-Checks from the payee.

2. Segregates them On-Us and On-Others.

3. On–Us E-Checks are sent to CBS/TBA for Payment confirmation.

4. On-Others E-Checks are made into a batch. The batches are digitally signed using its.

Private Key encrypted and sent to ECCH for Clearing.

5. Receives the transaction messages(confirmation/return) from the ECCH.

6. Decrypts the messages received.

7. Forwards payment confirmation to the Core banking/TBA systems.

8. Sends returned E-Checks to the bank’s web server for transmission to the payee.



Issuing Bank:



1. Decrypts E-Check batches received from the ECCH.

2. Validates E-Checks and forward them to Core Banking/TBA systems.

3. Receives transaction messages (payment confirmation or return) from core banking/TBA systems.

4. Sends confirmations to the ECCH. The confirmation batch is digitally signed and encrypted.

5. In case of returns, the E-Check is returned to the ECCH along with the return reason. The issuing bank digitally Signs the “return reason”.








 






A book about hacking would be irresponsibly incomplete without a chapter giving you a fair warning on the consequences of misusing these techniques as well as the ethical considerations of hacking. To begin this discussion, you need to be familiar with two different terminologies that describe different types of hackers: black hat and white hat. I like the imagery these terms bring to mind because they always seem to remind me of Spy vs Spy. Black hat hackers are what most people typically think of when they hear the word “hacker.” A black hat hacker is the type of nefarious Internet user who exploits weaknesses in computing systems for personal gain or in order to disrupt an organization’s information systems to cause them harm. He’s the guy wearing a high-collared shirt, sunglasses, and a fedora behind an array of 20 or so computer monitors or the nerd in the movies who can break into a top-secret system illegally. There really isn’t any good that can come out of adopting a black hat approach to hacking, either. When you hear in the media that a financial institution just lost thousands of usernames and passwords or that a social media database was compromised that causing vast amounts of people to lose sensitive personal information, the attack was carried out by a black hat hacker. Recently, there was even a module of code contained in a WordPress plugin that was susceptible to an XSS vulnerability (a type of security flaw in websites with caching plugins) that was being exploited worldwide by the extremist group ISIS. If you are reading this book because you have dreams of causing mass disruption and chaos, I would highly advise you to reconsider. However, understand that security and penetration tools aren’t inherently good or evil. One could argue that they are much like firearms in the sense that a weapon is an inanimate object, and it is only as good or evil as the person wielding it White hat hackers, on the other hand, are the complete opposite. They’re the good guys who do everything in their power to find potential security flaws and correct the errors so the black hat hackers can’t break a system. As you read this book, you need to consider all of the tools and techniques I show you from the perspective of a white hat hacker and use them responsibly. If you pursue white hat hacking professionally, you can add tremendous value to the organization you work for and make big money doing so. Some white hat hackers that have the CEH (Certified Ethical Hacker) certification make salaries well into the six-figure range. Internet security is only becoming more important with each passing year, and a talented white hat hacker can use penetration testing tools and footprinting methods to identify disastrous security flaws on the organization’s network and information infrastructure and patch them before they become a problem that would cost the organization obscene amounts of money. Furthermore, you need to be aware of the consequences of misusing the knowledge you learn in this book. Though you likely won’t get caught snooping around a network attached to an unsecured SOHO (Small Office/Home Office) wireless network in your neighborhood or at your favorite local coffee shop, you need to respect other people’s rights to privacy. Think about it – how would you feel if you were sitting down for a cup of coffee while reading a book only to find out later that someone had attacked your Kindle over the coffee shop’s network and stolen your data? You would feel enraged, irritated, and violated. So, remember the golden rule as you grow into a white hat hacker. Also, consider that using penetration tools on networks where you don’t have any authority to do so could lead to some extremely negative consequences. Let’s face it, you don’t have the right to steal other people’s personal information –it’s illegal. Not only could you provoke civil lawsuits, but you could even face jail or prison time depending on the nature of your offense. If you choose to do it on your employer’s network and you get caught, the best-case scenario is that you would have some extremely uncomfortable questions to answer, and the Worst-case scenario is that you would become fired. It’s just not worth it, so keep that in mind moving forward. Instead of testing out these techniques on public or corporate networks, my advice would be to try these in your very own home. Even a small home network will provide a digital playground for you to test out your new security skills. All you would need to run through some of these demos would be a personal computer, a wireless router, and preferably a few other devices that you can attach to your network. In the footprinting section, I will show you how to run ping sweeps and other utilities to perform reconnaissance and information-gathering methods, so having several other devices will give you more “toys” to play with on your local area network (LAN). By now I hope you understand that the word “hacker” is rather ambiguous. Years ago, it rightfully meant a black hat hacker. Today, however, it could refer to any number of different types of people who are extremely knowledgeable about technology, and the term “hacker” doesn’t necessarily mean someone who is trying to steal intellectual property or break into a restricted network. Calling someone a hacker is the layman’s approach to describing a digital thief, but security professionals will often draw the line between the white hats and the black hats. With all of the dire warnings out of the way, we can now proceed to the juicer and more pragmatic sections of the book you have all been waiting for and we can begin to learn how you personally can get your feet wet with hacking. To begin, understand that this book is written with the assumption that you have little to no understanding of rudimentary networking and security concepts. Because this book is written for beginners as opposed to seasoned Internet security professionals and expert hackers, you need to first have a basic understanding of network terminology, addressing concepts, and other fundamentals that you will be able to use as a foundation to build your hacking skills upon. So, let’s get started networking fundamentals Worst case scenario is that you would become fired. It’s just not worth it, so keep that in mind moving forward. Instead of testing out these techniques on public or corporate networks, my advice would be to try these in your very own home. Even a small home network will provide a digital playground for you to test out your new security skills. All you would need to run through some of these demos would be a personal computer, a wireless router, and preferably a few other devices that you can attach to your network. In the footprinting section, I will show you how to run ping sweeps and other utilities to perform reconnaissance and information-gathering methods, so having several other devices will give you more “toys” to play with on your local area network (LAN). By now I hope you understand that the word “hacker” is rather ambiguous. Years ago, it rightfully meant a black hat hacker. Today, however, it could refer to any number of different types of people who are extremely knowledgeable about technology, and the term “hacker” doesn’t necessarily mean someone who is trying to steal intellectual property or break into a restricted network. Calling someone a hacker is the layman’s approach to describing a digital thief, but security professionals will often draw the line between the white hats and the black hats. With all of the dire warnings out of the way, we can now proceed to the juicer and more pragmatic sections of the book you have all been waiting for and we can begin to learn how you personally can get your feet wet with hacking. To begin, understand that this book is written with the assumption that you have little to no understanding of rudimentary networking and security concepts. Because this book is written for beginners as opposed to seasoned Internet security professionals and expert hackers, you need to first have a basic understanding of network terminology, addressing concepts, and other fundamentals that you will be able to use as a foundation to build your hacking skills upon. So, let’s get started with networking fundamentals!

 


Almost everyone has used a computer at one time or another. Perhaps you have played computer games or used a computer to write a paper or balance your checkbook. Computers are used to predict the weather, design airplanes, make movies, run businesses, perform financial transactions, and control factories. Have you ever stopped to wonder what exactly a computer is? How can one device perform so many different tasks? These basic questions are the starting point for learning about computers and computer programming. A modern computer can be defined as “a machine that stores and manipulates information under the control of a changeable program.” There are two key elements to this definition. The first is that computers are devices for manipulating information. This means we can put information into a computer, it can transform the information into new, useful forms, and then output or display the information for our interpretation. Computers are not the only machines that manipulate information. When you use a simple calculator to add up a column of numbers, you are entering information (the numbers) and the Calculator is processing the information to compute a running sum which is then displayed. Another simple example is a gas pump. As you fill your tank, the pump uses certain inputs: the current price of gas per gallon and signals from a sensor that reads the rate of gas flowing into your car. The pump transforms this input into information about how much gas you took and how much money you owe. We would not consider either the calculator or the gas pump as full-fledged computers, although modern versions of these devices may actually contain embedded computers. They are different from computers in that they are built to perform a single, specific task. This is where the second part of our definition comes into the picture: Computers operate under the control of a changeable program. What exactly does this mean? A computer program is a detailed, step-by-step set of instructions telling a computer exactly what to do. If we change the program, then the computer performs a different sequence of actions, and hence, performs a different task. It is this flexibility that allows your PC to be at one moment a word processor, at the next moment a financial planner, and later on, an arcade game. The machine stays the same, but the program controlling the machine changes. Every computer is just a machine for executing (carrying out) programs. There are many dive-ferment kinds of computers. You might be familiar with Macintoshes and PCs, but there are literally thousands of other kinds of computers both real and theoretical. One of the remarkable discoveries of computer science is the realization that all of these different computers have the same power. with suitable programming, each computer can basically do all the things that any other computer can do. In this sense, the PC that you might have sitting on your desk is really a universal machine. It can do anything you want it to do, provided you can describe the task to be accomplished in sufficient detail. Now that’s a powerful machine!

 

 

Competitor analysis or the monitoring of competitor use of e‑commerce to acquire and retain customers is especially important in the digital marketplace due to the dynamic nature Of the Internet medium. This enables new services to be launched and promotions changed much more rapidly than through print communications. The implications of this dynamism are that competitor benchmarking is not an Off Activity while developing a strategy but needs to be continuous.

Benchmarking of competitors’ online services and strategy is a key part of planning activity and should also occur on an ongoing basis in order to respond to new marketing approaches Such as price or promotions. According to Chaffey et al. (2009), competitor benchmarking has different perspectives which serve different purposes:


1 Review of internal capabilities:


such as resourcing, structure, and processes vs external Customer-Facing Features of the sites.

2 From core proposition through branding to online value proposition (OVP).


The core Proposition will be based on the range of products offered, price, and promotion. The OV Describes the type of web services offered which add to a brand’s value. We cover proposition More in the sections on OVP and the marketing mix later in this chapter.


3 Different aspects of the customer life cycle:


customer acquisition, conversion to retention. Competitor capabilities should be benchmarked for all the digital marketing activities of each competitor, as shown in Figure 8.1. These should be assessed from the viewpoint of Different customer segments or personas, possibly through usability sessions. Performance In search engines (using the tools mentioned in Chapter 2) should be reviewed as a key Aspect of customer acquisition and brand strength. In addition to usability, customer views Should be sought on different aspects of the marketing mix such as pricing and promotions Mentioned later in the chapter.

4 Qualitative to quantitative:

from qualitative assessments by customers through surveys and focus groups to quantitative analysis by independent auditors of data across Customer acquisition (e.g., number of site visitors or reach within the market, cost of acquisition, Number of customers, sales volumes, and revenues and market share); conversion (Average conversion rates) and retention such as repeat conversion and number of active Customers.

5 In‑sector and out‑of‑sector:

benchmarking against similar sites within the sector and reviewing sectors that tend to be more advanced, e.g., online publishers, social networks, and brand sites. Benchmarking services are available from analysts such as Bowen Crags & Co (www.bowencraggs.com). An example of one of their benchmark reports is Shown in Figure 8.11. You can see that this is based on the expert evaluation of the suitability of the site for different audiences as well as measures under the overall construction (Which includes usability and accessibility), message (which covers key brand messages and suitability for international audiences) and contact (which shows integration between Different audiences). The methodology states: ‘it is not a “tick box”: every metric is Judged by its existence, its quality, and its utility to the client, rather than “Is it there or is it not?’

6 Financial to non-Financial Measures:

Through reviewing competitive intelligence sources Such as company reports, or tax submissions additional information may be available on Turnover and profit generated by digital channels. But other forward-Looking Aspects of


The company’s capabilities which are incorporated into the balanced scorecard measurement Framework should also be considered, including resourcing, innovation, and learning.


7 From user experience to expert evaluation:


Benchmarking research should take two Alternative perspectives, from actual customer reviews of usability to independent expert Evaluations

MKRdezign

Contact Form

Name

Email *

Message *

Theme images by nicodemos. Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget