The Internet The World Wide Web and everything 10/22/2018
In The Beginning sound – vibration - sound Sound – vibration – voltage – vibration - sound 10/22/2018
World Wide Communication Voltage amplitude (signal strength) is lost over distance (100+ miles). Voltage is easily amplified after certain distances preserving content. 10/22/2018
1980 Feeds and Speeds Acoustical MODEMS typical 300-1200 baud (30-120/char/sec) 56K baud maximum dial-up 1 twisted pair $15 a month plus time and distance Digital Communication 256K baud using 2 twisted pair “dial-up” $100 a month plus time and distance baud – a unit of measure named for Emile Baudot (French) –telegraphy and PPT codes 10/22/2018
What The Internet Was Supposed To Look Like 10/22/2018
DARPANET 1971 Meathead in meters Stifle Yourself X Axis 10/22/2018
Compuserve 1983 Remember MCI (LDDS) ? 10/22/2018
The Internet Today 10/22/2018
Digital Subscriber Line (DSL) Identical methodology for copper twisted pair (balanced line) or coaxial cable (unbalanced line) Very High Frequency (VHF) carrier is impressed with data using frequency shift keying (FSK) Theoretical maximum speed of 5M baud Signal creates an EM field about the “twist”. Signal amplitude (strength) is tuned limiting distance subscriber is to the telco switch. Only subscriber data on line. More secure. Signal creates an EM field about the ground braid. Signal amplitude can be as high as tolerable crosstalk. Possible multiple channels. All subscribers‘ data downwind of ISP’s switch/router appears at all subscribers‘ MODEMs. 10/22/2018
Anonymity Personally Identifiable Data Collection Security Surveillance In 2017, the trump administration removed all privacy safeguard regulations from the Internet separate from the public domain. Your ISP is now enabled to legally surveil you and collect any information passing through their circuits and disperse that data to whomever they please. Marketing companies like AdChoice read other companies’ cookies on your computer, without consulting the “Terms and Agreements”, to determine the advertising they will deliver to you. To what level a user wishes to achieve anonymity, prevent personally identifiable data collection, secure all data, and defeat intrusive surveillance, will involve additional software, an investment of time and effort, third party services, and significantly more processor power. 10/22/2018
What Is A Proxy Server ? you are here… or here… or here … At its simplest, a proxy server makes you appear somewhere else: you are here… or here… or here … The proxy places the user beyond the reach of an ISP’s DNS surveillance. Prior to W7 the NIC could only forward network data to the default gateway or a proxy server using an IP address. W7 and forward has a built-in VPN client and the ability to manage multiple VPN connections. Adding VPN reduces the success of user data surveillance. 10/22/2018
What Is A VPN ? Virtual Private Network. A point-to-point communication method providing the maximum privacy and security possible over an otherwise public network. There is a lot going on in a VPN: Authentication of the participants. Administration of at least 3 levels of TCP/IP Utilization of security certificates Encryption/Decryption of TCP/IP headers/trailers, URL destination, origination IP, and data. Operation of the VPN involves trade-offs in: overall security communication speed consumption of processor power ability to forestall failover Often the VPN server side provides the VPN client with Internet Proxy services. 10/22/2018
A Multitude Of Tunneling Protocols IKEv2 Internet Key Exchange – developed by MS and Cisco using IPsec IPsec is a framework of methodologies concerning cryptology OpenVPN Open Source – utilizes SSL/TLS for key exchange SoftEther Open-source, cross-platform, multi-protocol developed as part of Daiyuu Nobori's master's thesis research at the University of Tsukuba. L2TP/IPsec Layer 2 Tunneling Protocol – low level. Uses IPsec for Anonymity SSTP Secure Socket Tunneling Protocol (SSTP) transports PPP traffic using SSL/TLS with key negotiation, encryption and traffic integrity checking. PPTP Point-to-Point Tunneling Protocol is an obsolete method with many known security issues. 10/22/2018
Setting Up A 3rd Party VPN I chose Hide.me VPN. It is free to try; did not require a credit card. It could be installed without downloading anything. Click register. Enter a user ID and password. Provide an email address. Click the verify button in the email. Done. 10/22/2018
Setting Up A 3rd Party VPN Windows key +r Powershell <type> Add-Vpn Connection -Name “hide.me IKEv2” -ServerAddress “sg.hide.me” -TunnelType “Ikev2” -RememberCredential Wait for the prompt to return Settings-> Network & Internet-> (left pane) VPN ->(right pane) hide.me IKEv2 click Connect 10/22/2018
Windows Key + r 10/22/2018
POWERSHELL 10/22/2018
Network & Internet 10/22/2018
Success 10/22/2018