Download presentation
Presentation is loading. Please wait.
Published byJean-Pascal Milot Modified over 6 years ago
1
The Internet The World Wide Web and everything
10/22/2018
2
In The Beginning sound – vibration - sound
Sound – vibration – voltage – vibration - sound 10/22/2018
3
World Wide Communication
Voltage amplitude (signal strength) is lost over distance (100+ miles). Voltage is easily amplified after certain distances preserving content. 10/22/2018
4
1980 Feeds and Speeds Acoustical MODEMS
typical baud (30-120/char/sec) 56K baud maximum dial-up 1 twisted pair $15 a month plus time and distance Digital Communication 256K baud using 2 twisted pair “dial-up” $100 a month plus time and distance baud – a unit of measure named for Emile Baudot (French) –telegraphy and PPT codes 10/22/2018
5
What The Internet Was Supposed To Look Like
10/22/2018
6
DARPANET 1971 Meathead in meters Stifle Yourself X Axis 10/22/2018
7
Compuserve 1983 Remember MCI (LDDS) ? 10/22/2018
8
The Internet Today 10/22/2018
9
Digital Subscriber Line (DSL)
Identical methodology for copper twisted pair (balanced line) or coaxial cable (unbalanced line) Very High Frequency (VHF) carrier is impressed with data using frequency shift keying (FSK) Theoretical maximum speed of 5M baud Signal creates an EM field about the “twist”. Signal amplitude (strength) is tuned limiting distance subscriber is to the telco switch. Only subscriber data on line. More secure. Signal creates an EM field about the ground braid. Signal amplitude can be as high as tolerable crosstalk. Possible multiple channels. All subscribers‘ data downwind of ISP’s switch/router appears at all subscribers‘ MODEMs. 10/22/2018
10
Anonymity Personally Identifiable Data Collection Security Surveillance
In 2017, the trump administration removed all privacy safeguard regulations from the Internet separate from the public domain. Your ISP is now enabled to legally surveil you and collect any information passing through their circuits and disperse that data to whomever they please. Marketing companies like AdChoice read other companies’ cookies on your computer, without consulting the “Terms and Agreements”, to determine the advertising they will deliver to you. To what level a user wishes to achieve anonymity, prevent personally identifiable data collection, secure all data, and defeat intrusive surveillance, will involve additional software, an investment of time and effort, third party services, and significantly more processor power. 10/22/2018
11
What Is A Proxy Server ? you are here… or here… or here …
At its simplest, a proxy server makes you appear somewhere else: you are here… or here… or here … The proxy places the user beyond the reach of an ISP’s DNS surveillance. Prior to W7 the NIC could only forward network data to the default gateway or a proxy server using an IP address. W7 and forward has a built-in VPN client and the ability to manage multiple VPN connections. Adding VPN reduces the success of user data surveillance. 10/22/2018
12
What Is A VPN ? Virtual Private Network. A point-to-point communication method providing the maximum privacy and security possible over an otherwise public network. There is a lot going on in a VPN: Authentication of the participants. Administration of at least 3 levels of TCP/IP Utilization of security certificates Encryption/Decryption of TCP/IP headers/trailers, URL destination, origination IP, and data. Operation of the VPN involves trade-offs in: overall security communication speed consumption of processor power ability to forestall failover Often the VPN server side provides the VPN client with Internet Proxy services. 10/22/2018
13
A Multitude Of Tunneling Protocols
IKEv2 Internet Key Exchange – developed by MS and Cisco using IPsec IPsec is a framework of methodologies concerning cryptology OpenVPN Open Source – utilizes SSL/TLS for key exchange SoftEther Open-source, cross-platform, multi-protocol developed as part of Daiyuu Nobori's master's thesis research at the University of Tsukuba. L2TP/IPsec Layer 2 Tunneling Protocol – low level. Uses IPsec for Anonymity SSTP Secure Socket Tunneling Protocol (SSTP) transports PPP traffic using SSL/TLS with key negotiation, encryption and traffic integrity checking. PPTP Point-to-Point Tunneling Protocol is an obsolete method with many known security issues. 10/22/2018
14
Setting Up A 3rd Party VPN
I chose Hide.me VPN. It is free to try; did not require a credit card. It could be installed without downloading anything. Click register. Enter a user ID and password. Provide an address. Click the verify button in the . Done. 10/22/2018
15
Setting Up A 3rd Party VPN
Windows key +r Powershell <type> Add-Vpn Connection -Name “hide.me IKEv2” -ServerAddress “sg.hide.me” -TunnelType “Ikev2” -RememberCredential Wait for the prompt to return Settings-> Network & Internet-> (left pane) VPN ->(right pane) hide.me IKEv2 click Connect 10/22/2018
16
Windows Key + r 10/22/2018
17
POWERSHELL 10/22/2018
18
Network & Internet 10/22/2018
19
Success 10/22/2018
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.