Pages

Tuesday, January 13, 2009

Story About Internet (Amazing WWW World)


In 1994, the

The World Wide Web Consortium (W3C)

(W3C) was created to "Lead the Web to Its Full Potential."—Tim Berners-Lee

Download - The True Story Of The Internet "People Power" - 43:06 - Apr 4, 2008
The Science Channel

Host John Heilemann explores the interactive nature of the modern World Wide Web, from early successes like Napster and the still popular Craigslist, to more recent phenomena like the social networking sites MySpace and Facebook. http://science.discovery.com/tv/download/about/about.html In this episode, "People Power," teenager Shawn Fanning invents Napster and forever changes the way music is shared over the Net -- and, later, the way people communicate with each other via this medium. Download: The True Story of the Internet is about a revolution -- the technological, cultural, commercial and social revolution that has radically changed our lives. And for the first time, we hear how it happened from the men and women who made it possible. From the founders of eBay, Yahoo, Amazon, Netscape, Google and many others, we hear amazing stories of how, in ten short years, the Internet took over our lives. These extraordinary men and women tell us how they went from being geeky, computer obsessed nerds to being 21st-century visionaries in the time it takes most people to get their first promotion. And, how they made untold billions along the way. The style of the story-telling is up close and personal. With first-hand testimony from the people that matter, we tell a story that has all the excitement of a thriller -- full of battles and back-stabbing, moments of genius and moments of sheer hilarity. You will never surf the net in the same way again. Download is hosted by technology journalist John Heilemann. He's an edgy, combative, hi-energy New Yorker who never takes anything at face value. He's also a personal friend of most of Silicon Valley's most important characters and he revels in craziness of it all. After all, this is a story in which 20-year-olds become overnight billionaires, create, destroy and re-create more wealth in ten years then human race has ever seen, and still struggle to get a date.

«




21 Facts About The Internet You Should Know


You probably use it every day but how well do you
know your Internet?

Ever wonder how all this foolishness got started in the
first place and why? How big it really is? How many present
users there are? The average time spent on a website?
Here are 21 facts you might or might not want to know
about the Internet.


1. Who coined the phrase 'World Wide Web'?

Tim Berners-Lee in 1990. He's also considered by most
people as the person who started the whole thing rolling.


2. How did the Internet Start and Why?

It all started with the time-sharing of IBM computers in the
early 1960s at universities such as Dartmouth and Berkeley in
the States. People would share the same computer for their
computing tasks. The Internet also received help from Sputnik!
After this Russian Satellite was launched in 1957, President
Eisenhower formed ARPA to advance computer networking and
communication.

Plus, we won't even mention that whole industry where
people show their naughty bits.


3. Who was J.C.R. Licklider?

Licklider is often referred to as the father of the Internet because
his ideas of interactive computing and a "Galactic Network" were
the seeds for the Internet. His ideas would be developed thru
DARPA,(Defense Advanced Research Projects Agency) in 1962.
Later he would help form ARPANET and the Internet was on it's way.

Vinton Gray Cerf was another founding father of the Internet. He
played a key role in the creation of the Net by developing
the TCP/IP protocols we use for the Internet.



4. What was ARPANET?

ARPANET stands for 'Advanced Research Projects Agency Network'
Came about in the arena of Sputnik and the cold war. The military
needed a method of communicating and sharing all the information on
computers for research and development. It would also be a handy
communication system if all traditional ways were wiped out in
a nuclear attack!


5. What was the First long distance Connection?

In 1965 using a low speed dial-up telephone line, MIT
researcher Lawrence G. Roberts working with Thomas Merrill,
connected the TX-2 computer in Massachusetts to the Q-32
in California. The phone lines weren't quite up to the task!


6. Who was Leonard Kleinrock?

Kleinrock came up with the theory of packet switching,
the basic form of Internet connections. With a group
of UCLA graduate students on Oct. 29, 1969, Kleinrock
connected with the Stanford Research Institute but as
they typed in the G in LOGIN -- the system crashed!


7.What is an Ethernet?

It's a protocol or system for a set of computer networking
technologies for local area networks (LANs), the origins of
which came from Bob Metcalfe's Harvard's dissertation on
"Packet Networks."


8. When was the first mouse introduced?

The first computer mouse was introduced in 1968 by
Douglas Engelbart at the Fall Joint Computer Expo
in San Francisco.


9. Did Al Gore really invent the Internet?

No, but give credit where credit is due. He did the most of
any elected official to actively promote the Internet. However,
he wasn't even in Congress when ARPANET was formed in 1969
or even when the term 'Internet' came into use in 1974. Gore was
first elected in 1976.

Gore himself may be the cause of this Urban Legend or
Internet myth - during a Wolf Blitzer CNN interview on
March 9, 1999 - Al Gore did say: "During my service in the
United States Congress, I took the initiative in creating
the Internet."

Causing himself some ridicule but also paving the way for
such future one-liners as: "I invented the environment!"


10. Who coined the phrase 'information superhighway'?

Wikipedia says Nam June Paik coined the phrase "information
superhighway" in 1974.

Al Gore popularized the phrase in the early 1990's.


11. Which decade really saw the explosion of the net?

The 1990s. The Internet exploded into the mainstream with
the release of the first popular web browser Mosaic in 1993.


12. How fast is the Internet growing?

Very fast! It took 38 years for radio to reach 50 million users,
13 years for TV, and only 5 years for the Internet. Source:
CyberAtlas.com


13. Number of Internet Users and Breakdown.

The Internet is roughly 35% English, 65% Non-English with
the Chinese at 14%. Yet only 13% of world's population,
812 million are Internet users as of Dec. '04. North America
has the highest continental concentration with 70% of the
people using the Internet.


14. Country with the highest percentage of net users?

Sweden at 75%.


15. How big is the Internet's surfing world?

Google's index now stands at over 8 billion pages. There are
now over a Billion Internet Users and that number is growing
rapidily.


16. What was the Net's first index called?

Archie, other than library catalogs, this was the first
index created in 1989 by Peter Deutsch at McGill in Montreal.
Although it spouted such others as Veronica and Jughead, Archie
was short for Archiver and had nothing to do with the
comic strip.

Backrub was the original name for Google! Larry Page and Sergey
Brin used this term for their search engine in 1996, Google as we
know it debuted in 1998. The name Google is a twist on the word
Googol, a number represented as 1 followed by 100 zeros.


17. Who coined the phrase 'The Web might be better than sex'?

Bob Metcalfe in 1995.


18. What does HTTP stand for?

HyperText Transfer Protocol - it's the protocol for moving files
across the net; it requires two client programs. The HTTP client
and the server.


19. What is an ISP?

Internet Service Provider - This is the service or company you use to
access the Internet.


20. What is HTML?

Hypertext Markup Language - it's the coded format language for
transmitting and creating hypertext web pages.


21. What are your average surfing habits according to Nielsen
NetRatings?

Each month you usually visit 59 domains, view 1,050 pages allocating 45
seconds for each page and spend about 25 hours doing all this net activity!
Each surfing session lasts 51 minutes.


One last thought - Henry Edward Hardy in his Master's Thesis (1993) on
The History of the Net stated "The Net is Immortal". Ever wonder what
this baby will be like in a 100 years? a 1000 years? Just something
to think about as you keep your eye on that cursor.

The Dark Side of the Internet



In an online world of millions of people, you are bound to have bad guys and dishonest individuals. The tough part is that they can know deceive you just by knowing a little more technology than you do. But don't fear: About.com wants to help you see when you are being scammed or attacked by a dishonest internetizen. And we want to help you defend against these bad boys of the internet.


1) What is “Spyware”?

Forget viruses, spam and hacker attacks..."spyware" is now the single largest problem facing internet users today. These nasty little rogue programs have become so widespread and so infectious, their volume far outstrips spam and regular viruses. The spyware problem has grown to such an immense breadth and depth, we cannot even agree on what to call it.

2) Spyware = 'Malware'
Most people historically call these rogue programs "spyware". That name comes from the 1990's where nasty little programs secretly observed and logged your web surfing habits. The spyware problem, however, has now grown into dozens of other malicious formats, including sneakware, adware, keyloggers, browser hijackers, porn servers, trojans and worms
Because the spyware problem has mutated so much, we now describe spyware as part of a much larger category of rogue software called "malware" (malicious software programs). .
At its most basic definition, malware is when insidious little software programs covertly install themselves on your computer, and then perform secret operations without your permission. Once in place, malware programs may do hundreds of nasty things to your computer. Malware will log your keystrokes, steal your passwords, observe your browsing choices, spawn pop-up windows, send you targeted email, redirect your web browser to phishing pages, report your personal information to distant servers, and serve up pornography. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive. Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions.

3) What does Spyware/Malware specifically do to my computer?

Malware will perform a variety of nasty activities, ranging from simple email advertising all the way to complex identity-theft and password-stealing. New nasty functions are created every week by malware programmers, but the most common malware functions are:
  1. Malware steals your personal information and address book (identity theft and keystroke-logging).
  2. Malware floods your browser with pop-up advertising.
  3. Malware spams your inbox with advertising email.
  4. Malware slows down your connection.
  5. Malware hijacks your browser and redirects you to an advertising or a phishing-con web page.
  6. Malware uses your computer as a secret server to broadcast pornography files.
  7. Malware slows down or crashes your computer.

4) Where does Spyware/Malware come from?

Spyware/malware programs are authored by clever programmers, and then delivered to your computer through covert Internet installs. Usually, malware will piggyback on innocent-looking web page components and otherwise-benign software such as game demos, MP3 players, search toolbars, software, free subscriptions, and other things you download from the web. Subscribing to online services is especially bad for getting malware. In particular, whenever you sign up for a so-called "free" service or install new software, you must accept an "end user license agreement" (EULA). The fine print of the EULA will often include the phrase "the vendor is allowed to install third-party software on your computer". Since most users don't bother to read this EULA fine print, they naively click "accept", and install malware out of sheer ignorance.

5) What kind of personal information does Spyware/Malware steal?

This varies from the non-confidential to the extremely-personal. The malware may simply steal a listing of your MP3s or recent website visits. Malware may also harvest your email address book. At its very worst, malware will steal your banking PIN, your eBay login, and your Paypal information (aka "keystroke logging" identity theft). Yes, spyware/malware is a very serious Internet problem that threatens everyone's personal privacy, and network administrators everywhere are deeply concerned.

How Do I Protect Myself from this 2008 Epidemic of Spyware/Malware?

Answer: Avoiding and destroying spyware is not instant, and it is not a one-time event like an inoculation. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week.

Note: Additionally, as an educated user, you must also adopt a "buyer beware" attitude whenever you install new software from the Net or even from CD...you need to read every end user license agreement on your screen before you click "accept".

Here is the checklist for detecting and destroying malware

Install two or three different anti-spyware programs ("spyware cleaners") on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware. Also, the anti-spyware manufacturers regularly add new entries to their "definition" lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists!

  1. Build a weekly habit of "scan and detect". Like cleaning house, this should be done every few days. At the very least, this should be done whenever you install new software. Many anti-spyware programs can be set to automatically perform scan-and-detect nightly.

  2. Carefully read every EULA (end user license agreement) before clicking "accept". If you see the phrase "3rd-party software may be installed", make sure to follow the software install with a spyware cleaning.

  3. Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs.

  1. Save your data, and backup often! As much as it sounds like broken-record preaching, backing-up is how an intelligent user prepares for the worst. Backing up means: keep your original software CDs in a safe accessible place, constantly save copies of your important work files on CD or separate drives, and presume you will actually need them one day. This way, if you ever experience the extreme spyware circumstance of having to reformat your hard drive, you can at least recover your important work.
There you go, fellow Internet users. Your lives now have an extra complexity as you add one more cleaning habit to your weekly routine. The good news is: once you build a regular scan-and-detect habit, then spyware and malware will be reduced to a mere annoyance, and you can get back to business of enjoying the internet! Personally, I think of it as having one more room in my house to dust and vacuum.

Lock Down Your PC!

Security Essentials for Home Computing

By Paul Gil, About.com

If you subscribe to Cable or DSL broadband at home, then you are likely to be casually "attacked" by hackers up to three dozen times a day. Especially if you use Windows XP or other Windows operating systems, you are a prime target for savvy hackers who will exploit your fulltime Internet connection.

As good as Microsoft products are, they are also obsessively targeted by hackers around the world. Small Microsoft "holes" perforate your computer, including: your administrator account, your ICF firewall service, your guest logon, your shared folders, your messaging services, your Identifier Broadcasts, your port openings, and your Encrypted File Services... all of these obscure points are absolute candy for hackers!

Yes, this is frightening. But all is not lost... most of these security holes in Microsoft are easily patched by an hour of reading and an hour of configuring your PC.

Good home security is about vigilance, knowledge, and meticulous attention to detail. We here at About.com want to help you with that, so we have provided dozens of free articles explaining security holes and how best to plug them.

Welcome to the exciting and challenging world of anti-hacker and anti-virus defense! What follows next are explanations of firewalls, packet filter routers, toggling Windows services to prevent external access, configuring WiFi networks for privacy, and overall blocking of hackers on Cable and DSL networks.

These next tutorials are updated frequently to reflect news and software changes. Please check back often for updates!


Interesting Internet Facts

by
Robert C. Brenner, MSEE, MSSM

While researching for pricing information, we found the following interesting tidbits. These factoids may be of interest to you.

TOTAL NUMBER OF HOUSEHOLDS ONLINE
1993
– 4.6 million online in US

1995
– 9.6 million online in US
– 19% are shopping online

1996
– 10 million online in US (4% of US population)
– 8% of online users buying products via Internet

1997
– 11 million online in US
– 17% claim to be online buyers spending at least $50 a year
– 27% are shopping online

1998
– 19.1 million online in US
– 20 million users (”netizens”) worldwide say Internet is indispensable
– over 1.2 million users in Russia

1999
– 158 million online worldwide
– 58 million - 92 million online in US (depending on research source)
– average surfer got over 1,700 email messages
– 37 million use Web for e-commerce

2000
– 122.7 million online in US (source Yahoo! Internet Life)
– 180 million online in the US as of December 2000
– 2.1 billion online worldwide (out of 6 billion)
Internet sales up 1,200% since 1997
– 500,000 new users to Internet every month
– 7 million US homes now getting 10 MB of two-way high speed Internet access

2003
– 500 million users online worldwide

2008
– 215 million online in the U.S. (71.4% of U.S. population)
– 1,464 million online worldwide (21.9% of world population)



INTERNET STATS (as of Septermber 2000)
– 76 million in US surf Internet and use email daily
– (215 million users in 2008)
– 333.5 million e-mail accounts active in US (in 1998 it was 77 million)
– 46% of American workers use the Net for personal reasons
– 48% of engaged couples used Web to gather info on and plan weddings
– 55% of online gamblers are women
– 650 thousand new jobs created based on Internet contact
– 5,400 jobs cut between January and June 2000 due to dot-com failures
– 44% of online surfers have participated in an online auction this year
– 32% used the Net to keep up with and gather voting and election
information
– 18% relay on Internet “completely” or “very much” for daily news
– 68% say that e-mail and instant messaging has reduced long distance
phone bill
– 71% of men have shop online
– 58% of women shop online
– Most likely shoppers are males with at least Bachelor’s degree and
earning $75,000
– Companies are launching Web sites at record pace
– Over half of all businesses with Web sites maintain their own site
– advertising online has gone from $400 million in 1997 to $4.8 billion
in 2000
– 32 million households to bank online by 2003


OTHER INTERESTING STATS
– Total US business at end of 1996 - 6.22 million

– 50% of all businss owners are 35-54 years old
– 50% of these are 35-44 years old
– 70% are married
– 54% are home-based sole proprietorships
– 66% are first time businesses
– (2008) 60% of U.S. households have high speed Internet connections


DEMOGRAPHICS OF INTERNET USERS
2000
– 84% Caucasian (1999 - 76% Caucasian)
– 12 % African-American
– 3% Asian
– 1% mixed
–38% have Bachelor’s degree or higher (down from 47% in 1996)
–27% are relatively new to the Web
–60% are married or partnered (was 71% in 1997)
–Over 50% go online every day


TOP ONLINE ACTIVITIES
92% browse the Web
88% send/receive email
87% collect information about hobby or personal interest
81% collect product or service information
74% read the news
65% get business or work information
63% collect travel information
60% download images or photos
58% look up entertainment events
56% check the weather
xx% doing online investing


WHO’S BUYING WHAT (January 1999)
MEN
– men mostly buying computers, CDs and videos
– 12.6 million male shoppers research automobiles and buy auto parts
– 9.4 million men buy computers online
WOMEN
– number of women buyers up 80%
– 9.6 million women bought books, CDs and videos
– 6.9 million women buy clothing online
– 6.4 million women buy computers online


SMALL BUSINESS USE OF INTERNET
72% use for email and customer contact (up from 62% in 1999)
48% operate a Web site
28% sell goods or services online


WEB SITE STATS
Over 1 million active Web sites (over 80 million web pages)
– typical Web page 5k
– typical Web image 12k
– median site has 300 pages
– 50 sites have over 30,000 pages
– top 1,000 sites account for 50% of all web traffic


True Stories Collection

Are u ready 4 da scariest stories, photos nd pictures

Story 1

April 6th, 2007

Fire Lady Ghost

Thanks to James for submitting these photos.

This photo was taken during a minor bush fire. The photo came out with the fire forming a lady ghost. The scariest thing is that, this lady “ghost” doesn’t shown in the negative film.






Story 2

Mermaid


Thanks to Lee Hong for sharing the photos below.

Photos purportedly show the carcass of a dead mermaid found washed up on a beach in the Philippines. The local fishermen found it on shore.


Story 3

April 28th, 2008

Angel Captured at St Peter’s Basilica

When retired policeman Andy Key went on a trip to Rome, he was struck by the beauty of sunlight streaming through a window in the Vatican. As the Pope made an address nearby, he decided to capture the stunning image on his camera.

But it was only when Mr Key, 48, and his wife Susan, 44, returned home and and downloaded their photographs that they noticed a strange apparition in the picture. They were amazed to see what looked like the image of a guardian angel above the heads of other visitors to St Peter’s Basilica.

Professional photographers have studied Mr Key’s photo and are at a loss to explain what may have caused the image.


Story 4

Dead Children’s Playground

Huntsville, Alabama
By Robin Wright

Founded in 1822 and reaching over one hundred acres of land, Maple Hill Cemetery is the oldest and largest cemetery in Alabama. Within the cemetery limits, tucked away in a peaceful cove surrounded by a rock cliff on three sides and picturesque paths leading through the woods, is the Dead Children’s Playground. Admittedly beautiful during the day, when dusk falls, the atmosphere changes into something quite sinister.

Some say that the spirits of the dead children come to the playground to play. Another legend has it that Huntsville suffered a rash of child abductions in the 1960’s, and sadly, the bodies of the children were found in the area of the playground. Since that time, there have been reports of swings moving on their own, children calling out, giggling, and when photos are taken, orbs of light believed to be the spirits of the children are captured. Much of this phenomenon occurs between 10 p.m. and 3 a.m., far too late for any live child to be out playing.

The most eerie of reports is the common occurrence of swings moving rhythmically and in sync by themselves, even when the swings have just been brought to a complete stop. Some have seen dust from the sand that covers the area rise as if someone had jumped off a swing. Others who have taken photographs see circles of light show up on their photos, some of which are the same height as a child.

In fall of 2007, the City of Huntsville tried to take the playground over in order to further increase the area of the cemetery for graves and tombs. This was done literally overnight, one morning the playground was there and the next day all of the equipment was torn away and the area destroyed. The public outcry that resulted caused the City to pull the work order for the cemetery and new playground equipment was installed. This disturbance has not stopped the mysterious occurrences at the playground, however.

In January of 2008, The Alabama Paranormal Society investigated the area known locally as DCP. One of the investigators heard a voice of either a woman or female child. She quickly snapped a photo of the area and when it was developed, a misty figure of a woman can be made out. Many of the photos taken that night are littered with orbs.

Thanks to the citizens of Huntsville Alabama, children, dead and alive, will still have a place to play in Maple Hill Cemetery.

Comments

Rachel says:

October 17, 2008, 11:25 pm

Ok I have friends who have went to the playground and were gonna take pictures but there camera didnt work right i mean it would turn on and show a black screen but it wouldnt take pictures. I also have friend who left the playground and the next day had mysterios bruises on them

Teresa Cantrell says:

October 24, 2008, 2:27 pm

For the past several years we have investigated several haunted places,with this “Dead Childrens Playground” being the best! I have many pics with orbs and when you zoom the pics in,you can see they are actual children.there was one photo I took as the swings started to move to and fro by theirselves.My brother sat in one of the swings and I took a photo of him and there were 3 orbs around him, one which looked like a child kneeling to pray and the other was in somewhat the “casper”.On the next photo,there was a face of a little girl her hair laying over her shoulder looking as if she appeared just for the photo. The 1st time I went to DCP… I was recovering from back surgery and wasnt able to run with the rest of our group,so I stayed behind and tried to hide in the darkness to wait on them and I heard what sounded like giggling.and whispering..it kinda spooked me in a way that made me want to go back. so now we have made it a pact to go every year and it just gets better. anyone who has never been…I encourage you deeply to go. we have developed a paranormal group that we now call S.K.I.D.M.A.R.K.S. comical yes…but there is meaning behind it.Thanks for taking time to read this and Happy Haunting

Followers