Labs

Lab 10.1: Let's Get Virtual

Being “connected” isn’t all good. There are many potential down-sides to participating in a virtual community of users who, if they know what they are doing and are so inclined, can easily gain access to information on your computer. Software that protects your computer from potential “attacks,” like anti-virus software, has been available for some time now. Other, more powerful forms of protection, like firewalls, that were once reserved for larger computer installations, are now becoming commonplace on personal computers that are exposed to the WWW and the internet.

  1. Do some "investigative surfing" and locate 5 different web sites that offer support for what you would regard as hacking activities. For each site you find, list its URL, the type of information provided (does it provide code that can be run, hacking-related news, links to similar sites, etc.), and the use to which this information could be put.
  2. Conduct the same type of investigation, this time looking for sites that offer some form of protection from hacking activities. Again, list each site's URL, describe the services offered, and explain how the product(s) could be put to use by the average web surfer.

Labs

MODULES:



© 2004 Thomson/Brooks Cole, All Rights Reserved.