Академический Документы
Профессиональный Документы
Культура Документы
Krebs
Introduction to the
Internet
© 2001 – 2002 Universiteit Maastricht.
All rights reserved. No part of this publication may be reproduced, in any
form or by any means, without prior, written permission from the publisher.
PICTURE CREDITS
Section cover background: size-isnt-everything.co.uk
TYPEFACES
Headlines are set in TheSansCorrespondence © TheTypes b.v., Lucas de
Groot. Function calls are set in Arial Narrow © The Monotype Corporation
plc. Image components and Google Output are labeled in Arial © The
Monotype Corporation plc. Body text and side notes are set in Times New
Roman © The Monotype Corporation plc. Keys are set in RatCaps 3D PC
and RatKeys 3D PC © Quadrat Communications, David Vereschagin. Email
quotes are set in Courier New © The Monotype Corporation plc.
TRADEMARKS
Product names, logos, designs, titles, words or phrases mentioned in this
publication may be trademarks, service marks, or trade names of companies
or other entities and may be registered in certain jurisdictions or
internationally.
DISCLAIMER
WE HAVE USED EXCEPTIONAL CARE IN PREPARING THIS BOOK.
NONETHELESS, PUBLISHER AND AUTHOR MAKE NO CLAIMS OR
WARRANTIES WITH RESPECT TO THE ACCURACY OR
COMPLETENESS OF THE BOOK AND SPECIFICALLY DISCLAIM
ANY WARRANTIES REGARDING THE USEFULNESS FOR A
PARTICULAR PURPOSE. THERE ARE NO WARRANTIES EXCEPT
THOSE GRANTED HERE. THE ADVICE GIVEN IN THIS
PUBLICATION IS NOT GUARANTEED TO PRODUCE ANY
PARTICULAR RESULTS AND MAY NOT BE SUITABLE FOR EVERY
INDIVIDUAL OR UNDER PARTICULAR CIRCUMSTANCES.
NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE
FOR ANY LOSS OF PROFIT OR ANY OTHER COMMERCIAL
DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL,
INCIDENTAL, CONSEQUENTIAL OR OTHER DAMAGES.
ACKNOWLEDGEMENTS
I would like to thank the following for their continued support:
Dirk Tempelaar. The computer whiz kids at ACO and ICTS. Andreas van
Rienen and Carsten Sturmann. Christiane Arndt.
FEEDBACK
We are happy to hear from you. You can contact the author directly at
l.krebs@ke.unimaas.nl.
Maastricht University
P.O. Box 616
6200 MD Maastricht
Netherlands
CONTENTS
A. GENERAL TOPICS
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
1. Introduction 3
2. Getting Hooked Up 9
C. EMAIL
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
APPENDIX
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
A. Useful Websites 59
Image: size-isnt-everything.co.uk
GENERAL TOPICS
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
1. INTRODUCTION
The Internet ranks highly among the most important inventions of the
last century. While initially a military network designed to withstand a
nuclear war, it was soon championed by American academics. With the
debut of the World Wide Web in 1991, the Internet has found its way
into the common household. Today, the Internet is quickly becoming as
ubiquitous as the telephone, first and foremost in commercial and
academic settings but also in households.1 The two most commonly used
services are the WWW (‘world wide web’, also known as the web or the
‘world wide wait’) and email.
An Overview
This book is meant as an introduction to the Internet. In the first section,
we will start off with some general remarks and we will help you to
connect your PC to the Internet.
Once you are there, you will want to check out the Web, which is
basically an information retrieval service. Anyone can leave documents
on the Internet for others to see, a feature which has made information
on almost every imaginable subject easily accessible. We will discuss
this feature of the Internet in detail in the second section of this guide.
Finally, we turn to the other big feature of the Internet, electronic mail
(or email). The third section tells you how it works and how you can
send and receive email using Microsoft’s Outlook 2000 program.
Browser However, you will also need some software that tells the computer how
Computer program that allows to access the Internet: a browser that allows you to see the world wide
you to see the world wide web.
web, and an email client that enables you to send and receive email. At
Email Client Maastricht University, we have opted for a combination of Microsoft’s
Computer program used to send Internet Explorer and Outlook 2000.
and receive emails.
1
In a world were 75% of the population does not have a telephone, any remarks regarding the ubiquitousness of the
Internet obviously apply only to the richer countries.
4 Introduction to the Internet
●●●●●●●●●●●●
2
These prices are sharply reduced in comparison to normal retail prices, because Maastricht University (in cooperation
with other Dutch universities) buys large quantities of educational licenses.
General Topics: Introduction 5
●●●●●●●●●●●●
SMR 1 SMR 2
LOCATION Rooms 3.047 – 3.061 Rooms 0.012 – 0.014
NUMBER OF PCS 120 60
OPENING HOURS
Mon – Thu 9 a.m. – 10 p.m. 9 a.m. – 5 p.m.
Fridays 9 a.m. – 5 p.m. 9 a.m. – 5 p.m.
Weekends closed closed
In general, the SMRs should only be used for study related activities,
e.g. downloading and reviewing lecture notes, writing papers, registering
for courses etc. If you want to write personal emails or surf the web for
fun, you are asked to restrict yourself to the early morning (9 – 10 a.m.)
or the evening (after 5 p.m.). Even with these rules in place, the SMRs
tend to get crowded often.
When the SMRs are closed, you can walk over to the library, which
offers a small computer room of its own. Be aware that other faculties
also use this computer room – you may have to wait (possibly a long
time) for a PC to become available. If you know in advance that you
need a PC for a study related reason, you can make a reservation for up
to two hours per day.
THE LIBRARY
ADDRESS Bonnefantenstraat 2
PHONE (043) 388 34 27
WEBSITE www.ub.unimaas.nl
OPENING HOURS
Mon – Thu 8.30 a.m. – 10 p.m.
Fridays 8.30 a.m. – 9 p.m.
Saturdays 10 a.m. – 5 p.m.
Sundays 12 a.m. – 5 p.m.
that you are working with, as Internet Explorer and Outlook. If you feel
that you need further guidance, there are a number of excellent printed
resources. Personally, we find the jargon-free language and useful hints
of the ‘For Dummies’ series to be particularly appealing, but there are
certainly many other useful and well-written computer books out there.
There is also a lot of helpful information on the web, and we will show
you how to find it in chapter 4.
· When you need to enter more than a few characters, we will not
print the individual keys, because that would be space consuming
and hard to read. Instead, we will indicate the text using a special
font, as demonstrated here: ‘enter this’.
If you are stuck using a certain program, the first thing you can try is
pressing the 1 key. Pressing 1 is like asking the computer for help.
In most cases, the appropriate program will then give you additional
information on whatever you are currently doing.
There are, however, cases when your computer does not understand your
problem (because the persons that built the software did not foresee it) or
when your PC is not able to help you (because it is malfunctioning). In
such cases, you may want to check out a helpful website, Tech24
SelfHelp at www.tech24inc.com/help.html. Tech 24 offers self-help
links that are sorted by category (e.g. ‘Internet’, ‘Email’, ‘Outlook’).
They also offer live support from certified technicians.
You can also try contacting the producer directly. If you have trouble
with Outlook, Outlook Express or the Internet Explorer, you might want
to visit www.microsoft.com to see if they know the answer to your
question. However, some producers do not offer a lot of support or
charge money for it.
Another option is to call or email the computer whiz kids at the ICT
service center of our university. They offer support for the software used
throughout the university, which includes among others Windows,
Microsoft Office, Internet Explorer, and the McAfee virus scanner. (See
the info box on p. 4 for their contact information.)
Finally, befriending a geek may be the best solution. Geeks are by nature
friendly, helpful and extremely well versed in all things computer. If you
can count one of them as your friend, he (or in rare cases she) probably
won’t mind dropping by and helping you out when you are having
trouble with your PC. An invitation to dinner or to the movies in return
won’t hurt either.
Modem To connect to such an ISP over the telephone network, you need a
A modem is a device that regular telephone connection and a modem. The vast majority of
translates the electrical signals
from your computer into audible
computers sold today already comes with a modem installed, so we will
sounds so they can be skip the physical installation procedure. If you do not own a modem, you
transmitted over a telephone line. can buy one from a local electronics or computer store. Please consult
This process is known as your modem’s manual for installation advice.
modulation. It also translates the
incoming sounds into electrical
signals for your computer;
You also need the phone number of the ISP (the so-called ‘dial-up
demodulation in computer-lingo.number’) and a name and password to identify you. The latter is
The term modem is simply an necessary because most ISPs either charge a certain fee or restrict access
abbreviation of to a certain group of people. Our university belongs to the second group:
modulator/demodulator. you do not pay anything to use the ISP of our university, but they want
Dial-up connection
to make sure that only our own students and staff can use the network.
A connection between computers By the way, you still pay for the telephone connection to the ISP, which
that is established over a is usually a local call.
telephone line.
In the first step, enter a name for the Internet connection. This would
usually be the name of the ISP, such as ‘Maastricht University’ or
‘Enertel’ if you live in the Netherlands. (More info in the region-specific
sections below.)
In the same step, you will need to select the device that you want to use
for the connection. If your modem is properly installed, it will be
automatically selected and you will not need to do anything.
In the second step, you will need to enter the area code and telephone
number of the ISP. If you live in the Netherlands, then the area code is
‘06760’ and the telephone number is ‘88029’. Finally, select the country
you are currently residing in for the country code.
The third step only confirms what you have entered. That’s it, you are
done.
You will now see a new icon in the dial-up networking window with the
name you have given your Internet connection. Double-click on it to test
whether the Internet connection works. A window will appear to ask you
for your username and password.
Both depend on the ISP you are using and can vary a great deal. Please
see the region-specific section below for further details. If you are the
only one using your PC or if you trust the other persons in your
household, you can tick ‘save password’. If you don’t, you will have to
enter your password every time you want to connect to the Internet, but
you keep anyone else from using the Internet on your account. Finally,
quickly check whether the phone number displayed in the window is
correct.
If you are in the Netherlands, it should say ‘06760 88029’. Once you are
done, click on ‘Connect’.
Hopefully, everything went well the first time. In that case, Windows
This icon indicates an active will let you know that it has successfully established an Internet
Internet connection. connection, and it will add an icon for the connection to your system
tray. As long as this icon is present in the tray, you are connected to the
Internet.
Just to remind you: the Internet connection we have just set up works
like a normal phone call and you are paying some sort of telephone fee
for it. 3 Because you are paying for the connection, you should only keep
it active as long as you need it. To disconnect from the Internet, right-
click on the icon in the system tray and select ‘disconnect’.
You will also need a user name and password to identify yourself when
dialing in. Your user name is of the format Ixxxxxx@student.unimaas.nl,
where ‘xxxxxx’ represents your six-digit ID number. So if your ID
number happens to be 1234, your username would be
3
The actual fee depends on where you live and which ISP you use. Usually, the charge should be equal to or less than the
normal rate for a local telephone call
12 Introduction to the Internet
●●●●●●●●●●●●
Obviously, there are other ISPs in the Netherlands that offer the same
Intranet service. Unfortunately, some of the services of our faculty require that
A network that functions like the
Internet, but that is accessible
you are directly connected to their network. Geeks say that this
only to authorized persons that information is not available on the Internet, but on the Intranet. To use
are directly connected to it. these services, you need to use Enertel or a PC in the SMR.
The second option is to use another provider. There are quite a number
of ISPs available that you can reach throughout Belgium at the cost of a
local phone call (or less). However, the quality of each provider is
difficult to gauge and their service changes over time. It is therefore best
if you take the time to sign up with several ISPs. In all cases, signing up
is free and if you have trouble reaching a particular provider, you can
always use another one. Each provider will tell you which phone
number, user name and password to use once you have signed up.
Below, we list some of the most popular ISPs in Belgium, together with
their WWW address. Please be aware that the telephone charges can
differ between the providers. For the most recent information, see their
websites.
Intranet Note: unfortunately, some of the services of our faculty require that you
A network that functions like the are directly connected to their network. Geeks say that this information
Internet, but that is accessible
only to authorized persons that
is not available on the Internet, but on the Intranet. To use these
are directly connected to it. services, you will need to use a PC in the SMR.
General Topics: Getting Hooked Up 13
●●●●●●●●●●●●
Least-Cost Router Probably the best solution is to download the Web.de SmartSurfer. This
A tool that automatically program is a so-called least-cost router: it finds the cheapest ISP that is
connects you to the least
expensive service currently
currently available and connects you to it. To install SmartSurfer, visit
available. www.web.de, click on ‘SmartSurfer’ and download the program.4 You
can then install this program on your computer at home.
Intranet Note: unfortunately, some of the services of our faculty require that you
A network that functions like the are directly connected to their network. Geeks say that this information
Internet, but that is accessible
only to authorized persons that
is not available on the Internet, but on the Intranet. To use these
are directly connected to it. services, you will need to use a PC in the SMR.
4
The program is small enough to fit on a floppy disk, so you can easily download it elsewhere and transfer it to your PC.
5
For the geeks, the guaranteed minimum speed is 256 kpbs, four times the speed of an ISDN line.
6
Nutsbedrijven Maastricht offers a network card for 24 € (80 € for laptops) and will install the card for you on the day the
connection is set up.
14 Introduction to the Internet
●●●●●●●●●●●●
For additional information, please visit the following web site. In order
to sign up, you must be connected directly to the university network,
either by using a PC in the SMR or by dialing in through Enertel as
described under “Connecting over the telephone network: Students
living in the Netherlands”.
„ http://www.ica.unimaas.nl/projecten/campus/campus.html
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
Image: size-isnt-everything.co.uk
Obviously, links can be used for more than just the explanation of terms,
and over the last years, people have come up with a variety of interesting
uses. In this chapter, we will learn how to use a browser to read
Browser
information on the Internet, discuss what an address on the Internet
Computer program that allows
you to see the world wide web. looks like, and discover how you can navigate the Internet using
addresses and links. We will also see how we can keep track of the
addresses of interesting pages and finally talk about the necessities for
experiencing multimedia content on the net.
Using a browser
To retrieve information from the Internet and to display it on the screen,
your computer needs one essential piece of software, a browser. The
most popular browser to date is Microsoft’s Internet Explorer7 (a.k.a. IE,
or simply Explorer). Internet Explorer is available for free and it is
already installed on most Windows PCs, so you do not need to worry
about buying or installing the software.
7
The three main competitors of Microsoft’s Internet Explorer are Netscape’s Navigator, which was the industry standard
during the early years of the WWW, Mozilla Organization’s Mozilla, a direct offspring of Navigator, and Opera Software’s
Opera. However, by now the majority of netizens uses Internet Explorer. Since there are (in some cases substantial)
differences between the products, we will stick to Microsoft’s product. If you want to learn more about the competitors,
visit home.netscape.com, www.mozilla.org and www.opera.com.
18 Introduction to the Internet
●●●●●●●●●●●●
· Below that is the address bar, which tells you where you
currently are. It also allows you to send Explorer to different
locations by entering their address.
· Next is the most prominent area, which in our case is blank. This
is where the actual Internet content will be displayed.
· Finally, there is a status bar that tells you what IE is doing at the
moment.
The World Wide Web: Using the WWW 19
●●●●●●●●●●●●
The first part to the right (‘nl’) is also called the top-level domain. There
are two different types of top-level domains: a) top-level domains for
categories, and b) top-level domains for countries. The former consist of
· .com – originally meant for commercial operations, but now used
by almost everyone
· .net – originally meant for telecom network operators, but this
distinction is moot
· .org – for non-profit organizations
· .mil –for (American) military units
· .edu – for American educational institutions
Very recently, a whole new array of new domains has been added
because sensible names were becoming scarce. Among the new domains
are e.g. .info and .biz.
New Zealand and so forth.8 Some countries were pretty fortunate when
they got their domains, such as Tuvalu, a tiny island nation in the south
pacific that sold its .tv domain name to an American business that
promotes TV shows.9 Also, in some cases domain names are given to
non-state actors. Palestinians obtained the domain .ps and the European
Union is currently trying to get their hands on .eu.
Luckily, you will not need to remember all this when you surf the web.
First of all, the first part can be discarded when it says ‘http://’. If you
enter ‘www.unimaas.nl’ instead of ‘http://www.unimaas.nl’, your
computer will add the ‘http://’ for you. Also, if the address ends with
‘index.htm’ or ‘index.html’, you usually can discard that, too. You will
need to enter the beginning and end only if they differ from these values.
This way, our original address shrinks to www.fdewb.unimaas.nl/ke.
At this point, we feel that we need to remind you that computers are
‘stupid’: they do what you tell them. This means that you will have to
make sure you enter the address correctly. If just one letter or number is
wrong, the computer will not be able to find the page you are looking
for.
8
There is a domain for the U.S.A., .us, but it is almost never used.
9
They can use the money: if global warming does happen, Tuvalu will be among the first island nations to be submerged
by the rising oceans. The government is currently trying to buy land in Fiji and New Zealand for their inhabitants.
The World Wide Web: Using the WWW 21
●●●●●●●●●●●●
However, this is not the only thing that can go wrong. Sometimes, the
remote computer to which you are surfing has been disconnected for
some reason. There may be a power failure, or its line to the Internet was
severed, or something else has gone wrong. Alternatively, someone may
have deleted the page from that particular computer. In the former case,
you can still hope to get your information when the computer has been
reconnected to the net. In the latter case, your only hope is to find the
same document elsewhere.
Does this all sound really complicated? Well, don’t worry: in most cases
you will not have to enter an address; instead you will be using links. We
talked about them before: they make navigating the net very easy. Most
commonly, a link will be a word or phrase, and when you click on it, it
will most likely take you directly to another page. This saves you from
actually entering the address of the next page.
However, some web pages prefer to give their links another appearance
so that they are more pleasing to the eye. In the vast majority of the
cases, you will be able to intuitively recognize the links on a page. It
may be a bit more difficult with pictures. Almost always, clickable
pictures will look just like ordinary pictures. However, there is another
Your mouse pointer turns into a telltale sign which indicates that you have found a link: your mouse
hand when it is above a link. pointer changes its shape so that it looks like a hand.
22 Introduction to the Internet
●●●●●●●●●●●●
This will take you to Yahoo!, a famous directory of web sites. Here,
millions of pages on the WWW are sorted according to their category. If
you e.g. want to find out about a country, you would go to Yahoo, click
on ‘countries’ under the category ‘regional’, then select the country you
are interested in and take it from there.
Useful buttons
Internet Explorer has a number of functions to help you navigate the
Internet:
The ‘back’ and ‘forward’ button let you revisit pages that you just left.
The ‘back’ and ‘forward’ Let’s say you read an interesting article a couple of minutes ago, and you
buttons. want to go back to it to write down some information. You do not need
to remember the address; you can use the ‘back’ button to
chronologically revisit all the sites that you have just visited. You can
then use the ‘forward’ button to go back to the page that you are
currently reading.11
10
If you are reading the electronic version of this document, you can simply click on the blue, underlined link. This will
accomplish all three steps for you without the need to lift another finger.
11
This will not work for sites that rely on your interaction. You will see an appropriate error message in such cases.
The World Wide Web: Using the WWW 23
●●●●●●●●●●●●
In some cases, your computer may be a bit eager to open the file. This is
frequently the case with Microsoft Office files, such as Word documents
or Excel spreadsheets. For these files, simply clicking on their link will
not allow you to save the file. Instead, you need to right-click on the
link. A small menu will appear that features a ‘Save target as’ option.
Fortunately, there is a better way: you can bookmark the page. To do so,
go to the page that you want to bookmark and use your mouse to click
‘Favorites’ „ ‘Add to
favorites…’
on ‘Favorites’ „‘Add to favorites’ on the menu bar. You will then have
the opportunity to enter a description for the page. Once you click ‘ok’,
Internet Explorer will save both your description and the address of your
web page for future reference.
There is only one caveat: because bookmarks are stored locally on the
PC that you are working on, you will only be able to use them reliably
on your own PC at home. If you create bookmarks on a PC in the SMR,
you would need to return to the same computer to retrieve them – and
even that does not guarantee success as all information on SMR PCs is
regularly deleted.
24 Introduction to the Internet
●●●●●●●●●●●●
If you recognize the page you want, you do not need to type the whole
c + H address: once the page shows up in the list, click on its name.
If you no longer remember the address, but do remember the day you
saw the page, you can still find the page. Click on the ‘history’ button on
the toolbar, select the day you last visited that page, and Internet
Explorer will give you a complete list of all pages you saw that day.
Below, we provide you with a list of plug-ins that you can install from
the Internet for free. While the majority of web pages does not require
any of these goodies to be installed, it is usually the most entertaining
and informative websites that rely on them. If you want to do some
serious surfing on the net, be sure to install all of the following.
By the way, do not get your hopes up with regard to the quality of
Internet audio and video, especially if you connect to the Internet over a
phone line. Usually, the video that you will see will be small, rather
fuzzy and may sometimes look like a series of individual photos instead
of a real movie.
WinZip
Downloads over the Internet take time – the larger the file, the longer
you will have to wait. Fortunately, it is possible to reduce the most file’s
size for their journey over the Internet. The leading software that allows
you to compress files before sending them and uncompress files after
receiving them is WinZip. You can download it here:
„ www.winzip.com/download.htm
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
COMING UP
In this chapter, we discuss two
ways of locating information on
4. FINDING INFORMATION ON
the web: directories and search
engines. THE WEB
The most obvious advantage of the Internet is that it contains so much
useful information. The two most obvious disadvantages are that it
contains even more useless information and that it is tricky to get at the
good stuff. If you ever hope to find anything on the Internet, you need to
know how to search for information efficiently.
To find something on the net, you can make use of two different types of
services: directories and search engines.
Directories
A directory works like the Yellow Pages: you browse through the
directory to find the category you are looking for. The directory will then
give you a listing of web sites with related information.
INTERNET DIRECTORIES
Yahoo! www.yahoo.com
About.com www.about.com
Google Directory directory.google.com
Open Directory Project dmoz.org
Digital Librarian www.digital-librarian.com
NL-Menu www.nl-menu.nl
12
There are several equally valid ways to get the information because several paths can lead to the same results.
28 Introduction to the Internet
●●●●●●●●●●●●
Search Engines
There is a huge amount of Information on the WWW, which puts the
directories at a disadvantage: to categorize a web page, someone
working for Yahoo! or any of the other directories must actually go to
the page, read it and classify it. This is a gargantuan task and it is not
possible to cover more than a miniscule part of the web. Search engines
are better off: a search engine simply stores and indexes the content of
each web page that it finds. You can then go to the search engine and
type in the term that you look for. The leading search engine is Google.
There is competition, but using Google has one huge advantage: Google
uses a patented technique that ranks pages according to their popularity
on the WWW. In its search results, popular pages will be listed first,
which makes their search results more useful. By now, Google provides
its search engine to a number of other companies, among them Yahoo!
Because Google is by far the most useful search engine, we will focus on
it. Once you know how to work with Google, you should have no
problems using any of the other search engines, although their results
will be structured differently.
Google www.google.com
Teoma www.teoma.com
AltaVista www.altavista.com
Lycos www.lycos.com
WebCrawler www.webcrawler.com
HotBot www.hotbot.com
FAST www.alltheweb.com
Continuing our example from above, let’s assume that you are looking
for a cheap place to stay in Toulon or its surroundings. To find such
information, you would surf to www.google.com and enter an
appropriate expression in the text field.
No. of
Query results Comments
lodging Toulon 2,310 Yields mostly hotels, not hostels
backpackers Toulon 11 Yields mostly travel reports, not
hostels
hostel Toulon 21 Yields mostly travel reports, not
surrounding hostels
youth hostel cote d'azur 201 Highly effective, yields a number of
accommodations in the area
bed and breakfast 5,780 Yields hostels, but surprisingly not in
southeast France France but in the US and Great
Britain
auberge de jeunesse 152 Highly effective, yields youth hostels
Toulon in a number of cities called Toulon
auberge de jeunesse cote 234 Highly effective for youth hostels in
d'azur the whole area, including hostels in
Toulon
As you can see, the difference in results can be quite big. Sometimes, the
results are clearly not what you are looking for. E.g. ‘backpackers
Toulon’ yields only a handful of web pages, and all of them are pretty
much useless for our purposes. ‘Lodging Toulon’ on the other hand
yields a large number of pages, and a youth hostel is not among the first
ones. It might be among the later entries, but who has the time to check
all 5,780 of them? In both cases, you would need to run a new search. In
the first case, you simply need to rephrase your search, while in the
second case you would have to narrow the results.
Google tells you several things. Directly under the header, it tells you
that “"de" is a very common word and was not included in your search”.
This will happen with any words that show up on almost all pages, such
as articles (‘a’, ‘an’, ‘the’), conjunctions (‘and’, ‘or’) and some of the
more common prepositions (such as ‘of’); this is obviously valid for all
major Internet languages. Try searching for ‘het’ or ‘und’ and you will
have plenty to read.13
Google then repeats what you wanted to search for: “Searched the web
for auberge de jeunesse Toulon”. Note that some of the words are links,
clicking on them will yield a dictionary definition of the word.
Google also tells you how many pages it found and which of them are
currently on your screen: “Results 1 - 10 of about 152.” Obviously,
Google will always show you the most relevant results first, but after
you have clicked on ‘next’ (page) for a couple of times, it may be useful
to know if you are looking at results 41-50 or 71-80. Also, the total
results may be a bit imprecise. Google usually tries to get the first three
digits right and replaces the rest with zeros.
The blue part is the title of the page, clicking on it will take you to that
page.
What follows is a short excerpt from the page to show you where your
search terms were found. The words you were looking for are printed
boldface. Sometimes it is hard to make sense of the excerpt because it is
limited to only two lines. But in our case we can fathom that this
probably is not what we were looking for: it does not look like the
description of a youth hostel. Instead of going to the page, we would
check out some of the other results.
Finally, there are two more options. If you tried to visit the page, but you
cannot get to the page (e.g. because it was deleted or because the server
is too slow), you can click on ‘cached’. ‘Cached’ means that Google has
kept a copy of the page from its last visit in its archive, the cache.
Clicking on ‘cached’ will then get you the (possibly outdated) copy from
13
For the curious: the former yields ca. 18,300,000 while the latter yields approximately 93,100,000 results.
The World Wide Web: Finding Information on the Web 31
●●●●●●●●●●●●
Google’s archive instead of the real page. The other option (‘similar
pages’) does exactly what it says. If that page was exactly what you were
looking for and you want more results like this, click on ‘similar pages’.
Now, if you are not entirely satisfied with the results of your search, you
may want to refine your search a bit. Here are a few tricks:
· By default, Google looks for each word individually. E.g. if you
search for ‘youth hostel’, it may find a document that says
‘youth’ somewhere and ‘hostel’ somewhere else. If you want to
force Google to look for ‘youth hostel’, but not for ‘youth’ and
‘hostel’ separately, enclose your search term in quotation marks:
"youth hostel".
Finally, if you are planning on doing some serious research using the
Internet, you might want to check out the following (free) tools.
Copernic 2001
This handy little tool checks 80 different search engines simultaneously,
saving you a lot of time and effort. Duplicate results are removed and
results are ranked according to relevance.
„ http://www.copernic.com/products/copernic/basic/
32 Introduction to the Internet
●●●●●●●●●●●●
Cogitum Co-Citer
If you plan to use information from the Internet for a paper or essay, you
will need to provide accurate references. With this tool, you can keep
track of all the pages that you think are interesting and archive their
exact content, address, comments etc.
„ www.cogitum.com/co-tracker-text/
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
COMING UP
This chapter briefly discusses
three common security risks:
5. SECURITY ON THE INTERNET
loopholes in the security of your
browser, viruses and deliberate Security on the Internet is a big issue. A number of people have found
cracking attempts. Unsafe clever ways to damage or destroy data on your computer, of spying on
behavior is also discussed. you while you surf the net, and of committing various other forms of
Novices should familiarize
themselves with these issues. mischief. First, we discuss three common security problems: loopholes
in your browser, viruses and targeted intrusion attempts. We then discuss
‘unsafe’ behavior both at home and when using public Internet access.
Browser loopholes
ActiveX
ActiveX components are basically programs for Microsoft Windows
PCs. They are more dangerous than e.g. JavaScript components because
they have a lot of rights: an ActiveX program could theoretically erase
your entire hard disk. To achieve at least a certain level of security, set
Internet Explorer to give you a warning when ActiveX components are
activated. This way, you can choose whether to stop the process or not.
Usually, sites will warn you if they use an ActiveX component, and they
will tell you what it is used for. If you encounter an ActiveX component
unexpectedly or if you do not trust the site, you should not run the
component.
Cookies
Cookies are small bits of information saved on your computer to identify
you. Usually, when you visit a website you are more or less anonymous
– there is no easy or cheap alternative for the other side to find out who
you are (unless of course you tell them). But using cookies, they have
the opportunity to save an identifying number on your computer. When
you visit the website again, the other side still does not know who you
are, but they do know that you have been there already and they may still
know what you did when you visited the last time. E.g. if you go to an
online bookstore, they may use a cookie and keep track of the books that
you apparently find interesting. The next time you drop by, they know a
little bit about your taste and may be able to give you better advice.
Some, however, do not like the idea that companies are “tracking their
34 Introduction to the Internet
●●●●●●●●●●●●
every move”. You can direct Internet Explorer not to use cookies (see
below), but some websites depend on them and will not work if you
switch them off.
There are four default levels: high, medium, medium-low, and low. (If
you cannot see the slider, click on the ‘default level’ button.) The latter
two settings are not recommended under any circumstances; they are
meant for web sites that you absolutely trust. You should go either for
the medium or high security settings. When choosing your level of
security, you need to balance security and functionality: at higher
security settings, you will be able to enjoy less interactive features. The
medium setting probably offers the best tradeoff. You will still be able to
enjoy most of the sites, but you will be asked for permission when any
hazardous content is encountered, and ActiveX controls that have not
been reviewed by a certified authority will not be executed. The high-
security setting is usually only necessary when you are on a website
which you expect to have harmful content.
Viruses
Unfortunately, there are more hazards on the Internet. Among them are
viruses, which you probably know from the newspapers. Viruses are
computer programs that do harm to the data and programs on your
computer or abuse your PC in some other way. A typical virus might e.g.
delete your hard disk, causing you to lose all you documents and forcing
you to reinstall all software on your computer. Obviously, no one would
let a virus on his or her computer willingly, so they try to “sneak in”, e.g.
by hiding in other, useful computer programs. Particularly when you are
downloading data from the Internet, there is no way of knowing whether
the programs you are receiving are not possibly infected. So it is crucial
that do not simply start or open them once you have finished the
download. Instead, you need to check them for viruses.
The World Wide Web: Security on the Internet 35
●●●●●●●●●●●●
Probably the best firewall available can be obtained for free from
Zonelabs. You can download it here:
„ www.zonelabs.com/products/za/
Beyond that, the largest risk comes from more mundane sources: simple
spying. Be aware that people may be reading what you are typing on the
screen. If you want to enter information that you would not want to be
publicly known, you should not use public computers. This holds
especially for information that is easily abused, such as credit card
numbers and the like.
Be aware that some forms of encryption are less safe than others, e.g. if
they use a rather simple code. You can check what kind of code your
Internet Explorer uses by clicking on ‘Help’ in the menu bar and then on
‘About Internet Explorer’.
The World Wide Web: Security on the Internet 37
●●●●●●●●●●●●
Internet Explorer will reveal the strength of the cipher used in the
encoding process in the window that appears. This value should be no
less than 128 bit, a reasonably safe value at the time this manual was
published (July 2002). If it is less than 128 bit, click on the ‘update
information’ link.
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
Image: size-isnt-everything.co.uk
EMAIL
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
COMING UP
In this chapter, we will help you
set up your PC at home to send
6. SETTING UP YOUR EMAIL
and receive emails. If you do not
own a PC or if you do not intend
to use it for email, you can skip
ACCOUNT
this chapter.
Long before the WWW existed, people were already sending each other
electronic mails, or emails, over the Internet. Besides the world wide
web, email is the most useful service on the net. In some ways, it is
similar to the normal postal service, with the important difference that it
is much faster and decidedly cheaper.
In the following, we will first describe how you can enable your
computer to send and receive email. This chapter is only relevant for you
if you want to use your own computer at home to send emails.
Otherwise, you can skip ahead to the next chapter.
The analogy does not end here: every time you feel like it, you can ‘drop
by’ your mail account to see if you have new mail, and while you are
there you can also mail the letters that you have written. Most of this is
completely automated: you only need to tell your computer once where
he can find your mail account and where he is supposed to post the
emails you have written.
reduced price from the ICT service center. If you do not want to spend
money on software, you can use Microsoft Outlook Express, the tiny
brother of Microsoft Outlook. Outlook Express is available for free and
is automatically installed with any recent version of Microsoft Internet
Explorer – the overwhelming majority of PCs will already have a copy.
And while Outlook Express lacks most of the advanced functions that
come with Outlook, all general functions are pretty similar. Pretty much
everything that we are about to say about Outlook is also valid for
Outlook Express.
Outlook will then guide you through the process of connecting to your
mail account. In the first step, you need to enter your own name.
When you send someone an email, he or she will see the name that you
enter here. In the second step, you need to type in your email address.
Your exact email address will be included in the letter that contains your
student ID card. Be sure to enter it exactly as it appears on this letter.
People that want to reply to your emails will automatically use this
address; they will not be able to reach you if it is incorrect.
Once you are done with your personal details, you need to tell Outlook
where to fetch your incoming mail, and where to post your outgoing
messages. This is done in the third step. The first question is what type
of server you are using: you will be using an IMAP server, not a POP
server.
The address for the incoming mail is mail012.unimaas.nl, the address for
outgoing mail is mail001.unimaas.nl.
In the fourth step, Outlook wants to know your username and password.
Email: Setting Up Your Email Account 43
●●●●●●●●●●●●
Both are included in the letter that accompanies your student ID card.
Keep your password safe to avoid abuse. If you are fairly confident that
no one will abuse your PC, tick ‘Remember password’. If you do this,
Outlook will be able to automatically collect your mail.
In the final step, you need to tell Outlook how you are connecting to the
Internet. If you use a modem and a phone line, choose ‘connect using my
phone line’; if you use a cable modem, choose ‘connect using my local
area network (LAN)’.
To send your first email, click on the ‘new email’ button in the toolbar,
c + N or select ‘File’, ‘New’, ‘Mail message’ from the menu bar. If you are too
‘File’ „ ‘New’ „ ‘Mail lazy to use the mouse, you can also press c + N. A new window will
message’ open to receive your input. Besides the obligatory toolbar, it features
Creates a new message. three fields plus a large area for writing your message.
‘To:’, the first field, is supposed to contain the address of the recipient.
For now, we assume that you know his email address. Email addresses
always have the same form:
j.smeets@ke.unimaas.nl
You will already be familiar with the latter part, ke.unimaas.nl, from
chapter 3. It is some computer on the Internet. The former part then
identifies the person you are contacting. The @ is pronounced ‘at’. To
@ translate this computer shorthand: you are writing to J. Smeets at the
is used and pronounced like the department of Quantitative Economics (Kwantitatieve Economie = KE),
word ‘at’. University of Maastricht, the Netherlands. It is crucial that you get the
email address right. Computers are not as smart as mailmen: if the
address is not exactly correct, the computer will simply return your mail
with ‘undeliverable’ stamped all over it.
‘someguy@somewhere.com’, instead of
‘some guy@somewhere.com’.
· You will always find at least two bits of information after the @,
and they are separated by a dot. ‘j.smeets@unimaas.nl’ may be a
valid address, but ‘j.smeets@unimaas’, ‘j.smeets@nl’ and
‘j.smeets@unimaas_nl’ are not.
We will defer discussion of the ‘cc’-line for later and directly turn to the
‘subject’-line. In emails, just like in business letters, it is custom to
inform the recipient of the subject of the message before going into
detail. But this line is much more important when writing emails than
when writing letters: when the recipient gets your email, the only thing
he will see at first will be your name, the subject of your email and when
you wrote it. Based on this information, he will decide whether to open it
immediately, read it later or even delete it unread. If you want your
message to be treated well, make up a sensible subject-line.
The actual email goes into the big white space that covers most of the
window. Once you are done writing your mail, clicking on the ‘send’
button will, well, send the email. Actually, it will send the email if you
are connected to the Internet. If not, the email will be placed in the
outbox, where it will stay peacefully until you are hooked up to the net
again.
CC (Carbon Copy) Alternatively, you can enter some of the addresses in the ‘cc’-line.
Persons in this field get a copy of Technically, it does not make a difference where you put the addresses.
the email, but are not the actual
addressees of an email.
The two lines are mainly used to differentiate between persons to whom
the email is addressed and any other persons that receive a copy for their
information only. So if you want to write an email to your tutor to
complain about unfair grading and you want your classmates to have a
copy, you would put your tutor’s address in the ‘to’-line and your
classmates’ addresses in the ‘cc’-line.
Email: Sending & Receiving Emails 47
●●●●●●●●●●●●
BCC (Blind Carbon Copy) What most probably is not in your window is the ‘bcc’-line. You can get
In function just like the CC-field, it by selecting ‘View’ in your email window, and then clicking on ‘BCC
but the addresses listed here will
not be visible in the email.
Field’. The ‘bcc’-line has a special function: it creates blind copies.
People in this line will receive a copy, but their addresses will show up
‘View’ „ ‘BCC field’ nowhere. In our previous example: if you put the tutor’s address in the
‘to’-line and your classmates’ addresses in the ‘bcc’-line, then your tutor
will never know that everyone else in the group got a copy. To him, it
will look as if he was the only recipient. Sneaky!
However, you should not rely on this tool too much: some email
applications do not display this information on the screen, or they
display it in such a way that the recipient may not see or recognize it. If
you feel that the information you are sending is confidential, you may
want to take other precautions as well.
Another option allows you to time the delivery of messages. You may
e.g. prepare a birthday email to a friend and ask the computer not to mail
it before the actual birth date.
48 Introduction to the Internet
●●●●●●●●●●●●
Finally, you may request a ‘read receipt’ for the message. In this case,
you ask the computer of the recipient to send you a confirmation when
your email has been opened.
However, you should not expect too much from this: most of the
computers do not process such requests. Those computers that do
process the request usually ask their user if he actually wants to send this
receipt. (Most people do not.) All in all, you will get a receipt in 5% of
the cases when the mail has been opened. Not getting a receipt therefore
does not imply that your email was not read. Conversely, getting a read
receipt only means that your email has been opened, but it does not
guarantee that the recipient actually read it.
Before you start emailing files, consider this: the recipient will spend
considerable time downloading the files that you send him. Please make
sure that it is worth it by
1. keeping files as small as possible. If possible, compress files by
using WinZip (see p. 25) before sending them.
2. sending files only when necessary. Do not just send everything
that you like to all of your friends.
Also, you should describe what it is that you are sending. Many people
send emails saying “here’s the file” or “found something funny – have a
look!” This practice is not only annoying, it can also be dangerous.14
Receiving emails
Receiving emails is easy. Outlook will check your email account for new
messages in regular intervals (every 15 minutes by default; if you want
to speed up the process, click on the ‘send/receive’ button). If there are
14
There are viruses that spread themselves by sending equally non-committal emails. By sending files without a clear
description, make the viruses’ job easier.
Email: Sending & Receiving Emails 49
●●●●●●●●●●●●
· The second column tells you whether you already read that
particular message: if the envelope is closed, then this message is
new. Such messages will be displayed in bold in the list.
· Two further icons follow: the first one, a red flag , tells you that
a follow-up is required for that message. This feature is mostly
used by advanced users. The second icon, a paperclip , indicates
messages with attachments.
· Finally, the sender, subject and time of receipt are given for each
message.
· Delete the message. In this case, the email will be stricken from
Press this button to delete the the message list. Contrary to intuition, it will not actually delete
current message. the message in your mail account – you will still be able to go
back to the message and read it again. To actually delete the
message in your mail account, you will need to delete it using a
PC in the SMR or the webmail feature (see below).
· Read another message: you can use the blue arrows to read the
Previous Next previous or next message, saving you the work of manually
closing each message and opening the next one.
folder until you close Outlook – then they are deleted for good.
Once you have successfully logged in, you will be able to send and
receive emails right away. Be aware that the system does not
automatically tell you when you have new emails. To check, press the
Check for new mail. ‘collect new mail’ button every once in a while. Deleting messages will
result in the message being transferred to the deleted messages folder. If
you want to delete a message from the list, you need to tick the box next
Delete marked messages.
to it and then click on ‘delete marked items’. You can select several
messages at the same time. Deleted messages will stay in the recycle bin
Empty the recycle bin. until you remove them by clicking on ‘empty deleted items folder’. Once
you are done, make sure that you click on ‘log off’ and close all
windows of the browser you are using (probably Internet Explorer).
If you use the directory on the faculty website or the directory in your
email account on the web, you only need to enter the name of the person
you are looking for in the ‘screen name’ field.15
15
Do not use the ‘first name’ or ‘last name’ fields, they do not work.
54 Introduction to the Internet
●●●●●●●●●●●●
Click on ‘find’, and you will be presented with a list of people with that
name. For each person, you will also learn with which institution he or
she is affiliated. For students, the faculty acronym will be listed, while
the department acronym is used for staff. Click on any of the persons to
learn more about them. In the window that opens, their email address
will be listed in the email addresses-section after ‘smtp:’.
‘Tools’ „ ‘Accounts’ „ ‘Add’ If you want to access the directory from your home PC, you will need to
„ ‘Directory Service’ set it up once. In Outlook, click on ‘Tools’, ‘Accounts’, then on ‘Add’
and finally on ‘Directory service’. In the first step, you will need to enter
the address of the LDAP server, which is ‘mail001.unimaas.nl’.
You are not required to log on to this server, so make sure that the
appropriate box is not ticked.
In the second step, enter that you do not want to check addresses using
this service. (This would cause your computer to check all email
addresses, even when you know them for sure.)
That’s it!
‘Start’ „ ‘Find’ „ ‘People…’ You will then be able to click on ‘Find’, ‘People’ in the Start menu.
Before you start your search, ensure that a) you are connected to the
Internet, and b) that the field ‘Look in:’ actually says
‘mail001.unimaas.nl’. Then fill in the name to find the person you are
looking for.
Once you have located the correct recipient, right-clicking on their name
will allow you to directly send an email to them: select ‘Action’ „ ‘Send
mail’ from the list that appears.
Netiquette
Everywhere, there is a certain standard of socially accepted behavior.
Email: Advanced Topics 55
●●●●●●●●●●●●
This is also true for the Internet. Here it is called network etiquette or
simply netiquette. Knowing about it may keep you from offending
someone unwittingly, or from taking offence when none was intended.
Below, we have summarized the netiquette in a few brief rules. For more
information, turn to Virginia Shea’s excellent guide Netiquette at
„ www.albion.com/netiquette/
· Respect everyone else’s time. With every email that you send,
you take up someone’s time – please make sure that it is worth it.
This is particularly true when forwarding funny emails and the
like: are you sure that the recipient is really interested in the
information that you are forwarding?
Security issues
Just as for the WWW, using email is not entirely harmless. Probably the
largest danger stems from viruses that are sent to you as attachments.
This does not imply that the sender is actually trying to infect you on
purpose. Instead, it is usually the case that a virus has infected his or her
computer and that this virus is sending out infected emails without the
knowledge of the PC’s owner. So if you did not expect to receive an
attachment from a particular person, you should be suspicious and
inspect the file before using it. Doing so is pretty easy, presuming you
have the university’s virus scanner installed (see chapter 5). Instead of
opening the attachment by double-clicking on it, save it to your desktop
(or another place on your hard drive) by right-clicking on the attachment
and selecting ‘Save as’ from the menu that appears. Then right-click on
the file on your desktop and select ‘Scan for viruses’ – the rest will
happen automatically.
56 Introduction to the Internet
●●●●●●●●●●●●
From: [DELETED]
Sent: May 14, 2001 16:31
The bad part is you need to contact everyone you sent ANY
e-mail to in the past few months. Many Major companies
have found this VIRUS on their computers. Whatever you do,
DO NOT open the file.
Also, please remember that virus scanners are able to detect (and in most
cases eradicate) viruses before they can do any harm! (Contrary to what
is claimed in these fake virus warnings.) The only thing you need to do
is keep your virus-scanner up to date. (See chapter 5 for instructions.)
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
Image: size-isnt-everything.co.uk
APPENDIX
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●
A. USEFUL WEBSITES
Official University & Faculty Sites
Faculty Homepage for Students
„ www.fdewb.unimaas.nl/studenten
Eleum
The electronic learning environment.
„ eleum.unimaas.nl
SurfYourself
The central information and service website for students.
„ www.fdewb.unimaas.nl/surfyourself
ISS Premium
Registration for courses and information on results.
„ www.fdewb.unimaas.nl/infopc/log_on.htm
UM Webmail
Access to your student email account.
„ mail.unimaas.nl
University Library Homepage
Library catalogue and electronic journals.
„ www.ub.unimaas.nl/fdewb/e-library/
ICT Service Center
Support for software & Internet facilities, sale of academic software
licenses.
„ www.icts.unimaas.nl
Student Services Center
General administration, student support and career advice.
„ www.ssc.unimaas.nl
Study Associations
AIESEC
Global organization for international work exchanges.
„ www.aiesec.nl
Argyris
Study association for organizational sciences, IT management and
consultancy.
„ www.argyris.nl
Criticonomics
Discussion forum for economics and ethics.
„ www.studver.unimaas.nl/critics/
COMAX
Study association for accountancy and controlling.
„ www.comax.nl
60 Introduction to the Internet
●●●●●●●●●●●●
Eloquent
Popular student magazine.
„ www.eloquent.nl
ESN Maastricht – Erasmus Student Network
Support for incoming exchange students.
„ www.esn-maastricht.nl
FIRST Maastricht
Study association for fiscal economics.
„ www.studver.unimaas.nl/first/
Integrand
Non-profit internship agency.
„ www.integrand.nl
Maastricht Marketing Association
Study association for marketing.
„ www.mma.nl
Ragweek Maastricht
Fun for a charitable purpose.
„ www.ragweek.unimaas.nl
Research Project Maastricht
Annual international research initiative for graduate students.
„ www.studver.unimaas.nl/research.project/
UniPartners Maastricht
Academic consultancy projects for graduate students.
„ www.studver.unimaas.nl/upm/
Vectum
For econometrics students.
„ www.vectum.nl
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●