IPv6, Wireless, and Security CS 1 Rick Graziani Cabrillo College

advertisement
IPv6, Wireless, and Security
CS 1
Rick Graziani
Cabrillo College
Spring 2015
Public Addresses
•
•
IANA – Internet Assigned Numbers Authority
Allocates IPv4 and IPv6 addresses to 5 RIRs (Regional
Internet Registries)
Public Addresses
IPv6
•
IPv4: 32 bits (written in decimal)
– 192.168.1.100
11000000
192.
•
10101000
168.
00000001
1.
01100100
100
IPv6: 128 bits (written in hexadecimal)
– 2001:0DB8:CAFE:0001:0000:0000:0000:0095
Rick Graziani graziani@cabrillo.edu
4
Increased Address Space
Number name
Scientific
Notation
1 Thousand
10
1 Million
10
1 Billion
10
1 Trillion
10
1 Quadrillion
10
1 Quintillion
10
1 Sextillion
10
1 Septillion
10
1 Octillion
10
1 Nonillion
10
1 Decillion
10
1 Undecillion
10
3
6
9
12
15
18
21
24
27
30
33
36
Number of zeros
1,000
1,000,000
1,000,000,000
There are 4 billion
IPv4 addresses
1,000,000,000,000
1,000,000,000,000,000
1,000,000,000,000,000,000
1,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000,000,000
• 50 billion billion billion addresses for every person on earth
There are 340
undecillion IPv6
addresses
IPv6
Number name
Scientific
Notation
1 Thousand
10
1 Million
10
1 Billion
10
1 Trillion
10
1 Quadrillion
10
1 Quintillion
10
1 Sextillion
10
1 Septillion
10
1 Octillion
10
1 Nonillion
10
1 Decillion
10
1 Undecillion
10
3
6
9
12
15
18
21
24
27
30
33
36
Number of zeros
1,000
1,000,000
1,000,000,000
1,000,000,000,000
1,000,000,000,000,000
1,000,000,000,000,000,000
1,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000,000
1,000,000,000,000,000,000,000,000,000,000,000,000
• IPv4 addresses: 4.3 billion
• IPv6 addresses: 340 undecillion
Rick Graziani graziani@cabrillo.edu
6
What has kept IPv4 alive…
NAT
192.168.1.0/24
RFC 1918 Private Address
•
•
•
Public IPv4 Address
Network Address Translation (NAT) is a technology
commonly implemented within IPv4 networks.
– Provides a way for multiple devices to share a single
public IP address.
The IP address of an internal network host is hidden.
This can be problematic for technologies that require
end-to-end connectivity.
•
Monday, January 31, 2011 IANA allocated two blocks of IPv4
address space to APNIC, the RIR for the Asia Pacific region
(39/8 and 106/8)
• IANA has no more IPv4 network addresses to allocate
• RIR’s Remaining IPv4 addresses
ARIN soon to run out
Rick Graziani graziani@cabrillo.edu
13
ISP
Internet
Service
Provider
24.2.2.2
IP Address =
Sub Mask =
Default Gateway =
Default
Gateway
75.1.1.1
Rick Graziani graziani@cabrillo.edu
DNS Server =
ISP
Internet
Service
Provider
24.2.2.2
DHCP
IP Address =
75.1.1.2 (Public)
Sub Mask =
255.255.252.0
Default Gateway =
75.1.1.1
Default
Gateway
75.1.1.1
Rick Graziani graziani@cabrillo.edu
Public Address
75.1.1.2
DNS Server =
24.2.2.2
DSL/Cable Modem
Rick Graziani graziani@cabrillo.edu
Router
17
ISP
Internet
Service
Provider
IP Address =
Sub Mask =
Default Gateway =
24.2.2.2
DNS Server =
IP Address =
Sub Mask =
Default Gateway =
Public IP
Address
75.1.1.2
Default
Gateway
192.168.1.1
Router/Default Gateway
Default Gateway: 192.168.1.1
DHCP Server:
Network = 192.168.1.0 (Private)
Sub Mask = 255.255.255.0
First host: 192.168.1.100
Rick Graziani graziani@cabrillo.edu
Network Address Translation
75.1.1.2  192.168.1.host
DNS Server =
IP Address =
Sub Mask =
Default Gateway =
DNS Server =
21
ISP
Internet
Service
Provider
IP Address =
192.168.1.100
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
24.2.2.2
DNS Server =
24.2.2.2
DHCP
IP Address =
192.168.1.101
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
Public IP
Address
75.1.1.2
Default
Gateway
192.168.1.1
Router/Default Gateway
Default Gateway: 192.168.1.1
DHCP Server:
Network = 192.168.1.0
Sub Mask = 255.255.255.0
First host: 192.168.1.100
Rick Graziani graziani@cabrillo.edu
Network Address Translation
75.1.1.2  192.168.1.host
DNS Server =
24.2.2.2
IP Address =
192.168.1.102
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
DNS Server =
24.2.2.2
22
Rick Graziani graziani@cabrillo.edu
23
IP Address =
192.168.1.100
I need an IP address
www.bayfed.com
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
24.2.2.2
www.bayfed.com is at
65.64.172.199
ISP
Internet
Service
Provider
DNS Server =
24.2.2.2
Default
Gateway
75.1.1.1
Public IP
Address
75.1.1.2
Bay Federal
65.74.172.199
Rick Graziani graziani@cabrillo.edu
Router/Default Gateway
IP Address =
192.168.1.100
I need an IP address
www.bayfed.com
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
24.2.2.2
www.bayfed.com is at
65.64.172.199
ISP
Internet
Service
Provider
DNS Server =
24.2.2.2
Default
Gateway
75.1.1.1
Public IP
Address
75.1.1.2
Bay Federal
65.74.172.199
Rick Graziani graziani@cabrillo.edu
Router/Default Gateway
IP Address =
192.168.1.100
Sub Mask =
255.255.255.0
Default Gateway =
192.168.1.1
24.2.2.2
DNS Server =
99.99.99.99
ISP
Internet
Service
Provider
Default
Gateway
75.1.1.1
I need an IP address
www.bayfed.com
Public IP
Address
75.1.1.2
Bay Federal
65.74.172.199
Router/Default Gateway
99.99.99.99
99.1.2.3.4
Rick Graziani graziani@cabrillo.edu
www.bayfed.com is at
85.255.112.99
L2
PAIX
Customer
Prefixes
Public IP
Address
Bi-lateral
Settlement
Free Peer
Non-transit.
You can get to
our prefixes and
we can get to
your prefixes.
No charge.
Level 3
Transit
Buy transit per Mb/s per
month for routes not know
from non-transit AS’s
EBGP
CENIC (non-transit AS)
Cabrillo
Google
Redistribute
static
MED
AS and
Public IP
Address
LocPref
SVL-Agg1
SAC
EBGP
UCSC
Hurricane Elec
Fully-meshed IBGP
EBGP
AS and
Public IP
Address
SVL
Commodity
Peer
Commodity
Peer
UCLA
LAX-Agg1
LAX
RVR
Comcast
IGP: IS-IS used for next-hop reachability
Public IP
Address
Commodity
Peer
EBGP
Cuesta
Non-transit. You can get to our prefixes and
we can get to your prefixes. No charge.
Internet 2
Research
Peer
NLR
CUDI
Research
Peer
Cogent
Transit
Buy transit per Mb/s
per month for routes
not know from nontransit AS’s
36
Rick Graziani graziani@cabrillo.edu
37
1981 primitive Internet report on KRON
http://www.youtube.com/watch?v=5WCTn4FljUQ&feature=pl
ayer_embedded
Rick Graziani graziani@cabrillo.edu
38
Circuit Switched
• Circuit Switching: A form of data communication which establishes a
•
•
single connection or circuit between source and destination to carry the
data stream.
Like a conventional telephone system.
When a subscriber makes a telephone call the dialed number is used
to set switches in the exchanges along the route of the call so that
there is a continuous circuit from the originating caller to that of the
called party.
Rick Graziani graziani@cabrillo.edu
39
Rick Graziani graziani@cabrillo.edu
40
Rick Graziani graziani@cabrillo.edu
41
Rick Graziani graziani@cabrillo.edu
42
The range of
G.fast will be very
short — on the
order of 250
meters (820 feet).
Basically, G.fast
is envisaged as
the ideal way of
getting fiber-like
speeds from the
cabinet,
manhole, or
telephone pole.
Rick Graziani graziani@cabrillo.edu
43
Packet Switching
• Packet Switching: A form of data communications which breaks
•
a data stream into small sections, sends them separately by the
best available channels and reassembles the original data
stream at its destination.
An alternative is to allocate the capacity to the traffic only when it
is needed, and share the available capacity between many
users.
Rick Graziani graziani@cabrillo.edu
44
Wireless Access Point
•
A wireless access point is a device that connects
wireless devices (laptops, etc.) to a wired network, usually
an Ethernet LAN.
Rick Graziani graziani@cabrillo.edu
45
Wireless Access Point
•
In our example the wireless access point (AP) will include a
Router.
Rick Graziani graziani@cabrillo.edu
46
Putting it together
•
Exactly the same as connecting a router without an AP.
Rick Graziani graziani@cabrillo.edu
47
Configuring the AP and Router
Wireless Settings:
• SSID (Service Set Identifier) – Name of your network
• Security: WPA2, WPA, WEP, or none
SSID
Rick Graziani graziani@cabrillo.edu
48
Configuring the AP and Router
Wireless Settings:
• Security: WPA2, WPA, WEP, or none
WPA2
Rick Graziani graziani@cabrillo.edu
49
SSID
•
The SSID is what will be displayed when people with
wireless computers are looking for a wireless LAN.
Rick Graziani graziani@cabrillo.edu
50
Linksys WRT54G
Router Information
• IP Address from ISP
• Connects to your DSL/Cable Modem
• NAT (Network Address Translation)
Local Network
• Ethernet Switch
• Connect “wired” computers
• DHCP Server (optional)
Wireless
• SSID: MyHomeNetwork
• DHCP Server: (optional)
• Channel: 11
• Encryption Function: WPA
Rick Graziani graziani@cabrillo.edu
51
You choose…
•
•
•
•
There are many resources to discuss the possible health
risks or wireless LANs.
As a networking and WLAN user and instructor I have my
own thoughts which I will share.
If you are concerned, then research the information and
come to your own conclusions.
The following information is from my own research and
experience.
Rick Graziani graziani@cabrillo.edu
52
Wireless Frequency
• Wireless APs operate at:
– 2.4 GHz
– 5 GHz
• 2 GHZ! That’s the same as my microwave oven, isn’t that
dangerous?
• Answer: No.
– Electromagnetic waves happen naturally.
• Light is an electromagnetic wave
– It is not the frequency, but the wattage, the power.
• Any electromagnetic wave can be dangerous with too much
power.
• A 25 watt light bulb is safe, but it wouldn’t be safe at 250,000
watts
– Wireless access points generate signals at 1/10th of a watt.
• Like all electromagnetic waves, the signal does not fade in a
linear manner, but inversely as the square of the distance.
Rick Graziani graziani@cabrillo.edu
53
Rick Graziani graziani@cabrillo.edu
www.britishlibrary.net
54
Inverse square law
10
Point A
20
30
40
3 times the distance
1/9 the power of Point A
2 times the distance
¼ the power of Point A
50
100
10 times the distance
1/100 the power of A
5 times the distance
1/25 the power of Point A
• Double the distance of the wireless link, we receive only ¼ of the
•
•
original power.
Triple the distance of the wireless link, we receive only 1/9 the original
power.
Move 5 times the distance, signal decreases by 1/25.
Rick Graziani graziani@cabrillo.edu
55
Putting it in some perspective
• Measurements from an antenna transmitting 100mW at 1 inch
• Remember a milliwatt is 1/1,000th of a Watt
• Microwave oven typically operates at 1,000 watts in a confined space.
•
•
1”
100 mW
1/10th watt
2”
25 mW
1/40th watt
4”
6.25 mW
1/166th watt
8”
1.56 mW
1/1000th watt
16”
0.39 mW
4/10,000th watt
32”
0.097 mW
1/10,000th watt
64” (5.3 ft)
0.024 mW
2/100,000th watt
128” (10.6 ft)
0.006 mW
6/1,000,000th watt
256” (21.3 ft)
0.0015 mW
15/10,000,000th watt
Light bulbs would also be dangerous the were 10,000 to
1,000,000,000,000 stronger.
A 250,000 watt up to a 250,000,000,000,000 watt light bulb would also
be dangerous.
Rick Graziani graziani@cabrillo.edu
56
Rick Graziani graziani@cabrillo.edu
57
Wireless N
•
•
Wireless N provides better speeds (bandwidth) and better
range by utilizing multiple antennas.
Backwards compatible with 802.11 b and g.
Rick Graziani graziani@cabrillo.edu
58
Wireless Security – Everyone can hear
•
•
Others can “hear” or capture your information.
Wireless signals are propagated, sent, similar to our voice
sound waves.
Rick Graziani graziani@cabrillo.edu
59
Wireless Security – Everyone can hear
• If we don’t want them to understand what they hear, we can encrypt or
•
code the information.
As long a our wireless computer and access point are using the same
encryption algorithm, such as WPA2.
Rick Graziani graziani@cabrillo.edu
60
Wireless Security
•
Without any security, anyone can:
– Use your wireless access point to access your network
and the Internet.
– Capture your information from your wireless computer.
Rick Graziani graziani@cabrillo.edu
61
Wireless Security
CommView
Rick Graziani graziani@cabrillo.edu
DriftNet
62
Wireless Security
• Your web browsing or email access should already be secured.
• Look for the lock
Rick Graziani graziani@cabrillo.edu
63
Wireless Security
•
•
Why you should protect your wireless network with WPA
– http://www.youtube.com/watch?v=A88XB7_Jz7s
Wireless Hacking
– http://www.youtube.com/watch?v=qP1BOZqrp5g&featur
e=related
Rick Graziani graziani@cabrillo.edu
64
MAC Cloning
Rick Graziani graziani@cabrillo.edu
65
Cell Phones do not cause explosions
• http://www.youtube.com/watch?v=OQ0aTMMITp8
• http://www.youtube.com/watch?v=NRGrFLRs9xE&feature=
related
Rick Graziani graziani@cabrillo.edu
66
Rick Graziani graziani@cabrillo.edu
67
Internet: Safe Surfing
Safe Surfing
• Adware
•
•
•
•
•
– Pop-ups
– Spyware
– Blocking Pop-ups
Java Traps or Pop-Up Hell
Spyware
– Blocking Spyware
Cookies
Virus Protection
Spam
– Blocking Spam
Rick Graziani graziani@cabrillo.edu
69
Adware
• Adware or advertising-supported software is any software application
•
in which advertisements are displayed while the program is running.
Adware helps recover programming development costs, and helps to
hold down the price of the application for the user (even making it free
of charge)—and, of course, it can give programmers a profit, which
helps to motivate them to write, maintain, and upgrade valuable
software.
Rick Graziani graziani@cabrillo.edu
70
What are Pop-ups? (Wikipedia.org)
• Pop-up ads are a form of online advertising on the Web where certain
•
•
websites open a new web browser window to display advertisements.
Usually generated by JavaScript
A less intrusive variation on the pop-up window is the pop-under
advertisement.
– This opens a new browser window, but in the background, so as
not to interrupt the user's page-view.
Rick Graziani graziani@cabrillo.edu
71
From Gain Publishing:
www.gainpublishing.com/ about/
Rick Graziani graziani@cabrillo.edu
72
•
•
•
•
For early advertising-supported websites, banner ads were sufficient revenue
generators.
But in the wake of the dot com crash, prices paid for banner advertising
clickthroughs decreased and many vendors began to investigate more
effective advertising methods.
Pop-up ads by their nature are difficult to ignore or overlook, and are claimed
to be more effective than static banner ads.
Pop-ups have a much higher click rate than web banner ads do.
– What are Pop-ups? (Wikipedia.org)
Rick Graziani graziani@cabrillo.edu
73
Pop-ups (Wikipedia.org)
Ultimate
irony!
•
•
Most users regard pop-ups as a nuisance.
In the early 2000s, all major web browsers except Internet
Explorer allowed the user to block pop-ups almost
completely.
Rick Graziani graziani@cabrillo.edu
74
Rick Graziani graziani@cabrillo.edu
75
Pop-up, looks real…
http://www.news3insider.com/finance/google-hiring-you.html
Rick Graziani graziani@cabrillo.edu
76
C/NET – Pop-ups mean more $$$
• Publishers willingly allow pop-ups or pop-unders
because they command higher prices, and they're
in high demand by advertisers.
Rick Graziani graziani@cabrillo.edu
77
But are the clicks real or bots?
Rick Graziani graziani@cabrillo.edu
78
“Java Trap” or
“Pop-up Hell”
• Pornographic websites are among the most common users of pop-up
•
•
•
•
ads.
Some particularly vicious types of pop-up ads have been specifically
designed to "hijack" a user's Internet session.
As each window is closed by the user it activates another window -sometimes indefinitely.
Usually the only way to stop this is to close the browser.
Mouse Trapping: Another variation of pop-up fills an entire screen
with an ad or Web page, removing any menu bars or other on-screen
icons by which the user can close the window.
Rick Graziani graziani@cabrillo.edu
79
Spyware (Wikipedia.org)
• Spyware is computer software that gathers and reports information
•
•
about a computer user without the user's knowledge or consent.
May perform many different functions, including:
– Delivery of unrequested advertising (pop-up ads in particular),
– Harvesting private information
– Re-routing page requests to illegally claim commercial site referral
fees
Spyware or Malware Can include:
– keystroke loggers
– denial-of-service (DoS) attack agents
Rick Graziani graziani@cabrillo.edu
80
Fighting Spyware
• Spybot (www.safer-networking.org)
• PestPatrol (www.pestpatrol.com)
Rick Graziani graziani@cabrillo.edu
81
Cookies
• A cookie is information sent by a
•
•
server to a browser and then sent
back to the server each time it
accesses that server.
Amongst other uses, cookies
enable websites to be customized
for individual users once
browsing patterns have been
established.
Cookies only store information
that you provide.
Rick Graziani graziani@cabrillo.edu
82
First time you login
HTTP Requests: GET
(first time)
HTTP: Response
Set-cookie: ID
5551212
HTTP Requests (GET)
Web server can now
now include ID track clients activities
5551212
on the web site.
HTTP
Server
Rick Graziani graziani@cabrillo.edu
HTTP Client
83
Each time you login…
HTTP: Cookie 5551212 included
HTTP
Server
HTTP data customized
for Rick Graziani
HTTP Client
Rick Graziani graziani@cabrillo.edu
84
Cookies - Purpose
• Typically this is used to authenticate or identify a registered user of a
•
web site as part of their first login process or initial site registration
without requiring them to sign in again every time they access that site.
Other uses are maintaining a "shopping basket" of goods selected for
purchase during a session at a site, site personalization (presenting
different pages to different users), and tracking a particular user's
access to a site.
Rick Graziani graziani@cabrillo.edu
85
Cookies - Permissions
• A browser may or may not allow the use of cookies.
• The user can usually choose a setting.
• Microsoft Internet Explorer
– Tools > Internet Options > Privacy Tab
– Use slider to set options, or use advanced options
Rick Graziani graziani@cabrillo.edu
86
Virus Protection
•
In computer security technology, a virus is a selfreplicating program that spreads by inserting copies of
itself into other executable code or documents
Rick Graziani graziani@cabrillo.edu
87
http://techguylabs.com/
Rick Graziani graziani@cabrillo.edu
88
Fishing…
Rick Graziani graziani@cabrillo.edu
89
Rick Graziani graziani@cabrillo.edu
90
Rick Graziani graziani@cabrillo.edu
91
Rick Graziani graziani@cabrillo.edu
92
Rick Graziani graziani@cabrillo.edu
93
Rick Graziani graziani@cabrillo.edu
94
Rick Graziani graziani@cabrillo.edu
95
Computer Virus, Spyware
•
•
Computer Virus, Spyware
http://www.youtube.com/watch?v=uK5ija2gVbY
•
•
How Computer Viruses Work
http://www.youtube.com/watch?v=sxal31zIKdE&feature=rel
ated
Rick Graziani graziani@cabrillo.edu
96
Spam (Wikipedia)
•
Spamming is the act of sending unsolicited electronic
messages in bulk.
Rick Graziani graziani@cabrillo.edu
97
Anti-Spam
• Spammers obtain e-mail addresses by a number of means:
•
•
•
– Web pages
– guessing common names at known domains
– "e-pending"
– searching for e-mail addresses corresponding to specific persons
Many e-mail spammers go to great lengths to conceal the origin of their
messages.
Spoofing e-mail addresses - spammer modifies the e-mail message
so it looks like it is coming from another e-mail address.
Among the tricks used by spammers to try to circumvent the filters is to
intentionally misspell common spam filter trigger words, ie. "viagra"
might become "vaigra", or by inserting other symbols within the word,
i.e. "v/i/a/g./r/a".
Rick Graziani graziani@cabrillo.edu
98
The Nigerian Email Spam Scam
•
•
•
Email SPAM Scam
The Nigerian Email Spam Scam
http://www.youtube.com/watch?v=kYNi2gVpuig
• ABC Report on Nigerian Scammers
• http://www.youtube.com/watch?v=8PQANsFisvU&feat
•
•
ure=related
http://www.youtube.com/watch?v=7PVK0R01tRw&feat
ure=related
http://www.youtube.com/watch?v=puYEUs18MFI&featu
re=related
Rick Graziani graziani@cabrillo.edu
99
Passwords
• Combine letters, numbers, and symbols.
• Use words and phrases that are easy for you to remember, but difficult
•
•
•
•
for others to guess.
Avoid sequences or repeated characters. "12345678”, "abcdefg"
Avoid using only look-alike substitutions of numbers or symbols.
– 'i' with a '1'
– 'a' with '@‘
– ‘o’ with a 0’
– as in "M1cr0$0ft" or "P@ssw0rd" (these are not good though)
At least 8 characters; more than14 characters is even better
But these substitutions can be effective when combined with other
measures:
– 1$erf@h00k4i$t
– http://howsecureismypassword.net/
– http://www.passwordmeter.com/
Rick Graziani graziani@cabrillo.edu
100
Hoaxes, Scams, and Fraud
•
This hoax generated
thousands of emails with
the first day alone.
Rick Graziani graziani@cabrillo.edu
101
Google name or go to Snopes.com
Rick Graziani graziani@cabrillo.edu
102
Swiffer Wetjet
Rick Graziani graziani@cabrillo.edu
103
Typical Email Scam
Subject: Account Confirmation {Account Expires in 4 days}
Date:
Mon, 15 Sep 2008 06:14:39 -0400
From:
Leboyd, Nichole <nleboyd@msm.edu>
Dear Staff/Student
This message is from the IT Service messaging center to all subscribers/webmail users. We are currently upgrading the
webmail data base and e-mail centers due to an unusual activities identified in our email system. We are deleting all
unused Webmail Accounts. You are required to verify and update your Webmail by confirming your Webmail identity.
This will prevent your Webmail account from been closed during this exercise. In order to confirm your Webmail
identity, you are to provide the following data;
Confirm Your WebMail Identity Below;
First Name:
Last Name:
Username/ID:
Password:
Date of Birth:
Warning: Any subscriber/webmail user that refuses to verify and subsequently update his/her Webmail within 4 days of
receiving this warning will lose his/her Webmail Account permanently.
We thank you for your prompt attention to this matter. Please understand that this is a security measure intended to help
protect your Webmail Account. We apologise for any inconvenience.
Regards,
Leboyd Nichole
Webmail Administrator.
Rick Graziani graziani@cabrillo.edu
104
Wells Fargo (Scam)
Rick Graziani graziani@cabrillo.edu
105
Fake Site
Rick Graziani graziani@cabrillo.edu
106
Fake and Real Sites
Rick Graziani graziani@cabrillo.edu
107
Wells Fargo – Reporting Fraud Emails
Rick Graziani graziani@cabrillo.edu
108
PayPal
Rick Graziani graziani@cabrillo.edu
109
USAA
Rick Graziani graziani@cabrillo.edu
110
Changing Who From
Rick Graziani graziani@cabrillo.edu
111
Create Fake Email
Rick Graziani graziani@cabrillo.edu
112
Creating Fake Link
Rick Graziani graziani@cabrillo.edu
113
Receiver
Rick Graziani graziani@cabrillo.edu
114
Looking at Options doesn’t help
Rick Graziani graziani@cabrillo.edu
115
Click on Link…
Rick Graziani graziani@cabrillo.edu
116
RickRoll’D
Rick Graziani graziani@cabrillo.edu
117
Killer Whale Lands On Kayak (?)
•
•
http://www.youtube.com/watch?v=H2KBpauoDNs
http://www.youtube.com/watch?v=NjwxAJYKFbE
Rick Graziani graziani@cabrillo.edu
118
Sites to check for hoaxes
•
•
•
http://urbanlegends.about.com/od/internet/a/current_netlor
e.htm
http://www.snopes.com/
http://www.hoax-slayer.com/
Rick Graziani graziani@cabrillo.edu
119
Rick Graziani graziani@cabrillo.edu
120
Rick Graziani graziani@cabrillo.edu
121
Rick Graziani graziani@cabrillo.edu
122
Rick Graziani graziani@cabrillo.edu
123
Rick Graziani graziani@cabrillo.edu
124
Rick Graziani graziani@cabrillo.edu
125
Rick Graziani graziani@cabrillo.edu
126
IPv6, Wireless, and Security
CS 1
Rick Graziani
Download