Tag Archive for Internet

The Internet is 50

In 1969 Apollo 11 took man to the moon, Woodstock rocked, Sesame Street debuted, Wendy’s was founded and the Internet was born and crashed. On October 29, 1969, at 10:30 pm Pacific Time. The first use of the proto-Internet was attempted by UCLA student programmer Charley Kline. He was trying to log in to a system at Stanford.

proto-Intenet userOnly 2 characters were sent before the entire fledgling Internet crashed. About an hour later, after debugging a code translation problem caused by the UCLA computer using EBCDIC (Extended Binary Coded Decimal Interchange Code) and the SRI computer using ASCII (American Standard Code for Information Interchange), the first actual remote connection between two computers was established over what would someday evolve into the modern Internet.

ARPANET

The proto-Intenet was funded by the Advanced Research Projects Agency (the predecessor of DARPA). It is commonly believed that ARPANET was built to explore technologies related to building a military command-and-control network that could survive a nuclear attack. However, Charles Herzfeld, the ARPA director who would oversee most of the initial work to build ARPANET told ars Technica:

ARPANET was not started to create a Command and Control System that would survive a nuclear attack  … clearly, a major military need, but it was not ARPA’s mission to do this … ARPANET came out of our frustration that there were only a limited number of large, powerful research computers in the country, and that many research investigators … were geographically separated from them.

Oringal Internet 1969In its infancy, ARPANET had only four “nodes”:

Internet routers

Rather than being directly connected, physicist Wesley Clark suggested the mainframe computers connect to ARPNET via another device to off-load the connections. These devices were called Interface Message Processors (IMPs). IMP’s were the first network routers and built by BBN which used Honeywell DDP-516 mini-computers with 12K of memory. The early-ARPANET connected the nodes with AT&T 50kbps lines. This would allow additional systems to be added as nodes to the network at each site as it evolved and grew.

Some of the major innovations that occurred on ARPANET include;

  • Email (1971),
  • Telnet (1972)
  • File transfer protocol (1973).
As ARPANET grew interoperability grew as an issue. The solution proposed by Vinton Cerf and Bob Kahn in 1982 was TCP/IP. The evolution of TCP/IP allowed organizations of all sizes to began using Local Area Networks or LANs. A standard network protocol like TCP/IP then allowed one LAN to connect with other LANs.
ARPANET was operated by the military until 1990, and until then, using the network for anything other than government-related business and research was illegal. TCP/IP made it possible for anyone to get on ARPANET. As non-military uses for the network increased, it was no longer safe for military purposes. As a result, MILnet, a military only network, was started in 1983.ARPANET logical diagram 1977

NSFnet

NSFnet logoARPANET was slowly replaced by NSFnet (National Science Foundation Network) beginning in 1986. NSFnet first linked together with the five national supercomputer centers, then every major university. ARPANET was finally shut down in 1990. NSFnet formed the backbone of what we call the Internet today.

When ARPANET was shut down, Vinton Cerf, one of the fathers of the modern Internet, wrote a poem in ARPANET’s honor:

It was the first, and being first, was best,
but now we lay it down to ever rest.
Now pause with me a moment, shed some tears.
For auld lang syne, for love, for years and years
of faithful service, duty done, I weep.
Lay down thy packet, now, O friend, and sleep.

rb-

Len Kleinrock, a UCLA professor since 1963 who was present at the birth of the Internet, described the attitude of the early Internet for NBC News, “Allow that open access, and a thousand flowers bloom … One thing about the Internet you can predict is you will be surprised by applications you did not expect.”

That openness of the early Internet has given way to growing concern that the Internet has become centralized by a few major companies, compromised by governments, and monetized by the collecting and sharing of private data.

ars Technica notes that the first three characters ever transmitted over the precursor to the Internet were L, O, and L. Without ARPANET, there would have been no Internet.

The Internet is still laughing out loud at us.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Over Half the World Connected to the Internet

Over Half the World Connected to the InternetNew statistics show that over half of the world’s population is now using the Internet. The 2017 Q2 Global Digital Snapshot Report on social media and digital trends released by Hootsuite, a social media management platform, and We Are Social, a social media agency, found that more than 3.8 billion people around the world now use the internet. This means that global internet penetration is 51%. The report’s author flips the number and points out that people who don’t use the Internet are now in the minority.

How are these people getting online? The report says that the total number of unique mobile users now stands at 4.96 billion. The use of a mobile phone is now ‘normal’ around the world. Almost 66% of the entire global population regularly uses a mobile phone. More and more of these users now own a smartphone too, and the latest data suggest that more than half of the world’s population now uses one of these powerful devices.

2017 Global Digital Snapshot

2017 Global Digital Snapshot Report by Hootsuite

The rapid spread of smartphones has led to significant growth in the number of mobile internet users. The number of people around the world accessing the internet via mobile reached almost 3.4 billion during early April 2017 according to the author.

Additionally, 93% of all internet users now go online via mobile devices (phones or tablets), and with the majority of new internet users now ‘phone first’, mobile’s share is likely to increase even more.

With all of this increased access, We are Social, writes that global social media users total to more than 2.9 billion users. This means that social media users are still increasing at a rate of more than 1 million per day – that’s 14 new users every second.

2017 Internet use

2017 Global Digital Snapshot Report by Hootsuite

The article observes that mobile social media continues to see the fastest growth across all our key data points. In the past 3 months, mobile social media users grew by more than 1.6 million new users every day. The total number of people around the world accessing social media via mobile devices now stands at just under 2.7 billion, representing global penetration of 36%.

Where do all of these mobile social media users go? Of course, they go to Facebook (FB). The research says that Facebook dominates the social media world. The latest data suggests that the world’s favorite social platform adds more than a million new users every day.

Facebook usage 2017

2017 Global Digital Snapshot Report by Hootsuite

Asia is the center of Facebook’s growth. Much of that growth came from India. With almost 250,000 new users in the country every day, the author speculates there’s a good chance that India will overtake the US to become Facebook’s most active market by July 2017.  Bangkok is Facebook’s most active city, with roughly 30 million people in Thailand’s capital using the platform.

rb-

It should be obvious to any marketer that firms need to remake their customer engagement plans and implement real-time interaction with their customers. Simon Kemp, We Are Social said.

“Half of the world’s population is now online, which is a testament to the speed with which digital connectivity is helping to improve people’s lives … Given this latest data, it’s probably time for us to stop referring to social as new media, and integrate it more seamlessly into our day-to-day activities.”

I think Mr. Kemp is too optimistic when he says that “digital connectivity is helping to improve people’s lives.” Followers of the Bach Seat know that too much social media is bad for you.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Spear Phishing

Spear PhishingAs long as there have been people, there have been scammers of some kind. Today, cybercriminals use the same technology email, instant messaging, chats, that helps everyone else in their daily lives. The only difference is that they use it for wrongdoing. The results of a recent JPMorgan Chase company hack prove it. The banking giant fell victim to a spear phishing attack.

PhisingThe outcome of the JPMorgan Chase & Co., hack says that over 76 million user accounts were compromised. It is also very likely that other banks were breached by the same attackers. The breach of JPMorgan Chase should serve as a reminder that even large, sophisticated businesses can be breached by today’s phishing expeditions.

Attackers were able to penetrate JPMorgan Chase’s defenses and roam their networks undetected for months most likely due to one worker who fell victim to a spear phishing attack. Corporate security and hackers are engaged in an asymmetric fight right now. The good guys have to protect the entire enterprise while the bad guys only need a single point of failure to gain access, just one user to fall victim to a spear phishing attack and they are in.

The bad guys have the advantage

Nigerian princeAnyone can claim to be a Nigerian prince from behind their computer screen and bilk unsuspecting targets for their financial information over email. All it takes is a valid email account – personal or otherwise. With the hacker’s advantage in mind, here are some tips to help avoid spear phishing attacks and prevent the attacker’s access to your firm.

Spear Phishing

Today’s phishing attacks are not the crude, typo-filled emails from Nigeria of yesteryear. Spear-phishers carefully research their targets. They will know your manager’s name, the names of your co-workers, and perhaps the projects you’re assigned to. This knowledge and detail make spear-phishing very effective.

No matter what the nature of an email account is, it is susceptible to all the dangers of the Internet. This is bad news for businesses that use email, and a lot of organizations out there fit that bill to a T. The more that a company uses email, the greater the chance that they will experience a data breach of some kind.

There is really nothing stopping a well-crafted phishing scam from appearing in a corporate inbox and fooling an unwitting employee. Here is a look at three of the email-based scams that could be threatening your business right now:

Vendor identity fraud

According to a report from Virginia TV station WHSV, the Better Business Bureau is warning businesses of a recent scam that targets this daily operation as a way to siphon money from corporate bank accounts. The BBB describes the attack:

As part of your job, you pay invoices for several of your business’s vendors … One day, you receive an urgent email from an executive in your company telling you to change how you pay invoices from a vendor. Instead of sending a check, you now need to wire the money straight to a bank account.

SPAM emailThis phishing attack is made possible by malicious hacking. Cybercriminals break into company emails and gain enough information to impersonate one of the organization’s suppliers. Next, they send off the false email that tells some poor admin to wire the payment to the hackers instead of the supplier and leave businesses out hundreds of thousands of dollars depending on the nature of the vendor.

Hackers impersonate branch of FBI

Nobody likes being accused of crimes that they didn’t commit. This is especially true when the FBI is involved. But a new scheme involving the Internet Crime Complaint Center has many people thinking their arrest is imminent if they do not fork over a hefty fine via online transaction – something that is unheard of in real law enforcement agencies and that the FBI has been forced to address. DailyFinance contributor Mitch Lipka wrote:

The emails claim that the victim is the subject of a criminal report and that charges are forthcoming … They are then told that they have one or two days to respond or risk arrest, IC3 said. Those who respond are told they have to send money via prepaid cards if they want to avoid prosecution.

Fooled by “clients”

Lawyers are trained to always read between the lines and examine the fine print in legal documents, but what about in their supposedly secure communications?

This is one concept that has been inadvertently brought up in New Zealand thanks to a scam targeting law firms and their clients. There are plenty of things that can be done over email, but that doesn’t mean that they should be. Client and lawyer communications are one of these tasks. According to The National Business Review, criminals will pose as either a law professional or someone they currently represent, asking the opposite party to make a payment or carry out a transaction. This not only puts funds in danger but also sensitive information. This may land a law firm in serious legal trouble.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

GOP Ordred to Gut FCC Over Net Neutrality

GOP Ordred to Gut FCC Over Net NeutralityThe courts turned down big Telecom’s demands to immediately kill Net Neutrality and somehow the Internet still works. But big Telecom’s House Republican stooges continue their war against consumers and the open Internet. The telecom lackeys have buried riders in a budget bill that would stop the FCC from enforcing the Net Neutrally regs until courts decide several challenges.

According to FierceCable, the GOP’s 2016 Financial Services and General Government Appropriations bill, unveiled recently, has three riders buried in the budget rules that:

  1. riders buried in the budgetPrevent the FCC from enforcing its net neutrality rules, pending what could be years of litigation.
  2. Cut the FCC budget by $73 million.
  3. Prohibits the FCC from regulating rates for both wireline and wireless Internet services.

Harold Feld, senior VP at Public Knowledge, in a responding statement told FierceCable:

Worst of all, the Appropriations Committee ban on FCC enforcement that ‘directly or indirectly’ regulates prices would prevent the FCC from ban on FCC enforcementperforming even the most basic consumer protection action, such as the recent FCC enforcement against wireless carriers requiring them to refund charges for services customers did not order or had discontinued.

Public Knowledge VP Feld concludes:

The Appropriations Committee would rather declare open season to rob American broadband subscribers with overcharges and ripoffs than allow the FCC to do its job.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Sharks are Taking a Bite Out of the Internet

Sharks Attacking InternetPoliticians in Washington D.C. think that the Internet is made of tubes. Most other people think the modern Internet is made of cell phones and wireless connections. They have no idea of how the Intertubes works. Readers of Bach Seat know that undersea cables cross the globe connecting the continents. Despite a century of development cables are still subject to the same threats the first transatlantic cables faced in 1900.

The Internet remains a relatively fragile thing according to Catchpoint. They report that the Internet can be brought down by as a little as an old woman with a hacksaw. Squirrels and bears have been known to wreak havoc with fiber optic cables as well.

The article says that Internet users in Vietnam have recently been suffering through slow and intermittent connections for months now without any explanation of the cause. The cause was not a government tapping the underwater fiber, it was just a dangerous – SHARKS.

 

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.