Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Portal:Internet

Page semi-protected
From Wikipedia, the free encyclopedia
Wikipedia portal

Portal maintenance status:(February 2020)
  • This portal'ssubpageshave been checked by an editor, and are needed.
Pleasetake care when editing, especially if usingautomated editing software. Learn how toupdate the maintenance information here.


The Internet Portal

Internet Archive servers

An Internet kiosk

TheInternet (orinternet) is theglobal system of interconnectedcomputer networks that uses theInternet protocol suite (TCP/IP) to communicate between networks and devices. It is anetwork of networks that comprisesprivate, public, academic, business, and government networks of local to global scope, linked by electronic,wireless, andoptical networking technologies. The Internet carries a vast range ofinformation services and resources, such as the interlinkedhypertext documents andapplications of theWorld Wide Web (WWW),electronic mail,discussion groups,internet telephony,streaming media andfile sharing.

Mosttraditional communication media, includingtelephone,radio,television,paper mail,newspapers, andprint publishing, have been transformed by the Internet, giving rise tonew media such asemail,online music,digital newspapers,news aggregators, andaudio andvideo streaming websites. The Internet has enabled and accelerated new forms of personal interaction throughinstant messaging,Internet forums, andsocial networking services.Online shopping has also grown to occupy a significant market across industries, enabling firms to extendbrick and mortar presences to serve larger markets.Business-to-business andfinancial services on the Internet affectsupply chains across entire industries. (Full article...)

Selected article

What a typical phishing email may look like
Phishing is a form ofsocial engineering and ascam where attackers deceive people into revealingsensitive information or installingmalware such asviruses,worms,adware, orransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type ofcybercrime, with theFederal Bureau of Investigation'sInternet Crime Complaint Center reporting more incidents of phishing than any other type of cybercrime.

Modern phishing campaigns increasingly targetmulti-factor authentication (MFA) systems, not just passwords. Attackers use spoofed login pages and real-time relay tools to capture both credentials and one-time passcodes. In some cases, phishing kits are designed to bypass two-factor authentication by immediately forwarding stolen credentials to the attacker's server, enabling instant access. A 2024 blog post by Microsoft Entra highlighted the rise ofadversary-in-the-middle (AiTM) phishing attacks, which intercept session tokens and allow attackers to authenticate as the victim.

The term "phishing" was first recorded in 1995 in thecracking toolkitAOHell, but may have been used earlier in the hacker magazine2600. It is a variation offishing and refers to the use of lures to "fish" for sensitive information. (Full article...)

Selected picture

This mind-map sums up some of the memes of Web 2.0
This mind-map sums up some of the memes of Web 2.0
Credit:Luca Cremonini,Markus Angermeier

In studying and/or promotingweb-technology, the phraseWeb 2.0 can refer to a perceived secondgeneration of web-based communities andhosted services — such associal-networking sites,wikis, andfolksonomies — which aim to facilitatecreativity, collaboration, and sharing between users. The term gained currency following the firstO'Reilly Media Web 2.0 conference in2004.

Ininternet security,cross-site (XS)leaks are a class of attacks used to access a user's sensitive information on another website. Cross-site leaks allow an attacker to access a user's interactions with other websites. This can contain sensitive information.Web browsers normally stop other websites from seeing this information. This is enforced through a set of rules called thesame-origin policy. Attackers can sometimes get around these rules, using a "cross-site leak". Attacks using a cross-site leak are often initiated by enticing users to visit the attacker's website. Upon visiting, the attacker uses malicious code on their website to interact with another website. This can be used by an attacker to learn about the user's previous actions on the other website. The information from this attack canuniquely identify the user to the attacker.

These attacks have been documented since 2000. One of the first research papers on the topic was published by researchers atPurdue University. The paper described an attack where theweb cache was exploited to gather information about a website. Since then, cross-site leaks have become increasingly sophisticated. Researchers have found newer leaks targeting various web browser components. While the efficacy of some of these techniques varies, newer techniques are continually being discovered. Some older methods are blocked through updates to browsers. The introduction and removal of features on the Internet also lead to some attacks being rendered ineffective.

Cross-site leaks are a diverse form of attack, and there is no consistent classification of such attacks. Multiple sources classify cross-site leaks by the technique used to leak information. Among the well-known cross-site leaks are timing attacks, which depend on timing events within the web browser. For example,cache-timing attacks rely on the web cache to unveil information. Error events constitute another category, using the presence or absence of events to disclose data. Since 2023, newer attacks that use operating systems and web browser limits to leak information have also been found.

Before 2017, defending against cross-site leaks was considered to be difficult. This was because many of the information leakage issues exploited by cross-site leak attacks were inherent to the way websites worked. Most defences against this class of attacks have been introduced after 2017 in the form of extensions to thehypertext transfer protocol (HTTP). These extensions allow websites to instruct the browser to disallow or annotate certain kinds ofstateful requests coming from other websites. One of the most successful approaches browsers have implemented isSameSite cookies. SameSite cookies allow websites to set a directive that prevents other websites from accessing and sending sensitive cookies. Another defence involves usingHTTP headers to restrict which websites can embed a particular site. Cache partitioning also serves as a defence against cross-site leaks, preventing other websites from using the web cache to exfiltrate data. (Full article...)

WikiProjects

WikiProjects

Did you know(auto-generated) -load new batch

Selected biography

Al Gore, Official portrait, 1994
Albert Arnold "Al" Gore, Jr. (born March 31, 1948) was the forty-fifthVice President of the United States, serving from 1993 to 2001 underPresidentBill Clinton. Gore previously served in theU. S. House of Representatives (1977–85) and theU. S. Senate (1985–93), representingTennessee. He was theDemocratic Partypresidential nominee in the2000 election, and shared the 2007Nobel Peace Prize with theIntergovernmental Panel on Climate Change for his work as anenvironmentalactivist. Gore has been involved with the development of the Internet since the1970s, first as a Congressman and later as Senator and Vice-President. HisHigh Performance Computing and Communication Act of 1991 (often referred to as theGore Bill) was passed on December 9, 1991 and led to theNational Information Infrastructure (NII) which Gore referred to as the "information superhighway."Leonard Kleinrock, a key player in the development of theARPANET, considers the act to be a critical moment in Internet history. Internet pioneersVint Cerf andBob Kahn stated in the 2000 article "Al Gore and the Internet", that Gore was "the first political leader to recognize the importance of the Internet and to promote and support its development."

General images -load new batch

The following are images from various internet-related articles on Wikipedia.

Selected quote

Lester Bowie
I believe that the future of the music lies in the Internet.
Lester Bowie, 1998

Main topics

Internet topics
Articles
Application layer
ARPANET
Blog
Browsers
CERN
Collaborative software
Computer file
Computer network
Computer networking
DARPA
Data (computing)
Electronic commerce
E-mail
English on the Internet
FidoNet
File sharing
History of the Internet
HTML
HyperCard
Hyperlink
ICANN
Instant messaging
Internet access
Internet capitalization conventions
Internet censorship
Internet Control Message Protocol
Internet democracy
Internet Exchange Point
Internet Governance Forum
Internet privacy
Internet Protocol
Internet protocols
Internet research
Internetworking
Massively multiplayer online role-playing game
Mosaic (web browser)
National Center for Supercomputing Applications
Net neutrality
Online chat
Peering
Remote access
Transmission Control Protocol
Scale-free network
Search engine
Security
Social network service
Unicode
Uniform resource locator
User agent
User Datagram Protocol
ViolaWWW
Virtual private network
VoIP
Web browser
Web resource
Web service
Wide area network
World Summit on the Information Society
World Wide Web

Featured content

Extended content
This is a list of recognized content, updated weekly byJL-Bot (talk · contribs) (typically on Saturdays). There is no need to edit the list yourself. If an article is missing from the list, make sure it istagged (e.g.{{WikiProject Internet}}) orcategorized correctly and wait for the next update. SeeWP:RECOG for configuration options.

Featured articles

Good articles

Good topics

Featured pictures

  • Internet map 1024
    Internet map 1024
  • Steve Jobs and Macintosh computer, January 1984, by Bernard Gotfryd - edited
    Steve Jobs and Macintosh computer, January 1984, by Bernard Gotfryd - edited

Featured portals

Level 3 vital articles

Level 4 vital articles

Level 5 vital articles


Categories

Related portals

Things you can do

Associated Wikimedia

The followingWikimedia Foundation sister projects provide more on this subject:

Wikipedia's portals

Retrieved from "https://en.wikipedia.org/w/index.php?title=Portal:Internet&oldid=1274540819"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp