Attend class to learn about how to set up your website in Dreamweaver. You will learn how to create divs, place images, create an interactive menu and more.
Use this link TechTerms.com, Webopedia.com and find your own web dictionary to research the terms below:
What is a (Web) Host/(Web) Hosting?
What does ISP stand for?
Example of 2 free hosting services (provide links)
What is FTP?
What is a Domain name?
Explain IP Address and give an example!
What is the difference between a static and a dynamic IP address?
Find and list prices for a domain name made up of your name on http://who.is/
What is the difference between a server and a PC?
What is a Web Server?
What is a Gateway?
Give an example for a Gateway.
What is the purpose of a Firewall and where is it located?
What is meant by Malware?
Give 3 examples for Malware!
How can you protect your computer against Malware?
Give three examples of software designed to protect your computer!
Define HTTP.
Define HTTPS. How does it differ from HTTP?
What is a URL?
Define SSL.
Explain the acronym TCP! How does it relate to IP?
Upload the Complete File on MyKangan
Create a new Word Document and insert all your definitions in there with the source of your information. Next upload this as a Day 1 Task on MyKangan in ICAWEB408A-Ensure Basic Website Security.
Example of a Network with Routers , Servers, Host PCs – Courtesy of: The TPC/IP Guide (click on image for link)
You can view the different routers that your host PC will visit when accessing a Web page:
Launch the command prompt from a Windows-based computer click: Start > All Programs > Accessories
> Command Prompt. Type tracert and hit enter. This process is called tracing route to a website.
tracert command
Internet Security
I would like to thank Anonymous alias JB for the most of the documentation below.
Read all the information below to be able to complete your assessment task for this unit.
Protect Fixed Internet Connection and IP Address
The IP address is always visible to the outside world. Internally, you can reduce its visibility for non-technical persons but not eliminate knowledge of the address.
Security updates on server/gateway.
Security exploitation is commonplace today and so it is essential that security patches for gateway machines are kept current.
Only gateway devices should have public IP addresses, not internal network computers, which should be on a private network address scheme.
Use and Maintain Antivirus Software
It is paramount to not just have Antivirus software installed, but to maintain currency .
Sharing is the primary productivity benefit of networking. We have to share resources on the network such as printers and file folders in order to be productive. Some of those resources might be shared outside the local network (eg the incoming mail server) but most local network files and hardware are not meant for use outside the organisation and need to be protected. This may also include computerised machine tools used in manufacture and the building air-conditioning and lighting which may be computer controlled.
TCP/IP is the modern network topology. A key feature of the protocol is that different types of traffic (eg Email, web, telephone) are sent to different ‘ports’. There are 65535 Ports available of which the first 1024 are reserved. Of these 1024 reserved ports, only the first 256 are in common use. That means there are tens of thousands of potential gateways into your network that are not in active use. From a security point of view, these open ports are like open doors to a building, with one important difference. Although they are open, there may not be anything on the other side of the door (an empty room). However, Trojans exploit these ports for communication and open ports are a leading cause of the spread of DDOS and other security threats. The primary function provided by all Firewall services is to control the range of open ports. Only those ports intended to be available for use should be open on the firewall. (Note: KANGAN does not seem to apply this restriction.)
Firewall
It is necessary to protect the interface between the local network and the internet by the use of a Firewall. A Firewall will allow management of what links (protocols/ports) are available between the local network and the internet. For example, it would be possible to only allow Email traffic.
A Firewall may either be software running on the gateway or most likely today an Appliance that sits between the Gateway and the Internet. The advantage of an Appliance is that it is purpose built for managing security risks.
Password Strength
Weak passwords are the single most common cause of security failure.
Ensure that personal computer protocols and preferences follow security protocols. (Too many uses of the word protocol here and with different nuances of meaning).
As the risk of an unexpected new threat is always there, it is essential that there are rules for how information about the internal network is managed. These include, establishing minimum password lengths and types, where business files are saved and how or if visitors are allowed any computer access.
Ensure that all staff understand security issues and in particular the role of HTTPS in creating secure data links; how to handle suspicious email and what to do if they suspect their computer is infected by a virus or otherwise compromised.
Ensure that processes exist to install and maintain Antivirus on all workstations.
Induction program for new staff on computer security and use procedures.
Disable Control Protocol
Disable control protocol or internet protocol bindings for file and printer sharing. (This is not relevant to modern Windows releases which implement security over file and printer access on the TCP/IP network.)
When a computer is directly connected to the internet, (e.g. at Home) shared printers and shared files are exposed to the internet and this can be exploited, particularly if passwords on the files/printers do not exist or are weak. At home, disabling file and printer sharing would prevent sharing of things such as iTunes on the local network. The better strategy is to make sure you have very strong passwords on the printer and file shares.
Do not disable or uninstall File and Printer sharing on a Business network. Disabling this will mean that the network cannot operate effectively in sharing data and services, which is its main purpose. In commercial environments (e.g. Kangan), TCP/IP is usually the only network protocol in use and the gateway server/appliance is the first level of defence against outside access. Most modern networks store shared files only on the server with robust security measures controlled by the server software.
NETBIOS and TCP/IP
Ensure that network basic input/output system (NETBIOS) over TCP/IP is disabled.
NETBIOS is a network Applications Programming Interface (API) that was used prior to Windows 2000 / XP to identify the individual computers on the network. Essentially it was the means by which data was directed across the network, by applications, to the computer that required it. It is not really a network protocol as such, more like a utility that software can implement to communicate between machines. It is not secure as it was developed in the context that the network was ‘trusted’ and only local (not internet exposed). NETBIOS is easily exploited to gain unauthorised access.
NETBIOS exists by default in all Windows releases using TCP/IP, including Windows 8. NETBIOS should not be implemented on any current systems and must be disabled.
You can disable NETBIOS using Group Policy on the Server or by individually disabling under Control Panel/ Local Network Connections / TCP/IP Advanced Settings / WINS
When Windows 2000 / XP first came out, NETBIOS was required to allow for some applications to work across networks that also had Windows98 machines. Those applications and services that depend on NetBIOS over TCP/IP no longer function once NetBIOS over TCP/IP is disabled.
Assessment Task
Please download the assessment task here (on Wednesday) and upload to MyKangan.
Feedback
Please leave your feedback in form of a comment. Your feedback and suggestions will help me to make this blog more user friendly. Thanks!
Today we will commence on your assessment for this class. You will need to design a website for a client to promote his work or services. See examples below as a result of an in-class brain storm:
Portfolio of a designer, web-designer, graphic designer, fashion designer, …
Portfolio of an artist or illustrator
Portfolio of a photographer
Website for a horse trainer
Website for a singer
Website for a humanitarian organisation, eg Doctors Without Borders
Website for a restaurant
Four Web Pages
You will need to create 4 web pages using Dreamweaver or a WYSIWYG (What you see is what you get) code editor. These are the pages for you to create:
Home Page
About us and Contact
Gallery or Portfolio of Work
Bookings or Purchase Requests
Step 1 – Brainstorm Ideas
Brainstorm ideas for a website (if portfolio for a photographer, what type of photographer, wedding, portrait, famous photographer, …)
Step 2 – Research Content
Go online and research what content you can find for your website. Use Creative Commons sites whenever possible:
Otherwise use Google and add Creative Commons to your search criteria.
Step 3 – Storyboard
Create a storyboard for the website. Before you can create the storyboard you will need to organise all the different elements. Please refer to the Storyboard Workshop from Tuesday:
Storyboarding for Web Designers
Webdesigners benefit from storyboarding. It helps organising content and ensures that every element is included in a logical place according to topic and site.
Create the website in Dreamweaver (or any other Code editor) using HTML, CSS and if necessary JavaScript or JQuery.
Your website needs to have a well-designed layout
Attend class to learn about how to set up your website in Dreamweaver. You will learn how to create divs, place images, create an interactive menu and more.
Design and Layout
Here are some important standards to consider for a convincing, well-communicated web page:
This workshop is about creating storyboards. A storyboard is a number of drawings, descriptions and annotations that help organising a story visually.
A storyboard is helpful in establishing a number of steps within a story. It will support you in organising the elements and give your story a clear focus.
Storyboards are used in a number of fields and industries:
film and TV
animation
choreography
theatre
dance
opera
web design
game design
writing
other multimedia fields
Storyboarding a film is quite different from storyboarding a website.
Storyboards can be created using software or it can be created with pen and paper.
Pen and Paper
When you create a storyboard on paper I recommend to use colours and plenty of annotations.
Example of a storyboard with annotations. Courtesy of Sarah Pritchard.
Software
Most software packages will allow you to create storyboards:
Adobe Photoshop
Adobe Illustrator
Corel Draw
MS Word
MS PowerPoint
There are also some specialised software packages for creating storyboards:
StoryBoard Artist Studio
StoryBoard Pro
Inspiration
There are also numerous websites that allow you to create storyboards:
Webdesigners benefit from storyboarding. It helps organising content and ensures that every element is included in a logical place according to topic and site.
Make sure to play with the different values at this link Boxmodel in W3Schools TryEditor, eg change the padding, margin, border, content to actually see the difference that it makes. Spend at least 20-30 mins changing values around.
After entering the Adobe TV site (link above) you should see an icon with resources at the top of the window. Download these and install on your D-drive.
Note: You will not see resources unless you have sign up with Adobe TV (for free).
Illustration: Tavis Coburn – Illustration for for an article predicting trends in Apple’s mobile strategy. Found on: TavisCoburn.com
Study – Lines and Grace Kelly – by Federico Viola photo: courtesy of GettingCheeky.com and curved lines wallpaper: courtesy of FreeFever.com
Some of us have there most enjoyable moments in nature at the beach, Photo by rivediamoci on morgueFiles
Illustrator unknown – found at: Ephemera – World of Rare Books
Photo by clarita on www.morguefile.com
Photo by matthewbridges on morgueFile.com
Text and Shapes – This design lends itself to an interactive use – found at: Smashing Magazine (click image for inspiring article on table of content design)
Image Source: www.photoshopessentials.com
Work by Egon Schiele, found at Mom.org
Text and Shapes – This design lends itself to an interactive use – found at: Klafferty.com
Photo by mconnors on morgueFile
Illustration by Jessie Ford, found on DzineBlog.com
Illustration by Gary Neill found on P.A.P.-Blog – http://garyneill.com/ http://garyneill.tumblr.com/
Photo by hotblack on morgueFile.com
Only practice will help you learn! Photo by BreonWarwick on morgueFile
Text-based Table of Content – Very Graphic and Black and White- found at: Smashing Magazine (click image for inspiring article on table of content design)
Image source: Data Center Knowledge
Geese in Ameland, Photo by Frans Schouwenburg
Poppies – Vector art Federico Viola based on photo by hotblack from morgueFile
Experimental Photomontage by Robert Heinecken
Britons, Lord Kitchener Wants You! Propaganda poster design from WWI by Alfred Leere. Image: courtesy of WorldWarEra.com
Based on a photo by delboysafa from morgueFile.com
The Face by drfranken found on ChromoArt.de
Uncle Sam Wants You, WWI Propaganda Poster for US Army recruits, Design by James Montgomery Flagg, 1916, image found at: Live Auctioneers
Illustration: Jamie McKelvie – Art Brut Record
Michael Pointing in GTA V – Courtesy of Rockstar
ruthworkx -http://ruthworkx.files.wordpress.com
Peace- Swiss International Style Reference – by Maryam Chananeh
Leonardo’s St. John the Baptist, Louvre, Paris, Image: courtesy of A World History of Art – www.all-art.org
Pink Ribbon Day – Swiss International Style Reference – by Hwan Rochanabuddhi
Vertical lines of a dark fence, image courtesy of p.ic – Photo Internet Collection – www.photoic.wordpress.com, photographer: Federico Viola
Screenshot from What’s Your Story by Joyce Hostyn
Screenshot – 82 Everyone is a Marketer by Seth Godin from What’s Your Story by Joyce Hostyn
Grassy Rabbits
From ‘Henri’s Walk to Paris’ 1962 – children’s book by Saul Bass Found at: Brainpickings.org
Constructivism Reference – by Lylah Livingston
Photo Montage by SGlider12 on Webdesign.org – Click image for great Gimp tutorial
The swirls in the image are made up of numerous lines. Courtesy of: www.openprocessing.org
Screenshot of Endless Alphabet 2, courtesy of AppsPlayground.com
Based on photo by xandert found on morgueFile
The Glossy Reflection is transparent on top and gets whiter towards the bottom.
Close-up at Fed Square, Federico Viola 2013
Photo by ariadna on morgueFile
I Want You – Emily Strange, The lovable Emily Strange came to life in 1991, designed by Nathan Carrico for Santa Cruz Skateboards. She is referred to as a counterculture icon. I would just call her a sceptic. Image found at: Kollectable Kaos
Photo by agathabrown on morgueFile
The concept was used on the German side as well with this ‘Auch du sollst beitreten zur Reichswehr’ [You too should join the German Army], design by Julius Engelhard, Image: courtesy of mental_floss
The grass layer has been turned into a clipping mask with the shape of the rabbit below.
Illustration by Jessie Ford, found on DzineBlog.com
Study – Lines and Grace Kelly – by Federico Viola photo: courtesy of GettingCheeky.com and curved lines wallpaper: courtesy of FreeFever.com
Example of applied changes
From ‘Henri’s Walk to Paris’ 1962 – children’s book by Saul Bass Found at: Brainpickings.org
Setting the grid up.
Courtesy of The Art of Mass Effect Universe’, 2012
Free Transform and Ctrl – I am loving it!!!
Italian movie poster found on Abduzeedo.com
Swiss travel poster from 1934 by Herbert Matter – Source: http://swisstype.wordpress.com/work/
Based on photo by dhester from morgueFile.com
Examples of Output and Display for web-content. Image: live.surveyshack.com
Multimedia Production Cycle – This image is under the Creative Common Agreement, you can use it but will need to reference this site: www.classoffederico.wordpress.com
Based on image by hotblack on morgueFile.com – F.Viola
The gentle curve of the river and the light green tones of the grass give this image a calming feel. The montains and the clouds have a less calming effect. Image: courtesy of Icon Photography School – http://www.photographyicon.com/line/
Found at Inc.com
Colourful Table of Content – Ribbons in Primary Colours – found at: LifeBlue.com
Finding the Right Candidate for a Job… – Photo AdamRiley from www.projectnoah.org
Massive Attack – The Essential Mix
Lines and Gradients- Courtesy of: psdtuts+
Contemporary design in style of Construcitvism by Teo Brito found at LauraGreen92 – click image for more information and link to her blog
The underlined text and insertion point at end of the word indicates that you are still in the type mode.
Illustration by Gary Neill found on Dzineblog.com – http://garyneill.com/ http://garyneill.tumblr.com/
He loves OHS! – Photo by Karpati Gabor on morgueFile
Illustration: Jamie McKelvie – Suburban Glamour Comic Series
Mosaic of Sofia Coppola – by Maurizio Galimberti – www.mauriziogalimberti.it
Photo by dharder on morgueFiles.com
Layers in Photoshop are like a Collage of images stuck on top of each other…
What Time is it Now? by King_Bobbles
Photo by frenchbyte on morgueFile
Illustration by Tavis Coburn found on DzineBlog.com
Source: morgueFile, Photo by matei
This is a template for a business website found at TemplateMonster. It is interesting in the sense that it breaks up the main image as part of the navigation. The sound it comes with is annoying.
A Beautiful Piece by Aerosol found on his Facebook
Illustration by Kate Miller, found on DzineBlog.com
Using the Reflect tool (o) to reflect the i downwards as if it has collapsed in front.
Your Lipstick Needs You, an entertaining take by Digital Media Artist Samantha Cain. Courtesy of: Samantha Cain, http://www.behance.net/samanthacain
Milk Poster – Swiss International Style Reference – by Annabel Stephen Salip
Good Morning! Photo: wallyir, from: morgueFile.com
‘For Great Road Trips: Switzerland’ Poster by Herbert Matter in (Swiss) International Style – Source: http://swisstype.wordpress.com/work/
Fruity Design – This is great for a menu, very appetizing thumbnails – found at: WeddingPhotography.com
Typographic with Colours and Photos – The use of large numbers is effective and the low opacity of the boxes works, personally, I find it looks a bit dated- found at: JuxtaPost.com
Image from morgueFile by lemai13
Photo by mcconnors on morgueFile
Table of Content from Textbook – This design lends itself to an interactive use – found at: Smashing Magazine (click image for inspiring article on table of content design)
Work by Justin Anderson
Courtesy of The Art of Mass Effect Universe’, 2012
Work by Jo W
Colours, Numbers and Boxes – very happy and alive, personally I do not like the distortion of the word content – found at: Flickr