Untitled
Untitled
Untitled
Contents
1 Introduction (0:00–3:00) 2
1
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes
1 Introduction (0:00–3:00)
• Exam 1 is next week during normal lecture hours. You’ll find resources
to help you prepare for the exam, which will be comprehensive, on the
course website. After lecture today, there will also be a review section.
• Assignments are graded on a X–, X, X+ basis whereas exams are graded
on a percentile basis. We’ll soon make a tool available via web or e-mail
that will allow you to verify that you’ve submitted your assignments on
time.
2
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes
3
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes
to access your home computer from outside your home network, you need
to allow certain incoming traffic. For example, Remote Desktop Protocol
(RDP) on PCs and screen-sharing on Macs, which allow you to control
a computer remotely, require external connections to your home network.
RDP operates on port 3389, so if you’d like to be able to control your
home PC remotely,1 you need to configure your router to allow incoming
traffic on port 3389. Furthermore, you need to instruct your router to
forward traffic on this port to the IP address of the home PC you wish
to control. This configuration is called port forwarding. The IP address
of your home PC will also need to be static so that this port forwarding
won’t break if your home PC is suddenly assigned a new IP address on
the network.
4
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes
5
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes
what you’re really telling the spammer is that a real, live person was the
recipient of that message he thought never got delivered. As a reward, he
may just send you more spam. Of course, in the case that the message
you received is the result of your buying something online or subscribing
to a newsletter, the unsubscribe link may actually be genuine.
• Question: why not charge for e-mails being sent? Technologically, it would
be near impossible to plug all the holes. Any number of e-mail servers
would arise that circumvented this policy. Not to mention that it would
certainly hurt many legitimate e-mail users as well.
• Frighteningly, misunderstanding of the internet extends even to those at
the highest levels who make decisions to regulate it. Check out this video
which documents the comments of Senator Ted Stevens as well as John
Hodgman’s humorous discussion of net neutrality.
6
Computer Science E-1 Lecture 4: March 1, 2010
Spring 2010 Andrew Sellergren
Scribe Notes