SlideShare a Scribd company logo
What is a MS Windows network drive?
Drive letters are only of relevance within a MS Windows environment,
and has no relevance on other Operating Systems. In other words it's
ONLY a MS way of assigning a disk resource.
It is a drive letter assigned LOCALLY to a LAN filespace resource. This
drive letter is only valid for use on the LAN and has NO relevance on
WANs, including the Internet.
If some disk space is made available to users, and the user has
permission to access this resource, then on a MS Windows machine
only, and assuming the correct network protocols are being used, then
this disk space can be assigned to a drive letter.
What is a MS Windows Network Drive
dforbes on 'SATURN (nthomes.inf.brad.ac.uk)' is assigned to drive z:
in this example the contents of 'dforbes' filespace on the server called
'SATURN' is assigned to a drive letter z:.
So drive z: is only of relevance to 'dforbes' on his machine. Other users
can also be using a drive z:, but their z: will contain completely different
files from the 'dforbes' user filestore area.
... One drive letter ..... different filestores .... lots of confusion.
How is a filestore assigned to a drive letter?
In 'Windows Explorer' , 'My Network Places', 'Entire Network', 'Microsoft
Windows Network', available workgroups and domains on the LAN are
viewable.
If you are a registered user in a domain, you can enter and view
resources, otherwise.....
Assuming a workgroup or domain service is available.........open the
command prompt.
To view all workgroups and domains on the LAN, type:
c:> net view
If a machine called, say, 'SATURN' is available to you, then connect in the
following way.
c:> net use k: SATURNWebSpace
c:> net use z: SATURNdforbes
The command completed successfully.
SATURN is a Windows compatible NETBIOS name for the server, which is
actually a Unix machine pretending to be a Windows server.
The 'real' name of SATURN is 'nthomes.inf.brad.ac.uk' and 'saturn.inf.brad.ac.uk'.
How can a Unix filestore 'pretend' to be a Windows filestore?
The protocols used are called SMB or 'Server Message Blocks' which are an open
standard. The information transfer using SMB looks the same on a Unix box
running a SAMBA server, as on a Windows box running FileServer.
Internet Hacking Tools - Unix and Windows
What must I understand completely to be a beginner?
• telnet
• ftp
Use telnet to linux1.inf.brad.ac.uk
telnet linux1.inf.brad.ac.uk
Tools to hack with
• YoLinux: List of Linux Security and Hacker Software Tools
http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html
• Unix tools track hackers
http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm
http://www.antihackertoolkit.com/tools.html
• For DNS lookups use -
'dig' (domain information groper) or
host -a 143.53.29.129 ns2.splice1.com or
nslookup Note: nslookup is deprecated and may be removed from future
releases. or
http://www.dns.net/dnsrd/tools.html
C:>nslookup 143.53.29.129 ns1.splice1.com
Server: server4.splice1.com
Address: 66.45.242.178
Name: d209.inf.brad.ac.uk
Address: 143.53.29.129
C:>
Where is the site hosted?
traceroute/tracert
Is the site on-line?
ping
Is there a back door or way in?
nmap
How is the network routing configured?
netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
143.53.28.0 * 255.255.255.0 U 0 0 0 eth1
169.254.0.0 * 255.255.0.0 U 0 0 0 eth1
127.0.0.0 * 255.0.0.0 U 0 0 0 lo
default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1
How are the network cards configured?
ifconfig/ipconfig
satan - Security Administrator Tool for Analyzing Networks
Internet Corporation for Assigned Names and Numbers (ICANN)
http://www.icann.com/
www.internic.net:
• The InterNIC® web site is a public information resource for Internet users
worldwide.
• It provides information on the domain-name system, the domain-name
registration process, and domain-name registrars.
• To access information regarding registered domains, please go to the Registry
Whois.
• For Whois information about country-code (two-letter) top-level domains, try
Uwhois.com.
• http://www.whois.net/
• http://www.betterwhois.com/
• http://www.nic.uk/
• Nominet UK is the registry for .uk internet names.
• Manages the authoritative database of .uk domain name registrations.
• A not-for-profit company - has members instead of shareholders.
• Nominet is officially recognised as the .uk domain name registry by the internet
industry, users and the UK Government.
What Is a Mail Message?
• A mail message generally consists of
• a message body, which is the text of the
message,
• and special administrative data specifying
recipients, transport medium, etc., as you see
when you look at an envelope of a real letter.
A typical mail header may look like this:
Return-Path: <ph10@cus.cam.ac.uk>
Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by
al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for
<terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100
Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13
#1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000
Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT)
From: Philip Hazel <ph10@cus.cam.ac.uk>
Reply-To: Philip Hazel <ph10@cus.cam.ac.uk>
To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com>
Subject: Electronic mail chapter
In-Reply-To: <38921283.A58948F2@animats.net>
Message-ID: <Pine.SOL.3.96.1000130111515.5800A-200000@ursa.cus.cam.ac.uk>
This list is a collection of common header fields
From: This contains the sender's email address and possibly the “real name.” A complete
zoo of formats is used here.
To: This is a list of recipient email address e s. Multiple recipient address e s are separate d by
a com m a.
Cc: This is a list of email address e s that will receive “carbon copies” of the mess a g e.
Multiple recipient address e s are separate d by a com m a.
Bcc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. The
key differenc e betwe e n a “Cc:” and a “Bcc:” is that the address e s listed in a “Bcc:” will
not appear in the header of the mail mess a g e s delivered to any recipient. It's a way of
alerting recipients that you've sent copies of the messa g e to other people without telling
them who those others are. Multiple recipient address e s are separate d by a com m a.
Subject: Describe s the content of the mail in a few words.
Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may
be useful if you have several accou nts, but want to receive the bulk of mail only on the
one you use most freque ntly. This field is optional.
How Is Mail Delivered?
• Generally, you will compose mail using a mailer interface like pine.
• These programs are called mail user agents, or MU A s. If you send a mail
mess a g e, the interface progra m will in most cases hand it to another progra m
for delivery. This is called the mail transportagent, or MT A. On most syste m s
the same MTA is used for both local and remote delivery and is usually
invoke d as a progra m such as sendmail.
•
• Local delivery of mail is, of course, more than just appending the inco min g
mess a g e to the recipient's mailbox. Usually, the local MT A understa n d s
aliasing (setting up local recipient address e s pointing to other address e s) and
forwardin g (redirecting a user's mail to some other destination). Also,
mess a g e s that cannot be delivered must usually be bounced, that is, returne d
to the sender along with some error mess a g e.
• Mail delivered over a network using TCP/IP, commonly
uses Simple Mail Transfer Protocol (SMTP).
• SMTP was designed to deliver mail directly to a
recipient's machine, negotiating the message transfer
with the remote side's SMTP daemon.
• Today it is common practice for organizations to
establish special hosts that accept all mail for
recipients in the organization and for that host to
manage appropriate delivery to the intended recipient.
Email Addresses
• Email addresses are made up of at least two parts.
• One part is the name of a mail domain that will ultimately
translate to either the recipient's host or some host that accepts
mail on behalf of the recipient.
• The other part is some form of unique user identification that
may be the login name of that user, the real name of that user in
“Firstname.Lastname” format, or an arbitrary alias that will be
translated into a user or list of users.
• Internet sites adhere to the RFC-822 standard, which requires
the familiar notation of user@host.domain, for which
host.domain is the host's fully qualified domain name. The
character separating the two is properly called a “commercial at”
sign, but it helps if you read it as “at.”
How Does Mail Routing Work?
• The process of directing a message to the
recipient's host is called routing .
• Apart from finding a path from the sending site
to the destination, it involves error checking and
may involve speed and cost optimization.
Mail Routing on the Internet
• On the Internet, the destination host's configuration determines
whether any specific mail routing is performed.
• The default is to deliver the message to the destination by first
determining what host the message should be sent to, and then
delivering it directly to that host.
• Most Internet sites want to direct all inbound mail to a highly
available mail server that is capable of handling all this traffic
and have it distribute the mail locally.
• The Mail Exchanger is a machine that states that it is willing to
act as a mail forwarder for all mail addresses in the domain.
DOS - Disk Operating Systems
DOS provides the prime means of interaction between the user and
the computer hardware.
The command interface (DOS prompt) converts keyboard
commands into instructions understood by the machine hardware.
Without DOS there is no means of interpreting input commands.
The GUI "sits" on top of DOS and provides a graphical equivalent of
keyboard commands.
Windows - written by Microsoft for PC's.
UNIX and UNIX clones, eg. Linux, Apple

More Related Content

PPTX
Networking presentation
PPT
Common Network Services
PPT
PDF
Application layer protocol
PDF
Introduction to HTTP
DOCX
Bt0076, tcpip
PPT
Domain Name Server
DOCX
Bt0076, tcpip
Networking presentation
Common Network Services
Application layer protocol
Introduction to HTTP
Bt0076, tcpip
Domain Name Server
Bt0076, tcpip

What's hot (20)

PPTX
Email and DNS
PPTX
Dhcp, dns and proxy server (1)
PPT
Domain Name Service
PPTX
DNS & HTTP overview
PPTX
Web technologies: HTTP
PPTX
PPTX
Electronic Mail
PPTX
Http-protocol
PDF
Lecture17
PPTX
Http protocol
PPTX
Domain Name System
PPTX
PPT
HyperText Transfer Protocol
PPTX
Basic concept of internet
PPT
Lecture 4 -_internet_infrastructure_2_updated_2011
PPT
Chapter 06
PDF
Email and DNS
Dhcp, dns and proxy server (1)
Domain Name Service
DNS & HTTP overview
Web technologies: HTTP
Electronic Mail
Http-protocol
Lecture17
Http protocol
Domain Name System
HyperText Transfer Protocol
Basic concept of internet
Lecture 4 -_internet_infrastructure_2_updated_2011
Chapter 06
Ad

Viewers also liked (7)

PPT
Video tech final
PPT
Q3 summary-student information-partial
PDF
To Understand Video
PPTX
Composition 2.pptx
PPTX
Composition
PPTX
Guardians institutions.pptx
PPTX
15 mise en scene infographics
Video tech final
Q3 summary-student information-partial
To Understand Video
Composition 2.pptx
Composition
Guardians institutions.pptx
15 mise en scene infographics
Ad

Similar to What is a MS Windows Network Drive (20)

PPTX
Computer network
PPTX
Application layer
PPTX
Electronic mail
PPT
Email
DOCX
How email works
PDF
Final year project report on Internet And Interanet Emailing server
PPT
Internet Tutorial 02
 
PPTX
unit 5.pptxhhhnggjfvbjoohcchvvikbkbkbobh
PDF
Lecture 9 electronic_mail_representation_and_transfer
PDF
The Fundamental of Electronic Mail (E-mail)
PPTX
Electronic mail
PPT
Chapter 8 E-Mail
PPT
Mail server
PPT
Mail server
PPTX
window server 2008 mail configuration
PDF
Beginner Series 7 2009 Final
PDF
Internet technology unit 6
PPTX
7_Chapter 7_Email.pptx
PPTX
Internet mail server
Computer network
Application layer
Electronic mail
Email
How email works
Final year project report on Internet And Interanet Emailing server
Internet Tutorial 02
 
unit 5.pptxhhhnggjfvbjoohcchvvikbkbkbobh
Lecture 9 electronic_mail_representation_and_transfer
The Fundamental of Electronic Mail (E-mail)
Electronic mail
Chapter 8 E-Mail
Mail server
Mail server
window server 2008 mail configuration
Beginner Series 7 2009 Final
Internet technology unit 6
7_Chapter 7_Email.pptx
Internet mail server

More from adil raja (20)

PDF
ANNs.pdf
PDF
A Software Requirements Specification
PDF
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
PDF
DevOps Demystified
PDF
On Research (And Development)
PDF
Simulators as Drivers of Cutting Edge Research
PDF
The Knock Knock Protocol
PDF
File Transfer Through Sockets
PDF
Remote Command Execution
PDF
Thesis
PDF
CMM Level 3 Assessment of Xavor Pakistan
PDF
Data Warehousing
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
PDF
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
PDF
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
PDF
VoIP
PDF
ULMAN GUI Specifications
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
PDF
ULMAN-GUI
PDF
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
ANNs.pdf
A Software Requirements Specification
NUAV - A Testbed for Development of Autonomous Unmanned Aerial Vehicles
DevOps Demystified
On Research (And Development)
Simulators as Drivers of Cutting Edge Research
The Knock Knock Protocol
File Transfer Through Sockets
Remote Command Execution
Thesis
CMM Level 3 Assessment of Xavor Pakistan
Data Warehousing
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Implementation of a Non-Intrusive Speech Quality Assessment Tool on a Mid-Net...
Real-Time Non-Intrusive Speech Quality Estimation for VoIP
VoIP
ULMAN GUI Specifications
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...
ULMAN-GUI
Modeling the Effect of Packet Loss on Speech Quality: Genetic Programming Bas...

Recently uploaded (20)

PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
The Evolution of Traditional to New Media .pdf
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PPTX
artificial intelligence overview of it and more
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
si manuel quezon at mga nagawa sa bansang pilipinas
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
simpleintnettestmetiaerl for the simple testint
t_and_OpenAI_Combined_two_pressentations
newyork.pptxirantrafgshenepalchinachinane
The Evolution of Traditional to New Media .pdf
SAP Ariba Sourcing PPT for learning material
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Introduction to cybersecurity and digital nettiquette
Design_with_Watersergyerge45hrbgre4top (1).ppt
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
artificial intelligence overview of it and more
Mathew Digital SEO Checklist Guidlines 2025
SASE Traffic Flow - ZTNA Connector-1.pdf
Power Point - Lesson 3_2.pptx grad school presentation
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟

What is a MS Windows Network Drive

  • 1. What is a MS Windows network drive? Drive letters are only of relevance within a MS Windows environment, and has no relevance on other Operating Systems. In other words it's ONLY a MS way of assigning a disk resource. It is a drive letter assigned LOCALLY to a LAN filespace resource. This drive letter is only valid for use on the LAN and has NO relevance on WANs, including the Internet. If some disk space is made available to users, and the user has permission to access this resource, then on a MS Windows machine only, and assuming the correct network protocols are being used, then this disk space can be assigned to a drive letter.
  • 3. dforbes on 'SATURN (nthomes.inf.brad.ac.uk)' is assigned to drive z: in this example the contents of 'dforbes' filespace on the server called 'SATURN' is assigned to a drive letter z:. So drive z: is only of relevance to 'dforbes' on his machine. Other users can also be using a drive z:, but their z: will contain completely different files from the 'dforbes' user filestore area. ... One drive letter ..... different filestores .... lots of confusion.
  • 4. How is a filestore assigned to a drive letter? In 'Windows Explorer' , 'My Network Places', 'Entire Network', 'Microsoft Windows Network', available workgroups and domains on the LAN are viewable. If you are a registered user in a domain, you can enter and view resources, otherwise..... Assuming a workgroup or domain service is available.........open the command prompt.
  • 5. To view all workgroups and domains on the LAN, type: c:> net view If a machine called, say, 'SATURN' is available to you, then connect in the following way. c:> net use k: SATURNWebSpace c:> net use z: SATURNdforbes The command completed successfully. SATURN is a Windows compatible NETBIOS name for the server, which is actually a Unix machine pretending to be a Windows server. The 'real' name of SATURN is 'nthomes.inf.brad.ac.uk' and 'saturn.inf.brad.ac.uk'. How can a Unix filestore 'pretend' to be a Windows filestore? The protocols used are called SMB or 'Server Message Blocks' which are an open standard. The information transfer using SMB looks the same on a Unix box running a SAMBA server, as on a Windows box running FileServer.
  • 6. Internet Hacking Tools - Unix and Windows What must I understand completely to be a beginner? • telnet • ftp Use telnet to linux1.inf.brad.ac.uk telnet linux1.inf.brad.ac.uk
  • 7. Tools to hack with • YoLinux: List of Linux Security and Hacker Software Tools http://www.yolinux.com/TUTORIALS/LinuxSecurityTools.html • Unix tools track hackers http://insight.zdnet.co.uk/hardware/servers/0,39020445,2123102,00.htm http://www.antihackertoolkit.com/tools.html • For DNS lookups use - 'dig' (domain information groper) or host -a 143.53.29.129 ns2.splice1.com or nslookup Note: nslookup is deprecated and may be removed from future releases. or http://www.dns.net/dnsrd/tools.html C:>nslookup 143.53.29.129 ns1.splice1.com Server: server4.splice1.com Address: 66.45.242.178 Name: d209.inf.brad.ac.uk Address: 143.53.29.129 C:>
  • 8. Where is the site hosted? traceroute/tracert Is the site on-line? ping Is there a back door or way in? nmap How is the network routing configured? netstat -r Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 143.53.28.0 * 255.255.255.0 U 0 0 0 eth1 169.254.0.0 * 255.255.0.0 U 0 0 0 eth1 127.0.0.0 * 255.0.0.0 U 0 0 0 lo default Skipton.cen.bra 0.0.0.0 UG 0 0 0 eth1 How are the network cards configured? ifconfig/ipconfig satan - Security Administrator Tool for Analyzing Networks
  • 9. Internet Corporation for Assigned Names and Numbers (ICANN) http://www.icann.com/ www.internic.net: • The InterNIC® web site is a public information resource for Internet users worldwide. • It provides information on the domain-name system, the domain-name registration process, and domain-name registrars. • To access information regarding registered domains, please go to the Registry Whois.
  • 10. • For Whois information about country-code (two-letter) top-level domains, try Uwhois.com. • http://www.whois.net/ • http://www.betterwhois.com/ • http://www.nic.uk/ • Nominet UK is the registry for .uk internet names. • Manages the authoritative database of .uk domain name registrations. • A not-for-profit company - has members instead of shareholders. • Nominet is officially recognised as the .uk domain name registry by the internet industry, users and the UK Government.
  • 11. What Is a Mail Message? • A mail message generally consists of • a message body, which is the text of the message, • and special administrative data specifying recipients, transport medium, etc., as you see when you look at an envelope of a real letter.
  • 12. A typical mail header may look like this: Return-Path: <ph10@cus.cam.ac.uk> Received: ursa.cus.cam.ac.uk (cusexim@ursa.cus.cam.ac.uk [131.111.8.6]) by al.animats.net (8.9.3/8.9.3/Debian 8.9.3-6) with ESMTP id WAA04654 for <terry@animats.net>; Sun, 30 Jan 2000 22:30:01 +1100 Received: from ph10 (helo=localhost) by ursa.cus.cam.ac.uk with local-smtp (Exim 3.13 #1) id 12EsYC-0001eF-00; Sun, 30 Jan 2000 11:29:52 +0000 Date: Sun, 30 Jan 2000 11:29:52 +0000 (GMT) From: Philip Hazel <ph10@cus.cam.ac.uk> Reply-To: Philip Hazel <ph10@cus.cam.ac.uk> To: Terry Dawson <terry@animats.net>, Andy Oram <andyo@oreilly.com> Subject: Electronic mail chapter In-Reply-To: <38921283.A58948F2@animats.net> Message-ID: <Pine.SOL.3.96.1000130111515.5800A-200000@ursa.cus.cam.ac.uk>
  • 13. This list is a collection of common header fields From: This contains the sender's email address and possibly the “real name.” A complete zoo of formats is used here. To: This is a list of recipient email address e s. Multiple recipient address e s are separate d by a com m a. Cc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. Multiple recipient address e s are separate d by a com m a. Bcc: This is a list of email address e s that will receive “carbon copies” of the mess a g e. The key differenc e betwe e n a “Cc:” and a “Bcc:” is that the address e s listed in a “Bcc:” will not appear in the header of the mail mess a g e s delivered to any recipient. It's a way of alerting recipients that you've sent copies of the messa g e to other people without telling them who those others are. Multiple recipient address e s are separate d by a com m a. Subject: Describe s the content of the mail in a few words. Reply-To: Specifies the address the sender wants the recipient's reply directed to. This may be useful if you have several accou nts, but want to receive the bulk of mail only on the one you use most freque ntly. This field is optional.
  • 14. How Is Mail Delivered? • Generally, you will compose mail using a mailer interface like pine. • These programs are called mail user agents, or MU A s. If you send a mail mess a g e, the interface progra m will in most cases hand it to another progra m for delivery. This is called the mail transportagent, or MT A. On most syste m s the same MTA is used for both local and remote delivery and is usually invoke d as a progra m such as sendmail. • • Local delivery of mail is, of course, more than just appending the inco min g mess a g e to the recipient's mailbox. Usually, the local MT A understa n d s aliasing (setting up local recipient address e s pointing to other address e s) and forwardin g (redirecting a user's mail to some other destination). Also, mess a g e s that cannot be delivered must usually be bounced, that is, returne d to the sender along with some error mess a g e.
  • 15. • Mail delivered over a network using TCP/IP, commonly uses Simple Mail Transfer Protocol (SMTP). • SMTP was designed to deliver mail directly to a recipient's machine, negotiating the message transfer with the remote side's SMTP daemon. • Today it is common practice for organizations to establish special hosts that accept all mail for recipients in the organization and for that host to manage appropriate delivery to the intended recipient.
  • 16. Email Addresses • Email addresses are made up of at least two parts. • One part is the name of a mail domain that will ultimately translate to either the recipient's host or some host that accepts mail on behalf of the recipient. • The other part is some form of unique user identification that may be the login name of that user, the real name of that user in “Firstname.Lastname” format, or an arbitrary alias that will be translated into a user or list of users. • Internet sites adhere to the RFC-822 standard, which requires the familiar notation of user@host.domain, for which host.domain is the host's fully qualified domain name. The character separating the two is properly called a “commercial at” sign, but it helps if you read it as “at.”
  • 17. How Does Mail Routing Work? • The process of directing a message to the recipient's host is called routing . • Apart from finding a path from the sending site to the destination, it involves error checking and may involve speed and cost optimization.
  • 18. Mail Routing on the Internet • On the Internet, the destination host's configuration determines whether any specific mail routing is performed. • The default is to deliver the message to the destination by first determining what host the message should be sent to, and then delivering it directly to that host. • Most Internet sites want to direct all inbound mail to a highly available mail server that is capable of handling all this traffic and have it distribute the mail locally. • The Mail Exchanger is a machine that states that it is willing to act as a mail forwarder for all mail addresses in the domain.
  • 19. DOS - Disk Operating Systems DOS provides the prime means of interaction between the user and the computer hardware. The command interface (DOS prompt) converts keyboard commands into instructions understood by the machine hardware. Without DOS there is no means of interpreting input commands. The GUI "sits" on top of DOS and provides a graphical equivalent of keyboard commands. Windows - written by Microsoft for PC's. UNIX and UNIX clones, eg. Linux, Apple