Welcome. Thanks for being here.
This Page is designed to be a quick technology ‘leg-up’, to get the most important points across about owning a domain name and/or a website, in approximately the least amount of words and hopefully not too much opinion.
Owning and operating a website can basically be broken down into three recurring costs:
(Do follow the links, it’s easy to get back)
- Registering a Domain Name – Fairly cheap.
- Web Site Hosting – Also fairly cheap
- Web Development – Hopefully cheap, but this is usually most of the cost.
Follow the links above for information on those three items.
For a primer on the technology and some of the terminology in use today, please just open the sections below:
The Internet
More
Domain Name System (DNS)
More
A note on .AU registrations
More
a) an Australian registered company; or
b) trading under a registered business name in any Australian State or Territory; or
c) an Australian partnership or sole trader; or
d) a foreign company licensed to trade in Australia; or
e) an owner of an Australian Registered Trade Mark; or
f) an applicant for an Australian Registered Trade Mark; or
g) an association incorporated in any Australian State or Territory; or
h) an Australian commercial statutory body.
Similarly for .net.au and .org.au. Full details on eligibility were once available here, though may have moved. The AUDA will likely be here for a while and all those rules and their interpretation are their bag.
Email and your domain name/s
More
Similarly, electronic mail or email doesn’t always leave by the same method it arrives or the same server. Separate server processes handle the reception and sending of mail. The Serial Mail Transport Protocol (or SMTP) server is the electronic equivalent of the mailbox at the post office or down the street. Its role is to receive messages and send them on to the destination, any destination. Not caring, only sending. Any form of error that prevents it delivering its message will prompt it to throw a Non Delivery Report to the Postmaster for you. That SMTP server and all the other SMTP servers working around the world are analogous to the Australia Post mail system, there’s one everywhere that’s important, or likely to receive traffic in the form of mail.
The other side of the equation for electronic mail is a Post Office Protocol 3 or POP3 server. This is probably analogous to the Postmaster back at the local Post Office. He’s the guy that issues you your key to your PO Box (electronically, a username and password combination can be thought of as your ‘key’ … see below) and ensuring that mail that arrives addressed for you is inserted into the right mailbox. He also turns away mail that can’t be delivered, usually marking each envelope as he does so. If you forget to empty your mailbox and it becomes too full, the electronic Postmaster will stop receiving messages for you, but he won’t call and complain, which is nice. So every email address is almost exactly like a PO Box. We might leave an instruction for the postmaster to forward our mail to another address and he will do just that. We could ask him to leave a copy in the postbox as he does so, and being an electronic process, he’s more than happy to run your mail through a photocopier and put a copy in BOTH mailboxes, in a prcoess known as Email forwarding. Putting a message in both mailboxes is actually easier for the electronic postmaster, as he doesn’t have to come back and ‘clear’ the message from the original mailbox, like he may have if he was leaving only one copy.
You might have your partner check a shared PO Box and leave the mail in there (for whatever reason). That would be similar to when you send two devices to check a single POP3 mailbox. If either of the devices removes the message from the mailbox before the other sees it, it won’t be available for who or whatever comes next to check the mailbox, same as a letter at the PO Box that’s already been collected. If you cant find that piece of mail you expected and two people had access to your PO Box, you would likely ask them if they had gotten it before long. Having a policy that you’ll remove mail after a month, means that the mailbox won’t usually overfill, and every device connected to the account has a month to get any message before anything removes it.
If a message gets sent from your street address to an address that doesn’t exist, the mail system notifies you. In real life, this is in the form of the letter returned to you with a short description of the problem, “Not at this address”, “Unknown Recipient”,”Insufficient Postage Applied” or whatever. In an electronic mail system this type of message is called a Non-Delivery Report or NDA. Being that the electronic postmaster is terribly efficient and has an awful lot of data on hand about any given message, the report is somewhat longer than just ‘Return to Sender’ and will contain almost everything that has happened to the message since it left the sender. In some gobbly-de-gook code that could possibly be deciphered by the FBI and a hefty budget increase. Some times the error isn’t fatal, but the mail system marks the message in an invisible header and moves it on anyway, maybe it was a suspected Spam message. If the message was checked for viruses, the header will be marked with the result.
Those nasty spammers have found that they can exploit the usual handling of a non-delivery report and they post their message exactly as if you had sent it and a receiving server had rejected it. This gets around a lot of ‘Sender Restrictions’ that are applied at the server level to restrict spam. The spammers attitude is: If you can build a higher wall, I can build a higher ladder.
A Note on Passwords ‘held’ online
More
So if a password is like a key that gets you into a system, what is letting you in is synonymous to a lock. They’re telling you the truth (probably), that they don’t keep a copy of your password anywhere. What they do keep is a long chain of data, just like this:
$6$gYkLHQAZ$NqkVNMGJvC0qe9CkcLdo8B5WZ4dUT51/8JRYb1PYPctfSYX813UxUOJM0xFJ0QWFGh9SaBXJLnW/Yt6mcYctn/:16847:0:99999:7:::
which is produced by a special ‘hashing’ algorithm. Your password goes in, gets ‘hashed’ and a uniquely related code like that pops out. They then store it in their whatever system as your ‘password’. Each time you supply your actual password, they ‘hash’ what you’ve supplied for a password and compare the result with what they’ve already got stored. If the two hash codes match exactly, you’re a winner and you’re allowed in (to whatever). This mechanism is the ‘lock’ that your password ‘key’ is unlocking. There are different methods of hashing your password and differing levels of encryption built into the lock, but the principle is roughly the same everywhere. Like the tumblers set into your front door lock, we may not be able to tell what the key is that opens it, only that when the right key goes in, all the tumblers are lifted so they’re unobstructed, and the lock turns.
Once the new key works, no surprise that everything in the mailbox (or whatever you logged in to) is exactly as it was left, plus any new messages the postmaster has delivered since we last looked.
One of the dangers of any password or PIN protected system is that an attacker can keep trying all the possible passwords until the correct one is entered and entry is gained. One of the defences we have against that is to use a complex password. Consider a 4 digit PIN. The first position in the PIN can be any of 10 possible combinations, 0-9. Multiply that by the number of positions available in the second, third and fourth positions and you can see that to break a PIN, they’re going to need, on average around 5000 attempts (assuming people use a roughly average distribution of numbers between 0 and 9999) to get past the PIN. So one combination in a possible ten-thousand unlocks most people’s credit or debit cards. Most banks are happy to accept those odds and don’t impose a stricter PIN policy. They just absolve themselves of any use of your PIN by their terms and conditions and off they go. A six letter password that requires the use of at least one upper and lower case character, a number and a special character means that every position in the password could be one of around 140 characters now, so even a two character complex password with its 140 x 140 possible combinations is far superior than a PIN. After you’ve typed the seventh character in a complex password, you’ve essentially pinned down one possible password option of around 130 Billion possible combinations.
One of the challenges a lot of people face is how to manage so many passwords to so many systems. Agreed, it is difficult. You don’t want to use the same password to sign in to different websites, in case one site is compromised and that common password is then used to gain access to the other sites.
I use a password system. Each site I access or password that I have to store should have a password unique to that site or system, so I use the name of that site or system name to make a standard modification to my standard password and it means that I can then ‘calculate’ my password for any site.
Lets assume my ‘base’ password is MyP@ss123. This is the sort of password that rarely fails for not complex enough. Its got upper and lower case letters, a number and a special character. It’s 9 letters long. If you require a shorter password, just truncate it, in six character password fields, its simply MyP@ss, for 8 characters it’s MyP@ss12.
If I sign up for a hotmail account, I’ll set the hotmail password to be MyP@ss123hotmail
For news.com.au, the password would be MyP@ss123news.com.au
For Internet Banking, because it involves a more secure login, I might use an extra dollar sign ($). MyP@ss123$NAB
Some logins require you to change your password regularly, if that’s the case, then you can use a number on the end of your password, giving you a limitless supply of new passwords without too much indecision. When you come back from leave and you’ve forgotten your password, within two or three tries, you’ll remember where you were up to, MyP@ss12305 –> MyP@ss12306 –> MyP@ss12307 and so on. When I come back to a site where I once recorded a different password that I’ve since lost, I always reset the password with the password that the policy would produce to make that login consistent. In this manner I can ‘remember’ no less than 150 passwords accurately. There are no doubt a few out there where old passwords are stuck in the system somewhere, but over time they become less relevant. As I go forward, if a password can’t be reset, then one option may be to open a new account with the same site and the correct password used going forward.
Passwords are meant to serve us. If your wireless router has a 23 digit code that takes 4 attempts to put in each time a new device joins the network, then CHANGE IT. The five or ten minutes of abject fear you may experience from having to login to your router, find the wireless password and change it – Will pale into significance at Christmas when you can boldly say to your cousin Charlie and his 4 1/2 tween children: “12345qwert, our wireless password is, as easy as can be” and you can get back to Christmas dinner or your egg-nog and mistletoe or such. Using patterns on the keyboard, especially integrating the shift key into the pattern can produce some very secure and quite easy to remember passwords. Type some of these ‘hard’ passwords to see what I mean.
:LKJpoiu
)(*&6543
ZXCV!@#$
zxasQW!@
ZaQ1XsW2
So, What are you driving, there?
More
Most computing gear is ridiculously constrained by cost. To remain competitve, manufacturers save money by using parts that are engineered to last sometimes considerably less longer, at a marginally lower cost for them to purchase. There are such slim margins out there on electronics generally that most consumer electronics manufacturers understand that there will be a number of failures in every batch of equipment made and put in place a strategy to resolve problems by replacement rather than repair, (the old 10% overrun on a production, 10% is boxed and stored as replacement stock for the rest). Its very hard for a consumer to put a finger on what is good and will last and what won’t. I get an idea when I hold a device for the first time of how long I think it will survive. More often than not, if I bought it as a standard consumer, I’m disappointed. Consumer electronics is mostly designed to last 24 months and not a day more. Anecdotally, you hear of so many items that lasted 12 months and 2 weeks and failed, or two years and 3 days and failed. Consumer law in Australia has particular standards for equipment and most will be designed to exactly meet a load of those minimum specifications. Each component in a PC system has a Mean Time Between Failures rating or MTBF. This figure is the average amount of time an average example of this device will run for and is usually expressed in hours of use. A product with a 10000 hr MTBF can be expected to fail pretty much exactly 10000hrs after you start using it constantly. When you combine hundreds or thousands of parts to create a PC or a tablet or phone etc, the whole device effectively inherits the same MTBF as the lowest MTBF of any component inside it. Sometimes paying a little more gets you proportionally more for your money, computing and electronic goods are certainly like that.
Business grade systems are a little different. Manufacturers understand that reliability is more key to business than price, unlike the consumer market. Big Business sees IT spending in terms of investment, not expense. Suppose a new fleet of computer systems costs the company $14M, but the corresponding boost in efficiency of 12% across 1200 workers nets the company a $46M gain in a financial year. Big business drools at figures like that. Similar effects can be achieved with efficiencies in back-end systems, so business is keen to gobble up anything that can squeeze any more efficiency out of their existing cost base.
The hardware vendors realise this and produce a much higher quality system for the Business end of town, at a significant premium. You will get at least three years use out of a Business system, except on the very rarest of occasions and more usually five years solid use. Multi-million dollar deals are leveraged by a company’s percieved ‘reliability’, so it’s very important for hardware vendors to get the Business market and any systems sold to it well squared away. HP and Lenovo are good examples of companies that operate in both the consumer and Business market.
Software moves at a similar rate. Microsoft finally let go of ‘Good ‘ol’ Windows XP a couple of years ago. Version 2002, mind you, 14 yrs ago, at time of writing. It was testament to the widespread acceptance of Windows XP and its near ubiquitous place in the PC market. But times move on. After all, the 15 or 20 thousand software developers at Microsoft don’t all sit on their hands all day, year after year. So lets recount since Windows 98 (yay). We’ve seen Windows Millenium (bleh), Windows XP (yayayay), Windows Vista (bleh), Windows 7 (yay!) Windows 8 (bleh) and now Windows 10 (Yay!). All along the way, these busy little beavers at Redmond have been studying you, and your couple of billion mates, to see what you do on your computer and how you do it. Some poor schmuck still turns up on Monday morning at Microsoft with an inbox full of crash reports about random systems around the world that spat it and dumped their whole system memory into a file and sent it to Microsoft. They’ve done some really neat things with Windows 10 and I like it unreservedly. I predicted pre-release that Windows 8 was going to be a flop becauseĀ someone who bashes a keyboard and mouse for a living on Windows, Linux and yes, even Mac systems since DOS 5.2 (OK, thats 20 years plus for you non-geeks) shouldn’t have to go and get another computer to google how to shut your new Windows 8 down. – Fail Microsoft, Shame on You… Rant over. Windows 10 thankfully joined the long Windows tradition of every second release being AwesomE and every other release being cRUd.
If you’re worried that chief big brother, Bill Gates, is going to somehow know that you want that Cornetto in the freezer you bought at the corner store for $3.25 at 10 past two this afternoon, you can go through Windows 10 privacy settings and turn all that reporting nonsense off. I did, noticed absolutely no difference and just continued. I have no great fear of any monitoring undertaken by Microsoft but prefer to keep any information ‘leakage’ to such corporations to a minimum.
So should I install that update?
More
For a long time, many IT professionals would advise against running Windows Updates as they would occasionally cause problems with the system and cause easily preventable difficulties. Since that era, Microsoft has released patches on a monthly basis for over a decade. The number of updates that cause issues like in the past has fallen away in recent times to nearly zero. By the time you’re getting ready to install your updates on Wednesday evening, any rogue patch has been in the wild in America for around 6 -10 hours. Microsoft take this type of incident very seriously and will pull a ‘poison’ patch down within minutes and replace it within a couple of hours with a working, updated patch. The odds of a system in Australia being adversely affected by a broken Windows Update is very small.