faqs.org - Internet FAQ Archives

RFC 2150 - Humanities and Arts: Sharing Center Stage on the Inte


Or Display the document by number




Network Working Group                                             J. Max
Request for Comments: 2150                                    W. Stickle
FYI: 31                                                         Rainfarm
Category: Informational                                     October 1997

       Humanities and Arts: Sharing Center Stage on the Internet

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Abstract

   This document is designed primarily for individuals who have limited
   knowledge of, or experience with, the Internet.

   The purpose of this document is to provide members of the Arts and
   Humanities communities with an introduction to the Internet as a
   valuable tool, resource, and medium for the creation, presentation,
   and preservation of Arts and Humanities-based content.

   The intended audience is practicing artists, scholars, related
   professionals, and others whose knowledge, expertise and support is
   important to ensuring that the Arts and Humanities are well-placed in
   the global information infrastructure.

Table of Contents

   1.    Introduction...............................................   3
   1.1    Definition of Arts and Humanities.........................   3
   2.    What does the Internet mean to the "Artist?"...............   4
   2.1    Access to the Global Community............................   5
   2.2    Sharing Your Work and Collaborating with Others...........   6
   2.3    Freely Available Software, and Other Information..........   8

   3.    What is the Internet?......................................   8
   3.1    What is the World Wide Web?...............................   9

   4.    How does the Internet Work?................................  10
   4.1    Internet Addresses........................................  11
   4.1.1   Computer Addresses and Hostnames.........................  12
   4.1.2   Addresses of People on the Internet......................  12
   4.1.3   Information Addresses, Locators, URLs....................  13
   4.2    How Does the World Wide Web Work?.........................  14

   4.3    Other, Higher Level Protocols on the Internet.............  15

   5.    Forums.....................................................  16
   5.1    Message Based Communications..............................  16
   5.1.1   Electronic Mail - email..................................  17
   5.1.2   Newsgroups...............................................  17
   5.1.3   Electronic Bulletin Board System - BBS ..................  18
   5.2    Real-Time Communications..................................  19
   5.2.1   Chat - IRC...............................................  19
   5.2.2   Multicasting.............................................  20
   5.2.3   MUD - Multi-User Dungeon.................................  20
   5.2.4   Audio/Video Conferencing.................................  21
   5.3    Archives..................................................  22
   5.3.1   Searching................................................  22

   6.    Accessing the Internet.....................................  25
   6.1    Internet Service Providers................................  26
   6.2    Computer Hardware and Software Tools......................  26
   6.3    Multimedia................................................  31

   7.    Creating Content...........................................  32
   7.1    Getting Help..............................................  33
   7.2    About File Formats........................................  34
   7.3    Creating Text and Hypertext Documents.....................  35
   7.4    Creating Graphic and Moving Images........................  35
   7.4.1   Bitmap Image Formats.....................................  36
   7.4.2   Vector Image Formats.....................................  37
   7.4.3   Video Formats............................................  37
   7.5    Creating Music and Sound Files............................  38
   7.6    Content Design Issues.....................................  40
   7.7    Publicizing Your Work.....................................  41

   8.    Issues and Challenges......................................  42
   8.1    Security Issues...........................................  43
   8.2    Viruses...................................................  44
   8.3    The Standard Disclaimer...................................  44
   8.4    Copyrights and Intellectual Property Issues...............  45
   8.4.1   Copyright................................................  45
   8.4.2   Trademark................................................  46
   8.4.3   Privacy..................................................  47
   8.4.4   Seek Professional Advice.................................  47
   8.5    Conducting Business over the Internet.....................  47
   8.6    Netiquette................................................  48

   9.    Glossary...................................................  49

   10.   Resources, References, etc.................................  51
   10.1   RFCs and Internet-Drafts..................................  51

   10.2   Internet Documents........................................  52
   10.3   Other Sources.............................................  53
   10.4   Freely Available Web Browser Software.....................  54
   10.5   The Internet Assigned Numbers Authority...................  54

   11.   Security Considerations....................................  55
   11.1   Formulate a security policy...............................  55
   11.1.1  Talk to your Internet Service Provider...................  56
   11.1.2  Make sure your systems are up to date....................  56
   11.1.3  Use the tools available..................................  56
   12.   Acknowledgments............................................  57
   13.   Authors' Addresses.........................................  57

   Appendix A.  Internet Projects of Interest to the
                Arts and Humanities Communities.....................  58
   Appendix B.  Starting Points; A brief list of related sites......  60
   Appendix C.  Examples for using the RFC server RFC-INFO@ISI.EDU..  62

1. Introduction

   This document has been structured to provide information about, and
   examples of, the wide range of functions and capabilities available
   on the Internet today.  It is intended to illustrate the potential of
   current networking technologies for personal and cultural growth.

   Some basic functions of the Internet are described, along with their
   applications and forums for building online communities of interest,
   such as the World Wide Web, Email, and Network News.

   This is followed by discussion and examples of hardware and software
   being used to support the creation and presentation of artistic and
   literary works, along with examples of how Arts and Humanities
   content is being represented, stored, and retrieved on the Internet.

   In addition to illustrating the great potential of the Internet, this
   document provides a brief introduction to the issues and challenges
   that affect the development and presentation of Arts and Humanities
   content online, such as privacy and property rights.

   Included is a brief Glossary, and a number of Appedices which provide
   pointers to other sources of information about the Internet.

1.1 Definitions of Arts and Humanities

   For purposes of this document the term "Arts" includes, but is not
   limited to, dance, design arts, folk arts, literary arts, media and
   film arts, music, theater, and visual arts.

   The term "Humanities" includes, but is not limited to, the study of
   the following: language, both modern and classical; linguistics;
   literature; history; jurisprudence philosophy; archaeology;
   comparative religion; ethics; the history, criticism and theory of
   the arts; those aspects of social sciences which have humanistic
   content and employ humanistic methods; and the study and application
   of the humanities to the human environment.

   For purposes of simplicity this document will use the word "Artist"
   to mean both Artist and Humanist: "all practitioners who work in the
   fields of the visual, performance, and literary arts, as well as
   museum curators, librarians, and others who are involved in the
   research, restoration, and presentation of that which comprises our
   cultural heritage."

2. What does the Internet mean to the Artist?

   The Internet is exerting a profound influence on our society.  Even
   now in its infancy, the effects of the Internet can be easily seen in
   popular media as well as in the way we do business.  But the most
   dramatic influences are in the children who are now growing up with
   the net.  Many parents are aware of the influence television has over
   their children.  With the advent of WEB-TV, the Internet has begun to
   assimilate Television, transforming it into something more powerful.
   This coming integration of information, communication and
   entertainment will play a major role in teaching and shaping the
   minds of those who live and grow up with it.

   Because of this power, it is critical that the best parts of human
   culture are represented on the Internet. If we raise the Internet
   right, it will return the favor by nurturing a generation that may
   well grow up wiser than ourselves.

   This is where artists are needed.  Because the net is primarily built
   and run by Scientists and Engineers who are creatures of mind, it is
   the heart and soul of the Internet that is weak.  Artists are the
   heart and soul of human culture, and must bring the fruits of their
   efforts to the net to give the net culture, and future generations
   their essence of humanity.

   If that does not convince you, we will also introduce you to some of
   the many tools artists may use to exploit the net for their own
   personal gain.  As the online culture becomes a more balanced
   representation of humanity, the net will become an essential tool for
   collaboration, communication, and distribution of art and humanities
   content.  The day is coming where those who are not on the net will
   be greatly handicapped in the expression and distribution of their
   works.

   The net is the new frontier for the growth of humanity.  Can you
   afford not to be involved?

2.1 Access to the Global Community

   In the past, artist's audiences and collaborators were limited to the
   people around them.  Improvements in transportation and communication
   have allowed these associations to expand, but even today few members
   of the artistic community have gone global.  The Internet changes all
   this by allowing anyone access to a global community.

   A great many arts institutions and organizations have now established
   sites on the World Wide Web and a significant number of online
   discussion groups focus on the arts and humanities.  Consortiums of
   museums and libraries are now using networking technologies to
   support research and projects involving more effective ways to
   collect, store, and disseminate objects of antiquity and other non-
   textual primary sources, as well as textual sources.

   Sites are also created by individuals and for institutions,
   organizations, and businesses for reasons ranging from commerce to
   simple self-expression.  The Internet connects hundreds of countries,
   thousands of cities, and countless groups and individuals around the
   globe.

   On the Internet today you can find information on topics ranging from
   art and music to guns and ammunition; among which are astronomy,
   news, astrology, agriculture, acupuncture, botany, biology, zoology,
   food, psychology, medicine, space exploration, genetics, media,
   chemistry, microbreweries, aeronautics, scuba diving, meteorology,
   neurology, artificial intelligence, mathematics, literature, wine
   tasting, law, painting, photography, dance, history, social sciences,
   politics, crafts, clothing, economics, genealogy, pets, sports,
   languages, dictionaries, encyclopedias, technical manuals, schools,
   shops, entertainment, furniture, flowers, software, hardware,
   computers and the Internet, just to name a few.  Whatever your work
   requires, whatever your whim desires, you can find it on the net.

   People all around the world will be looking for what they want on the
   net, and if you have what they want, then through the magic of the
   Internet, you are their next door neighbor.

   With access to the Internet, the world is at your fingertips.  Bring
   your questions on health, the environment, government, and religion,
   and look though volumes of documentation on your concerns, or discuss
   your questions with others electronically.  Once you get used to it,
   you will even be downloading more information and tools to assist you
   further.

   The Internet provides a forum in which diverse cultures can merge,
   and allows people to visit faraway places from the privacy and safety
   of their own computer.  The Internet explorer will also find that
   many sites are multilingual.

   Once you have the basic tools for using the Internet you will begin
   to understand how easy, helpful, informative, and exciting it can be.
   With a few quick strokes you have accessed a great library, museum,
   or gallery, toured a faraway city, or looked up an old friend.  You
   might find an out of print book you have always wanted, then either
   read it on your computer screen, or print it out on your printer.  If
   you do not have a printer, simply save it to your floppy disk and
   bring that to a printshop or friend with a printer.  It really is
   that easy.

   You could spend the afternoon at the Smithsonian, or the Louvre
   without ever leaving your chair.  For a more athletic adventure, you
   could put your computer in front of your treadmill, and jog through
   the online Olympics site.

   When you are ready, you can explore deeper.  Follow other links to
   smaller sites, lesser known writers, artists, poets, and thinkers,
   and discover the emerging world they are creating.  With the proper
   tools you can even view moving pictures, and listen to music and
   other audio.

   Perhaps you would like to locate a rare album, or debate one
   musicians merit over anothers.  Perhaps you prefer to discuss and
   compare the works of others with producers, collectors, gallery
   owners or other professionals in your field, or related fields.  You
   might want to find out who's hot and why.  You could also find out
   where, and when shows, showings, benefits, conferences, releases,
   signings, and performances are taking place, or announce your own.

   They say that for every artist, there is a critic, and you could meet
   one, or be one, on the Internet.

2.2 Sharing Your Work and Collaborating with Others

   Artists often want to share their work with other artists so that
   they can get peer comments and recognition.  The Internet is a great
   place to explore new ideas with other artists as well.

   Perhaps you are a painter who has developed a method for keeping
   acrylics moist during long sessions, or a photographer who has
   discovered a new lighting technique.  You could make the information
   available over the Internet to enlighten others, or to get their
   feedback.

   Perhaps you've had difficulty in some aspect of your work, and you'd
   like to talk to others who have had similar experiences to find out
   how they solved them.

   There are many types of content that artists can share.  Including:

      - text: stories, poetry, historic accounts, transcripts, etc.
      - images of their visual work: paintings, photographs,
        sculpture, etc.
      - images of themselves: photographs, self-portraits, etc.
      - sound files of their audio works or voice presentations of
        their works: books on tape, speeches, tutorials, music, etc.
      - moving pictures: video arts, performance arts, etc.
      - a description of their art process and works of art
      - resumes and biographical data
      - contact information in the form of electronic mail address,
        postal mail address, phone, etc.  Electronic mail is most
        popular because it allows people to respond spontaneously.

   After you've met some of the global critics, and compared your work
   with others, you may feel so bold as to share your work with others.
   Perhaps emailing a manuscript to a publisher, or putting up scans of
   your art will entice a buyer.  Perhaps it will entice a critic to say
   wonderful things about your work.

   Perhaps putting your work on the Internet will bring fortune and
   fame, or perhaps it will encourage others to put their work up.
   Increasing the cultural content of the Internet will have profound
   results in all areas of the Arts.

   There are many ways of collaborating over the Internet.  As mentioned
   in previous sections it is easy to see how to communicate and
   exchange work with other artists from anywhere in the world.  In
   addition, there are art and literature projects which explore the
   Internet by asking people to submit their feelings, thoughts, and
   ideas through the Internet.  Some of these projects will allow
   interested people to come to them, others may be distributed in
   various ways to actively seek out people interested in participation.

   There are also games which are played over the Internet, by players
   all over the planet.  These types of games, which are described in
   greater detail in Section 5, can be both entertaining and
   educational.  Some games offer players the opportunity to alter the
   environment, so that ideas and information contained in the game
   evolve over time into a jointly constructed experience.

2.3 Freely Available Software, and Other Information

   There is a world of useful software available to you via the
   Internet.  Known as Shareware, Public Domain, or Freely Copyable, you
   can find many software programs you may download and use on your own
   machine, often completely free, occasionally for a small and/or
   optional fee which helps the author to afford to create more software
   for general use. There are also libraries, stores, and news groups
   you can peruse in search of just the tool or information you want.

   As you explore the Internet, you will begin to find information that
   is beyond your reach without the right tools for viewing, listening,
   etc.  For example, someone may have put up a sound file using a
   format which cannot be recognized by the software you have installed.
   In these cases, that person will often have included a pointer to the
   exact tool necessary to recognize their format, or convert the
   format, and you can download, install, and use this tool right away.
   More information on file formats is provided throughout the document.

   Using the basic tools acquired to access the Internet, you can begin
   to add to your collection software tools, both for accessing the
   information already on the Internet, and for creating your own
   content.  After reading this document you will have the tools
   necessary to find and use this information.

   Appendix B provides a list of Internet sites, where communication
   about the arts, and freely copyable software tools and art, among
   other things, can be found.

   There are many people both like, and unlike, yourself with whom you
   can meet, communicate, and share ideas.  Some like to just talk, you
   can listen if you like.  Others like to just listen, so you and
   others can talk.

   There are also many forms that communication can take, from private
   electronic mail, to group video conferencing, to moderated
   newsgroups, to public bulletin boards.  See Section 5 for additional
   information on Electronic Forums.

3. What is the Internet?

   As new users, the first question that probably comes to mind is:
   "What is the Internet?"  A good answer is: "People, computers and
   information electronically linked around the world by a common
   protocol for communicating with each other."

   The Advanced Research Projects Agency (ARPA) was founded in the late
   1960s.  Among its many projects, ARPA created a network of computers
   called the ARPANET.  As other networks were created, most were
   connected to the ARPANET, and the resulting network that
   interconnected many networks was named, "The Internet".  At last
   count, this "Information Superhighway" connects several million
   computers and over 40 million users from all over the world.

   The Internet should not be confused with America OnLine (AOL),
   CompuServe, Prodigy, and other type service providers, which may use
   their own, often proprietary protocols and are sites unto themselves
   but may also have connections to the Internet.  The Internet should
   also not be confused with the World Wide Web which is the topic of
   the next section.

3.1 What is the World Wide Web?

   The World Wide Web, generally referred to as simply, The Web, is
   comprised of a subset of the computers on the Internet.

   You can visualize the World Wide Web as a giant magazine stand with a
   vast web of strings connecting various words pictures and ideas.
   Like a magazine rack, you may quickly select a chosen magazine, or
   you may browse, following the strings from magazine to magazine.

   More formally, the Web is vast multimedia "document" distributed
   among a large number of the computers on the Internet.

   There is no central hierarchy that organizes the Web.  Instead, the
   information is distributed among many "Web Sites" created and used by
   the many people on the Internet.  Each Web Site is much like a
   magazine in that it has a Cover Page, called the Home Page, and other
   pages of related information that can be connected in whatever way
   the author wishes.  This "document" is in a format called "hypertext"
   which allows information in the web to be linked by words or pictures
   viewed on the computer.

   The Web is broken up into a large set of pages, called "Web Pages",
   of information connected by hypertext "links" which let you click on
   a highlighted word or picture to call up a page of related
   information.  This is what differentiates hyper-text from "normal"
   text.  In "normal" text, each idea, sentence or paragraph is
   connected in a sequence or "train of thought", from beginning to end.
   In hypertext however, tracks of ideas branch out through "Links", so
   that each idea may be connected to many different "trains of
   thought".  This ability to follow an idea to many different
   destinations allows you to read hypertext documents in a way more
   naturally resembling human thought.

   For example, you might create a "Cool Music" Web Page and place it on
   a "Web Server", which is any computer somewhere on the Internet
   running the software needed to provide access to the resident Web
   Pages.  Anyone on the Internet could then use a piece of software
   called a "Web Browser" to ask the Web Server to view your Home Page.

   This Home Page could be a striking artwork featuring a list of your
   favorite albums and a few labeled buttons.  While your music plays
   from their speakers they might choose to click on any album that
   catches their eye, or go to lists of information sorted by Artist,
   Label, or Genre.  Once they get to the page for a particular album,
   they might see the artwork, a song list, and other links to follow.
   Clicking on a song might pull up the song lyrics, or perhaps even
   download the song.  Or they could follow a link you provided from
   your page to the HomePage of the artists record company, or to a
   magazine interview of the band.  If the information is out there,
   your page could link to it.

   At last check there were hundreds of thousands of web sites, home
   pages, and hosts on the Web.  The contents of those sites are almost
   as varied.  Some pages are personal pages containing photos of family
   members, lists of hobbies, or the sharing of collections such as song
   lyrics.  Some pages are strictly business, selling everything from
   abalone to zymoscopes.  Still other pages provide services such as
   information searches, and weather reports.

   Human culture is based on communication, and the widespread
   availability of information and the thought-like constructions of
   hypertext are the most powerful new ideas in communication since the
   invention of writing.  A glance back at history will easily show how
   written language has shaped our societies.  These results are only a
   foreshadowing of the things to come.

4. How Does the Internet Work?

   While it is not necessary to understand how the Internet works in
   order to use it, a brief technical overview will introduce you to
   some concepts and terms that will be used in the sections ahead.

   As we go into more detail here, we are assuming that you, the reader,
   have at least a passing familiarity with computers.  Section 6.2
   provides more information on computer hardware and software.

   On one level, networks are built out of wires, phone lines, and other
   pieces of hardware, and the Internet is indeed built of all these
   things.  The essence of the Internet however is built out of an idea
   called the Internet Protocol.

   There are many different kinds of computers.  Most of them work by
   encoding information into ones and zeroes, which they can manipulate
   at incredible speeds.  Unfortunately, there are many different ways
   of encoding information.  Computers that use different methods can be
   said to speak different languages.  In order for computers to talk to
   each other there must be a thing called a "Communication Protocol"
   that provides a set of procedures for talking and a common language
   to use.

   The Internet Protocol, or IP, is the Communication Protocol that all
   computers on the Internet must use and understand.  It allows
   computers to find each other, and to send packages, or "packets", of
   information back and forth.  Much like the Postal service reads your
   country code, city code, etc., but not the contents of your letter,
   the Internet Protocol does not care what is inside most of these
   packets of information.  This is a great thing because it means that
   other, higher level protocols may transmit any possible kind of
   information simply by stuffing it into a packet and handing it off to
   the software responsible for speaking IP.

   Another important protocol upon which the Internet is built is the
   Transmission Control Protocol, or TCP.  IP by itself provides a way
   of sending a message to another computer, but no guarantee that it
   will get through.  Since reliable communication is a necessity, the
   TCP protocol was invented which uses IP to send packets and
   guarantees their delivery by requiring the receiver to acknowledge
   the information received.  TCP and IP form the heart of a group of
   protocols aptly named the TCP/IP protocol suite.  This suite of
   protocols provides most of the functionality of the Internet.

   We will be mentioning these protocols throughout the rest of the
   document.  Information on IP and other Internet Protocols can be
   obtained through the resources referenced in Section 10.

4.1  Internet Addresses

   There are many things we would like to be able to find on the net,
   including people, information, and the computers themselves.  An
   important part of IP and other protocols is the way they label things
   so that the computers can find and identify them.  The U.S. Post
   Office finds people by their Postal Address, which is just a label
   containing information about who you are, and where you live.
   Likewise, the various protocols of the Internet have given computers,
   people, and information, addresses which can be used to find them.
   The following sections will describe several different kinds of
   addresses.

4.1.1 Computer Addresses and Hostnames

   When speaking IP, computers locate each other using a thing called
   their IP Address.  Each computer on the Internet must have a unique
   IP Address.  Some programs allow or require you to use the IP Address
   directly, if so, it will appear as four groups of numbers separated
   by dots. (i.e., 123.123.123.123) Most of the time though, you will
   not need to worry about the actual IP Address number, because all
   computers have a "Host Name" to which the number is mapped.

   A computers hostname also comes in parts, separated by dots.  The
   first part is the name of the machine, and the second part is the
   name of the "domain" in which that computer is registered.

   For example, if I had a machine named "foo" registered in the
   commercial domain known as "com", my machine's hostname would be
   "foo.com".  When speaking out loud, this machine's address would be
   spoken as "foo dot com".

   A domain is just an abstract category to which machines and networks
   may be registered into in order to organize them.  Domains are
   organized in a hierarchy of top level domains and their subdomains.
   Top Level Domains include,

         .edu   for educational institutions
         .gov   for government sites
         .com   for commercial companies
         .org   for other organizations
         .net   for network infrastructure sites
         .us    for sites in the United States
         .ca    for sites in Canada
         .nl    for sites in the Netherlands
         .jp    for sites in Japan

   to name a few.  Domain names may be further subdivided by inserting
   one or more subdomain names before the top level domain, still
   separating everything with dots.  For example, "law.harvard.edu", for
   the Law School at Harvard University, and "la.ca.us" for computers in
   Los Angeles, California in the United States.

   More information about the Domain Naming System can be found in the
   documents referenced in Section 10.

4.1.2  Addresses of People on the Internet

   Every human being has a given name, or full name with which we
   address them.  When you begin to use a computer, you will be
   introduced to your "username".  Your username, sometimes called your

   user i.d., may be your initials, your last name and first initial,
   your nickname, a number, or anything else that is just normal letter
   or number characters.  (Your username usually cannot contain
   "special" characters such as "&", or "%".)  Sometimes you get to
   choose your own username, and sometimes your service provider or
   system administrator will choose one for you.

   Your username is used when you connect to other computers, and to
   identify you in electronic mail. Your electronic mail, or Email
   Address, will consist of your username followed by the symbol "@",
   followed by your computers hostname.

   So, for Joe Cool, who has the username "jcool", and gets his Internet
   service from Dirigible Online, his email address might be
   "jcool@dirigible.com".  When spoken out loud, the "@" symbol is
   pronounced simply "at" so this would typically be spoken as "jcool at
   dirigible dot com".

   Email is moved around on the Internet using the Simple Mail Transfer
   Protocol, SMTP, over IP.  Information on SMTP can be found in the
   documents listed in Section 10.

4.1.3  Information Addresses, Uniform Resource Locators, or URLs.

   In order to retrieve information from the Internet, you need to be
   able to find it and know how to ask for it.  This is the job of the
   Uniform Resource Locator, or URL which functions as an address for
   information.  Every file or document intended to be accessible
   through the Internet has a URL.

   URLs (or simplified versions of them) are now appearing frequently in
   TV, billboard, and magazine advertising as a company's Internet
   Address; basically the hostname of their web site.

   In previous sections we've identified IP Addresses, hostnames and
   email addresses; a URL contains more information.  Not only does it
   tell you what the information is, and where to find it, it also tells
   you precisely which protocol you need to use to retrieve it.

   A URL is a machine readable, and hence somewhat cryptic, text string,
   in a form such as "http://www.something.com/location/filename.ext".
   This string can be broken down into the following pieces.

    http    is the name of the communications protocol which can be used
            to access the information.  In this case, it identifies the
            HyperText Transfer Protocol, which is used in the World Wide
            Web, and will be described later.  Other protocols are
            described in Section 4.3.

      :     separates the protocol from the hostname

     //     indicates that what is to follow is the hostname

   www.something.com  is the hostname of the computer on which the
            document resides.  In this case, the "www" indicates that
            it is a machine named for the fact that it is running a
            World Wide Web server.  "something.com" is the domain in
            which that server is registered.  Typically the "something"
            part is the name of the organization running the server.

     /      separates the hostname from directory on the machine in
            which the information resides.

   location is the location of the information on the machine
            something.com.

   filename is the first part of the file name of the information you
            are retrieving.

     .      a dot separates the filename from its extension

     ext    the extension, or file "type" actually says a great deal
            about the file, how to handle it, and how to present it.

   The URLs you see will usually be simpler than this.  The people at
   something.com assume you are going to use a modern web browser to
   access the information, so they may leave off the protocol
   information, "http://",  because this is probably your web browsers
   default protocol.  Also, if they configure their server to have a
   default homepage to display, they can leave off everything after the
   hostname part of the URL.  This puts it into the form that is most
   commonly seen, www.something.com.

   URLs can specify any file and most protocols.  In this example, the
   URL is using the protocol for moving HyperText, the HyperText
   Transfer Protocol, HTTP, over IP.  More information on HyperText and
   HTTP can be found in the next section, and in the Resources section.

4.2 How Does the World Wide Web Work?

   Web pages are computer files written in a format called HTML, the
   HyperText Markup Language.  HTML is the protocol for putting specific
   strings of letters and symbols (such as parentheses) into an ordinary

   text document which can specify that words link to other pages, or be
   viewed in a particular type font, or display images, or many other
   things when viewed with the appropriate software.  The appropriate
   software would generally be a web browser.  More information about
   software tools is provided in Section 6.2.

   HTML is simple enough that most people can learn to use it, but rich
   enough in possibility that there will always be a thriving community
   of people making web pages for others.

   Links within a hypertext documented are implemented using references
   to the URL of the information to be linked to.

   In order to download information from distant places in the web, your
   computer will typically be using a protocol called HTTP, the
   HyperText Transfer Protocol.  HTTP was designed to allow web browser
   software to connect to web server software on other machines and
   request the transmission of a web page in the form of an HTML
   document and any associated images, audio, video, etc.  The latest
   version of the HTTP can actually tell what type of browser is
   connecting and the server is now able to better customize its default
   homepage to its audience.

   More information on HTML, HTTP, and hypertext can be found in Section
   7.3, and through the references listed in the Resources section.

4.3  Other Higher Level Protocols on the Internet.

   There are many other higher level protocols built on top of IP.
   We've provide examples throughout the document, but we'll mention a
   few here to make you more familiar with them.

      telnet: a protocol for providing remote terminal service.  Telnet
            software allows you to log in to remote computers across the
            net by giving you a virtual terminal on that computer.

      ftp: the File Transfer Protocol.  FTP allows diverse machines to
            send simple files back and forth.  FTP is usually used by
            archive sites to allow multiple users to download files
            simultaneously.

      smtp: the Simple Mail Transfer Protocol.  The SMTP specification
            allows electronic mail to be sent, stored, and forwarded,
            around the Internet.  SMTP does not specify how a mail
            "reader" operates, just the transmission of email.

      nntp: the Network News Transfer Protocol.  NNTP specifies how
            Internet News is passed, stored and forwarded around the
            Internet.

      gopher: the Gopher protocol creates linkages, much like the web,
            which is called, "gopherspace".  The specification allows
            a gopher server to serve files in a text rather than graphic
            format.

   Many other protocols function on the Internet, and are specified in
   technical documents, such as are referenced in the Resources section.

5. Forums

   Websters defines a forum as "A public meeting place for open
   discussion."  In the world that could be a park or an auditorium.  In
   the Internet, a forum will be electronic, but it may still feel like
   a roomful of people.

   Many forums exist on the Internet.  There are interactive forums
   where you can share information in real-time and carry on discussions
   with others.  There are message-based forums where you send or
   receive a message and others involved in that forum can respond
   later, and there are archived forums where information is stored, and
   may be retrieved by anyone but modified only by its owner.

   While we have attempted to list and describe a few of the more
   popular forums, we have not created an exhaustive, complete, or up-
   to-the-minute list here.  You can find information on forums, lists
   and sites in many magazines and books today.

5.1 Message-based Communications

   In Message-based communication, a message is sent by one user, and
   can be received by one or many.  For example, you might send a dinner
   invitation to an individual, a couple, or a group.  In the same way,
   you send electronic messages to individuals or groups.  Just like a
   postal service for physical mail, there are electronic mail servers
   for electronic mail.  Just like you have a physical address to which
   your physical mail is sent, there is an electronic mail address to
   which your electronic mail is sent.

   Message-based Communications includes electronic mail, newsgroups,
   and bulletin boards.

5.1.1 Email

   Electronic mail, called EMAIL, is a system whereby a computer user
   can exchange messages with other computer users, or groups of users
   via a communications network.  This can be the Internet, or a smaller
   internal office network.

   Typical use of email consists of downloading messages as received
   from a mailbox or mail server, then reading and replying to them
   solely electronically using a mail program which behaves much like a
   word processor for the most part.  The user can send mail to, or
   receive mail from, any other user with Internet access.  Electronic
   mail is much like paper mail, in that it is sent, delivered, and
   contains information.  That information is usually textual, but new
   innovations allow for graphics, and even sound to sent in email.

   Email is superior to paper mail in that it can arrive at its
   destination within minutes of being sent, and it can be replied to,
   appended to, forwarded, formatted, saved, or deleted just as quickly.

   Some sites on the Internet run a type of file server which can
   respond with a file automatically, for those who have email but not
   web or ftp access.

   An email address consists of a username, and the address of the
   machine to which the mail should be delivered for that user.

   Reviewing Section 4.1.2, email addresses take the form
   "username"@"site"."domain"  For example, if your name is Joe Cool and
   you get your Internet service from Dirigible Online, where you login
   as "jcool",  your email address might be "jcool@dirigible.com".

   You will usually get your Email address from your System
   Administrator, in a work or school environment, or from your Internet
   Service Provider.  Section 6 provides more information on Internet
   Service Providers.

5.1.2 Newsgroups

   Someday everyone will be able to get their news electronically,
   saving paper, money, time, and the environment.

   A Newsgroup is an electronic bulletin board system created originally
   by the Unix community and which is accessible via the Internet.
   Usenet News forms a discussion forum accessible by millions of users
   in almost every country in the world.  Usenet News consists of
   thousands of topics arranged in a hierarchical form.  Major topics
   include "comp" for computer topics, "rec" for recreational topics,

   "soc" for social topics, "sci" for science topics, and there are many
   others we will not list here.  Within the major topics are subtopics,
   such as "rec.music" for general music content, and
   "rec.music.classical" for classical music, or "sci.med.physics" for
   discussions relating to the physics of medical science.

   If you have access to newsgroups, it would be wise to read any
   postings on the newsgroup "news.announce.newusers" first.  This
   newsgroup provides detailed information on newsgroups, such as
   finding the right place to post, and information on newsgroup writing
   style.

   Local newsgroups are those that are accessible through your
   organization or company which contain news that is relevant only to
   your organization.  For example, NASA's Goddard Space Flight Center,
   GSFC, has many internal newsgroups that are of interest only to GSFC
   employees and none of the other NASA centers.  Therefore, newsgroups
   have been formed to provide internal information to NASA GSFC
   employees only and no one else.  Some examples are: gsfc.carpool,
   gsfc.dialup or gsfc.220.civil.servants.

   Another example of a local newsgroup is news that is posted regarding
   your community or the vicinity in which you live.  For example, if
   you lived in the Washington D.C. area some of the local newsgroups
   might be:  dc.biking, dc.jobs or dc.smithsonian.

   Many newsreaders are available, and many web browsers now also
   support news.  The URL to use for a newsgroup will have the protocol
   news: followed by the group name, as in news:dc.smithsonian.  A
   domain address is not necessary, as the browser would be configured
   to know which host you will get news from.

5.1.3 Electronic Bulletin Board System - BBS

   An Electronic Bulletin Board System, or BBS, consists of a computer,
   and associated software, typically providing electronic messaging
   services, archives of files, and any other services or activities of
   interest to the bulletin board systems' operator.

   Typically a BBS user must dial into the BBS via their modem and
   telephone line, and select from a hierarchy of lists, files,
   subdirectories, or other data maintained by the operator.  Once
   connected, the user can often send messages to other BBS users within
   the system.

   Although BBSs have traditionally been the domain of hobbyists, an
   increasing number of BBSs are connected directly to the Internet, and
   many BBSs are currently operated by government, educational,
   research, and commercial institutions.

   BBSs usually advertise their services in the backs of magazines and
   newspapers and by word of mouth.  Many companies now offer a BBS via
   which their customers can retrieve their latest technical support
   documents and product literature.

5.2  Real-Time Communications

   The communications methods described in Section 5.1 involve delays
   between when you send a message and when you receive a response, with
   the result that both parties are not involved simultaneously.  The
   net can also be used to communicate in "Real-Time" by making the sure
   the delays are short enough that both parties can be involved
   simultaneously in a "conversation".

   Typically this is done in a text based format where each user has two
   special regions on their screen: One that they type in, and another
   that the other users type is displayed in.  The delay between when
   one user types and the other sees it on their screen is called "net-
   lag" and usually ranges from "too short to be aware of" to about 30
   seconds.  Lag can occur due to network congestion or a variety of
   bottlenecks including link speed, processor speed, and typing speed.

   Although it is still rather expensive, it is also possible to use
   both audio and video in "Real-Time".  However the reasons for it's
   expense are temporary, and you should expect to see more and more of
   this in the future.

   Forums which communicate in real-time are the Internet Relay Chat
   (IRC), the Multi-User Dungeon (MUD), Audio-Video Conferencing (AVC),
   and WhiteBoard Systems (WBS).

5.2.1  IRC - Internet Relay Chat, WebChat

   Internet Relay Chat, or IRC, provides a text-based mechanism for
   communication with multiple participants.  IRC is an interactive
   forum set up in virtual rooms that you can move between, and where
   others can virtually "hang out".  Chat rooms can be used to discuss
   common ideas or topics, or as part of a collaborative process.  The
   connection method used will be specific to each IRC site.  IRC sites
   can be found using search tools, as outlined in Section 5.3.1.

   Web chat is like IRC but it is done via a web browser, and it is not
   a text only forum.  Section 6.2 provides more information on web
   browser software.

   Many webchat sites require the user to register before being able to
   participate in the activity.  If any additional software is needed
   based on your particular software and PC configuration the site will
   point you in the right direction so you can download the necessary
   software.

   Some sites will provide you with chat etiquette guidelines.  Please
   be sure to read the directions before you participate in the chat
   session.

   Once you begin to chat you may find that there are some abbreviations
   used with which you are not familiar.  These abbreviations are for
   various actions or phrases.  Some very common ones are: by the way
   (btw), in my humble/honest opinion (imho), and ta ta for now (ttfn).

   Appendix B provides a few Chat sites to start you off.

5.2.2  Multicasting

   Multicasting is a technical term that means that you can send pieces
   of data, called "packets", to multiple sites simultaneously.  How big
   a packet is depends on the protocols involved and it may range from a
   few bytes to a few thousand.  The usual way of moving information
   around the Internet is by using unicast protocols, which send packets
   to one site at a time.

   You can think of multicasting as the Internet's version of
   broadcasting.  A site that multicasts information is similar in many
   ways to a television station that broadcasts its signal. The signal
   originates from one source, but it can reach everyone in the
   station's signal area.  The signal takes up some of the finite
   available bandwidth, and anyone who has the right equipment can tune
   it in. The information passes on by those who don't want to catch the
   signal or don't have the right equipment.

5.2.3  MUD - Multi-User Dungeon

   A MUD is an interactive game environment where both real other
   players and virtual other players exist and with whom you can
   communicate to share ideas or solve puzzles, etc.

   The word "Dungeon" refers to the setting of many of the original
   games of this sort, in which you, our hero, must escape from a
   dungeon-like environment where evil goblins, demons, and other "bad-

   guys" are wandering around ready to kill you.  Generally the goal, in
   order to win the game, is to find and retrieve some treasure, or
   reach some hidden place, and find the way out.

   MUDs have applications in education, as for problem solving and
   leadership skills, as well as in building teamwork to share ideas and
   to enhance creativity.  Having a virtual world in which people from
   diverse backgrounds and cultures can come, again and again, to work
   on a common project, allows ideas to accrue and cultures to grow over
   time.

   For more information on MUDs, and other collaborative environments,
   explore the references in the appendices.

5.2.4 Audio Video Conferencing

   Audio Video Conferencing has many applications in the arts as well as
   in business.  Using the Internet, teachers can reach students who
   cannot get to their schools, doctors can give medical consultations
   from around the world, and artists can perform in front an audience
   they would never have otherwise.

   CU-SeeMe is a freeware desktop videoconferencing software tool.  CU-
   SeeMe allows Macintosh and Windows users with an Internet connection
   and a desktop camera (some go for as little as $100) to see, hear and
   speak with other CU-SeeMe users across the world.  This program was
   developed at Cornell University in Ithaca, New York, USA and is
   freely available.

   CU-SeeMe allows the user to have a one-to-one communication.  It is
   also possible to have a one-to-many or many-to-many communication by
   installing a reflector on another machine running the appropriate
   software.  The reflector software must be installed on a Unix
   machine.  The software can be obtained from Cornell University's CU-
   SeeMe page listed in Appendix B.

   Whiteboard systems also enhance audio visual conferencing.  A
   Whiteboard, which is analogous to a chalkboard, is physically quite
   similar.  Using a write-on wipe-off style of whiteboard, which has
   been electronically enhanced, allows people on the Internet to share
   text, drawings, and other graphic information which is being written
   in real-time.

   Software exists which allows connections between two sites, or
   hundreds, over the Internet, the Web, or your telephone.

5.3  Archives

   Archive is defined in Webster's New World Dictionary as:
    n. 1 a) a place where public records, documents, etc. are kept b) a
    place where material having documentary interest, as private papers,
    institutional records, memorabilia, or photographs, is kept.

   Archives on the Internet are pretty much the exact same thing.  The
   motivation and much of the content is the same, but the media changes
   (from paper files, to electronic files), and as such allows for a
   much greater diversity of content.

   Archives on the Internet also allow many people access to their files
   simultaneously, and from all over the world.  Many archives on the
   Internet still reside on Anonymous FTP Servers, which allow users to
   log in without a user i.d. or password.  When connecting to these
   servers the protocol used is "ftp" the File Transfer Protocol, as
   mentioned previously in Section 4.3.

   Any and all information that people want to make available on the
   Internet can be.  This means there is a truly vast amount of
   information out there, with more being added every day.  In fact
   there is so much information that it is sometimes difficult and
   confusing to find the information you want.  This is the topic of our
   next section.

   Some anonymous ftp sites are provided in Appendix B.

5.3.1 Searching

   One of the great challenges facing the Internet is how to organize
   the vast amounts of information in ways that allow most people to
   find what they want.  In theory, there may be a "perfect"
   organization, but in practice, we will never achieve it.  This means
   that finding the information you want on the net may require some
   skill on your part.  Fortunately there are many tools and strategies
   that may be helpful.

   One of the all time great ideas for finding the information you want
   is a thing called a search engine.  A search engine is a computer
   program usually living on a remote computer that spends its time
   downloading information from other computers and building an index of
   what lives where.  This behavior has given them the nickname of Web
   Crawlers.  What this means to you, is that you can call up the Search

   Engine's home page, and enter in a subject, name, title, or random
   string pattern, which is then used to search the engines index for
   stuff out on the net that seems related.  This can lead to both a
   large volume of information, and some rather startling discoveries of
   information from unsuspected sources.

   Some of the available Searchers and Indices on the Internet include:

   Yahoo      - Index of WWW sites, with search capabilities
                http://www.yahoo.com/
   DejaNews   - USENET (news groups) search engine
                http://www.dejanews.com/
   WebCrawler - http://query.webcrawler.com/
   Lycos      - http://www.lycos.com/
   AltaVista  - WWW and USENET search engine
                http://www.altavista.digital.com/
   Magellan   - Index of reviewed and rated Internet sites, with
                search capabilities
                http://www.mckinley.com/

   Yahoo, for example, has a high-level category called "Arts", which
   has a multitude of subcategories below it, most of which have further
   subdivision, each of which can contain lists of lists.

   For example, to find information on Modern Dance, from a starting
   point of http://www.yahoo.com/, you can follow the links to
   http://www.yahoo.com/Recreation/Dance/Modern/Groups or simply type
   "Modern Dance" into the search field and choose from a list of
   selections returned.

   On a typical attempt on March 25, 1997, Yahoo returned 4 major
   categories of Modern Dance, and offered 82 other links to related
   pages around the web.  Statistics, however, can be changing by the
   moment.

   There are many other Searchers and Indices on the Internet, and a
   good way to find them, is to do a search for them in one of the
   services above, or others you encounter in your travels.  The
   resources in Appendix B may also be helpful.

   After experimenting with the available search engines, it quickly
   becomes clear that searching on a broad category can result in too
   much information.  For example, a recent search at AltaVista for the
   subject "Rembrandt" matched over 8500 individual items, including
   information on the famous artist (Rembrandt von Rijn (1606-1669)),
   His Self-Portrait, a hotel in Thailand (Rembrandt Hotel and Plaza,
   Bangkok),  and a pizza restaurant in California.  (The URLs for these
   sites are listed under Rembrandt in Appendix B.)

   To be more particular in what you find, all of the available search
   engines allow you to do compound searches, in which multiple keywords
   are used, possibly in combination with Boolean logic operators such
   as AND, OR, and NOT. For example, to focus in on Rembrandt the
   artist, at the exclusion of pizza cafes, try the following advanced
   search in Magellan:

   Rembrandt AND artist AND portrait NOT pizza

   Note that the method of entering search items differs slightly from
   service to service.  When trying a new service, check the available
   help topic before searching.  And as with any new skill, practice,
   practice, practice!

   Test of search scope:
     Lycos:     rembrandt.                       1837 relevant documents
     Lycos:     rembrandt and artist and portrait   6 relevant documents
     Yahoo:     rembrandt                 2 Category and 39 site matches
     Yahoo:     rembrandt and artist      2 Category and 11 site matches
     AltaVista: rembrandt                        about "10000" documents
     AltaVista: rembrandt +artist +museum          about "100" documents
     WebCrawler: rembrandt.                     347 matching "rembrandt"
     WebCrawler: rembrandt and artist and portrait 21 matching documents
     Magellan:  rembrandt                                    666 results
     Magellan:  rembrandt and artist and portrait          39379 results

   You will notice, in the above statistics, that the numbers for
   Magellan are quite different from the others.  This is because
   different search engines may function differently.  When you do a
   this+that search on Magellan, it looks for all instances of This AND
   all instances of That rather than the standard response of Only
   documents which contain both This AND That.  On almost all the sites
   I have explored, there is an explanation of how the search process
   works on that site.  You should read that explanation if you are
   having trouble or need further information.

   You will also begin to see patterns in the way people name, or file,
   their information, which will help you find more information.  Some
   may list their links to ART, while others list their links to
   PAINTINGS.  Also many people put links to related pages in their
   pages, so one page you find that does not have what you are looking
   for, may have a pointer to another page that does have what you are
   looking for. Searching is an iterative process, keep going from one
   search key to another, and continue down multiple levels to see what
   is out there.  Its known as Exploring, or Surfing the Net, and it is
   a major part of the joy of the Internet.

6. Accessing the Internet

   Having decided to explore the Internet, you will need some tools and
   information to get you started.

   Accessing the Internet in terms of simply receiving, downloading, and
   viewing files, uses most of the same tools (software and hardware)
   needed to create files and make them available on the Internet.
   Sections 6 and 7 overlap a great deal in the areas of basic hardware
   and software.

   The Internet can be accessed in many comfortable ways: at school, at
   home, at work, and even at trendy CyberCoffeeHouses.  Accessing the
   Internet is not synonymous with publishing and displaying on the
   Internet, however.  You may need different equipment for creating
   content, then you need for retrieving content.  Section 6 focuses on
   the specific needs of those who wish to create content and publish on
   the Internet.

   If you live near a major metropolitan area you may have already begun
   to see advertising for Internet access from your local telephone
   company, or cable TV provider.  Contact them to get information on
   equipment needed, services provided, access restrictions and costs
   involved.

   Local libraries and schools may now offer both Internet Access, and
   instruction on Internet related subjects, including getting
   connected.  Check the Internet sections of your bookstore and
   magazine stands.

   Do not be dissuaded if you find limited access.  The Internet will
   soon be everywhere, but if you do not want to wait, then you might
   consider taking matters into your own hands as these enterprising
   youths did...

      When several students from large universities returned home to
      Taos, NM, a few summers ago, they left behind their Internet
      connections.  Missing their connectivity, they approached the
      owner of a local bakery and suggested he start an Internet room
      where he could charge people by the hour to use the Internet.  The
      entrepreneurial baker applied for a government grant and received
      a few computers with high speed modems.

   You may be able to find a place like this, often called a CyberCafe,
   rather than having to create one.  Try your local magazine stand for
   the latest periodicals, or your public library or bookstore for
   pointers to other people who will know more.

   Once you have some Internet access, you can find out more about
   Cybercafes, InternetCafes, and other physical Internet access points,
   by searching as described in Section 5.3.1. and in the newsgroup
   alt.cybercafes.

6.1 Internet Service Providers

   Being an Internet Service Provider (ISP) these days is pretty easy
   and can be financially worthwhile, so there are alot of them, and
   they are starting and failing every day.  In addition to the
   information and pointers you will find in this document, many
   organizations exist to help you locate, and choose a service
   provider.

   As with any service, be sure to get references, and get their
   features and terms in writing.  Some ISPs provide access only to
   their site, others may provide email only, or provide access to the
   web but charge by the minute for access.  Have some idea of what you
   want to do and what the vendor provides before making any deals.

   Many Internet Service Providers offer free instruction to get you
   started in accessing the Internet as well as creating content.  With
   the competition of Internet providers, you should be able to find one
   or two that offer the instruction you need.

   Some organizations exist solely to recommend those who pay them.
   Most Internet related magazines these days will contain extensive
   advertising by ISPs in your area.

   As discussed in Section 4.1, every machine on the Internet needs an
   address by which it is accessed.  Even machines which are only
   browsing need an address to which the browsed information is
   returned.  This is actually called your IP address.  The address is
   the number with which your hostname is associated.  Usually you will
   get your IP address from your work, school, or ISP when you get your
   configuration information for your Internet connection.  If you were
   trying to get an IP Address on your own, you would go to the Internet
   Assigned Numbers Authority (IANA).

   More information about IANA, IP addresses, and domain names can be
   found in the information referenced in the Resources section.

6.2  Computer Hardware and Software Tools

   A basic computer system consists of a box containing a Central
   Processor Unit (CPU), main controller (motherboard), and Floppy

   Drive.  It will also come with a keyboard, and you will need a Hard
   Drive, Memory, and a Video Monitor.  How much memory, how large a
   hard drive, and how fabulous a monitor, will vary with your needs and
   experience.  To connect to an ISP you will usually also need a modem.

   This is simply an overview to familiarize you with some basic terms.
   There are many current magazines devoted to computer and Internet
   related subjects now available in most bookstores and magazine stands
   which provide much better and more timely information on computers,
   operating systems, software, and peripherals.

   There are many types of computers available including Personal
   Computers (PCs), Apple Macintosh Computers (Macs), and various Unix
   based Workstations.  The most affordable systems are generally PCs
   and Macs.

   You may also need to choose an Operating System (OS) for the machine
   you choose.  PCs can run a version of "DOS", anything from Microsoft
   (Windows, NT, Windows95, etc.), or a version of Unix (BSDI, FreeBSD,
   Linux, etc.) Macs can run the common Mac Windows, or Apples version
   of Unix.  Workstations generally run a Unix derived OS, but there are
   also quite a few machines available which run their own proprietary
   OS.

   Each type of system has its features, functions, and drawbacks, as
   well as its proponents and opponents.  Each system has different
   costs associated with it.  You will need to understand much of this
   before you are ready to buy your first computer.  Much of the free
   software available on the Internet, for example, was written for the
   Unix operating system because that has been the main OS of the
   Internet for many years.  That, of course, doesn't mean there isn't
   alot of free software available for other OSs, Windows software, for
   example, is becoming quite popular.  The system of choice for most
   musicians is the Mac because of the variety and quality of the music
   software available for them. Windows users will need a pc to run
   their software.  Now, actually, there are many operating systems
   available for personal computers.

   Common operating systems come in two basic types; single tasking and
   multi-tasking.  This is a reference to how many different things or
   "tasks" the computer "seems" to be doing at once.  The earliest
   computers were single tasking.  They did only one thing at a time,
   and could be used by only one person at a time.  DOS is a modern
   example of a single tasking operating system.  Since people rarely do
   more than a few things every second, this often left the computer
   simply waiting around for the next keystroke.

   Even back then, computers could do all the work needed to listen to a
   human in a few milliseconds every second, so time-slicing was
   invented to get more use out of computers.

   A time-slicing operating system is said to be Multi-tasking. It
   executes programs in little slices of time, typically shorter than 25
   milliseconds (or 1/40 of a second) and switches to another task for
   each new slice.  If you remember that most video runs at 25 or 30
   discrete frames per second, and yet humans perceive it as continuous,
   you can see how time-slicing can provide a convincing illusion of
   doing many things at the same time.

   Multi-tasking operating systems have the option of being set up as
   single-user or Multi-user machines Windows 95 and the MacOS are
   modern examples of multi-tasking operating systems that were designed
   to be used by a single user most of the time.  Other operating
   systems, such as UNIX, VMS, NT, and others are more prepared to be
   set up as multiuser machines.  Multiuser machines are typically
   connected to a network, or a network of terminals, so that more than
   one person can use the processor and other peripherals at the same
   time.

   Some operating systems can also take advantage of Parallel Processing
   hardware that actually does more than one thing at a time.  However
   as of this writing, this hardware is somewhat rare and expensive, so
   we won't go into the details here.

   Different OSs also have different File Systems.  The File System is
   the way in which your programs and other computer files are stored
   and displayed.  Different Operating Systems also have different "User
   Interface"s.  The User Interface is the way in which you interact
   with the computers OS.  Some use "Text" interfaces, which require the
   user to type all commands using a keyboard.  Others use a "Graphical"
   user interface, which provides graphical images of buttons and icons
   which the user "clicks" on to start programs and perform save and
   delete functions among other things.

   In order for the software to run on the computer, the software must
   be written specifically for the operating system.  Just like Internet
   traffic must use the Internet Protocol, software must speak the OS
   language of the computer on which it wants to run.  Translation
   programs exist, but there are still problems.

   One of the problems is with file"names".  The DOS Operating System,
   for example, supports names that consist of an 8-character filename,
   and a 3-character "extension", separated by a ".".  For example
   "foo.txt", and "myprog.exe" are valid DOS filenames, but sadly,
   "foo.html" is not.  This means that HTML files on a dos system must

   use the extension ".htm" rather than the ".html" extension used on
   many other systems.  This problem also affects many other common
   extensions such as ".jpeg", ".mpeg" and others.

   A filename's extension is very important in that it tells not only
   you, but your software, the kind of file it is, and what it needs in
   order to be understood.  For example, when your web browser
   encounters a file with a .html or .htm extension, it will assume it
   is hypertext, and will know how to display it and follow its links.
   When it gets a .txt file, it knows to display it, and that it will
   have no links.  Your browser can also be configured to understand
   other file formats which can be made to be displayed with the
   browser, or another program, or saved to disk, etc.  For example, you
   might configure your browser to start up Word when it encounters a
   .doc file.

   File extensions indicate file format.  Just as there are different
   file extensions for different text file formats, there are different
   extensions for different graphic file formats.  That goes for sound
   file formats, video file formats, data base files, and others.

   Different software understands different file formats and will create
   and display only those formats it understands.  For this reason,
   software which translates a file from one format to another is often
   necessary.

   For example, if you create a file with Microsoft Word you will
   usually save it in Word's native format as a ".doc" file. You can
   also choose the "save as" option to save it as plain text in the .txt
   file format.  Although some format information will be lost in the
   translation, words and numbers should remain unchanged.  If you
   wanted to give others access to the file, and you couldn't assume
   that they all have Word, you would want to present it in .txt format.
   Note that a .txt file is also easily formatted into .html.

   File formats and extensions are discussed throughout the following
   sections.

   After you've resolved to some extent, what it is you want to do, and
   what hardware and OS you'll need, there are a great deal of software
   packages available to help you with all sorts of things on the
   computer.

   Software designed to make your life easier by using your computer,
   include dictionaries and other reference materials, accounting,
   bookkeeping desktop publishing and other business needs software, as

   well as landscape and architectural planning software, health and
   nutrition software, educational and entertainment software, and much,
   much more.  Your computer need not only be your link to the world,
   but also a major organizational tool in your life.

   For accessing the Internet, you'll need communication software.
   There are a few different pieces to this part of the puzzle.  There
   is the software which communicates between the operating system and
   the modem or network card, there's the software which speaks IP and
   allows communication over the Internet, and there's the software
   which you use which is called the "user interface", or application
   program.  For accessing the web, your application will be a "web
   browser".

   Web browsers are available in stores that sell software packages, and
   are also available free on the Internet.  Since you would not be able
   to reference the online material without a browser, and since most
   available periodicals will be likely to focus on commercial browsers,
   the Resources section provides a pointer to a free browser available
   by mail for the cost of postage, or over the Internet using the File
   Transfer Protocol, FTP.

   Ftp software is available both free and commercially.  Other Internet
   communication software, referenced throughout this document, are
   email, news, gopher, and telnet among others.

   With any system, you should ensure that it contains the software and
   hardware necessary to maintain both itself and your data.  While
   computer data is not particularly fragile, it is still sometimes lost
   due to hardware or software problems or simple human error.  For this
   reason it is considered important to "back up" your system by making
   extra copies of important data.  While simply copying data onto
   floppy disks could work, the small storage size of the disks makes it
   both time consuming and prone to human error.  Many large capacity
   disk and tape drives are available with special software specifically
   for doing backups.  It is highly recommended that you purchase a
   backup solution along with your computer.

   It is also important to protect your data from being damaged by
   computer viruses.  When you connect to the net and move data back and
   forth, it is possible that there can be a small piece of software
   called a "virus" that could hide in some of the data and infect your
   system, possibly then using your system to infect other machines that
   you connect to.  These viruses are often created by misguided people
   as a sort of computer prank, and can accidentally or maliciously

   damage your data.  Fortunately it is possible to obtain virus
   checking software that can regularly scan your system to see if it
   has been infected.  This software is important whether you are
   downloading information from the net, or using other peoples floppy
   disks.  See Section 8.2 for more information on viruses.

   Determining your ideal hardware and software configuration will take
   some time and patience.  You need an understanding of what you want
   to do, and how, and whether you wish to simply view, or create.

   You'll also want to know the limitations and expandability potential
   of the system, so you can determine if it will have a useful
   lifespan.  If the machine cannot grow for the foreseeable few years,
   it will become obsolete before its given you its fullest value.

6.3 Multimedia

   When one media is not enough.

   Depending upon your needs, you may require special hardware installed
   in the machine, or attached externally by cables.  These additional
   pieces of hardware are known as peripherals.

   The peripherals needed for accessing information on the Internet
   might include the following:

   - a sound card and speakers to hear sounds, music, speech, etc.
   - a CD-ROM player to read commercially available computer CDs
   - midi equipment for audio artists
   - video equipment
   - a printer to make hardcopy of files, or images
   - Other equipment for creating content See Section 7.

   Most of these peripherals will also require specialized software.  If
   you plan to purchase all the hardware and software at once, find a
   vendor who will connect and test all the hardware, software, and
   peripherals for you.  Due to the complexity of these systems, they
   can be difficult to configure for the inexperienced user.

   Also, verify that the vendor will stand behind their equipment, and
   this configuration in the event that it doesn't work the way you want
   it to.  Hook the system up, and test it extensively right away, so as
   to determine any problems before your warrantee period expires.

   Many of the Internet related periodicals available run articles on
   choosing a computer, as well as the latest software and hardware news
   and reviews.

   You can also explore the pointers in Appendix B for the information
   you need.

7.  Creating Content

   As the hardware and software of the net becomes cheaper and better
   understood, the technology itself will become less important than the
   content which lives on the net.  Many of the rewards of the Internet
   will go to the people who create such content.

   There are different ways to add content to the Internet.  One may
   start with pre-existing content, such as paintings or stories, and
   find a place for it, or one may create content specifically for the
   computer such as web pages, graphics, video and audio files, etc.

   Let us for the moment assume that you have already created something
   which you would like to make available on the net.  There are many
   ways in which you could do this.  You could deal with agencies who
   provide this service professionally, find friends or others willing
   to do it for free or barter, or get yourself on the net in some
   fashion, learn, and create a place for it yourself.

   If you chose to do it yourself, you will need your own computer and
   some form of Internet access from an Internet Service Provider (ISP)
   or Web Space Provider (WSP).

   Once you have a place to put your content, you will need to
   understand a little more about file formats.  Images may have to be
   digitized, audio may have to be recorded into computer files, etc.

   While hardware, such as image scanners, are readily available, there
   are also many other options available.  For example, most print, or
   copy shops today can do high quality image scans and some photolabs
   now provide photos-on-disk as one of their services.

   If you are placing your content on the Web, a web page must be
   created for it in the form of an HTML document.  While this is easy
   enough to do yourself, many WSPs also offer this service, and there
   are also independent web page designers who may be able to do a
   better job.

   Creating online content involves moving your art into an electronic
   form and then perhaps, re-formatting it for the Internet.  For some
   art forms, the initial electronic step is fairly painless: typing a
   short story, poem, novel, or other text into HTML is fairly

   straight forward.  Moving a computer graphic to the Internet may
   require a conversion program to make it useful to others.  Performing
   arts, sculpture, and other pieces may be more difficult to capture on
   a computer disk, and may require more work and creative thinking.

   Much of the information needed to help you think creatively about
   publicizing your work online is available in classes, books, local
   Internet cafes, and on the Internet itself.  Many Internet magazines
   are available for subscriptions or individual issues can help get you
   started.  Most new bookstores and, to some extent, used bookstores
   provide numerous volumes of Internet information.  However, even the
   most recently published books may contain outdated information.  The
   latest 'standards' can be obtained directly from the Internet
   Engineering Task Force, or IETF, at http://www.ietf.org/.  The
   document you are reading now is a product of that organization.  The
   documents of the IETF are collected and maintained on anonymous ftp
   sites, as well as in the web.  These sites are referenced in the
   Resources section, and Appendix B.

   A really good way to learn how to write html documents is to look at
   the source code of html files already available.  Just use your
   browser to look for pages you like, and then use your browsers "view
   source" feature to see how it was done.

   If however, you learn better by having someone teach you, you may be
   interested in taking a HTML or Internet Introduction course at a
   local college.  Most larger metropolitan area schools provide classes
   for the basics, which can also expose you to other artists.  Make
   sure you read the course description; some courses may only cover
   accessing the Internet while you may want to actually be creating
   documents.  If no colleges in your area offer classes, contact the
   computer science department or the continuing education office and
   suggest a topic.  If the school can obtain enough support, they may
   offer a class the following semester.

   Artists in smaller communities may need to rely more heavily upon
   online sources of information.  Appendix B provides some useful sites
   to get you started.

7.1  Getting Help

   Once you are connected to the Internet, there are many more ways of
   getting help with it.  Try the forums, listed in Section 5, such as
   Newsgroups, Bulletin Boards, and Chat rooms.  If you have checked the
   local netiquette guidelines, and behave accordingly, the Internet
   community will usually be very helpful toward new arrivals.

   When looking for good consultants and web page designers, start with
   the sites you like, and find out who did their pages.  Discuss your
   needs with other artists, or check the phone book, library, books,
   magazines and other periodicals for artist collectives and groups who
   may be available to assist you.  Look for groups whose cause is
   artistically motivated, rather than trusting people who are paid to
   point you at a particular consultant or assistant.

   Know what you want.  If it takes you a while to figure out what you
   want, take that time.  This should not be something you are rushed
   into.  The Internet is not going to go away.  Whatever you decide to
   do, do not be afraid to ask for references.  A good provider of
   services will always be happy to provide you with a list of happy
   customers.

7.2 About File Formats

   As described in Section 6.2, there are many file formats available on
   the Internet.  You'll need to understand a bit more about the formats
   you'll want to present, in order to create them for others to see.
   Some formats are called Public Domain, and are freely copyable, and
   the software tools used to create this content is available for you
   and others to download off the net.  Other formats are called
   "proprietary", and are only readable and creatable using software
   that must be purchased from the vendor who created it, or their
   authorized reseller.

   Some formats, and their associated formatting tools, come along with
   other software packages.  For example, Microsoft Windows comes with a
   Sound Recorder, which makes and plays back .wav files.  Apple also
   offers Quicktime free for their OS, as well as Windows and others,
   which also records and plays back .wav files.  So many Internet
   explorers already have access to tools which will allow them to hear
   your .wav file, if you were so inclined.  They may not, however, have
   a player for a proprietary format for which they would need special
   software.

   When creating content for the Internet, its important to consider the
   format most likely to be understood by your target audience.

   More information on file formats can be found at:
   http://www.matisse.net/files/formats.html and
   http://rodent.lib.rochester.edu/multimed/contents.htm

   Some artists are actually using html as an artform in itself and are
   helping to push the boundaries of this exciting new medium.  The
   current HTML specification can be found in the RFCs referenced in the
   Resources section.

7.3 Creating Text and Hypertext Documents

   Text files are stored on a computer by encoding the text in ASCII,
   "American Standard Code for Information Interchange", which
   substitutes a distinct number for each character of text, and stores
   the result in a file.  Text files are often given the file extension
   ".txt".

   Text files can be created in many ways.  The two most common types of
   programs used are called "text editors" and "word processors".
   Actually both types of programs are similar.  They both allow you to
   move around within the document, and add, delete, and otherwise
   modify text, as well as create and save text files.  Word processors
   differ from text editors in that they usually also have a great deal
   of options for formatting and printing text, and may support
   alternative file formats, such as ".doc" which inserts many
   formatting commands that are understood by printers, but not always
   by browsers.

   Since HTML formatting is simply ASCII text with special formatting
   commands, you may use either text editors or word processors to
   create a ".html" file.  Alternatively, there are many Web authoring
   tools that will allow you to use a graphical interface to specify how
   you want your page to look, and will automatically generate the HTML
   formatting commands and output an ".html" file directly.

   Text editors, Word Processors, and other document creation tools are
   available both freely and commercially for all operating systems.

   Look to currently available computer related books and periodicals to
   provide sources of information about text editors, word processors,
   and document and web page authoring tools.

   HTML is a technical specification of the Internet Engineering Task
   Force, and the most current documents can be found on the IETF
   site(s) listed in the Resources Section.

7.4  Creating Graphic and Moving Images

   Whether you want to put your existing images on the Internet, or
   create new images using electronic creation tools, there are a few
   basic pieces of information which will be useful.  The following two
   sub-sections provide an overview of image formats, and creation
   tools.

7.4.1  Bitmap Image Formats

   Pictures may be stored on computers in many different ways.  One of
   the most common, is a simple bitmap consisting of a list of pixel
   colors, and header information describing how to map this list of
   pixels back into the image.  Bitmap formats are .bmp in windows, and

   Bitmap images may be created by scanning in existing images, or by
   creating images directly on the computer, using programs such as
   Adobe Photoshop, Corel Photo Paint, Windows Paintbrush, and many
   others available both freely and commercially.

   A scanner works very much like a copy machine, or fax machine, in
   that it "scans" your artwork or text and "encodes" it into a machine
   readable format of numbers and formulas.  A scanner is a hardware
   tool, and usually comes with at least some of the software you need
   to use it.  Generally it will connect to your computer and you will
   either place your work on it, or run the scanner slowly over your
   work, depending on the type of scanner you select.  Scanners are only
   available commercially, and come in a variety of sizes and styles
   with a variety of features and prices.  As with all computer tools,
   understanding what you want to accomplish will help you decide what
   you need to purchase.

   Since it can take a lot of data to encode an image, there are many
   different kinds of file formats that contain compressed versions of
   the file data.  These formats vary greatly in how they compress the
   data.  Two of the most popular compressed image formats on the net
   are .gif and .jpg.

   GIF, short for Graphic Image Format, compresses an image by reducing
   the number of colors in the palette the image is reconstructed from,
   allowing them to shrink down the size of the color specification for
   each pixel.  Even if you only save a few bits per pixel, there are
   typically enough pixels that the savings are significant.  Under
   extreme amounts of compression, images start to look like childrens
   coloring books, but it is possible to get great looking images with
   moderate amounts.  GIF files typically use the extension ".gif".

   The JPEG format uses complex mathematics to approximate the whole
   image.  Under extreme amounts of compression, images start to look
   like bizarre cubist interpretations of the original image, but
   because everything about the image is compressed, it is still
   possible to get dramatic reductions in file size while retaining
   acceptable image quality.  JPEG files typically use the extensions
   ".jpeg" or ".jpg"

   Both of these formats are what is known as "lossy" compression
   because they actually lose information from the original image, thus
   degrading (hopefully by a negligible amount) the image quality.
   There are also "lossless" compression schemes that offer smaller
   reductions in file size, but allow perfect reconstruction of the
   image.

7.4.2  Vector Image Formats

   Another way images may be stored is in "vector" format.  This format
   is useful because of one of the techniques for creating images on a
   computer.  There are programs that allow you to create images by
   creating shapes like circles and polygons, and specifying colors for
   them.  If the entire image is constructed this way, it is possible to
   encode the list of information describing each polygon using only a
   fraction of the information it would take to describe each pixel.

   Vector images also have the wonderful quality that they may be scaled
   without loss of image quality.  For example, if you were to enlarge a
   bitmap image of a circle large enough to see individual pixels, you
   will find that pixels are actually square dots, and if enlarged
   enough, the circle will have very jagged edges.  However if you
   enlarge a vector image of a circle, it remains perfect down to the
   limit of resolution of the screen or printer, because it is stored as
   the mathematical representation of a circle which is independent of
   scale.

   For this reason, much commercial art and layout is often done in
   vector formats.

   Vector formats may be created using many commercially available
   software packages, and many freely copyable conversion tools are also
   available.

7.4.3  Video Formats

   Images received by the retina of the eye persist for a short period
   of time, and then fade.  A sequence of images or "frames", with small
   changes, sufficiently close together, will give the illusion of a
   moving picture.  How much of the picture changes between one image
   and the next affects how smoothly or jerkily the movement will
   appear.  Frame rates of 10 per second and above are enough to give a
   reasonably realistic rendition of natural scenes.  In fact, the way
   that motion is perceived by the human brain means that less detail is
   required in fast moving segments of a picture.

   Video on your television, or Video Cassette Recorder (VCR), is
   formatted quite differently from video formatted for viewing,
   storage, and transmission over the Internet.  Disk space and
   bandwidth being constantly at a premium, methods of compressing video
   data have been developed to shrink the size these video files might
   otherwise be.

   Just as described in Section 7.4.1. regarding compression of static
   images, there are different compression utilities and formats for
   video images.  There are many video compression formats, and we have
   provided information on two here.

   MPEG (pronounced M-peg), stands for Moving Picture Experts Group.
   The mpeg format creates files with a .mpg or .mpeg extension.  Mpeg
   players are freely available on the Internet.  Mpeg files can be
   created using a number of commercially available products.  More
   information on mpeg can be found by following the links available in
   Appendix B under Video Resources.

   Quicktime was created by Apple, and is currently available for both
   Macintosh and Windows systems.  Quicktime files have a .wav extension
   and can be played with many freely available viewers.  Quicktime
   creation and viewing tools can be found via the links in Appendix B.

   There are other video formats being created all the time.

7.5  Music and Sound

   The World Wide Web supports audio data as well as visual data.  The
   most obvious way to send audio across the net would be to use digital
   audio like that used for the Compact Disc or "CD".  However, CD
   format digital audio requires 44,100 16 bit words per second for a
   mono signal, and twice that for a stereo signal.  While there are
   many places where one can find digital audio in Windows ".wav", or
   the Macintosh ".au" format, these files typically take a very long
   time to download even a few seconds of audio.  The size of these
   formats makes them too inefficient for widespread use on the net
   today.

   It is however possible to do "useful" audio over the net. The
   emerging "de facto" standard seems to be _RealAudio_, based on the
   freely distributable server/player application, _RealAudio_ version
   2.0, developed by the Seattle based company Progressive Networks.
   First released in 1995, RealAudio allows useable digital audio in
   realtime over a 28.8 kB line, and has already been put into service
   on the home pages of most major record companies as well as in many
   niche applications.  In addition, RealAudio provides a "Voice mode"
   optimized for understandable speech transmission over a 14.4kB line.

   Unfortunately the quality of _RealAudio_ leaves much to be desired.
   In particular, the sample rate in Music Mode is only 8Khz (as
   compared to CD quality 44.1 Khz), meaning that all high frequencies
   above 4khz are simply missing.  The resulting audio is still pleasing
   to listen to, but sounds very dull and dark.

   More information about RealAudio can be found at www.RealAudio.com.

   Clearly Digital Audio is the way of the future, but until more
   bandwidth is available to the average person, it may not be the way
   of the present.  Fortunately, at least in the area of music, there is
   an interesting alternative.

   MIDI (the Musical Instrument Digital Interface), as developed for
   electronic musical instruments (keyboards, samplers, drum machines,
   etc.) works well for certain kinds of music over the net.  It
   involves sending no sound sources at all, just the description of the
   music -- kind of like the score, without the instruments.  If the
   receiver has the right instruments on their computer (such as the
   sounds defined in the General Midi soundset found on many
   soundcards), they can play back the musical score.

   The big disadvantage to using MIDI is that other than the limited
   selection of sounds in the General Midi set, it is extremely
   difficult to make sure the music sounds more than approximately like
   the original.  And there is no way to handle non-MIDI instruments
   such as guitar or voice, so it is useless to hear the new song by
   your favorite rock and roll band.

   The big advantage to MIDI is how fast it works over slow net
   connections.  For example, five minutes of music, fits in a mere 30k
   file, and usually will not take more than a few seconds even on the
   slowest of dialup connections!  This makes it ideal for applications
   such as networked games, or music to go along with a web page.

   There are many ways of embedding MIDI files into HTML documents, for
   Internet distribution.

   Anyone who wants to add MIDI to a page can choose to use existing
   public access MIDI file banks, of which there are many, or to produce
   new MIDI themselves.

   Crescendo is one package available for embedding MIDI files in HTML
   http://www.liveupdate.com Crescendo works for both Macintosh and
   Windows.

   Helpful Links: Publicly Available Audio and Music Applications
   http://reality.sgi.com/employees/cook/audio.apps/public.html

   Music of J.S. Bach for keyboard
   ftp://ftp.cs.ruu.nl/pub/MIDI/SONGS/CLASSICAL/BACH/HARPSICHORD/

   RISM (repertoire of manuscript sources), plus other access to online
   scholarly music resources. http://rism.harvard.edu/RISM/

   Crescendo is used in the web pages at http://mcentury.citi.doc.ca
   along with a growing number of others.  One very interesting use of
   Crescendo occurs on the Music Theory Online publication, a serious
   scholarly site for publishing and debating musicology and music
   theory.  Articles there now routinely include short musical examples,
   a great sign of the future of scholarly publishing in the age of
   dynamic, interactive content.
   http://boethius.music.ucsb.edu/mto/issues/mto.96.2.4/

   Formerly, debate on musical form and structure occurred in the pages
   of journals, referring usually to music examples in terms of its
   visual notation.  This notation requires a certain degree of training
   to decode, effectively restricting the potential readership to those
   with this professional training.  With sound examples embedded
   directly in the text, at least the aural effect of the music comes
   across, even to those unable to read the notation accurately.  This
   shift is appropriate to the newer trends in music scholarship, which
   talk about music in terms of its social and cultural context, instead
   of only in formal terms.

7.6  Content Design Issues

   Know your intended audience.  If you want more people to see your
   work, you'll need to make it more accessible.

   Many sites are very careful about what content they will allow access
   to.  If you want all audiences to be able to view your work, make
   sure you are careful about your content and language.

   Another content design issue is tool friendliness.  Some machines
   have limitations which will not allow them to see or hear what you'd
   like them to.  For example, older or less expensive models of
   monitors may have monochrome, or one-color displays, or display only
   16 colors, or 256 colors.  If you create and view images which look
   fabulous with a 64,000 color display, you may want to test them using
   a 16 color display to see what the effect is.  Sometimes you can
   modify your image slightly to get a wider audience while only having
   a minor impact on the effect.

   The following sites give you pointers on what to consider when
   designing a web page that is content- rich:

   - Sun's Guide to Web Style - http://www.sun.com/styleguide/
   - Yale C/AIM Web Style Guide - http://info.med.yale.edu/caim/manual/
   - Web Development - http://www.december.com/web/develop.html
   - A Guide to Creating a Successful Web Site =
     http://www.hooked.net/~larrylin/web.htm
   - Bandwidth Conservation Society - http://www.infohiway.com/faster/
     This is resource for web developers with an interest in optimizing
     performance.

   See Section 8 for other issues and challenges relating to content.

   Artists should post how they want their art treated on the web, and
   how it may be used and post their copyright notice there.

   For example, some artists allow their work to be used freely as long
   as it is not used for financial gain, and request that people contact
   them for permission if they wish to use their works for a commercial
   purpose.

   Artists need to be aware that when people view their works from the
   web, their art is downloaded to the viewers computer as that is how
   browsers work.

7.7  Publicizing your work

   The fastest way to publicize your work on the Internet, is to have
   the most popular sites link to your pages.  There are many sites on
   the net, such as the search sites mentioned earlier, that are
   interested in listing a pointer to your site for their own purposes.

   It is also helpful to have other artists link to your site and it is
   great to have other art sites link to you as well.  "Art on the Net",
   Art.net, offers free linking to artist sites and provides this as a
   service to the artist community on the Internet.  There are also
   other art related sites which do this.

   It can also be helpful to put your URL on your business card.

   The Internet's origins in the Research and Education communities
   played an important role in the foundation and formation of Internet
   culture.  This culture defined rules for network etiquette
   (netiquette), and communication based on the Internet's being
   relatively off-limits to commercial enterprise.

   Certain styles of marketing and advertising will therefore not be
   effective on the Internet, and mass mailings or inappropriate
   postings to newsgroups, will most likely do more harm to your
   enterprise than good.  If you intend to do marketing on the Internet,
   please read the Netiquette Guidelines document RFC 1855 listed in the
   Resources section.

8.  Issues and Challenges

   The Internet has many issues and challenges, among which are
   security, privacy, property rights, copyrights and freedom of speech.
   Security issues involve both the security of your data, as well as
   your image.  Viruses can be transmitted easily over the net, and
   precautions should always be taken.  If you choose to keep your own
   information available on the net it can be the subject of vandalism
   and theft.  You may also find yourself being persecuted for the
   information you provide as more and more people join the Internet
   community and feel the need to impose their morality upon it.

   This is no different from any society.  We must draw our own lines,
   and our own conclusions.  This section is terribly brief, and
   entirely summary in nature, and is in no way intended to be
   comprehensive.  It is intended to warn you and advise you.  If you
   have real concerns about your property rights, copyrights, and/or
   personal rights, please do your own research.  Internet laws are in
   such a state of flux that they are changing as I write this, and they
   will be changing as you read it.

   At last check, however, freedom of speech was prevailing in the
   United States, and so far the government has not upheld any laws
   prohibiting the exhibition of anything on the Internet.  Support your
   local constitutional rights.

8.1 Security Issues

   There are three major security areas of which the Internet user
   should be aware; Security of content, Site security, and Security of
   ownership.

   Security of Content, ensures that that which you put on the Internet
   is not altered, or vandalized.  Some Web Servers are inadequately
   secured, allowing vandals to modify your pages on your web sites,
   without your knowledge or permission.  If your pages are your
   business, you can imagine the problems this might cause.  Your words,
   art, and other work could be changed, your image tarnished.  If you
   cannot ensure that the content of your site cannot be corrupted, at
   least check it frequently to ensure that it has not been.  Keep
   frequent back-ups and periodically verify that you can retrieve data
   from them.

   Site security, will protect your data from viruses, worms, and sneak
   piracy.  Some software pirates, on the Internet, use unsuspecting
   sites to run their schemes.  Anonymous FTP servers which have write
   permission are most vulnerable.  Pirates can upload software onto
   your machine using cryptic filenames you may not even see in standard
   directory listings, and then publish the softwares whereabouts for
   others to download.  Not only will this compromise your reputation on
   the Internet for responsible system administration, it may make you
   liable for damages.  Learn what you need to learn to secure your
   system, or hire some security muscle to tighten down your site for
   you.  Section 11 provides some good information to get you started.

   Security of Ownership, involves copyrights and intellectual property
   laws.  If your work is your livelihood, having your rights
   compromised could be disastrous.  Section 8.4 provides an
   introduction to copyrights.

   This document only intends to bring the issues to your attention, and
   does not aspire to thoroughly cover these subjects.

   Please read another project of the IETF, the Site Security Handbook
   (FYI 8, RFC 2196), ftp://ds.internic.net/rfc/rfc2196.

   The Handbook is a guide to developing computer security policies and
   procedures for sites that have systems on the Internet.  The purpose
   of this handbook is to provide practical guidance to administrators
   trying to secure their information and services.  The subjects
   covered include policy content and formation, a broad range of
   technical system and network security topics, and security incident
   response.

   Section 11 provides more information on site security.

8.2 Viruses

   A "virus" is a program that modifies other programs by placing a copy
   of itself inside them.  It cannot run independently.  It requires
   that its host program be run to activate it.

   The damage caused by a virus may consist of the deletion of data or
   programs, maybe even reformatting of the hard disk, but more subtle
   damage is also possible.  Some viruses may modify data or introduce
   typing errors into text.  Other viruses may have no intentional
   effects other than replicating itself.

   Viruses can be transmitted over the Internet inside other programs,
   but usually they are transmitted by floppy disk.  Your best bet is to
   purchase a really versatile and up-to-date virus checking program
   from your local software retailer, and run it over every floppy you
   plan to read, and every program you plan to run, as well as
   periodically over the entire machine.

   Computer viruses are enough like organic viruses that many of the
   same precautions apply.  Early detection is key.  Diligence will
   mitigate potential damage, but frequent incremental backups are your
   best strategy for recovery.

8.3  The Standard Disclaimer

   As you have observed throughout the document, it is not common for
   you to get Internet access without having a provider of that access.
   Some Providers, such as universities and business, often require that
   you provide a disclaimer on every page stating that your opinions are
   your own, and not necessarily those of your affiliation.  What
   follows is a  sample Standard Disclaimer:

      This information is provided as-is. No warranty as to the accuracy
      is guaranteed.  Opinions expressed are entirely those of myself
      and/or my colleagues and cannot be taken to represent views of our
      employer.  If you notice something incorrect or have any comments,
      feel free to mail me.

   Other examples of disclaimers can be found via the search links
   listed in Appendix B.

8.4 Copyrights and Intellectual Property Issues

   The arrival of the Information Age has emphasized many questions that
   human society must answer.  One of the most important of these is the
   question of "Intellectual Property", which asks: "when and where is
   it appropriate to allow people to own information?"

   Copyright, Trademark, and Patent law are some of society's responses
   to earlier versions of this question.  They support the idea of
   ownership of ideas, or information, which can be used to assist the
   creators of the information in making a living from its creation.
   This is good for society.

   It is also good for society for information to flow freely.  Our
   technology, and even our society are built on a growing pool of
   shared information.  If we restrict the flow of information into that
   pool, then we restrict the rate at which society grows and becomes
   wiser.

   These two opposing drives have been highlighted by our newfound
   ability to distill many different things down to information that can
   be stored on a computer.  One of the computers greatest virtues is
   that once you network them together, the information they hold
   becomes more fluid, more easily moved, changed or copied.  This is
   great for society, but may not be so great if you spent your life
   creating that "information", and would like compensation.

   Because Copyright, Trademark, and Patent law were never designed for
   an economy built out of information, understanding how they apply to
   your information can be a tricky thing.  Since these laws vary from
   place to place, it is also difficult to know how to apply them to the
   Internet which has no definite location.  Worse yet, most of these
   laws are in the process of being rewritten today, a state that will
   continue for a long time because no one seems to know what to do
   about it.

   With that in mind though, here is how things stand today...

8.4.1 Copyright

   A Copyright is first established when a work is "set in media", which
   extends from paper to the Internet.  A work, once published in a web
   page, for example, is said to be "owned" by its owner.  However,
   applying for, and being granted, a copyright on your work by The
   Copyright Office of the Library of Congress will give your rights
   more legal weight.  Whether you plan to put your own works on the
   Internet, or simply download the works of others, you may want to
   familiarize yourself with the rights granted by "Copyright" as well

   as The Berne Convention for the Protection of Literary and Artistic
   Works.

   Sample Copyright Notice

      Permission is granted to transfer this document electronically
      only for the purposes of viewing it on the world wide web. Subject
      to fair use provisions, the right to print this document or to
      make electronic copies of this document available to others is
      expressly retained although direct requests will be considered.

8.4.2 Trademark

   A Trademark is a word, phrase, symbol or design, or the combination
   of words, phrases, symbols or designs, used to identify and
   distinguish the goods or services of one party from those of others.

   Trademark issues include both Trademarks which you own, and
   Trademarks which are owned by others.  If you own your own Trademark,
   you may want to familiarize yourself with legal ways of protecting
   it.  Some of the pointers in Appendix B provide that information, but
   we recommend retaining your own legal council.

   Trademark Infringement occurs when there is a "likelihood that
   consumers will be mislead or confused as to the source or origin of
   the goods or services.  This is the basic test used under both common
   law, and U.S. Federal Law.

   One issue regarding Trademarks on the Internet, is that of Domain
   Names which resemble, or infringe upon registered Trademarks.  Each
   case is being handled individually, and the text of cases can be
   found on many Internet sites.  The short version is that if a Domain
   Name is registered in good faith, "innocent registrations", the
   register can often keep the name, however, if the domain name is
   being used by a competitor, or to "force the trademark owner to pay a
   sum of money to acquire the name", the courts will generally not
   allow the register to keep the name, or profit from it.

   Trademark Dilution occurs when unauthorized use of a mark on
   dissimilar products or for dissimilar services causes the mark to
   cease functioning as a unique identifier, or becomes consciously or
   unconsciously linked with poor quality goods or services.  The
   Federal Trademark Dilution Act covers these issues.  If you may put
   trademarks on your web page, be sure you do not infringe upon the
   rights of the owner of the trademark.

   A good rule of thumb, offered by one company with concerns for their
   trademark, is that, if you mean a tissue, you should say "tissue", if
   you use the Kleenex(R) name, use its Registration mark "(R)".

8.4.3 Privacy

   The concept of trademarks extends to personal names or likenesses, in
   that you can infringe on their rights, including their right to
   privacy.  This issue has both legal and ethical implications.

   U.S law currently recognizes four types of invasions of privacy:
   intrusion, appropriation of name or likeness, unreasonable publicity
   and false light.  In most states people have a "Right of Publicity"
   which gives individuals the exclusive right to license the use of his
   identity.  You will want familiarize yourself with privacy law if you
   want to make other peoples likeness, name, address, or others
   personal information available on the Internet.

   Rights vary from state to state and country to country and many
   international, and U.S. sites are provided in the Law section of
   Appendix B.

8.4.4 Seek Professional Advice

   A number of organizations exist which can be of assistance in
   ascertaining the appropriate legal status, law, statute, or standing,
   of your particular issue and helping you understand your rights and
   responsibilities.

   One of these is The Citizens Internet Empowerment Coalition, CIEC.
   CIEC is a large and diverse group of Internet users, businesses,
   non-profit groups, and civil liberties advocates, who share the
   common goal of protecting the First Amendment and the viability of
   the Internet as a means of free expression, education, and commerce.

   The CIEC homepage URL is listed and a number of sites in the U.S. and
   other countries are represented in Appendix B, under the heading
   "Law".

8.5 Conducting Business over the Internet

   Since people are doing business over the Internet, they want to
   ensure that their personal information, credit card number, etc. is
   not used or compromised in any way.  Since the Internet is a public
   place, the only way to get information across it without anyone being
   able to retrieve it, is to encrypt it.  Encryption, is a process for
   scrambling access codes to prevent illicit entry into a system.  The
   study and work for people creating these system is called

   Cryptography.

   Secure HTTP (S-HTTP) provides secure communication mechanisms between
   an HTTP client-server pair in order to enable spontaneous commercial
   transactions for a wide range of applications.  SHTTP and SHTML are
   Internet-Drafts, which are "works in progress" of the Internet
   Engineering Task Force WTS working group.  The Resources section
   provides information on retrieving Internet-Drafts.

   You should be aware that encrypted communications are illegal in some
   parts of the world.  You should check your local laws regarding legal
   uses of encryption.

   Before you begin installing any encryption software, back up your
   files and make sure your computer is not needed for any deadline
   tasks in the next few minutes or hours. If you mess up the
   installation or forget some password along the way, your files will
   be protected from everyone, including you.

8.6 Netiquette

   Like any community, the Internet has a code of conduct, for which the
   users have created the term "Netiquette".  Much of it will probably
   seem like common sense, but since the Internet spans many cultures'
   ideas of "common sense", its worth paying attention.  Remember, when
   you put something onto the Internet, you're publishing it in front of
   a very large audience.

   What follows is a few short ideas to start out with.  If you wish to
   behave well on the Internet, you really should read:

   FYI 28 "Netiquette Guidelines", (Also RFC 1855), October 1995.
   available at ftp://ds.internic.net/rfc/rfc1855.txt

   First of all, most forums have their own guidelines posted near the
   door for new arrivals.  For Usenet News, for example, read
   news.announce.newusers.  It never hurts to keep silent until you know
   your audience better.  Once you join a forum, see how others behave
   before making too much of an impression.  Also, try not to jump to
   conclusions about others.  Internet media conveys attitudes and
   emotions differently than face-to-face, or even telephone
   communication.  You are also dealing with more cultural diversity on
   the Internet than you are likely familiar with.  Realize that many
   things have very different meanings in other cultures than they might
   in yours.  Try not to take things too personally.  Avoid attributing
   to malice what might be adequately explained by ignorance.  And hope
   others will do the same.

9.  Glossary

   This glossary contains a few of the words used in this document,
   which were least likely to appear in any common dictionary.  If there
   are other words in the document which are not in your dictionary,
   some other glossaries are referenced in the Resources section which
   follows.

      Boolean:    adj. Of or relating to an algebraic combinatorial
                  system treating variables, as propositions and
                  computer logic elements through the operators AND, OR,
                  NOT, IF, THEN, and EXCEPT.

      access:     n. 1. A means of approaching, passage; 2. The right to
                  enter or use.  v. To gain access. e.g., computer
                  information.

      bandwidth:  Technically, the difference, in Hertz (Hz), between
                  the highest and lowest frequencies of a transmission
                  channel.  However, as typically used, the amount of
                  data that can be sent through a given communications
                  circuit.

      bit:        n. (From "Binary digIT") 1. A single character of a
                  language having just two characters, as either of the
                  binary digits 0 or 1.  2. a unit of information
                  storage capacity, as of computer memory.

      bitmap:     A graphic image format which consists of a list of
                  pixel colors, or shades of gray, and header
                  information describing how to map this list of pixels
                  back into the image.  Bitmap formats are .bmp in
                  Windows, .pict on a Macintosh, and .anm and .btm on
                  Unix.

      broadcast:  A special type of multicast packet which all nodes on
                  the network are always willing to receive.  See also:
                  multicast, unicast.

      btw:        By The Way

      byte:       8 bits

      encryption: The manipulation of a packet's data in order to
                  prevent any but the intended recipient from reading
                  that data. There are many types of data encryption,
                  and they are the basis of network security.

      fyi:        For Your Information

      html:       HyperText Markup Language:
                  The language used to create hypertext documents.  It
                  is a subset of SGML and includes the mechanisms to
                  establish hyperlinks to other documents.

      http:       HyperText Transfer Protocol:
                  The protocol used by WWW to transfer HTML files.  A
                  formal standard is still under development in the
                  IETF.

      hyperlink:  A pointer within a hypertext document which points
                  (links) to another document, which may or may not also
                  be a hypertext document

      hypertext:  A document format which contains "hyperlinks" to
                  other documents.

      imho:       In My Humble/Honest Opinion

      interactive: Capable of acting on, or influencing each other.

      lag:        The failing behind or retardation of one phenomenon
                  with respect to another to which it is closely
                  related; time delay.

      multicast:  A packet with a special destination address which
                  multiple nodes on the network may be willing to
                  receive.  See also: broadcast, unicast.

      multimedia: Transmission that combine media of communication (text
                  an graphics and sound etc.)

      netlag:     time delay over the Internet.  See also: lag.

      packet:     The unit of data sent across a network.

      proprietary:Manufactured articles which some person or persons
                  have exclusive right to make and sell. [from
                  U.S.Statutes]

      protocol:   A formal description of message formats and the rules
                  two computers must follow to exchange those messages.
                  Protocols can describe low-level details of machine-
                  to-machine interfaces (e.g., the order in which bits

                  and bytes are sent across a wire) or high-level
                  exchanges between allocation programs (e.g., the way
                  in which two programs transfer a file across the
                  Internet).

      realtime:   occuring at and in the present time

      reflector:  A file server whose purpose is to receive packets from
                  a source site and forward it to other sites.

      ttfn:       ta ta for now  - a colloquialism for goodbye.

      unicast:    An address which only one host will recognize.  See
                  also: broadcast, multicast.

      url:        Uniform Resource Locator:
                  A URL is a compact string representation for a
                  resource available on the Internet. The syntax and
                  semantics for URLs are defined in RFC 1738.

      virtual:    Not real, but similar in relevant ways.

10.  Resources, References, etc.

   The information in this document has been gleaned from the minds of
   its authors and contributors, and from some of the following sources.
   More information on the topics discussed can be found in these
   sources, and in the information referenced in Appendix B.

10.1 RFCs and Internet-Drafts

   One of the most important collections of informational documents
   about the Internet are written as Requests for Comment by the
   Internet Engineering Task Force, IETF.  The name Request for Comment
   is historical, as these documents are submitted by their authors' for
   the approval of the Internet community as Internet Standards, and
   valid Informational RFCs called FYIs, of which this document is one.

   Basically, if the IETF collective uses a tool or resource, they
   document its use in an RFC so that there is no mystery to its
   functionality, uses, designations, specifications, or purposes.

   More information on RFCs, FYIs, the IETF, and its organizations,
   documents, policies and purposes can be found in the RFCs themselves,
   or at http://www.ietf.org/ and http://www.isi.edu/rfc-editor/

   There are many way to get copies of RFCs over the Internet (see
   ConneXions, Vol.6, No.1, January 1992).  Most of these simply access
   a directory of files where each RFC is in a file.  The searching
   capability is generally limited to the filename recognition features
   of that system.

   The ISI RFC-INFO server is a system through which you can search for
   an RFC by author, date, or keyword (all title words are automatically
   keywords).

   RFC-INFO is an e-mail based service to help in locating and retrieval
   of RFCs and FYIs.  Users can ask for "lists" of all RFCs and FYIs
   having certain attributes ("filters") such as their ID, keywords,
   title, author, issuing organization, and date.  Once an RFC is
   uniquely identified (e.g., by its RFC number) it may also be
   retrieved.

   To use the service send e-mail to RFC-INFO@ISI.EDU with your requests
   in the body of the message.  Feel free to put anything in the
   SUBJECT, the system ignores it.  This service is case independent.
   Appendix C provides examples for using the RFC server.

10.2 Internet Documents

   FYI 18 "Internet Users' Glossary", (Also RFC 1983), August 1996.
   Available at ftp://ds.internic.net/rfc/rfc1983.txt

   FYI 22 "Frequently Asked Questions for Schools", (Also RFC 1941), May
   1996.  Available at ftp://ds.internic.net/rfc/rfc1941.txt

   FYI 28 "Netiquette Guidelines", (Also RFC 1855), October 1995.
   Available at ftp://ds.internic.net/rfc/rfc1855.txt

   FYI 29 "Catalogue of Network Training Materials", (Also RFC 2007),
   October 1996.  Available at ftp://ds.internic.net/rfc/rfc2007.txt

   RFC 1866 "Hypertext Markup Language - 2.0", November 1995.  Available
   at ftp://ds.internic.net/rfc/rfc1866.txt

   RFC 1942 "HTML Tables", May 1996.  Available at
   ftp://ds.internic.net/rfc/rfc1942.txt

   RFC 2070 "Internationalization of the Hypertext Markup Language",
   January 1997.  Available at ftp://ds.internic.net/rfc/rfc2070.txt

   RFC 2068 "Hypertext Transfer Protocol -- HTTP/1.1", January 1997.
   Available at ftp://ds.internic.net/rfc/rfc2068.txt

   RFC 2084 "Considerations for Web Transaction Security", January 1997.
   Available at ftp://ds.internic.net/rfc/rfc2084.txt

   RFC 1738 "Uniform Resource Locators", December 1994.  Available at
   ftp://ds.internic.net/rfc/rfc1738.txt

   RFC 977 "Network News Transfer Protocol", February 1986.  Available
   at ftp://ds.internic.net/rfc/rfc977.txt

   RFC 821 "Simple Mail Transfer Protocol", STD 10, August 1982.
   Available at ftp://ds.internic.net/rfc/rfc821.txt

   RFC 959 "The File Transfer Protocol", STD 9, October 1985.  Available
   at ftp://ds.internic.net/rfc/rfc959.txt

   RFC 1034 "Domain Names - Concepts and Facilities", STD 13, November
   1987.  Available at ftp://ds.internic.net/rfc/rfc1034.txt

   RFC 1035 "Domain Names - Implementation and Specification", STD 13,
   November 1987. Available at ftp://ds.internic.net/rfc/rfc1035.txt

   RFC 791 "Internet Protocol", STD 5, September 1981.  Available at
   ftp://ds.internic.net/rfc/rfc760.txt

Internet Drafts

   The Secure HyperText Transfer Protocol, SHTTP.
   ftp://ds.internic.net/internet-drafts/draft-ietf-wts-shttp-04.txt

10.3 Other Sources

   The Getty Research Institute for the history of art and the
   humanities is one of six independent entities of the J. Paul Getty
   Trust.  Its goals as a research institute are to promote innovative
   scholarship in the arts and the humanities, cross traditional
   academic boundaries, and provide a unique environment for research,
   critical inquiry, and debate.  You can contact the institute at:

      The Getty Research Institute
      401 Wilshire Blvd.
      Santa Monica, CA 90401
      PHONE: (310) 458-9811,  FAX: (310) 458-6661

   The National Initiative for a Networked Cultural Heritage (NINCH)
   is a broad coalition of arts, humanities and social science
   organizations formed to assure the fullest possible participation of
   the cultural sector in the new digitally networked environment.

      National Initiative for a Networked Cultural Heritage (NINCH)
      21 Dupont Circle NW, Washington, DC 20036
      Tel: 202/296-5346 http://www-ninch.cni.org  Fax: 202/872-0886

10.4  Freely Available Web Browser Software

   The University of Illinois at Urbana-Champaign, National Center for
   Supercomputing Applications, NCSA, developed the first Mosaic
   Browser, and continues to maintain and update it, as well as making
   it freely available over the Internet at http://www.ncsa.uiuc.edu/.
   Hardcopy manuals and software disks and tapes can be ordered through
   the NCSA Technical Resources Catalog for postage and handling charges
   only.  Postage and handling on all orders must be prepaid.  For a
   copy of the catalog, contact NCSA Orders by email at
   orders@ncsa.uiuc.edu, by phone at 217-244-4130, or by U.S. mail at:

   NCSA Orders, 152 Computing Applications Building, 605 E. Springfield
   Avenue, Champaign, IL 61820-5518

10.5  The Internet Assigned Numbers Authority

   The IANA coordinates the assignment and use of various Internet
   protocol parameters, manages the Internet address space, and manages
   domain names.  See: http://www.iana.org/iana/

   You should get your IP address (a 32bit number) from your
   network service provider.

   Your network service provider works with a regional registry
   to manage these addresses.  The regional registry for the US
   is the Internic, for Europe is RIPE, for the Asia and Pacific
   region is the AP-NIC, and parts of the world not otherwise
   covered are managed by the Internic.

   If for some reason your network service provider does not
   provide you with an IP address, you can contact the your
   regional registry at one of the following addresses:

            Internic     <hostmaster@internic.net>
            RIPE         <ncc@ripe.net>
            AP-NIC       <admin@apnic.net>

   Please do contact your network service provider first, though.  The
   regional registry will want to know all the gory details about why
   that didn't work out before they allocate you an address directly.

11. Security Considerations

   There are a wide variety of ways in which systems can be violated,
   some intentional, some accidental.  Of the intentional attacks, a
   portion may be exploratory, others simply abusive of your resources
   (using up your CPU time) but many are actively malicious.  No system
   is 100% safe, but there are steps you can take to protect against
   misconfigured devices spraying packets, casual intruders, and a
   variety of focused assaults.

   Your best defense is to educate yourself on the subject of security.
   There are places on the net devoted to teaching users about security
   - most prominently, the CERT Coordination Center located at the
   Software Engineering Institute at Carnegie Mellon university.  You
   can point your web browser (or direct your ftp connection) to
   ftp://info.cert.org/pub/cert_faq to start.  This is a frequently
   asked questions guide and general overview on CERT.  It includes a
   bibliography of suggested reading and a variety of sources to find
   more information.

   Next, you should probably read

   ftp://info.cert.org/pub/tech_tips/security_info

   which contains a (primarily based on the UNIX operating system)
   checklist to help you determine whether your site has suffered a
   security breach.  You can use it to guide you through handling a
   specific incident if you think your system has been compromised or
   you can use it as a list of common vulnerabilities.  CERT also
   maintains a wide variety of bulletins, software patches, and tools to
   help you keep up to date and secure.

   Before you are even online, you should consider some basic steps:

11.1 Formulate a security policy.

   It should include policies regarding physical access procedures,
   security incident response, online privileges and back-up media.  Put
   a message at the login to establish your policy clearly.

   An example:

   "This system is for the use of authorized users only.  It may be
   monitored in the course of routine operation to detect unauthorized
   use.  Evidence of unauthorized use or criminal activity may result in
   legal prosecution."

11.1.1. Talk to your Internet Service Provider.

   Depending upon your provider and router management situation, there
   are a number of things your ISP should be able to do for you to make
   your site more secure.  Foremost, packet filtering on the router that
   connects you to the Internet.  You will want to consider IP filters
   to allow specific types of traffic (web, ftp, mail, etc.) to certain
   machines (the mailhost, the web server, etc.) and no others.  Other
   filters can block certain types of IP spoofing where the intruder
   masks his or her identity using an IP address from inside your
   network to defeat your filters.  Discuss your concerns and questions
   with your provider - the company may have standards or tools they can
   recommend.

11.1.2. Make sure your systems are up to date.

   A significant number of incidents happen because older versions of
   software have well-known weaknesses that can be exploited from almost
   anywhere on the Internet.  CERT provides a depository for software
   patches designed by concerned net.citizens, CERT's engineers, and by
   the vendors themselves.

11.1.3. Use the tools available.

   Consider recording MD5 checksums on read-only media (the MD5-digest
   algorithm determines an electronic "fingerprint" for files to
   indicate their uniqueness -comparing more recent checksums to older
   ones can alert you to changes in important system files), installing
   tripwire on your systems (notes size and MD5 checksum changes, among
   other sanity checks), and periodically testing the integrity of your
   machines with programs an intruder might use, like SATAN and crack.
   [Details on MD5 are contained in RFC 1321.]

   Most files and fixes go through the basics before leaving you to
   figure things out on your own, but security can be a complicated
   issue, both technically and morally.  When good security is
   implemented, no one really notices.  Unfortunately, no one notices
   when it's not taken care of either.  That is until the system
   crashes, your data gets corrupted, or you get a phone call from an
   irate company whose site was cracked from your machines.  It doesn't
   matter if you carry only public information.  It doesn't matter if
   you think you're too small or unimportant to be noticed.  No one is
   too small or too big, no site is immune.  Take precautions and be
   prepared.

12. Acknowledgments

   The following people are being acknowledged for their contributions
   to this document.

   Joseph Aiuto
   Sepideh Boroumand
   Michael Century
   Kelly Cooper
   Lile Elam
   Sally Hambridge
   Dan Harrington
   Julie Jensen
   Scott Stoner

   Thank you all for your help.

13. Authors' Addresses

   Janet Max
   Rainfarm

   EMail: jlm@rainfarm.com

   Walter Stickle
   Rainfarm
   EMail: wls@rainfarm.com

Appendix A.  Internet Projects of Interest to the Arts and Humanities
             Communities

   The commonplace insight about the web as a new distribution channel
   for cultural products is that it effaces the traditional border
   between producer and consumer.  Publishers exploit two-way
   interactivity by re-designing the editorial mix to include reader
   response.  What follows are some examples of the way creative artists
   attempt to design structures flexible enough for significant viewer
   input.

   RENGA (http://renga.ntticc.or.jp) - An inspired transposition of a
      traditional collaborative writing practice into the realm of
      digital media supported by the NTT InterCommunication Centre in
      Tokyo.  Renga means linked-image or linked-poem, and draws on the
      Japanese tradition of collaboration which effaces the unique
      notion of original author.

   PING (http://www.artcom.de/ping/mapper) - by Art+Com, a Berlin
      based media centre and thinktank.  Art+Com is a leader in
      producing high-end net visualization projects.  Ping lets the
      browser add a link, which then becomes a part of the ongoing
      visual structure.  It is similar, in this sense, to the Toronto
      Centre for Landscape Architecture's OASIS site.

   Art+Com's T-Vision project (http://www.artcom.de/projects/terra)
      which uses satellites and networked VR computers to permit an
      astonishing fly-in to earth from space: acclaimed as one of the
      most imaginative realizations of the potential of networked
      computing.

   OASIS(Image)INTERNET-DRAFT Toronto Centre for Landscape
      Architecture's OASIS site requires a specialized browser, but from
      a standard Netscape connection, you can view stills that give a
      sense of the beautiful images produced by the collaborative
      "design process".  It is introduced by its designers as follows:

      Oasis is a shared 3-Dimensional navigational environment for the
      world wide web.  This virtual landscape allows one to bury their
      own information links throughout the terrain or to discover and
      connect to new information left by others.

   TechnoSphere (http://www.lond-inst.ac.uk/TechnoSphere/)
   Is TechnoSphere a Game?
      Yes and no. It's an experiment on a global scale, a chance to
      develop complex artificial life on digital networks.  TechnoSphere
      is interactive like a game, but transgresses the linear boundaries
      of branching and hierarchical games narrative to enable freer

      movement.  TechnoSphere is designed to encourage a non-linear
      experiential exploration.

   Body Missing (http://yorku.ca/BodyMissing/index.html)
      Toronto artist Vera Frenkel created this richly evocative site on
      the disappearance of art and memory as an extension of her Transit
      Bar installation.  It is conceived as a site open to new
      'reconstructions' of the artworks confiscated during the Third
      Reich.  First opened to the public as part of the ISEA95
      exhibition in Montreal, it has since earned widespread critical
      comment and praise.

   Molecular Clinic 1.0
   (http://sc_web.cnds.canon.co.jp/molecular_clinic/artlab_bionet)
      Molecular Clinic 1.0 ' is an art project realized through a
      collaboration between ARTLAB and Seiko Mikami, and is one of the
      most elaborate custom designed art projects yet created for the
      Web.  During their initial visit users should download the
      MOLECULAR ENGINE VIEWER, which is a type of molecular laboratory
      for their computer.  What they will see on the web site after this
      initial download is a virtual space containing a three dimensional
      computer generated Spider and Monolith object.  The user will be
      able to navigate through and into this virtual space and can zoom
      into the spider all the way to the molecular level.

   File Room (http://fileroom.aaup.uic.edu/FILEROOM.html) -
      Cumulative database info on Censorship, hosted in Chicago but
      conceived by Spanish artist Antoni Muntadas.

   Idea Futures  (http://if.arc.ab.ca/~jamesm/IF/IF.html) -
      Winner of the grand prize at the 1995 Ars Electronica competition
      for Web Sites, Idea Futures is a stock market of ideas, based on
      the theories of mathematical economist Robin Hanson.  The 'truth'
      of any claim is assigned a weight calculated by the amount of
      virtual cash which members of the exchange are willing to bet.
      The scheme leads might lead toward a radical democratization of
      academic discourse, but just as easily, toward the trivialization
      of thought.  See the following for a philosophical critique of the
      system. (http://merzbau.citi.doc.ca/~henry/Matrix/Erewhon.html)

   Firefly (http://www.agents-inc.com/) also a prize winner at Ars
      Electronica in 1995, Firefly is an prototypical example of what
      enthusiasts call a "personal music recommendation agent", which
      makes suggestions for what you might like to listen to, based on a
      stored profile of your own likes and dislikes, and the evolving
      ratings submitted to the system by other members.  Worth visiting,
      if only to understand what all the fashionable hype about
      'intelligent agents' is all about; skeptics should know that even

      the promoters of these services admit the circularity of their
      systems: they're capable of reinforcing existing taste, but little
      else.

Appendix B:  Some other URL's of interest

   Art
      http://www.louvre.fr/
      http://www.art.net/
      http://www.artnoir.com/
      http://www.artincontext.com/
   Art Education
      http://www.kn.pacbell.com/wired/art/art.html
   Artists
      http://www.yoko.com/
      http://www.thinkage.on.ca/~dmowbray/botticelli.html
   Artist Memorials
      http://www.cascade.net/kahlo.html
   Audio Video Conferencing
      http://www.lll.hawaii.edu/workshops/pedagogy/audiovideo.html
      http://cu-seeme.cornell.edu/
      http://www.indstate.edu/msattler/sci-tech/comp/CU-SeeMe/
   Building Arts Audiences on the Web
      http://www.artswire.org/spiderschool
   Chat Forums
      http://pages.wbs.net/
      http://acm.ewu.edu/homepage/wmundell/chathole.htm
   Cryptography
      http://www.ftech.net/~monark/crypto/index.htm
      http://www.pgp.com/
   Frequently Asked Questions, pointers to lists
      http://www.cis.ohio-state.edu/hypertext/faq/usenet/top.html
   Filtering Software
      http://www.surfwatch.com/
      http://www.solidoak.com/cysitter.htm
      http://www.cyberpatrol.com/
   FTP Archives
      ftp://rtfm.mit.edu/pub
      ftp://athos.rutgers.edu/pub
      http://hoohoo.ncsa.uiuc.edu/ftp/
   Gopher Sites
      gopher://peg.cwis.uci.edu:7000/11/gopher.welcome/peg/GOPHERS/gov
   Law
      http://www.findlaw.com/01topics/10cyberspace/index.html
      http://www.ciec.org/
      http://www.netlaw.com/
      http://www.law.cornell.edu/
      http://www.fplc.edu/tfield/order.htm

      http://w3.gwis.com/~sarbar/
      http://www.eff.org/
      http://www.efa.org.au/Issues/IP/Welcome.html
      http://www.yorku.ca/faculty/osgoode/uc.htm
      http://www.lawsoc.org.uk/
      http://www.jurisnet.com.mx/jurisweb2.html
      http://www.iupui.edu/it/copyinfo/intelect.html
      http://law.house.gov/105.htm
      http://www.ipcenter.com/
      http://www.intellectual-property.co.uk
      http://www.blueriver.net/~wyrm/tele.html
      http://www.fplc.edu/tfield/ipbasics.htm
   Libraries
      http://www.ipl.org/
   MUDs
      http://lamar.ColoState.EDU/~mojo/kevpage/mud/
      http://www.lysator.liu.se/tolkien-games/
      http://www.godlike.com/muds/
   Music Production
      http://www.ebb.ele.tue.nl/midi/index.html
   Musical Groups
      http://www.dead.net/
      http://www.netspace.org/phish/
   News
      http://www.w3.org/pub/DataSources/News/Groups/Overview.html
      http://www.duke.edu/~mg/usenet/
   Other Standards Organizations
      http://www.iso.ch/
      http://www.ansi.org/
   Photography
      http://www.nyip.com/
   Reference
      http://www.ipl.org/ref/RR/
      gopher://gopher.uiuc.edu/11/Libraries/writers
      http://www.ex.ac.uk/~ftapson/dictunit.html
      http://www.learn2.com/
      http://www.ipl.org/classroom/userdocs/internet/citing.html
      http://www.theslot.com/contents.html
      http://www.bsdi.com/date
   Rembrandt
      http://www.bod.net/CJackson/rembrand/rembrand.htm
      http://found.cs.nyu.edu/fox/art/rembrandt/self1660.html
      http://www.siam.net/rembrandt/index.html
      http://www.lososos.com/Rembrandt'sCafe/
   Search Sites
      http://www.yahoo.com/
      http://www.altavista.digital.com/
      http://www.lycos.com/

      http://www.dejanews.com/
      http://query.webcrawler.com/
      http://www.mckinley.com/
   Video Resources
      http://www.mpeg.org/
      http://www.maxibyte.com/mpeg_samples.htm
      http://www-plateau.cs.berkeley.edu:80/mpeg/
      ftp://sokaris.ee.upenn.edu/pub/MPEG2Tool/
   Writers
      http://the-tech.mit.edu/Shakespeare/
      http://www.rain.org/~da5e/tom_robbins.html

Appendix C:  Examples for using the RFC server RFC-INFO@ISI.EDU

   To get started you may send a message to RFC-INFO@ISI.EDU with
   requests such as in the following examples (without the explanation
   between []):

        Help: Help              [to get this information]

        List: FYI               [list the FYI notes]
        List: RFC               [list RFCs with window as keyword or
                                 in title]
         keywords: window
        List: FYI               [list FYIs about windows]
         Keywords: window
        List: *                 [list both RFCs and FYIs about windows]
         Keywords: window
        List: RFC               [list RFCs about ARPANET, ARPA
                                 NETWORK, etc.]
         title: ARPA*NET
         List: RFC              [list RFCs issued by MITRE, dated
                                 1989-1991]
          Organization: MITRE
          Dated-after:  Jan-01-1989
          Dated-before: Dec-31-1991
        List: RFC               [list RFCs obsoleting a given RFC]
          Obsoletes: RFC0010
        List: RFC               [list RFCs by authors starting with
                                 "Bracken"]
         Author: Bracken*       [* is a wild card matches everything]
        List: RFC               [list RFCs by both Postel and Gillman]
          Authors: J. Postel    [note, the "filters" are ANDed]
          Authors: R. Gillman
        List: RFC               [list RFCs by any Crocker]
          Authors: Crocker

 

User Contributions:

Comment about this RFC, ask questions, or add new information about this topic:

CAPTCHA