Network Working Group                                            R. Plzak
Request for Comments: 2664                                           SAIC
FYI: 4                                                           A. Wells
Obsoletes: 1594                                                 UWisc-Mad
Category: Informational                                           E. Krol
                                                                  Univ IL
                                                              August 1999
        
Network Working Group                                            R. Plzak
Request for Comments: 2664                                           SAIC
FYI: 4                                                           A. Wells
Obsoletes: 1594                                                 UWisc-Mad
Category: Informational                                           E. Krol
                                                                  Univ IL
                                                              August 1999
        

FYI on Questions and Answers Answers to Commonly Asked "New Internet User" Questions

供参考的问题和答案常见问题“新互联网用户”问题的答案

Status of this Memo

本备忘录的状况

This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

本备忘录为互联网社区提供信息。它没有规定任何类型的互联网标准。本备忘录的分发不受限制。

Copyright Notice

版权公告

Copyright (C) The Internet Society (1999). All Rights Reserved.

版权所有(C)互联网协会(1999年)。版权所有。

Abstract

摘要

This memo provides an overview to the new Internet User. The intended audience is the common Internet user of today, thus it attempts to provide a more consumer oriented approach to the Internet rather than going into any depth about a topic. Unlike its predecessors, this edition seeks to answer the general questions that an unsophisticated consumer would ask as opposed to the more pointed questions of a more technically sophisticated Internet user. Those desiring a more in-depth discussion are directed to FYI 7 that deals with intermediate and advanced Q/A topics. A conscious effort has been made to keep this memo brief but at the same time provide the new user with enough information to generally understand the Internet.

此备忘录为新的Internet用户提供了概述。目标受众是当今的普通互联网用户,因此它试图提供一种更面向消费者的互联网方式,而不是深入探讨某个话题。与之前的版本不同,本版本旨在回答普通消费者会提出的一般问题,而不是技术更成熟的互联网用户提出的更尖锐的问题。希望进行更深入讨论的人请参考FYI 7,其中涉及中级和高级Q/a主题。有意识地努力使本备忘录保持简短,但同时为新用户提供足够的信息,使其大致了解互联网。

1. Acknowledgements
1. 致谢

The following people deserve thanks for their help and contributions to this FYI Q/A: Chris Burke (Motorola), John Curran (BBN Planet), Albert Lunde (NWU), and April Marine (Internet Engines, Inc.). Last, but not least, thanks are extended to Patricia Harper and Charlotte Nurge. These ladies from South Riding, Virginia, consumer tested this document.

以下人员值得感谢,感谢他们对本FYI Q/A的帮助和贡献:Chris Burke(摩托罗拉)、John Curran(BBN Planet)、Albert Lunde(西北大学)和April Marine(互联网引擎公司)。最后,但并非最不重要的是,感谢帕特里夏·哈珀和夏洛特·努奇。这些来自弗吉尼亚州南骑马的女士测试了这份文件。

2. Questions About the Internet
2. 关于互联网的问题
2.1. What is the Internet?
2.1. 什么是互联网?

People use computers to perform a wide assortment of tasks. A connected group of computers is known as a network. Because people are connected via this network, they can use their computers to exchange ideas and information. Some computers are connected directly to the network while others (primarily those in homes) are connected via a telephone line and a communication device known as a modem. By connecting networks together with specialized computers known as routers, people on one network can engage in activities with people on other networks. This INTER-connected group of NETworks is known as the INTERNET.

人们使用计算机执行各种各样的任务。连接的计算机组称为网络。因为人们是通过这个网络连接起来的,所以他们可以用电脑来交换想法和信息。一些计算机直接连接到网络,而另一些计算机(主要是家庭中的计算机)通过电话线和称为调制解调器的通信设备连接。通过将网络与称为路由器的专用计算机连接在一起,一个网络上的用户可以与其他网络上的用户进行活动。这组相互连接的网络称为INTERNET。

2.2. What Can I do on the Internet?
2.2. 我可以在互联网上做什么?

There is a large variety of activities that users can do on the Internet. These activities include surfing, searching, sending mail, transfering programs and documents, chatting, and playing games.

用户可以在互联网上进行各种各样的活动。这些活动包括冲浪、搜索、发送邮件、传输程序和文档、聊天和玩游戏。

SURFING

冲浪

Surfing is one of the most popular Internet activities. To surf, a user needs a program known as a web browser. The web browser enables the user to connect to a location that contains information. Many locations contain links to other sites that contain related information. These links are usually identified by underlined text that is of a different color from the rest of the text in an article. By clicking on one of these links the user is then connected to that information. This information may be at the same location or may be at a different location. This new information may, in turn, have links to other information. So just like a footnote or reference in a print publication, links can be used to find related or non-related information.

冲浪是最流行的互联网活动之一。要冲浪,用户需要一个称为web浏览器的程序。web浏览器允许用户连接到包含信息的位置。许多位置包含指向其他包含相关信息的站点的链接。这些链接通常由带下划线的文本标识,这些文本的颜色与文章中其他文本的颜色不同。通过单击其中一个链接,用户就可以连接到该信息。该信息可能位于同一位置,也可能位于不同的位置。这些新信息又可能与其他信息有链接。因此,就像印刷出版物中的脚注或参考资料一样,链接可以用来查找相关或不相关的信息。

SEARCHING

搜索

Searching involves using a special program known as a seach engine. There are several of these engines that are located at various search sites. The popular web browsers have location information about these search sites. Searching is similar to using a card catalog in a library. Just as a person would look up a topic in a card catalog and find one or more references to that topic with library location information, a search engine provides the user with a list of sites that may contain relevant information. This list is actually a set of links to these sites so that all the user has to do is click on the link to go to the location. Just as different library card

搜索包括使用一个称为搜索引擎的特殊程序。这些引擎中有几个位于不同的搜索站点。流行的web浏览器具有这些搜索站点的位置信息。搜索类似于在库中使用卡片目录。正如一个人在卡片目录中查找一个主题,并通过图书馆位置信息找到该主题的一个或多个参考文献一样,搜索引擎为用户提供可能包含相关信息的网站列表。此列表实际上是指向这些站点的一组链接,因此用户只需单击链接即可转到该位置。就像不同的图书证一样

catalogs will contain different reference cards, different search engines will provide different reference lists.

目录将包含不同的参考卡,不同的搜索引擎将提供不同的参考列表。

E-MAIL

电子邮件

E-mail is another very popular activity. It is very similar to sending letters through the post office or notes and memos around the office. It is used to exchange messages between two or more people. Because email can be misunderstood or abused, users should be familiar with email netiquette. For more information see Netiquette Guidelines [FYI 28, RFC 1855].

电子邮件是另一种非常流行的活动。这非常类似于通过邮局寄信或办公室周围的便条和备忘录。它用于在两个或更多人之间交换消息。因为电子邮件可能被误解或滥用,用户应该熟悉电子邮件网络礼仪。有关更多信息,请参见网络礼仪指南[FYI 28,RFC 1855]。

Many people also participate in mailing lists. Usually a mailing list is dedicated to a particular topic or interest. Some mailing lists are used to provide information to subscribers, such as product update information for something an individual may have purchased while others are used for discussion. In the latter instance people participate in the discussion by sending email to a "list" address which in turn distributes it to all members of a list. Abuse of mail lists is probably the biggest source of junk email (also known as "spam"). Everyone should take care that they aren't the source of junk mail.

许多人也参与邮件列表。通常,邮件列表专用于特定的主题或兴趣。一些邮件列表用于向订阅者提供信息,例如个人可能购买的商品的产品更新信息,而其他邮件列表用于讨论。在后一种情况下,人们通过向“列表”地址发送电子邮件来参与讨论,然后将电子邮件分发给列表中的所有成员。滥用邮件列表可能是垃圾邮件(也称为“垃圾邮件”)的最大来源。每个人都应该注意自己不是垃圾邮件的来源。

FILE TRANSFER

文件传输

Programs and documents are transferred in several ways. The most common way this is done between individual users is to attach the program or document to an e-mail message. Programs and documents are usually transferred from sites to users using the save feature of a web browser or the file transfer protocol (FTP). Such transfers enable users to obtain a variety of programs, documents, audio files, and video files.

程序和文件以多种方式传输。个人用户之间最常用的方法是将程序或文档附加到电子邮件中。程序和文档通常使用web浏览器的保存功能或文件传输协议(FTP)从站点传输给用户。这种传输使用户能够获得各种节目、文档、音频文件和视频文件。

CHAT

闲聊

Chat takes place between one or more persons who are on the Internet. Chatting is very similar to going to a party. Just as people congregate in small groups and discuss things, chatters meet in chat rooms to discuss a topic. Chat rooms are generally sponsored or operated by an organization that has an interest in the topic area. For example, an online news organization would have a chat room for chatters to discuss current events. To chat one person writes a message which can be read, as it is being written, by the others who can respond to it in turn. First time chatters should be aware that just as at a party where some people never say anything, so there may be people in the room who are just listening. Also, just like at a party, some people may portray themselves to be someone different than who they really are. Lastly, remember that chatters come and go

聊天发生在互联网上的一个或多个用户之间。聊天与参加聚会非常相似。就像人们聚在一起讨论事情一样,聊天者也会在聊天室里讨论一个话题。聊天室通常由对主题领域感兴趣的组织赞助或运营。例如,一个在线新闻组织会有一个聊天室供聊天者讨论时事。为了聊天,一个人写了一条信息,当它被写的时候,其他人可以依次回复它。第一次聊天的人应该意识到,就像在派对上有些人什么都不说一样,房间里可能有人只是在听。而且,就像在聚会上一样,有些人可能会把自己描绘成一个与自己不同的人。最后,要记住,喋喋不休的人来来往往

to chat rooms the same way people move about groups at a party.

就像人们在聚会上移动群组一样,去聊天室。

GAMES

游戏

Some people use the Internet to play games. These games can be role playing games, action/adventure games, or online versions of old standbys like chess. Some games require the user to purchase a copy of the game and install it on their computer, while others are played by going to a game site. Just like other forms of game playing, Internet game playing can be challenging, entertaining, and an enjoyable social experience. Don't be afraid to have fun.

有些人利用互联网玩游戏。这些游戏可以是角色扮演游戏、动作/冒险游戏,也可以是像国际象棋这样的老替身游戏的在线版本。有些游戏要求用户购买游戏副本并安装在电脑上,而另一些游戏则通过访问游戏网站进行。就像其他形式的游戏一样,网络游戏具有挑战性、娱乐性和愉快的社交体验。不要害怕玩得开心。

OTHER ACTIVITIES

其他活动

Other popular activities include electronic shopping, banking, and investing. Many retailers describe and display pictures of their products on the Internet enabling people to buy on line. Shopping also includes purchasing services such as an airline ticket or ordering groceries. Many banks allow people to transfer funds, check available funds, pay bills and other such activities while on the Internet with an account number and ID. Lastly, many people invest while on the Internet in everything from stocks and bonds to real estate. One word of caution, if you are using a credit card, check to see if there are security features in place to protect your credit card information. Reputable sites should tell you how they are protecting your information. If you are in doubt about how your information will be protected, don't use your credit card at that site.

其他受欢迎的活动包括电子购物、银行和投资。许多零售商在互联网上描述和展示其产品的图片,使人们能够在线购买。购物还包括购买服务,如机票或订购杂货。许多银行允许人们在互联网上用账号和身份证转账、检查可用资金、支付账单和其他类似活动。最后,许多人在互联网上投资从股票、债券到房地产的一切。警告一句,如果你使用的是信用卡,检查是否有安全功能保护你的信用卡信息。信誉良好的网站应该告诉您他们是如何保护您的信息的。如果您对如何保护您的信息有疑问,请不要在该网站使用您的信用卡。

2.3. What is an Address?
2.3. 什么是地址?

Two commonly asked questions these days are "What's your e-mail address?" and "What's the URL?" Generally, the first question is asking where to send information, while the second is asking where to get information. The answer to the first question is usually something like myname@company.com. The answer to the second question is usually something like "http://www.newspaper.com". What do these answers mean?

现在两个常见的问题是“你的电子邮件地址是什么?”和“URL是什么?”一般来说,第一个问题是询问在哪里发送信息,而第二个问题是询问在哪里获取信息。第一个问题的答案通常是myname@company.com. 第二个问题的答案通常类似于“http://www.newspaper.com". 这些答案是什么意思?

E-MAIL ADDRESS

电子邮件地址

As stated previously an e-mail address is something like "myname@company.com", pronounced "MYNAME at COMPANY dot COM". An email address consists of two parts that are divided by an "@" sign.

如前所述,电子邮件地址类似于“myname@company.com,发音为“MYNAME at COMPANY.COM”。电子邮件地址由两部分组成,用“@”符号分隔。

The portion to the left is like the name line on a letter, it identifies a particular person and usually is composed of the person's name. Typical names look like this:

左边的部分类似于字母上的姓名行,它标识一个特定的人,通常由该人的姓名组成。典型的名称如下所示:

john_doe john.doe jdoe doej

约翰·多伊约翰·多伊·多伊

The name is assigned by the system or network adminstrator who is managing the email system and follows rules that have been established by the company providing the e-mail service. Sometimes the name portion of the e-mail address is referred to as a mailbox.

该名称由管理电子邮件系统的系统管理员或网络管理员指定,并遵循提供电子邮件服务的公司制定的规则。有时,电子邮件地址的名称部分称为邮箱。

The portion to the right of the "@" sign is the name of the computer system that is providing the e-mail service. This name is usually the name of the company that owns the computer system followed by a "dot" and an abbreviation that represents the "domain" or group of names which the organization falls under. Examples of these "top level" domains are "edu", "com", and country codes such as "fr" for France and "jp" for Japan. When an e-mail is sent the portion of the address to the right of the "@" sign is used to find the destination computer of the email.

“@”标志右侧的部分是提供电子邮件服务的计算机系统的名称。该名称通常是拥有计算机系统的公司的名称,后跟一个“点”和一个缩写,表示该组织所属的“域”或名称组。这些“顶级”域的示例包括“edu”、“com”和国家代码,如法国的“fr”和日本的“jp”。发送电子邮件时,地址中“@”符号右侧的部分用于查找电子邮件的目标计算机。

URL

统一资源定位地址

A Uniform Resource Locator (URL) is commonly used to identify a computer that provides world wide web service. It usually looks something like "http://www.newspaper.com". This address also consists of two parts. In this case the two parts are separated by the "//". The portion to the left means find the world wide web service that is located at the computer identified to the right of the "//". The portion to the right is the name of the computer that is providing the world wide web service. Its name is composed of parts that are similar to those described for the name of an email computer. Sometimes the portion on the right contains additional information that identifies a particular document at the web site.

统一资源定位器(URL)通常用于标识提供万维网服务的计算机。它通常看起来像“http://www.newspaper.com". 这个地址也由两部分组成。在这种情况下,两部分用“/”分隔。左侧部分表示查找位于“/”右侧标识的计算机上的万维网服务。右边的部分是提供万维网服务的计算机的名称。其名称由与电子邮件计算机名称类似的部分组成。有时,右侧的部分包含标识网站上特定文档的附加信息。

For example, http://www.newspaper.com/sports/article1.html would identify a specific article in the sports section of the newspaper.

例如http://www.newspaper.com/sports/article1.html 会在报纸的体育版上找到一篇特定的文章。

2.4. Are There Any Rules of Behavior on the Internet?
2.4. 互联网上有什么行为规则吗?

In general, common sense, courtesy, and decency govern good Internet behavior. There is no single formal rulebook that governs behavior on the Internet. FYI 28 that was mentioned previously is a good guide. Many activities such as game sites, chat rooms, or e-mail lists may have rules of their own. What may be acceptable behavior in one chat room may be totally out of bounds in another. It never hurts to check the water temperature before jumping in the pool. Users should use the same precautions before joining in any online activity.

总的来说,常识、礼貌和礼仪规范着良好的网络行为。没有一本规范互联网行为的正式手册。前面提到的FYI 28是一个很好的指南。许多活动,如游戏网站、聊天室或电子邮件列表,可能都有自己的规则。在一个聊天室中可以接受的行为在另一个聊天室中可能是完全不允许的。在跳进游泳池之前检查水温是没有坏处的。用户在参加任何在线活动之前应使用相同的预防措施。

E-mail in particular can lead to misunderstandings between people. Users should remember that the reader only has the text to determine what is being said. Other conversation cues such as "tone of voice" and body signals like winking are not present in the text. Because of this, users of the Internet have developed cues to put in the text. Text techniques such as capitalization and symbols known as emoticons (also called "smilies") are used.

电子邮件尤其会导致人们之间的误解。用户应该记住,读者只有文本才能确定所说的内容。文本中没有其他对话提示,如“语调”和身体信号,如眨眼。正因为如此,互联网用户已经开发出了输入文本的线索。使用了诸如大写和符号(也称为“表情”)之类的文本技术。

A typical smiley looks like this :-)

典型的笑脸如下:-)

Additionally, acronyms have evolved over time (for example IMHO - In My Humble Opinion). More information about this can be found by searching. Use keywords like "netiquette" and "emoticon" with your search engine to find more information.

此外,首字母缩略词也随着时间的推移而演变(例如,依我拙见,IMHO)。可以通过搜索找到有关此的更多信息。在搜索引擎中使用诸如“网络礼仪”和“表情”之类的关键词来查找更多信息。

Users should also be aware that their particular programs such as word processors or e-mail might produce documents and messages that are not readable by everyone. Very often, a reader must have the same program in which a document was written in order to read it. So, before sending an attached document, it is a good idea to make sure that the intended receiver of your document has the capability to read it. If in doubt, send a text (ascii) version of the document.

用户还应该意识到,他们的特定程序(如文字处理器或电子邮件)可能会生成并非人人都可读的文档和消息。通常,为了阅读文档,读者必须使用与文档编写时相同的程序。因此,在发送附加文档之前,最好确保文档的预期接收者能够阅读它。如果有疑问,请发送文档的文本(ascii)版本。

2.5. How Does the Internet Work?
2.5. 互联网是如何工作的?

Each of the activities mentioned in the section describing what one can do on the Internet requires that computers exchange information. Computers take turns sending and receiving information. When a computer is sending information, it is known as the "source"; when it is receiving information, it is known as the "destination." (The same computer can be both a source and destination at different times. This is especially clear when one thinks of sending and receiving e-mail.)

在描述一个人可以在互联网上做什么的章节中提到的每一项活动都要求计算机交换信息。计算机轮流发送和接收信息。当计算机发送信息时,它被称为“源”;当它接收信息时,它被称为“目的地”。(同一台计算机可以在不同的时间既是来源又是目的地。当人们想到发送和接收电子邮件时,这一点尤其明显。)

Every computer on the Internet has a unique Internet "address" that identifies it from among the millions of computers. The Internet has specialized computers between the source and destination located at network inter-connection points. These computers are known as "routers." The routers understand how to use a computer's address to appropriately point information from one computer to another over the Internet.

Internet上的每台计算机都有一个唯一的Internet“地址”,可以从数百万台计算机中识别它。因特网在位于网络互连点的源和目标之间有专门的计算机。这些计算机被称为“路由器”。路由器了解如何使用计算机的地址在互联网上适当地将信息从一台计算机指向另一台计算机。

In an exchange of information the following occurs:

在信息交换中,会发生以下情况:

* The source finds the address of the destination.

* 源查找目标的地址。

* The source contacts the destination and says "hello".

* 来源联系目的地并说“你好”。

* The destination responds back with a "hello" of its own.

* 目的地以自己的“hello”回应。

* The source tells the destination that it has information to send.

* 源告诉目的地它有信息要发送。

* The destination tells the source that it is ready to receive the information.

* 目的地告诉源它已准备好接收信息。

* The source breaks the information into small pieces called packets and sends each packet on its way to the destination.

* 信息源将信息分成称为数据包的小块,并将每个数据包发送到目的地。

* The routers guide each packet to the destination.

* 路由器引导每个包到达目的地。

* The destination takes the packets and puts them back together to form the information.

* 目的地接收数据包并将它们放回一起以形成信息。

* The destination tells the source that it has received the information and asks the source if it has anything more to send.

* 目的地告诉源它已收到信息,并询问源是否还有其他信息要发送。

* If the source says no, the destination will say "good bye" unless it has something to send back. If it does, it will break the information into packets and send them.

* 如果来源说不,目的地会说“再见”,除非它有东西要送回去。如果它这样做了,它将把信息分成数据包并发送出去。

* Once both end users are done "talking", they say both say "good bye".

* 一旦两个终端用户“交谈”完毕,他们就会说“再见”。

Clearly our simplified introduction to this section did not explain many steps in this process, such as how a computer discovers the address of another computer or how packets are divided and reassembled. Fortunately, these are specifics that people using the Internet never really need to deal with!

显然,我们对本节的简化介绍并没有解释这个过程中的许多步骤,例如计算机如何发现另一台计算机的地址,或者数据包如何被分割和重新组装。幸运的是,这些都是使用互联网的人从来没有真正需要处理的细节!

2.6 Who Runs the Internet?
2.6 谁经营互联网?

No one. The Internet is a cooperative effort among Internet Service Providers (ISPs), software companies, volunteer organizations, and a few facilities that tie the whole thing together. The ISPs and software companies are completely independent and most of them compete with each other. The ISPs provide internet service to people much the same way that they obtain telephone service from a telephone company. ISPs agree to connect their networks to each other and transmit information following an established set of rules (protocols). The software companies agree to manufacture programs (such as email or web browsers) that also follow protocols. There are other organizations that keep things straight. Some assign Internet addresses in much the same manner as telephone numbers are assigned, others keep track of names used by Internet users and groups, and a large volunteer organization called the Internet

没有人互联网是互联网服务提供商(ISP)、软件公司、志愿者组织和一些将整个事情联系在一起的设施之间的合作。ISP和软件公司是完全独立的,它们中的大多数相互竞争。ISP向人们提供互联网服务的方式与他们从电话公司获得电话服务的方式大致相同。ISP同意将其网络相互连接,并按照既定的规则(协议)传输信息。软件公司同意生产同样遵循协议的程序(如电子邮件或网络浏览器)。还有一些其他的组织会把事情搞清楚。一些人分配互联网地址的方式与分配电话号码的方式基本相同,另一些人跟踪互联网用户和团体使用的名称,还有一个称为互联网的大型志愿者组织

Engineering Task Force (IETF) develops the protocols computers follow to make network communications succeed.

工程任务组(IETF)开发了计算机遵循的协议,以使网络通信成功。

3. Security Considerations
3. 安全考虑

The question "is the Internet secure?" can be a confusing one for people, who will hear many assurances that it is secure and many scary stories saying it is not secure. There are a few basic rules of thumb to remember that will address most concerns.

对于人们来说,“互联网安全吗?”这个问题可能是一个令人困惑的问题,他们会听到许多关于互联网安全的保证,以及许多关于互联网不安全的可怕故事。要记住一些基本的经验法则,它们将解决大多数问题。

First, make it a rule never to share account passwords with anyone. Learning a password is the easiest way for someone to break into a system. Most people feel that their files are not that interesting to anyone, but someone may be able to get a foothold from one innocuous account to other places in the same computer system. Many good security practices can be found in the User's Security Handbook [FYI 34, RFC 2504].

首先,规定永远不要与任何人共享帐户密码。学习密码是闯入系统的最简单方法。大多数人觉得他们的文件对任何人来说都不那么有趣,但有人可能能够从一个无害的帐户到同一计算机系统中的其他地方找到立足点。用户安全手册[FYI 34,RFC 2504]中有许多良好的安全实践。

Second, understand that there are means for people to track the information a user sends via email, the files one downloads, and the sites visited on the web. The system administrators and network engineers who oversee a sites' computers require access to information that an individual may think is secret. In practice, no responsible system administrator or network engineer will violate a person's privacy out of personal curiosity. However, if someone less legitimate attains illegal access to a system, they also will have access to this information. This situation is not a problem for most people, but it should be understood that things like email sent a year ago or a log of users web pages browsed may still exist in some system's backup archive tape and can be easily resurrected and published widely.

其次,要了解人们有办法跟踪用户通过电子邮件发送的信息、下载的文件和访问的网站。监控站点计算机的系统管理员和网络工程师需要访问个人可能认为是机密的信息。实际上,任何负责任的系统管理员或网络工程师都不会出于个人好奇心而侵犯个人隐私。但是,如果不太合法的人非法访问某个系统,他们也可以访问此信息。这种情况对大多数人来说都不是问题,但应该理解的是,像一年前发送的电子邮件或浏览过的用户网页日志之类的内容可能仍然存在于某些系统的备份归档磁带中,并且可以很容易地恢复并广泛发布。

Third, before giving personal information over the Internet, such as filling in a form on a Web page, users should realize that there is no assurance of confidentiality or privacy. It could be compared to faxing such information to a party that you've never dealt with before. While many organizations on the Internet are responsible with information received via the web and email, this cannot always be determined in advance.

第三,在通过互联网提供个人信息(如在网页上填写表格)之前,用户应该意识到没有保密或隐私的保证。这可以比作将这些信息传真给一个你从未接触过的当事人。虽然互联网上的许多组织都对通过网络和电子邮件接收的信息负责,但这并不总是事先确定的。

4. References
4. 工具书类

[1] Guttman, E., Leong, G. and G. Malkin, "Users' Security Handbook", FYI 34, RFC 2504, February 1999.

[1] Guttman,E.,Leong,G.和G.Malkin,“用户安全手册”,FYI 34,RFC 2504,1999年2月。

[2] Hambridge, S., "Netiquette Guidelines", FYI 28, RFC 1855, October 1995.

[2] Hambridge,S.,“网络礼仪指南”,第28期,RFC 1855,1995年10月。

5. Authors' Addresses
5. 作者地址

Raymond Plzak SAIC 1710 Goodridge Drive McLean, Virginia 22102

雷蒙德·普扎克(Raymond Plzak SAIC)弗吉尼亚州麦克莱恩古德里奇大道1710号,邮编:22102

Phone: (703) 821-6535 EMail: plzakr@saic.com

电话:(703)821-6535电子邮件:plzakr@saic.com

Amy Tracy Wells Internet Scout Project University of Wisconsin-Madison Computer Sciences Department 1210 W. Dayton St. Madison, WI 53706

艾米特雷西威尔斯互联网童子军项目威斯康星大学麦迪逊计算机科学系1210 WI道顿圣迪亚麦迪逊53706

Phone: (608)263-2611 EMail: awel@cs.wisc.edu

电话:(608)263-2611电子邮件:awel@cs.wisc.edu

Ed Krol University of Illinois 1120 DCL 1304 Springfield Urbana IL 61801

ED克洛尔伊利诺伊大学1120 DCL 1304斯普林菲尔德Unrina IL 61801

Phone (217)333-7886 EMail: krol@uiuc.edu

电话(217)333-7886电子邮件:krol@uiuc.edu

Appendix A
附录A

Glossary of Terms

术语表

Emoticon Combination of punctuation marks used to provide sense of the senders tone of voice in an e-mail message

表情符号是标点符号的组合,用于在电子邮件中提供发件人语调的感觉

IETF Internet Engineering Task Force [see text for a description]

IETF互联网工程任务组[见正文以获取说明]

Internet An interconnected group of networks

因特网是一组相互连接的网络

ISP Internet Service Provider [see text for a description]

ISP互联网服务提供商[有关说明,请参阅正文]

Network A connected group of computers

网络一组相互连接的计算机

Router A specialized computer that connects networks together and guides information packets to their destination

路由器将网络连接在一起并引导信息包到达目的地的专用计算机

Spam A slang term for junk e-mail

垃圾邮件:垃圾邮件的俚语

URL Uniform Resource Locator [see text for a description]

URL统一资源定位器[有关说明,请参阅文本]

Web Browser A program that provides the capablility to read information that is located at a world wide web site

Web浏览器提供读取位于万维网站点的信息能力的程序

6. Full Copyright Statement
6. 完整版权声明

Copyright (C) The Internet Society (1999). All Rights Reserved.

版权所有(C)互联网协会(1999年)。版权所有。

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.

本文件及其译本可复制并提供给他人,对其进行评论或解释或协助其实施的衍生作品可全部或部分编制、复制、出版和分发,不受任何限制,前提是上述版权声明和本段包含在所有此类副本和衍生作品中。但是,不得以任何方式修改本文件本身,例如删除版权通知或对互联网协会或其他互联网组织的引用,除非出于制定互联网标准的需要,在这种情况下,必须遵循互联网标准过程中定义的版权程序,或根据需要将其翻译成英语以外的其他语言。

The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.

上述授予的有限许可是永久性的,互联网协会或其继承人或受让人不会撤销。

This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

本文件和其中包含的信息是按“原样”提供的,互联网协会和互联网工程任务组否认所有明示或暗示的保证,包括但不限于任何保证,即使用本文中的信息不会侵犯任何权利,或对适销性或特定用途适用性的任何默示保证。

Acknowledgement

确认

Funding for the RFC Editor function is currently provided by the Internet Society.

RFC编辑功能的资金目前由互联网协会提供。