Related Tags

Thursday, 1 December 2011

The Risks of P2P (PEER TO PEER) File Sharing

                                Risks of P2P (PEER TO PEER) File Sharing
This refers to sharing files for music, games or other types of software. This sharing requires one to connect with other computers using the same software. This could expose the system to:

The copying of your private files. A hacker is capable of accessing all personal and private information including bank accounts, address and contacts.

Violation of copyright laws. Includes received, downloaded to shared folders/files. The penalty for such a violation is quite harsh.
Incoming viruses that could corrupt data and saving devices permanently and the user might not be aware of the damage already done. Accidentally download pornography that was purposely mislabeled as something else; allowing them to be downloaded to safer websites used for P2P file sharing.

Cyber Bulling

                                                                  Cyber Bulling
Is when the internet, cell phones or other devices are used to send/post text or images intended to hurt or embarrass another person. Entertainment for millions of people could turn out to be an avenue for violence. Videos/material is posted to get even.
                  Stalking youth through this method becomes extreme and could even lead to suicide by the victim, as a desperate measure.

Monday, 28 November 2011

Online Victimization

                                                     ONLINE VICTIMIZATION
People may be victimized online in many ways:

Threats or other offensive behaviour sent online to the youth or posted online about the youth for others to see.

Sexual solicitation:
Requests to engage in sexual activities and talk or give personal sexual information. This becomes aggressive with continued requests for offline contact with the perpetrator through regular mail, by telephone, or in person.

Unwanted exposure to sexual material:
Without seeking or expecting sexual material while searching/surfing the web, accessing email/links or instant messages. These become distressing incidents only when and where the youth rate themselves as extremely upset of afraid as a result of the incident.

Lottery Scam

                                                              Lottery Scam

                            "You have won!" a large sum of money in a lottery, can excite many; although the recipient may have never bough a ticket to participate. Further in this scam comes the depositing of the "processing fees" or "transfer charges" so that the winnings can be distributed; but will never receive any lottery payment.
Many email lottery scams use the names of legitimate lottery organizations or other legitimate corporation/companies, without their involvement. There are several ways to recognize a fake lottery email:

  • Unless someone has bought a ticket, they cannot have won prize.
  • The real lottery system does not charge a fee, but would subtract it from the prize, while the scammer will ask the victim to pay a fee before they can receive their prize.
  • Scam lottery emails will nearly always come from free email accounts such as Yahoo, Hotmail, MSN, Gmail etc.


Chain emails

                                                            Chain emails
A chain email is an email with a request to send on to all contacts some promising to bring good luck and others of contribution to charity, if passed on. Not passing them forward and deleting them on realization is the best way to ward off any further ramifications.

Saturday, 26 November 2011


Spam are emails sent to a large number of email addresses; mostly consisting of advertisements of illegal products, scams and pornography. It is against the law to market material by email with-out the consent of the receiver. Spam, especially if it has an attachment; may contain a virus that can damage the computer. Deleting and not responding to such an email will remove you from their mailing list; otherwise it leads to more spam.

Identity Fraud

                                                           Identity Fraud

Identity Fraud is where someone steals personal details to con another out of money. Sharing personal details without discretion may result in purchases or withdrawal of funds without the person's knowledge or consent. Disclosing credit card number or bank account information on the internet is therefore discouraged.

Wednesday, 5 October 2011

Social Networking Fraud

Hackers and identity thieves use social networking sites to gain access to other individual's sensitive information. Posting full name, birthday, address, the name of schools and organizational affiliation is the information disclosed. This irreversible disclosure might be accessed by scams and offenders. Thus, it is wise to verify contacts before allowing access to personal information.

General Talk

Change is inevitable and can have positive or negative impact on our lives. Technology based change is shifting paradigms and helping people attain personal and professional heights. The world is at one's disposal at the touch of a finger tip. Photo sharing, social network systems, mobile phones, digital cameras and other such devices; can be destructive just as much as we consider them to be constructive.
                                       The crux of the matter leads us to two other words, 'use' and 'misuse'. How we use the mode of technology available to us is our own responsibility. We forget the implications and the outcomes of these facilities that have invaded our lives. ' A mobile in every hand' and ' Internet in every home', these slogans have worked well to get people connected; but has also put them through some unnecessary hassles not experienced before.
As the number of devices is increasing in our country, so the associated risks. It is established that misuse may have serious ramifications; and hence educating our youth about these risk factors is crucial. Educating people on related issues and raising awareness would help the parents, caregivers and the youth. This would help make innovations bliss for all.
Similarly, the kind of company one keeps is increasingly becoming important. With the progress of technology, the youth is also facing a trying time. Mutual relations and friendships are full of deceit, jealousy and fake exteriors. It is of utmost importance to bring to the attention of the youth, how to remain alert about their surroundings and to safeguard their wellbeing.
In order to avoid such company and the children going astray with external pressures; the parents should be aware of the potential influence and threats; and be encouraged to talk to their children and improve communication with them. In general, maintaining healthy communication with children and staying involved in their lives, helps prevent such damaging linkages to establish and flourish. Need of the hour is also to raise a generalized awareness about addictions/dependencies that not only affect ones health; but also instigate one to commit acts of criminal nature. Peer pressure and the need to belong; can make people conduct themselves in the most unbecoming manners.
The triggering factor is not just emotional and physical distance from families but also the loss of spiritual connection. The need to study hard and get good grades has removed focus from all the other aspects of a healthy personality. People identify themselves with grades and others judge them through the GPA. The need to go beyond and know people at a personal level is minimizing.
Awareness of religions and cultural obligations, norms and boundaries is lacking in our society.  Students must be careful while making friends and sharing personal information with acquaintances. There is a growing need for parents and teachers to more cognizant and involved in the lives of the upcoming generation. Legislation on the subject exists in the country, but there is lack of implementation. The requirement is that efforts should be made at all levels of society; the individual, family, educational institutions and the entire community collaborating with the government.
Some of the imminent aspects that require attention are:

The Internet:
The Internet has become an integral part of an adolescent's life, outside and on campus. The "Hanging Out" in chat rooms includes anonymously discussing intimate topics with strangers. This is done in the privacy of their homes, mostly without parental consent or knowledge. With no age bar and constructed identities, such interactions lead to exploitative relationships. Social networks formed with other know or unknown people provide contracts such as email and instant messaging services.
The worlds' biggest information exchange, the internet; could have some unexpected ramifications. Face book, Twitter, Orkut and My Space are social networking websites with more than 900 million users. Adding people as friends, sending messages; and personal profiles to notify friends about one's whereabouts and status are some basic activities on these sites. These sites are subject to controversy and have been blocked intermittently in several countries. The users suffer privacy violations as well as spending time in redundant and nonproductive activities. These sites are now warning users to protect themselves from harm through exposure.Some of the hazards of using the internet could be:
Internet Frauds:
This refers to the use of Internet services to present fraudulent solicitations to prospective victims. Fraudulent transactions transmit the proceeds to the illicit financial institutions or persons. Internet fraud occurs in chat rooms, through emails, or on websites.Some forums of such frauds are:
Social Networking Fraud:
Hackers and identity thieves use social networking sites to gain access to other individual's sensitive information. Posting full name, birthday, address, the name of schools and organizational affiliation is the information disclosed. This irreversible disclosure might be accessed by scams and offenders. Thus, it is wise to verify contacts before allowing access to personal information.
Dating Fraud/Romance Scam:
Online dating frauds are almost as old as the concept itself; often referred to as the 'Sweetheart Swindle'. This is a confidence trick involving feigned romantic intentions towards a victim; gaining affection, and then using that goodwill to commit fraud. Fraudulent acts may involve attaining access to the victims' money, back accounts, credit cards, passports, e-mail accounts, and/or national identification numbers; or by getting the victims to commit financial fraud on their behalf. Most online dating services experience difficulties dealing with fraudsters and issue warnings to their users.