3. Introduction
Most cybercrime is usually done for money today, but some people are trying to steal
someone’s data, harm another person, and destroy someone’s network or computer.
In the present time, Cyber Crime remains a headache for the people; it is a severe problem;
to stop this activity, every country in the world developed laws.
Why is it done? How is it done?
4. What is Spamming
Spamming is when one person or company sends an unwanted email to another person.
Spam emails are usually sent to try to get the person to buy something or do something else that
will cause gain for the sender.
They often advertise products or services which are being lied about by the companies sending the
spam, such as frauds or scams.
The emails sent when someone is spamming is called spam.
The person or company who sent the unwanted email is called spammer.
5.
6. Spam prevention
Some user email programs can automatically delete spam messages when they arrive, or move
them to a separate spam folder.
Internet Service Providers also detect them automatically and cooperate to cut off customers who
are major spammers.
7. What is Hacking?
Hacking is an unauthorized entry into a network or a computer to steal or manipulate information,
data or files,
The person involved in this process is names as hacker.
Computer hacking is done using several types of programs such as Rootkit, Trojan, Keylogger, etc.
Hackers also employ techniques like browser hijacks, spoofing, phishing, etc to capture user’s
personal or financial details.
8.
9. How to know if your computer is
Hacked?
Your computer may show certain signs of being hacked such as fake antivirus warning messages,
unwanted browser toolbar, redirection to strange websites, random pop ups, ransomware messages
etc.
If you receive any of these warning signs, you can be sure that your computer has been targeted by
a hacker.
10. How to prevent Hacking?
Download software from authorized websites.
Do not click on random email attachments.
Scan all types of hard drives before running.
Abstain from keeping easy passwords.
Never store or share your login information.