3. Hacking is unauthorized use of someone else's computer or online account.
E-mail hacking is one of the most common types of online hacking because it is where most
information on a user's online accounts can be found. Once a hacker is able to enter your e-mail
account, he or she would be
ableto view your personal information and access your other online accounts, giving him the power
to do unauthorized transactions or activities through your account.There are many ways for
hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a
keystroke logger (keylogger) software, a program which allows the hacker to know everything
you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying
on Personal information they know about you such as birthdays or names of loved ones. Viruses
can also be used to get into your computer to harvest information. Furthermore, there are many
professional hackers online whom people pay to hack any account.
HACKING
4. As mentioned earlier, hacking can also occur through computer viruses. A computer virus
is a computer program that spreads from one computer to another computer and
interferes with computer operation. If your computer is infected with a virus, it can
corrupt or delete any data you have stored or even delete everything on your hard disk.
Viruses are commonly spread through attachments in e-mail messages, links in instant
messages, or through files and programs you download online.
Three of the most common types of computer virus are trojans, worms, and e-mail
viruses. A trojan is a computer program that appears to be an interesting or familiar
application, file, or e-mail attachment, but is only masquerading as such or hiding malware
that causes damage when you click and run it. Trojans can do a number of nasty things on
your computer, the least of which tracks your browsing habits, but in severe cases may
even cause your computer from functioning properly.
VIRUSES
5. The sneaky nature of trojans allows them to enter the victim's computer undetected, but
once in, they can be a nuisance, frequently making their presence known.
A worm is a small piece of software that uses computer networks and security flaws to
replicate itself. More complex than trojans (although they can be brought in by one),
worms usually attack multi-user systems and can spread over a network of computers
through e-mail circulation.
An e-mail virus spreads as an attachment to e-mail messages and replicates itself by
automatically mailing itself to dozens of people in the victim's e-mail address book. Some
e-mail viruses don't even require you to double-click as they automatically launch when
you preview an e-mail message.
VIRUSES
6. A spam is the electronic equivalent of junk mail. Spamming is flooding message
accounts over the Internet with copies of the same message, mostly to advertise,
campaign something, and distribute jokes or words of wisdom to a lot of people at
the same time. Spam costs very little to send, hence "spammers" use this method to
advertise their products, services, or schemes to as many people as possible. Below
are some of the most common types of spam and their definitions.
SPAMMING
8. When Spammed
You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse.
Here are some pointers.
1. Be selective when responding to messages.
If you receive any unwelcome advertising in an e-mail, private message, or any other function, don't send a reply in any form, such as by clicking
on any link. Doing so would inform the spammer that you exist. If you receive a message that is obviously spam, delete it immediately without
opening. Spam messages often use nonsensical or meaningless subject heads with liberal use of characters or all caps.
2. Be careful of signing up or posting to various websites.
When registering on a website or online group, don't use your personal or business e-mail address. Create another e-mail address specifically for
this purpose. It's also advisable to disguise your e-mail address when posting it to websites. Instead of using plain text such as
girl.free@yahoo.com, strip out periods and "@" symbols and use GIRL FREE AT YAHOO DOT COM to prevent spam crawlers from identifying your e-
mail address. Furthermore, avoid using your e-mail address as your screen name in chat rooms or online forums.
3. Create e-mail filters.
There are various ways to filter your e-mail and separate the genuine e-mails from those that are junk. No filter is 100% effective but a good
filter can lessen the amount of spam you receive significantly. Most of the common e-mail services such as Yahoo! and Gmail offer a standard
filtering service. If you want extra protection, you can install additional filtering software such as Mailwasher (www.mailwasher.net) or subscribe
to the paid filter of your service provider.
4. Make sure not to aid in perpetuating forwarded messages.
Forwarded e-mails often list the e-mail addresses of everyone who has forwarded the message as well as the e-mail addresses of the recipients,
making it easy for spammers to find long lists of e-mail addresses to target. To avoid forwarding, use the copy-paste option to transfer the
content you wish to send in a fresh e-mail.
9. There are many variations of frauds and scams on the Internet created by fake
sellers who use computer services to promote bogus services, products, and
investment opportunities, among others. The common goal is to fool you into giving
away money and/or bank information. But you have to find a balance between
caution and adopting a go-for-it attitude. The overly cautious trait of people can
actually prevent them from finding new legitimate opportunities. Not everything
suspicious you encounter on the Internet is a scam. Some are actually worthwhile
checking out.
FRAUDS AND SCAMS
10. What follows is a list of guidelines to give you a nose for online frauds or scams:
1. If something is too good to be true, then most likely it is.
If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment,
then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate
big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from
companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and
have earned credibility with members through the years.
2. Be wary of products that are offered too cheap.
If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the
product is a physical object and not just a digital file that can be downloaded.
FRAUDS AND SCAMS
11. 3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites.
Legitimate and certified businesses are registered and often provide complete contact information such as phone
numbers, office location, and e-mail addresses.
They also have well-written copy in English. Petty scammers often work alone (or with a handful of cronies), are often
careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the
target customers.
4. Research will go a long way.
Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can
already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those
organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support.
FRAUDS AND SCAMS
13. Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another
individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false
accusations, solicitation of minors for sexual purposes, and gathering of information for harassment
purposes. Cyber stalkers often meet or target their victims through search engines, online forums,
bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet
activity. They can also post derogatory statements about their stalking target on websites to harass
the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can
disrupt the lives of victims and cause a lot of fear and a feeling of being threatened.
CYBER STALKING