2. Hacking is unauthorized use of
someone else's computer or
online account. E-mail hacking is
one of the most common types of
online hacking because it is
where most information on a
user's online accounts can be
found.
Hackin
g
3. Viruses
A computer virus is a computer
program that spreads from one
computer and interferes with
computer operation. Viruses are
commonly spread through
attachments in e-mail messages,
links in instant messages, or
through files and programs you
download online.
4. HOW TO Protect your Computer against
Viruses
1. Make sure your computer's firewall is always turned on.
2. Use updated anti-virus software and perform a full
computer virus scan regularly.
3. Never open an e-mail attachment unless you know who
sent it and you are expecting the attachment.
4. Avoid using or downloading programs from unknown
sources and stick to commercial software.
5. Keep your operating system always up-ro-
date.
6. Back up your files regularly so in case your system gets
infected, your important date are saved.
5. Spamming
A spam is the electronic
equivalent of junk mail.
Spamming is flooding message
accounts over the internet with
copies of the same message,
mostly to advertise, campaign
something, and distribute jokes
or words of wisdom to a lot of
people ate the same time
6. Frauds and
Scams
There are many variations of
frauds and scams on the internet
created by fake sellers who use
computer services to promote
bogus services, products, and
investment opportunities, among
others.
7. Cyber
Stalking
Cyber stalking is the use of the internet by an
individual or a group of individuals ro harass
another individual, group of individuals, or
organization.
8. Summary
The internet has given us a lot of opportunities beyond
what we could imagine. However, it has also opened a
whole new world of abuse and preying on innocent
victims for money and other purposes. Among the most
common types of online crimes and hazards are
hacking, the spread of viruses, spamming, scamming,
and cyber stalking. Being aware of safety and
preventive measures against the online dangers are
essential so that people can be safer online.
9. Hackin
g
- unauthorized use of someone else's computer or online account.
Computer Virus
- a computer program that spreads from one computer to
another and interferes with computer operation.
Troja
n
- a computer program that appears to be an interesting or familiar
application, file, or E-mail attachment, but is only masquerading as
such and causes damage when you click and run it.
Wor
m
- a small piece of software that uses computer networks and
security flaws to replicate itself.
10. Spamming
- a flooding of messaging accounts over the internet with many
copies of the same message, mostly to advertise something to a
lot of people at the same time.
Black hat search engine
optimization
- arguably unethical techniques that are used to get higher
search rankings in an unethical manner.
Firewall
- system in a computer designed to prevent unauthorized
access to or from a private network.
11. Multi-user system
- operating system or application software that allows
simultaneous access by multiple users of a computer.
Cyber
Stalking
- the use of the internet by an individual or a group of
individuals to harass another individual, group of
individuals, or organization.
THE END...