SlideShare a Scribd company logo
Netiquette
Dr SAJEENA S.
Netiquette
It is a group of rules that would
have to follow the users of the
network to facilitate the
understanding of what to write
and the circulation for the
network.
There are ten rules of netiquette that everyone
who goes online should follow. They are:
• Make a good impression
• Always identify yourself
• Be patient with new comers
• Do not TYPE ALL IN CAPITAL LETTERS for emphasis
• Be brief whenever possible
• Do unto others, as you have others do unto you
• Be careful not to use rude or bad language online
• Be universal
• Remember that the written word is hard to interpret
• Don’t break any laws
Types of
Netiquettes Netiquette basics
Netiquette of sending
Netiquette of replying
Netiquette of confidentiality
Netiquette basics
Help the newbies
01
Research before
asking
02
Remember
emotions
03
Netiquette of sending
Be brief
Be
Use white spaces
Use
Use descriptive subject lines
Use
Stay on topic
Stay on
Be careful sending attachment
Be
Copy the minimum number of people.
Copy
Netiquette of
replying
• Acknowledge important
communication
• Replying and forwarding
• Summarize for the group
• Check current information before
replying
• Reference past communication
• Netiquette of
confidentiality
• Don’t publicize others email
addresses
• Never send what you don’t read
• Remember archiving
• Respect copyright
Phishing
Phishing is the fraudulent practice of
sending emails purporting to be from
reputable companies in order to induce
individuals to reveal personal
information, such as passwords,
usernames, security codes and credit
card numbers etc.
Phishing is an email fraud method in
which the perpetrator sends out
legitimate looking email in an attempt to
gather personal and financial information
from recipients. Typically, the messages
appear to come from well-known and
trustworthy Web sites.
How to
detect
phishing
Phishing emails often include generic greetings, such as “Hello …….
Customer” rather than using the recipient's actual name
Web sites that are frequently spoofed by phishers include PayPal,
eBay, MSN, Yahoo, BestBuy and America Online.
Misspelled URLs or the use of subdomains are the commonly tricks
used by phishers like http://www.maybank.home.com/.
One method of spoofing links used web addresses containing the
@ symbol, which are used to include a user name and password in
a Web URL eg. http://www.hotmail.com@members.com.
In another method attacker uses a bank or other services website
scripts on the victim.
How to avoid
phishing
Don’t click the link (type the site name in your browser
such as www.PayPal.com)
Never send sensitive account information by email
(Account numbers, SSN, Passwords)
Never give any password out to anyone
Verify any person who contact you (phone or email)
Types of Phishing
The common types of phishing are Email phishing, Spear
phishing, Whaling, CEO fraud, Smishing, Vishing etc.
Software
Piracy
Software piracy is a term used to describe the act of
illegally using, copying, or distributing software without
ownership or legal rights. The unauthorized copying
may be done for personal use. Software piracy does not
need a hacker or a skilled coder. Any normal person
with a computer can become a software pirate if they
don’t know about the software laws.
The majority of software today is purchased as an onsite
license, meaning that only one computer may have that
software installed on it at one time. Copying that
software to multiple computers or sharing it our friends
without multiple licenses is considered as software
piracy, which is illegal. It is the illegal use of copying,
distribution or use of software.
End–User License Agreement
(EULA)
The End User License Agreement is a license used for most software.
It is a contract between the manufacturer or the author and the end
user. This agreement defines rules for software use and every
agreement is same. One common rule in most EULAs prohibit users
from sharing the software with others. Typically, the license states that
you can install the original copy of software you bought on one
computer that you can make a backup copy in case the original is lost.
Types of Software Piracy
Soft Lifting
Soft lifting is when someone purchases one
version of the software and download it
onto multiple computers, even though the
software states it should only be
downloaded once. This often occurs in
business or school environments and is
usually done to save money.
Client Server Overuse
Client server over use is when too many people on a network use one main copy
of the program at the same time. This often happens when businesses are in a
local area network and download the software for all employees to use.
Hard Disk Loading
Hard disk loading is a type of commercial software piracy in which someone buys
legal version of the software and then reproduces copies or installs it onto
computer hard disks. The person then sells the product.
Counterfeiting
Counterfeiting occurs when software programs are
illegally duplicated and sold with the appearance
of authenticity. Counterfeit software is usually sold
at a discounted price in comparison to the
legitimate software.
Online Piracy
Online piracy is when illegal software is sold, shared or acquired by
means of the internet. This is usually done through a peer-to-peer
file sharing system, which is usually found in the online auction sites
and blogs.
The Dangers
of Software
Piracy
Increased chances that the software will malfunction or
fail.
No warranty and the software can’t be updated.
Increase risk of infecting your PC with malware, viruses
or adware.
Slow down PC
Leal repercussions due to copyright infringement.
Effect on users includes lower productivity, malware
infection, subject to raid, unusual sufferings.
How to Prevent Piracy?
• Purchase only legitimate software products.
• When buying software, it is necessary to be sure to get genuine disks,
manuals and license documentations.
• Buy from an authorized dealer.
• Check the price and ask for receipts.
• When one purchases illegal or counterfeit copies has money goes straight
into the pocket of software pirates.
THANK YOU

More Related Content

What's hot

Electronic media
Electronic mediaElectronic media
Electronic media
Kokie Tayanes
 
Media law & ethics
Media law & ethicsMedia law & ethics
Media law & ethics
Lady Lee
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
Joanna Dimitrova
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
Jincy24
 
Wikipedia presentation
Wikipedia presentationWikipedia presentation
Wikipedia presentation
Dr. Hina Kaynat
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
Ashwin Agarwal
 
Social media and education: advantages and disadvantages
Social media and education: advantages and disadvantagesSocial media and education: advantages and disadvantages
Social media and education: advantages and disadvantages
Juana Berroa
 
ELECTRONIC MEDIA
ELECTRONIC MEDIAELECTRONIC MEDIA
ELECTRONIC MEDIA
Hamza Tahir
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
kamalesh2015
 
Impacts of social media on students
Impacts of social media on studentsImpacts of social media on students
Impacts of social media on students
Vikas Gupta
 
Online learning resources
Online learning resourcesOnline learning resources
Online learning resources
Ankit Grover
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Social Media Awareness for Students
Social Media Awareness for StudentsSocial Media Awareness for Students
Social Media Awareness for Students
Tom Matys
 
Multimedia
MultimediaMultimedia
Multimedia
Shivam Tuteja
 
Mass media and its advantages
Mass media and its advantagesMass media and its advantages
Mass media and its advantages
Dr. I. Uma Maheswari Maheswari
 
Script writing for e-content
Script writing for e-contentScript writing for e-content
Script writing for e-content
VanarajVasanthiRK
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
Samantha Culshaw-Robinson
 
What is Digital Media?
What is Digital Media?What is Digital Media?
What is Digital Media?
Caryn Brown
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in education
UPSIcoursework
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 

What's hot (20)

Electronic media
Electronic mediaElectronic media
Electronic media
 
Media law & ethics
Media law & ethicsMedia law & ethics
Media law & ethics
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Wikipedia presentation
Wikipedia presentationWikipedia presentation
Wikipedia presentation
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
Social media and education: advantages and disadvantages
Social media and education: advantages and disadvantagesSocial media and education: advantages and disadvantages
Social media and education: advantages and disadvantages
 
ELECTRONIC MEDIA
ELECTRONIC MEDIAELECTRONIC MEDIA
ELECTRONIC MEDIA
 
Multimedia presentation
  Multimedia presentation   Multimedia presentation
Multimedia presentation
 
Impacts of social media on students
Impacts of social media on studentsImpacts of social media on students
Impacts of social media on students
 
Online learning resources
Online learning resourcesOnline learning resources
Online learning resources
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Social Media Awareness for Students
Social Media Awareness for StudentsSocial Media Awareness for Students
Social Media Awareness for Students
 
Multimedia
MultimediaMultimedia
Multimedia
 
Mass media and its advantages
Mass media and its advantagesMass media and its advantages
Mass media and its advantages
 
Script writing for e-content
Script writing for e-contentScript writing for e-content
Script writing for e-content
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
What is Digital Media?
What is Digital Media?What is Digital Media?
What is Digital Media?
 
Introduction of multimedia in education
Introduction of multimedia in educationIntroduction of multimedia in education
Introduction of multimedia in education
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 

Similar to Netiquette

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
MallTake
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
HabFg
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
Aarush59
 
Software Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.pptSoftware Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.ppt
PramodAlfred
 
Soft piracy
Soft piracySoft piracy
Soft piracy
Vibhor Raut
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
Flora Runyenje
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Dr. Khaled Bakro
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
Cyber Ethics
Cyber Ethics  Cyber Ethics
Cyber Ethics
YeshwanthP8
 
Securityguide
SecurityguideSecurityguide
Securityguide
Oleg Kostyukevich
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Web design premium
Web design premiumWeb design premium
Web design premium
jeannined_1
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
NetWatcher
 
Malware Security
Malware SecurityMalware Security
Malware Security
Mike Ellis
 

Similar to Netiquette (20)

Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
Software Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.pptSoftware Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.ppt
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Cyber Ethics
Cyber Ethics  Cyber Ethics
Cyber Ethics
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Web design premium
Web design premiumWeb design premium
Web design premium
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Malware Security
Malware SecurityMalware Security
Malware Security
 

More from sajeena81

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
sajeena81
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
sajeena81
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
sajeena81
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
sajeena81
 
Firewall
FirewallFirewall
Firewall
sajeena81
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
sajeena81
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
sajeena81
 
Hacking
HackingHacking
Hacking
sajeena81
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
sajeena81
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
sajeena81
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
sajeena81
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
sajeena81
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
sajeena81
 
E content
E contentE content
E content
sajeena81
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
sajeena81
 
Microteaching
MicroteachingMicroteaching
Microteaching
sajeena81
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
sajeena81
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
sajeena81
 

More from sajeena81 (20)

Entrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristicsEntrepreneurship Education - importance , characteristics
Entrepreneurship Education - importance , characteristics
 
2nd Semester BEd.pptx
2nd Semester BEd.pptx2nd Semester BEd.pptx
2nd Semester BEd.pptx
 
4th semester.pptx
4th semester.pptx4th semester.pptx
4th semester.pptx
 
BBL.pptx
BBL.pptxBBL.pptx
BBL.pptx
 
Firewall
FirewallFirewall
Firewall
 
Legal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarismLegal &and ethical issues, plagiarism
Legal &and ethical issues, plagiarism
 
Life span psychology
Life span psychologyLife span psychology
Life span psychology
 
Hacking
HackingHacking
Hacking
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Computer virus
Computer virusComputer virus
Computer virus
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Essential requirements of teaching physical science
Essential requirements of teaching physical scienceEssential requirements of teaching physical science
Essential requirements of teaching physical science
 
Herbartian approach
Herbartian approachHerbartian approach
Herbartian approach
 
Science for sustainable development
Science for sustainable developmentScience for sustainable development
Science for sustainable development
 
Introduction to teaching and learning
Introduction to teaching and learningIntroduction to teaching and learning
Introduction to teaching and learning
 
E content
E contentE content
E content
 
Resources in teaching and learning physical science
Resources in teaching and learning physical scienceResources in teaching and learning physical science
Resources in teaching and learning physical science
 
Microteaching
MicroteachingMicroteaching
Microteaching
 
Skill of fluency in questioning
Skill of fluency in questioningSkill of fluency in questioning
Skill of fluency in questioning
 
Skill of stimulus variation
Skill of stimulus variationSkill of stimulus variation
Skill of stimulus variation
 

Recently uploaded

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 

Recently uploaded (20)

A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 

Netiquette

  • 2. Netiquette It is a group of rules that would have to follow the users of the network to facilitate the understanding of what to write and the circulation for the network.
  • 3. There are ten rules of netiquette that everyone who goes online should follow. They are: • Make a good impression • Always identify yourself • Be patient with new comers • Do not TYPE ALL IN CAPITAL LETTERS for emphasis • Be brief whenever possible • Do unto others, as you have others do unto you • Be careful not to use rude or bad language online • Be universal • Remember that the written word is hard to interpret • Don’t break any laws
  • 4. Types of Netiquettes Netiquette basics Netiquette of sending Netiquette of replying Netiquette of confidentiality
  • 5. Netiquette basics Help the newbies 01 Research before asking 02 Remember emotions 03
  • 6. Netiquette of sending Be brief Be Use white spaces Use Use descriptive subject lines Use Stay on topic Stay on Be careful sending attachment Be Copy the minimum number of people. Copy
  • 7. Netiquette of replying • Acknowledge important communication • Replying and forwarding • Summarize for the group • Check current information before replying • Reference past communication
  • 8. • Netiquette of confidentiality • Don’t publicize others email addresses • Never send what you don’t read • Remember archiving • Respect copyright
  • 9. Phishing Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords, usernames, security codes and credit card numbers etc. Phishing is an email fraud method in which the perpetrator sends out legitimate looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well-known and trustworthy Web sites.
  • 10. How to detect phishing Phishing emails often include generic greetings, such as “Hello ……. Customer” rather than using the recipient's actual name Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy and America Online. Misspelled URLs or the use of subdomains are the commonly tricks used by phishers like http://www.maybank.home.com/. One method of spoofing links used web addresses containing the @ symbol, which are used to include a user name and password in a Web URL eg. http://www.hotmail.com@members.com. In another method attacker uses a bank or other services website scripts on the victim.
  • 11. How to avoid phishing Don’t click the link (type the site name in your browser such as www.PayPal.com) Never send sensitive account information by email (Account numbers, SSN, Passwords) Never give any password out to anyone Verify any person who contact you (phone or email) Types of Phishing The common types of phishing are Email phishing, Spear phishing, Whaling, CEO fraud, Smishing, Vishing etc.
  • 12. Software Piracy Software piracy is a term used to describe the act of illegally using, copying, or distributing software without ownership or legal rights. The unauthorized copying may be done for personal use. Software piracy does not need a hacker or a skilled coder. Any normal person with a computer can become a software pirate if they don’t know about the software laws. The majority of software today is purchased as an onsite license, meaning that only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it our friends without multiple licenses is considered as software piracy, which is illegal. It is the illegal use of copying, distribution or use of software.
  • 13. End–User License Agreement (EULA) The End User License Agreement is a license used for most software. It is a contract between the manufacturer or the author and the end user. This agreement defines rules for software use and every agreement is same. One common rule in most EULAs prohibit users from sharing the software with others. Typically, the license states that you can install the original copy of software you bought on one computer that you can make a backup copy in case the original is lost.
  • 14. Types of Software Piracy Soft Lifting Soft lifting is when someone purchases one version of the software and download it onto multiple computers, even though the software states it should only be downloaded once. This often occurs in business or school environments and is usually done to save money.
  • 15. Client Server Overuse Client server over use is when too many people on a network use one main copy of the program at the same time. This often happens when businesses are in a local area network and download the software for all employees to use. Hard Disk Loading Hard disk loading is a type of commercial software piracy in which someone buys legal version of the software and then reproduces copies or installs it onto computer hard disks. The person then sells the product.
  • 16. Counterfeiting Counterfeiting occurs when software programs are illegally duplicated and sold with the appearance of authenticity. Counterfeit software is usually sold at a discounted price in comparison to the legitimate software.
  • 17. Online Piracy Online piracy is when illegal software is sold, shared or acquired by means of the internet. This is usually done through a peer-to-peer file sharing system, which is usually found in the online auction sites and blogs.
  • 18. The Dangers of Software Piracy Increased chances that the software will malfunction or fail. No warranty and the software can’t be updated. Increase risk of infecting your PC with malware, viruses or adware. Slow down PC Leal repercussions due to copyright infringement. Effect on users includes lower productivity, malware infection, subject to raid, unusual sufferings.
  • 19. How to Prevent Piracy? • Purchase only legitimate software products. • When buying software, it is necessary to be sure to get genuine disks, manuals and license documentations. • Buy from an authorized dealer. • Check the price and ask for receipts. • When one purchases illegal or counterfeit copies has money goes straight into the pocket of software pirates.