Raaj, and others ,
kindly have a  note:
attackers, understanding the risks will enable you to follow safe
computing procedures when using the Internet for everyday activities.
It is important for you to become aware of the types of people who
would invade your computer privacy.

Hackers

Hackers like the challenge of entering other computers and computer
systems; it is like a game to them. They don’t necessarily damage
information, but they break through secure computer networks and
browse through, or secretly look at, data. Some Internet security
professionals believe that most cases of browsing involve curiosity
with no malicious, or harmful, intent. This suggests that hackers are
more of a nuisance than a threat. In a court of law, however,
unintentional damage to another’s computer can be treated as a crime.
Also, recent studies in 2005 suggest that browsing is an exploratory
activity that in many instances leads to theft or attempted theft.
When hackers cross into this realm, they enter the world of the
“cracker.”

Crackers

Crackers are hackers who have criminal intentions. They work like
hackers except they look for weaknesses in software and computer
systems and use them for their own gain. They browse through and
tamper with, or harm, data or take information for negative purposes.
They browse through systems and networks to identify the available
information, its potential value, and how to steal the data. To steal
money, crackers figure out a computer’s file structure and locate
accounts that are most open to theft with low chances of discovery.
Also, crackers test password security to discover personal
authentication information. Personal authentication information allows
computers and networks to identify authorized users.

Computer Virus Authors

Computer virus authors write the programs that infect and damage
computer data and systems. Unfortunately, viruses are not difficult to
write and many resources, such as virus tool kits, are available on
the Internet. Experts in the antivirus field believe that only a few
virus authors have destructive goals. Most virus authors are teenagers
who want to show off to their peers or to the world. They write fairly
simple viruses or just copy and modify other well-known viruses.

Many modern computer viruses or worms, which can copy themselves from
computer to computer, are polymorphic. This means that every copy
differs, and copies cannot be detected by searching a computer file
for specific text. Some malicious code can even disable, or shut off,
antivirus software, whose job is to identify and get rid of viruses
and other harmful software. Doing so is an unauthorized modification,
or unpermitted change, of the victim’s computer. Criminals who write
such malicious software are not playing a prank: they are designing a
crime.

Hijackers

Hijackers take unauthorized control of your Web browser (e.g.,
Internet Explorer) and browsing experience. For example, say you
receive an email from an unknown person offering you something for
free. You click on the link for the free offer, but nothing happens.
The next time you open your browser, however, you find yourself at a
vendor’s Web site rather than the Web page you usually see, or your
home page. The deceptive link that you clicked on was a hijacker’s
malicious attempt to change your browser’s home page settings to a
vendor’s Web site. Marketers and advertisers use this method
frequently.

Spies

Spies hack into secure sites to discover secrets about their friends,
enemies, and competitors. Spies can steal anything from personal
documents to financial information. Internet service providers, which
provide Internet services such as Internet connection, email, and Web
sites, conducted recent studies about spies in 2005. According to
these studies, as many as one out of three personal computers (PCs)
could contain spyware.

Spyware is technology that secretly records sensitive personal
information on other computers and sends it back to the creator of the
spyware. The information is then sent to advertisers or other
interested parties. Often, spyware is installed without the computer
user’s consent, as when the user clicks an option in a deceptive
pop-up advertisement window on the Web.

Scammers

Scammers commit computer crimes that deal with money and fraud.
Scammers use the Internet to commit different types of fraud every
day. Such criminals ask computer users for bank account information
and cash payments, and they promise the users something great in
return. For example, scammers may claim they need to move a large
amount of money out of a particular country and into your account. In
return for using your account, they promise that you would keep some
of that money. If an offer appears too fantastic, it probably is a
scam. Never give personal information, such as bank account numbers
and passwords, over the Internet.

Cyberstalkers and Harassers

Cyberstalkers and harassers use information technology to bother,
threaten, or try to scare a victim continually over time.
Cyberstalkers, like other criminals, are opportunists: they know what
they are looking for and how to get it. The behavior of cyberstalkers
and harrassers may include, but is not limited to

•threats and false accusations

•identity theft

•data theft

•damage to data or equipment

•the solicitation of minors, or using of children and teenagers, for
illegal purposes
Often cyberstalkers and harassers are driven by revenge, hatred,
anger, jealousy, obsession, or mental illness; they want to frighten
or embarrass their victim. On the Internet, a cyberstalker can harass
a victim in various ways without leaving home or having any witnesses
to the incident:

•posting comments on Internet message boards to upset the victim or
cause others to harass the victim

•sending a constant stream of emails and instant messages to the
victim or the victim’s coworkers, friends, or family

•sending hateful or rude communications to the victim’s boss, family,
friends, or significant other (in the victim’s own name, pretending to
be the victim)

•hacking into and taking over the victim’s computer or email accounts,
or changing the password and locking the victim out of his or her own
accounts

•signing the victim up for unwanted spam or questionable offers

and the type of virus or worms may hit your computer even if you visit
a  highly protected sites.
but the knowns to avoid are:
Trojan horse

a destructive program that hides under a false image, such as a game,
waiting for an unsuspecting person to activate it

worm

a computer program that can copy itself from computer to computer and
infect other computer networks
But beware! You have just connected your computer to the Internet with
very little or no protection. Recent studies have shown that your
computer likely will be infected with a harmful piece of software
within the first twenty-four hours of unprotected Internet connection.
Whether a virus, worm, Trojan horse, spyware, or hacker, something or
someone wants to infect your new machine.

It is a fact that the Internet is not a safe place to connect your computer .
Are we going to avoid internet? never, so let us avoid being ttrapped, .
just keep in mind, the following.
•Worms constantly scan for unprotected computers to infect.

•Trojan horses pretending to be helpful programs actually install
malicious ones.

•Spyware secretly reports your activities back to its maker.

•Hijackers take unauthorized control of your Web browser and browsing
experience.
Understanding how your computer can become infected and what to avoid
when using the Internet is the most important step in keeping your
computer clean and secure.
anyway, happy surfing!

On 7/18/12, Sheik mohammedali <shahid.se...@gmail.com> wrote:
> Howdy people! Indeed you do not have to scared of spamming!.  Scammers,
> spammers and hackers are utterly different! Spammers will annoy you,Scammers
> will try to deceive you and where as hackers try to highjock your accounts.
> If you are aware of these things noone will be able to touch you! At the
> upper side you might feel that they aren't being taken care  meticulously?
> If so, this is your invalid assumption!.  The panel of the moderator is
> actively monitoring those unwanted activities and they are being booted
> immediately ☺!.  You know? I'm rather scared of access India! ☺ ☺ ☺?
>
> -----Original Message-----
> From: accessindia-boun...@accessindia.org.in
> [mailto:accessindia-boun...@accessindia.org.in] On Behalf Of Raaj
> Sent: Tuesday, July 17, 2012 10:03 PM
> To: accessindia@accessindia.org.in
> Subject: Re: [AI] Books uploaded on IP
>
> I'm scared of that inclusive plannet.
>
> spammers a lots, they say.
> ----- Original Message -----
> From: "Radha" <r.radh...@gmail.com>
> To: <accessindia@accessindia.org.in>
> Sent: Tuesday, July 17, 2012 10:00 PM
> Subject: Re: [AI] Books uploaded on IP
>
>
>>i  can get only very few, please check inclusive planet.
>> disclosed
>> rationalism in politics and other essays- oakeshott
>> rule of law- ideal or ideology
>> political theology- schmitt
>> homo sacer- agamben
>> ENGLISH CONSTITUTION- BAGEHOT
>> constitutional justice- dyzenhaus
>> weak courts strong rights- tushnet
>> the state democracy and anti terror legislations in india- ujwal kumar
>> singh
>> the jurisprudence of emergency- hussain
>> the indian supreme court and politics- baxi
>> laws of the postcolonial
>> law from anarchy to utopia- singh
>> fates of political liberalism in the british post colony- some chapters
>> emergency powers- omar
>> an introduction to the laws of the constitution1
>> the fragility of goodness- nussbaum2
>> and many more.....
>> many thanks for your sharing  Moiz
>>
>> On 7/17/12, Ketan Kothari <muktake...@gmail.com> wrote:
>>> Dear Mois,
>>>
>>> Please name a few.  Any political memoirs or so?
>>>
>>> -----Original Message-----
>>> From: moiz tundawala
>>> Sent: Tuesday, July 17, 2012 9:31 PM
>>> To: accessindia
>>> Subject: [AI] Books uploaded on IP
>>>
>>> All,
>>> I wrote to tell you that I frequently upload the books I get the time
>>> to scan on IP. If you are particularly interested in public law and/or
>>> politics, do check my collection. Just uploaded more than 40 books a
>>> few minutes back.
>>> Hope these help.
>>> Best,
>>> Moiz.
>>>
>>>
>>> Search for old postings at:
>>> http://www.mail-archive.com/accessindia@accessindia.org.in/
>>>
>>> To unsubscribe send a message to
>>> accessindia-requ...@accessindia.org.in
>>> with the subject unsubscribe.
>>>
>>> To change your subscription to digest mode or make any other changes,
>>> please
>>>
>>> visit the list home page at
>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>>
>>>
>>>
>>> Search for old postings at:
>>> http://www.mail-archive.com/accessindia@accessindia.org.in/
>>>
>>> To unsubscribe send a message to
>>> accessindia-requ...@accessindia.org.in
>>> with the subject unsubscribe.
>>>
>>> To change your subscription to digest mode or make any other changes,
>>> please
>>> visit the list home page at
>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>>
>>>
>>
>>
>> --
>> Cheers,
>> Radha
>> Never give up  until your dreams are reached, keep dreaming  then.
>>
>>
>> Search for old postings at:
>> http://www.mail-archive.com/accessindia@accessindia.org.in/
>>
>> To unsubscribe send a message to
>> accessindia-requ...@accessindia.org.in
>> with the subject unsubscribe.
>>
>> To change your subscription to digest mode or make any other changes,
>> please visit the list home page at
>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>
>
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-requ...@accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-requ...@accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>


-- 
Cheers,
Radha
Never give up  until your dreams are reached, keep dreaming  then.


Search for old postings at:
http://www.mail-archive.com/accessindia@accessindia.org.in/

To unsubscribe send a message to
accessindia-requ...@accessindia.org.in
with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please 
visit the list home page at
http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in

Reply via email to