Raaj, and others , kindly have a note: attackers, understanding the risks will enable you to follow safe computing procedures when using the Internet for everyday activities. It is important for you to become aware of the types of people who would invade your computer privacy.
Hackers Hackers like the challenge of entering other computers and computer systems; it is like a game to them. They don’t necessarily damage information, but they break through secure computer networks and browse through, or secretly look at, data. Some Internet security professionals believe that most cases of browsing involve curiosity with no malicious, or harmful, intent. This suggests that hackers are more of a nuisance than a threat. In a court of law, however, unintentional damage to another’s computer can be treated as a crime. Also, recent studies in 2005 suggest that browsing is an exploratory activity that in many instances leads to theft or attempted theft. When hackers cross into this realm, they enter the world of the “cracker.” Crackers Crackers are hackers who have criminal intentions. They work like hackers except they look for weaknesses in software and computer systems and use them for their own gain. They browse through and tamper with, or harm, data or take information for negative purposes. They browse through systems and networks to identify the available information, its potential value, and how to steal the data. To steal money, crackers figure out a computer’s file structure and locate accounts that are most open to theft with low chances of discovery. Also, crackers test password security to discover personal authentication information. Personal authentication information allows computers and networks to identify authorized users. Computer Virus Authors Computer virus authors write the programs that infect and damage computer data and systems. Unfortunately, viruses are not difficult to write and many resources, such as virus tool kits, are available on the Internet. Experts in the antivirus field believe that only a few virus authors have destructive goals. Most virus authors are teenagers who want to show off to their peers or to the world. They write fairly simple viruses or just copy and modify other well-known viruses. Many modern computer viruses or worms, which can copy themselves from computer to computer, are polymorphic. This means that every copy differs, and copies cannot be detected by searching a computer file for specific text. Some malicious code can even disable, or shut off, antivirus software, whose job is to identify and get rid of viruses and other harmful software. Doing so is an unauthorized modification, or unpermitted change, of the victim’s computer. Criminals who write such malicious software are not playing a prank: they are designing a crime. Hijackers Hijackers take unauthorized control of your Web browser (e.g., Internet Explorer) and browsing experience. For example, say you receive an email from an unknown person offering you something for free. You click on the link for the free offer, but nothing happens. The next time you open your browser, however, you find yourself at a vendor’s Web site rather than the Web page you usually see, or your home page. The deceptive link that you clicked on was a hijacker’s malicious attempt to change your browser’s home page settings to a vendor’s Web site. Marketers and advertisers use this method frequently. Spies Spies hack into secure sites to discover secrets about their friends, enemies, and competitors. Spies can steal anything from personal documents to financial information. Internet service providers, which provide Internet services such as Internet connection, email, and Web sites, conducted recent studies about spies in 2005. According to these studies, as many as one out of three personal computers (PCs) could contain spyware. Spyware is technology that secretly records sensitive personal information on other computers and sends it back to the creator of the spyware. The information is then sent to advertisers or other interested parties. Often, spyware is installed without the computer user’s consent, as when the user clicks an option in a deceptive pop-up advertisement window on the Web. Scammers Scammers commit computer crimes that deal with money and fraud. Scammers use the Internet to commit different types of fraud every day. Such criminals ask computer users for bank account information and cash payments, and they promise the users something great in return. For example, scammers may claim they need to move a large amount of money out of a particular country and into your account. In return for using your account, they promise that you would keep some of that money. If an offer appears too fantastic, it probably is a scam. Never give personal information, such as bank account numbers and passwords, over the Internet. Cyberstalkers and Harassers Cyberstalkers and harassers use information technology to bother, threaten, or try to scare a victim continually over time. Cyberstalkers, like other criminals, are opportunists: they know what they are looking for and how to get it. The behavior of cyberstalkers and harrassers may include, but is not limited to •threats and false accusations •identity theft •data theft •damage to data or equipment •the solicitation of minors, or using of children and teenagers, for illegal purposes Often cyberstalkers and harassers are driven by revenge, hatred, anger, jealousy, obsession, or mental illness; they want to frighten or embarrass their victim. On the Internet, a cyberstalker can harass a victim in various ways without leaving home or having any witnesses to the incident: •posting comments on Internet message boards to upset the victim or cause others to harass the victim •sending a constant stream of emails and instant messages to the victim or the victim’s coworkers, friends, or family •sending hateful or rude communications to the victim’s boss, family, friends, or significant other (in the victim’s own name, pretending to be the victim) •hacking into and taking over the victim’s computer or email accounts, or changing the password and locking the victim out of his or her own accounts •signing the victim up for unwanted spam or questionable offers and the type of virus or worms may hit your computer even if you visit a highly protected sites. but the knowns to avoid are: Trojan horse a destructive program that hides under a false image, such as a game, waiting for an unsuspecting person to activate it worm a computer program that can copy itself from computer to computer and infect other computer networks But beware! You have just connected your computer to the Internet with very little or no protection. Recent studies have shown that your computer likely will be infected with a harmful piece of software within the first twenty-four hours of unprotected Internet connection. Whether a virus, worm, Trojan horse, spyware, or hacker, something or someone wants to infect your new machine. It is a fact that the Internet is not a safe place to connect your computer . Are we going to avoid internet? never, so let us avoid being ttrapped, . just keep in mind, the following. •Worms constantly scan for unprotected computers to infect. •Trojan horses pretending to be helpful programs actually install malicious ones. •Spyware secretly reports your activities back to its maker. •Hijackers take unauthorized control of your Web browser and browsing experience. Understanding how your computer can become infected and what to avoid when using the Internet is the most important step in keeping your computer clean and secure. anyway, happy surfing! On 7/18/12, Sheik mohammedali <shahid.se...@gmail.com> wrote: > Howdy people! Indeed you do not have to scared of spamming!. Scammers, > spammers and hackers are utterly different! Spammers will annoy you,Scammers > will try to deceive you and where as hackers try to highjock your accounts. > If you are aware of these things noone will be able to touch you! At the > upper side you might feel that they aren't being taken care meticulously? > If so, this is your invalid assumption!. The panel of the moderator is > actively monitoring those unwanted activities and they are being booted > immediately ☺!. You know? I'm rather scared of access India! ☺ ☺ ☺? > > -----Original Message----- > From: accessindia-boun...@accessindia.org.in > [mailto:accessindia-boun...@accessindia.org.in] On Behalf Of Raaj > Sent: Tuesday, July 17, 2012 10:03 PM > To: accessindia@accessindia.org.in > Subject: Re: [AI] Books uploaded on IP > > I'm scared of that inclusive plannet. > > spammers a lots, they say. > ----- Original Message ----- > From: "Radha" <r.radh...@gmail.com> > To: <accessindia@accessindia.org.in> > Sent: Tuesday, July 17, 2012 10:00 PM > Subject: Re: [AI] Books uploaded on IP > > >>i can get only very few, please check inclusive planet. >> disclosed >> rationalism in politics and other essays- oakeshott >> rule of law- ideal or ideology >> political theology- schmitt >> homo sacer- agamben >> ENGLISH CONSTITUTION- BAGEHOT >> constitutional justice- dyzenhaus >> weak courts strong rights- tushnet >> the state democracy and anti terror legislations in india- ujwal kumar >> singh >> the jurisprudence of emergency- hussain >> the indian supreme court and politics- baxi >> laws of the postcolonial >> law from anarchy to utopia- singh >> fates of political liberalism in the british post colony- some chapters >> emergency powers- omar >> an introduction to the laws of the constitution1 >> the fragility of goodness- nussbaum2 >> and many more..... >> many thanks for your sharing Moiz >> >> On 7/17/12, Ketan Kothari <muktake...@gmail.com> wrote: >>> Dear Mois, >>> >>> Please name a few. Any political memoirs or so? >>> >>> -----Original Message----- >>> From: moiz tundawala >>> Sent: Tuesday, July 17, 2012 9:31 PM >>> To: accessindia >>> Subject: [AI] Books uploaded on IP >>> >>> All, >>> I wrote to tell you that I frequently upload the books I get the time >>> to scan on IP. If you are particularly interested in public law and/or >>> politics, do check my collection. Just uploaded more than 40 books a >>> few minutes back. >>> Hope these help. >>> Best, >>> Moiz. >>> >>> >>> Search for old postings at: >>> http://www.mail-archive.com/accessindia@accessindia.org.in/ >>> >>> To unsubscribe send a message to >>> accessindia-requ...@accessindia.org.in >>> with the subject unsubscribe. >>> >>> To change your subscription to digest mode or make any other changes, >>> please >>> >>> visit the list home page at >>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >>> >>> >>> >>> Search for old postings at: >>> http://www.mail-archive.com/accessindia@accessindia.org.in/ >>> >>> To unsubscribe send a message to >>> accessindia-requ...@accessindia.org.in >>> with the subject unsubscribe. >>> >>> To change your subscription to digest mode or make any other changes, >>> please >>> visit the list home page at >>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >>> >>> >> >> >> -- >> Cheers, >> Radha >> Never give up until your dreams are reached, keep dreaming then. >> >> >> Search for old postings at: >> http://www.mail-archive.com/accessindia@accessindia.org.in/ >> >> To unsubscribe send a message to >> accessindia-requ...@accessindia.org.in >> with the subject unsubscribe. >> >> To change your subscription to digest mode or make any other changes, >> please visit the list home page at >> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >> > > > > Search for old postings at: > http://www.mail-archive.com/accessindia@accessindia.org.in/ > > To unsubscribe send a message to > accessindia-requ...@accessindia.org.in > with the subject unsubscribe. > > To change your subscription to digest mode or make any other changes, please > visit the list home page at > http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in > > > > Search for old postings at: > http://www.mail-archive.com/accessindia@accessindia.org.in/ > > To unsubscribe send a message to > accessindia-requ...@accessindia.org.in > with the subject unsubscribe. > > To change your subscription to digest mode or make any other changes, please > visit the list home page at > http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in > > -- Cheers, Radha Never give up until your dreams are reached, keep dreaming then. Search for old postings at: http://www.mail-archive.com/accessindia@accessindia.org.in/ To unsubscribe send a message to accessindia-requ...@accessindia.org.in with the subject unsubscribe. To change your subscription to digest mode or make any other changes, please visit the list home page at http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in