You are on page 1of 6

Dangers on the Internet

Email spam

AISO known as junk email, it is usually unsolicited commercial email sent from one source with identical
message sent to multiple recipients. Although some of them are not harmful, deleting them one by one
will eat up your time and can clog your email. Dangerous spams carry virus like Trojan horse and other
malicious software (malware). Spammer is the term used to refer to a person who creates electronic
spam.Spamming is projected to continue because it is a cheap means of advertising. In addition, many
countries do not have laws to punish spammers.

Email spoofing

this refers to deceitful email practice in which the sender address is changed, so that it Would appear to
have come from a different source usually someone you know. Usually, the reply to address is the
source of the email, and when you unknowingly reply to it you would be replying to the one who
spoofed you. Email spoofing is usually used by spammers to hide the origin of the spam.

Phishing

This is a deceitful practice of trying to get confidential information such as passwords and usernames,
and credit card details by making it appear as if it comes from a trustworthy source. Phishing is usually
done by email or other similar means using a popular entity such as Microsoft, Yahoo, Google, Amazon,
and financial institutions to lure you to their website. Internet users would think that they are accessing
a genuine website and through this way, a phisher would be able to gather sensitive information from
internet account user.

Pharming

This is a dangerous hacker attack on a website which directs all traffic to that web site to another
fictitious website. The main object of pharming is to obtain username and passwords, as well as credit
card and financial information, and use these to steal their money electronically or use the credit card of
the victims.

Pharming is a major concern of many online banking and electronic commerce transactions, which
would compromise many of their client accounts as well as the business. Antivirus and anti-spyware
software cannot prevent and protect one from pharming.

Spyware

This is a computer program that is installed covertly on a personal computer to collect information or
even take control over the computer without the knowledge of the user. A spyware program would be
able to monitor and collect information about the user and his internet habits and practices. It is known
that spyware programs also affect the performance and settings of the computer. Major antivirus
companies have incorporated in theirproducts anti-spyware programs, and many internet-based
companies have offered anti-spyware programs for a fee, and some are free. But you must be careful
which one to use to ensure your protection.

Computer worm

This is a dangerous computer program that replicates itself through a network.Some worms delete files,
others disrupt the network function and still, others send junk mail from infected computer. Computer
worm usually spreads by exploiting weaknesses in operating system, and manufacturers of this software
regularly send free updates to clients to prevent the spread of the worms. They usually spread on their
own without attaching to a program or file. Users should not run attachments or open emails from
unknown or suspicious sources, delete them immediately. Anti Virus, anti-spyware, and use of firewall
helps to prevent worm attacks, but it must be updated regularly to ensure current prevention and
control.

Trojan horse

This is a form of a malicious software (malware) fronting to perform a good task, but COvertly performs
undesirable function with the intention of entering the computer without the user's consent. Once the
malware is installed in the computer, the Trojan horse can disable the computer's defenses opening it to
unauthorized entry.

It can erase data, can allow access of the victim's computer, can corrupt files, andcan be used in Phishing
for bank accounts. Regularly updated antivirus and anti-spyware programs can detect Trojan horse and
can delete them.

Computer virus

This is a program that duplicates itself and then infects the computer. It spreads like a real biological
virus, wherein it attaches itself to a host program and infect other Computers if it is received by a
computer through the internet. The virus can also transferred by the use of removable storage media
such as diskette, CD, flashdrives, memory cards, and others. Damage by the computer virus may be mild
to severe. Data loss and crippled functionality of the computer have created specialist to combat deadly
computer viruses. Many antivirus programs are effective against the threats, but should be regularly
updated to remain successful in prevention and fight against these computer viruses.

Hacker

This is a person who is able to enter and control other people's computer withoutauthorization. A
hacker is able to enter another's computer, usually vandalizes the victim's website, steals personal
information, obtains intellectual property, and performs credit card fraud. Firewalls are able to prevent
entry by hackers.

Windows Security
It is sometimes necessary to protect important work and personal information stored in the computer.
There are also situations that you want to prevent other people from using your computer. Imagine if
you have worked on a project for several hours or days, and then one day, you found out that it was
deleted by someone else by accident. Microsoft Windows has security features that determine who can
use and have access to your computer.

Changing and Adding User Accounts

Windows operating system provides user accounts in your operating system to determine and manage
the different kinds of users in one computer. This is to ensure the security and privacy of each user who
will use the computer.

To open the user accounts:

1. Go to Control Panel.

2. Look for "User Accounts"User accounts icon or category

3. In the User Accounts window, you will see tasks that you can do with your account.

To edit your account:

1. Open User Accounts in the control panel.

2. In the Pick a task, select Change an account.

3. Pick an account to change.

You may find different kinds of accounts, as follows:

1. Computer administrator - controls all the contents and users of the Computer, installs programs,
adds, and deletes users.

2. Limited account- has limited control and only have access to his/her particular account.

3. Guest- accounts created for transient users and do not have access to the other computer accounts
and their content.

Once you are in the account, you can pick any change that you like:

1. Change my account name - If you want to change your name displayedin your account.

2. Create a password -Provides security to new accounts or accountswithout existing password.

3. Change my password- Gives security to your account by changingapreviously created password.

4. Remove my password - You may remove an existing password if youdecide to do so.


5. Change my picture -You can change your picture displayed beside yourname.

6. Change my account type - You can set an account either as Computer Administrator or Limited.

Creating a New Password

Creating a new password requires you to have a user name first. once that is created, click on Create a
password and a dialog box will appear and will require you to type in a new password and retype it to
confirm on the next line. You will be asked to type a word or phrase to help you remember your
password in case you forget it later on. When creating a password, be aware that it is case sensitive, this
means that letters that are capital or small must be typed as they are when you enter them the first
time. Otherwise, you will not be able to open the computer using your account name.

Creating a Secure Password

The password that you create should be at least eight characters which could be a Combination of
uppercase and lowercase letters, symbols, and numbers. A secure password ideally should not be a real
word that anyone can easily guess. Make Sure

to remember the password by writing it and keeping it in a safe place or creating password hint.

Changing Passwords

Click the User Account icon from the control panel (Category view) and then select Change an account.
You will be prompted to Pick an account to change. You can create or change a password on an existing
account; otherwise, create a new account and a password for that new account. Assuming you are the
administrator and want to change your password, click on your account. You will be asked What do you
want to change about your account? Select the Change my password to change the existing password. A
dialog box will appear and require you to enter the current password and then the new password should
be typed twice on the space provided. Click Change Password, when you are done, otherwise, press
Cancel if you wish to discontinue.

Creating a Good Password Hint

There is a very big possibility that you will forget your password if you do not use your account very
often. In this situation, it is helpful that you create a password hint that will be easily remembered and
one that is meaningful to you. However, be aware that your password hint will also be visible to others
who will use your Computer.

Remembering and Recovering Passwords

Whenever you forget your password, check on the hint you have created. Thepassword hint is found on
the Welcome screen beside the password prompt. If you still could not remember your password, and
you have created a password reset disk, you can use that disk to log on and create a new password. If
the above steps are not available and have not helped you, then ask the computer administrator
tocreate a new password for you.

Screen Saver Security

Most operating systems has a feature that allows you to lock the computer even when the computer is
in a screen saver mode. This means that, even if your computer is open, no one will be able to access
your computer account from a Screen saver mode.

Security Center

The Security Center of Windows is the place where you can set additional protectionfrom threat to your
computer, especially when using the Internet. There are threeimportant security settings available;
Firewall, Automatic Updates, and VirusProtection.

1. Firewall helps in protecting your computer from unauthorized entries, viruses, or worms from the
Internet or network. It is recommended that you keep this setting turned on. Windows Firewall,
however, allows some exception to programs and services that helps some application programs to
work better, as well as sites thatyou trust. A selection box which says Don't allow exceptions is available.
Whenthis box is checked, all incoming programs will be blocked. This is important when you are
connected on a public Wi-Fi Internet connection where security is less secure.

2. Automatic Updates is another feature of Windows which when turned on willautomatically download
updates from Microsoft Windows website. Many of theupdates coming from Microsoft are usually
meant to update some Windows feature, secure areas of vulnerability, fix any bugs in the operating
system, and others.

3. Virus Protection is usually about the current antivirus software installed in your computer; this option
is recommended to be turned on always. Antivirus software is meant to locate, find, and remove virus
threats that are already in your computer.It also prevents other malware (malicious software) from
gaining entry into your computer. Antivirus program should be constantly updated to ensure that its
Anti-virus definition is current.

When you open the antivirus program, you will see settings and prompts that you can adjust, activate,
and fix. In the Antivirus window below, you will find the length of subscription, protection status, last
date it was updated, and the last time the Computer was scanned. There is also a summary report or
logs for all security activities. If you are always using the internet, it is recommended that you install the
Antivirus with Internet Security; it has lots of PC protection aside from the Antivirus packed into it.

Online Ethics and Etiquette


Guidelines and rules are needed in the appropriate use of computer technology.There are both
advantages and disadvantages in the use of computers. The Ten Commandments of Computer Ethics is
meant as a guide to the right attitude when using the computer.

The Ten Commandments of Computer Ethics was written by Dr. Ramon C. Barquin in 1992 for the
Computer Ethics Institute. He wrote a paper entitled "In Pursuit of a Ten Commandments for Computer
Ethics". Ramon C. Barquin stated that it is a means to create a set of standards to guide and instruct
people on the ethical use of computers. The Ten Commandments of Computer Ethics copies the style of
the Ten Commandments from the Bible which use "thou shalt" and "thou shalt not" style ofwriting.

The Commandments for Computer Ethics

1. Thou shalt not use a computer to harm other people.

2.Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not use or copy software for which you have not paid.

7. Thou shalt not use other people's computer resources without authorization.

8 Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you write.

10. Thou shalt use a computer in ways that show consideration and respect.

You might also like