By Ginalyn B. Panghulan, Ph.D. Overview • This lesson is about the intrusive internet or also known as “serious internet problems” that are common nowadays.
• Topic covers: snooping, spamming,
spoofing, phishing, pharming, cookies, & spyware. Objectives • This lesson aims to orient students with the serious internet problems. It also gives them insights to deal with those internet problems to be able to communicate effectively and efficiently through the use of modern communication technologies. Activities • PPT about: 1.Snooping 2.Spamming 3.Spoofing 4.Phishing 5.Pharming 6.Cookies 7.Spyware Snooping on your e-mail.
• Your messages are open to anyone even if
you delete your emails, they are not "gone." And they are not private. • To guard against this, you can use software such as Spytech Eradicator and Webroot's Window Washer to completely eliminate files. Spam: Electronic Junk Mail
• Junk mail is an unwanted mail, called
spam. • Spam refers to unsolicited email, or junk mail, in the form of advertising or chain letters. • To better manage spam, some users get two email boxes. Spoofing: Using fake email sender names • Spoofing is the forgery of an email sender name so that the message appears to have originated from someone or somewhere other than the actual source. • Spoofing is one of the main tactics used by spammers (and virus writers) to induce or trick recipients into opening and perhaps responding to their solicitations. Phishing: Using trusted institutional names to elicit confidential information • Phishing is the sending of a forged email that directs recipients to a replica of an existing web page, both of which pretend to belong to a legitimate company. • The purpose is to "phish" for, or entice people to share their personal, financial or password data. • Trusted names include Citibank, eBay, Best Buy. Pharming: Redirecting you to an Impostor Web Page • Pharming is a newer kind of phishing that is harder to detect. • In pharming, thieves implant mallicious software on a victim's computer that redirects the user to an impostor web page even when the individual types the correct address to his or her browser. Cookies: Convenience or Hindrance? • Cookies are little text files such as your log-in name, password, and preferences- left on your hard disk by some websites you visit. • Cookies can make some internet processes go faster, but they can also be used by companies to track your internet use and your personal information. Spyware: Adware, Browser & Search Hijackers, & Key Loggers (Intruders to track your habits & Steal your data) • Pop-ups ads is a form of online advertising in which when you visit certain websites, a new window opens or pop ups to display advertisements. • Spyware is a deceptive software that is surreptiously installed on a computer via the web; once installed in your hard disk, it allows outsider to gather confidential information without your knowledge. Common Forms of Spyware: • Adware or Pop Up Generators track web surfing or online buying so that marketers can send you targeted and unsolicited pop-up and other ads. • Browser Hijackers & Search Hijackers change your browser without your knowledge & intercept your legitimate search requests made to real search engines and return results from phony search services designed to send you to sites they run. cont. Common Forms of Spyware • Key Loggers or Keystroke loggers record each character you type and transmit that information to someone else on the internet making it possible for strangers to learn your passwords and other information. Some Anti-spyware Programs Program Name Site • Ad-Aware www.lavasoft.com/ • AntiSpyware http://us.mcafee.com • ca Technologies www.pestpatrol.com • PC Tools www.pctools.com/simple/ • Pest Patrol www.ca.com/products/pestpatrol • Spybot Search & Destroy http://spywaresoftware.net