You are on page 1of 14

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES

Sto. Tomas, Batangas

The Intrusive Internet


Serious Internet Problems

By
Ginalyn B. Panghulan, Ph.D.
Overview
• This lesson is about the intrusive internet
or also known as “serious internet
problems” that are common nowadays.

• Topic covers: snooping, spamming,


spoofing, phishing, pharming, cookies, &
spyware.
Objectives
• This lesson aims to orient students with
the serious internet problems. It also gives
them insights to deal with those internet
problems to be able to communicate
effectively and efficiently through the use
of modern communication technologies.
Activities
• PPT about:
1.Snooping
2.Spamming
3.Spoofing
4.Phishing
5.Pharming
6.Cookies
7.Spyware
Snooping on your e-mail.

• Your messages are open to anyone even if


you delete your emails, they are not
"gone." And they are not private.
• To guard against this, you can use
software such as Spytech Eradicator and
Webroot's Window Washer to completely
eliminate files.
Spam: Electronic Junk Mail

• Junk mail is an unwanted mail, called


spam.
• Spam refers to unsolicited email, or junk
mail, in the form of advertising or chain
letters.
• To better manage spam, some users get
two email boxes.
Spoofing: Using fake email
sender names
• Spoofing is the forgery of an email sender
name so that the message appears to have
originated from someone or somewhere
other than the actual source.
• Spoofing is one of the main tactics used by
spammers (and virus writers) to induce or
trick recipients into opening and perhaps
responding to their solicitations.
Phishing: Using trusted
institutional names to elicit
confidential information
• Phishing is the sending of a forged email that
directs recipients to a replica of an existing
web page, both of which pretend to belong to
a legitimate company.
• The purpose is to "phish" for, or entice
people to share their personal, financial or
password data.
• Trusted names include Citibank, eBay, Best
Buy.
Pharming: Redirecting you to
an Impostor Web Page
• Pharming is a newer kind of phishing that is
harder to detect.
• In pharming, thieves implant mallicious
software on a victim's computer that
redirects the user to an impostor web page
even when the individual types the correct
address to his or her browser.
Cookies: Convenience or
Hindrance?
• Cookies are little text files such as your
log-in name, password, and preferences-
left on your hard disk by some websites
you visit.
• Cookies can make some internet processes
go faster, but they can also be used by
companies to track your internet use and
your personal information.
Spyware: Adware, Browser & Search
Hijackers, & Key Loggers (Intruders
to track your habits & Steal your
data)
• Pop-ups ads is a form of online advertising in
which when you visit certain websites, a
new window opens or pop ups to display
advertisements.
• Spyware is a deceptive software that is
surreptiously installed on a computer via
the web; once installed in your hard disk, it
allows outsider to gather confidential
information without your knowledge.
Common Forms of Spyware:
• Adware or Pop Up Generators track web
surfing or online buying so that marketers
can send you targeted and unsolicited
pop-up and other ads.
• Browser Hijackers & Search Hijackers
change your browser without your
knowledge & intercept your legitimate
search requests made to real search
engines and return results from phony
search services designed to send you to
sites they run.
cont. Common Forms of Spyware
• Key Loggers or Keystroke loggers record
each character you type and transmit that
information to someone else on the
internet making it possible for strangers to
learn your passwords and other
information.
Some Anti-spyware Programs
Program Name Site
• Ad-Aware www.lavasoft.com/
• AntiSpyware http://us.mcafee.com
• ca Technologies www.pestpatrol.com
• PC Tools www.pctools.com/simple/
• Pest Patrol www.ca.com/products/pestpatrol
• Spybot Search & Destroy
http://spywaresoftware.net

You might also like