Hi Radha, Great peace of knowledge! On 7/18/12, Radha <[email protected]> wrote: > Raaj, and others , > kindly have a note: > attackers, understanding the risks will enable you to follow safe > computing procedures when using the Internet for everyday activities. > It is important for you to become aware of the types of people who > would invade your computer privacy. > > Hackers > > Hackers like the challenge of entering other computers and computer > systems; it is like a game to them. They don’t necessarily damage > information, but they break through secure computer networks and > browse through, or secretly look at, data. Some Internet security > professionals believe that most cases of browsing involve curiosity > with no malicious, or harmful, intent. This suggests that hackers are > more of a nuisance than a threat. In a court of law, however, > unintentional damage to another’s computer can be treated as a crime. > Also, recent studies in 2005 suggest that browsing is an exploratory > activity that in many instances leads to theft or attempted theft. > When hackers cross into this realm, they enter the world of the > “cracker.” > > Crackers > > Crackers are hackers who have criminal intentions. They work like > hackers except they look for weaknesses in software and computer > systems and use them for their own gain. They browse through and > tamper with, or harm, data or take information for negative purposes. > They browse through systems and networks to identify the available > information, its potential value, and how to steal the data. To steal > money, crackers figure out a computer’s file structure and locate > accounts that are most open to theft with low chances of discovery. > Also, crackers test password security to discover personal > authentication information. Personal authentication information allows > computers and networks to identify authorized users. > > Computer Virus Authors > > Computer virus authors write the programs that infect and damage > computer data and systems. Unfortunately, viruses are not difficult to > write and many resources, such as virus tool kits, are available on > the Internet. Experts in the antivirus field believe that only a few > virus authors have destructive goals. Most virus authors are teenagers > who want to show off to their peers or to the world. They write fairly > simple viruses or just copy and modify other well-known viruses. > > Many modern computer viruses or worms, which can copy themselves from > computer to computer, are polymorphic. This means that every copy > differs, and copies cannot be detected by searching a computer file > for specific text. Some malicious code can even disable, or shut off, > antivirus software, whose job is to identify and get rid of viruses > and other harmful software. Doing so is an unauthorized modification, > or unpermitted change, of the victim’s computer. Criminals who write > such malicious software are not playing a prank: they are designing a > crime. > > Hijackers > > Hijackers take unauthorized control of your Web browser (e.g., > Internet Explorer) and browsing experience. For example, say you > receive an email from an unknown person offering you something for > free. You click on the link for the free offer, but nothing happens. > The next time you open your browser, however, you find yourself at a > vendor’s Web site rather than the Web page you usually see, or your > home page. The deceptive link that you clicked on was a hijacker’s > malicious attempt to change your browser’s home page settings to a > vendor’s Web site. Marketers and advertisers use this method > frequently. > > Spies > > Spies hack into secure sites to discover secrets about their friends, > enemies, and competitors. Spies can steal anything from personal > documents to financial information. Internet service providers, which > provide Internet services such as Internet connection, email, and Web > sites, conducted recent studies about spies in 2005. According to > these studies, as many as one out of three personal computers (PCs) > could contain spyware. > > Spyware is technology that secretly records sensitive personal > information on other computers and sends it back to the creator of the > spyware. The information is then sent to advertisers or other > interested parties. Often, spyware is installed without the computer > user’s consent, as when the user clicks an option in a deceptive > pop-up advertisement window on the Web. > > Scammers > > Scammers commit computer crimes that deal with money and fraud. > Scammers use the Internet to commit different types of fraud every > day. Such criminals ask computer users for bank account information > and cash payments, and they promise the users something great in > return. For example, scammers may claim they need to move a large > amount of money out of a particular country and into your account. In > return for using your account, they promise that you would keep some > of that money. If an offer appears too fantastic, it probably is a > scam. Never give personal information, such as bank account numbers > and passwords, over the Internet. > > Cyberstalkers and Harassers > > Cyberstalkers and harassers use information technology to bother, > threaten, or try to scare a victim continually over time. > Cyberstalkers, like other criminals, are opportunists: they know what > they are looking for and how to get it. The behavior of cyberstalkers > and harrassers may include, but is not limited to > > •threats and false accusations > > •identity theft > > •data theft > > •damage to data or equipment > > •the solicitation of minors, or using of children and teenagers, for > illegal purposes > Often cyberstalkers and harassers are driven by revenge, hatred, > anger, jealousy, obsession, or mental illness; they want to frighten > or embarrass their victim. On the Internet, a cyberstalker can harass > a victim in various ways without leaving home or having any witnesses > to the incident: > > •posting comments on Internet message boards to upset the victim or > cause others to harass the victim > > •sending a constant stream of emails and instant messages to the > victim or the victim’s coworkers, friends, or family > > •sending hateful or rude communications to the victim’s boss, family, > friends, or significant other (in the victim’s own name, pretending to > be the victim) > > •hacking into and taking over the victim’s computer or email accounts, > or changing the password and locking the victim out of his or her own > accounts > > •signing the victim up for unwanted spam or questionable offers > > and the type of virus or worms may hit your computer even if you visit > a highly protected sites. > but the knowns to avoid are: > Trojan horse > > a destructive program that hides under a false image, such as a game, > waiting for an unsuspecting person to activate it > > worm > > a computer program that can copy itself from computer to computer and > infect other computer networks > But beware! You have just connected your computer to the Internet with > very little or no protection. Recent studies have shown that your > computer likely will be infected with a harmful piece of software > within the first twenty-four hours of unprotected Internet connection. > Whether a virus, worm, Trojan horse, spyware, or hacker, something or > someone wants to infect your new machine. > > It is a fact that the Internet is not a safe place to connect your computer > . > Are we going to avoid internet? never, so let us avoid being ttrapped, . > just keep in mind, the following. > •Worms constantly scan for unprotected computers to infect. > > •Trojan horses pretending to be helpful programs actually install > malicious ones. > > •Spyware secretly reports your activities back to its maker. > > •Hijackers take unauthorized control of your Web browser and browsing > experience. > Understanding how your computer can become infected and what to avoid > when using the Internet is the most important step in keeping your > computer clean and secure. > anyway, happy surfing! > > On 7/18/12, Sheik mohammedali <[email protected]> wrote: >> Howdy people! Indeed you do not have to scared of spamming!. Scammers, >> spammers and hackers are utterly different! Spammers will annoy >> you,Scammers >> will try to deceive you and where as hackers try to highjock your >> accounts. >> If you are aware of these things noone will be able to touch you! At the >> upper side you might feel that they aren't being taken care meticulously? >> If so, this is your invalid assumption!. The panel of the moderator is >> actively monitoring those unwanted activities and they are being booted >> immediately ☺!. You know? I'm rather scared of access India! ☺ ☺ ☺? >> >> -----Original Message----- >> From: [email protected] >> [mailto:[email protected]] On Behalf Of Raaj >> Sent: Tuesday, July 17, 2012 10:03 PM >> To: [email protected] >> Subject: Re: [AI] Books uploaded on IP >> >> I'm scared of that inclusive plannet. >> >> spammers a lots, they say. >> ----- Original Message ----- >> From: "Radha" <[email protected]> >> To: <[email protected]> >> Sent: Tuesday, July 17, 2012 10:00 PM >> Subject: Re: [AI] Books uploaded on IP >> >> >>>i can get only very few, please check inclusive planet. >>> disclosed >>> rationalism in politics and other essays- oakeshott >>> rule of law- ideal or ideology >>> political theology- schmitt >>> homo sacer- agamben >>> ENGLISH CONSTITUTION- BAGEHOT >>> constitutional justice- dyzenhaus >>> weak courts strong rights- tushnet >>> the state democracy and anti terror legislations in india- ujwal kumar >>> singh >>> the jurisprudence of emergency- hussain >>> the indian supreme court and politics- baxi >>> laws of the postcolonial >>> law from anarchy to utopia- singh >>> fates of political liberalism in the british post colony- some chapters >>> emergency powers- omar >>> an introduction to the laws of the constitution1 >>> the fragility of goodness- nussbaum2 >>> and many more..... >>> many thanks for your sharing Moiz >>> >>> On 7/17/12, Ketan Kothari <[email protected]> wrote: >>>> Dear Mois, >>>> >>>> Please name a few. Any political memoirs or so? >>>> >>>> -----Original Message----- >>>> From: moiz tundawala >>>> Sent: Tuesday, July 17, 2012 9:31 PM >>>> To: accessindia >>>> Subject: [AI] Books uploaded on IP >>>> >>>> All, >>>> I wrote to tell you that I frequently upload the books I get the time >>>> to scan on IP. If you are particularly interested in public law and/or >>>> politics, do check my collection. Just uploaded more than 40 books a >>>> few minutes back. >>>> Hope these help. >>>> Best, >>>> Moiz. >>>> >>>> >>>> Search for old postings at: >>>> http://www.mail-archive.com/[email protected]/ >>>> >>>> To unsubscribe send a message to >>>> [email protected] >>>> with the subject unsubscribe. >>>> >>>> To change your subscription to digest mode or make any other changes, >>>> please >>>> >>>> visit the list home page at >>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >>>> >>>> >>>> >>>> Search for old postings at: >>>> http://www.mail-archive.com/[email protected]/ >>>> >>>> To unsubscribe send a message to >>>> [email protected] >>>> with the subject unsubscribe. >>>> >>>> To change your subscription to digest mode or make any other changes, >>>> please >>>> visit the list home page at >>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >>>> >>>> >>> >>> >>> -- >>> Cheers, >>> Radha >>> Never give up until your dreams are reached, keep dreaming then. >>> >>> >>> Search for old postings at: >>> http://www.mail-archive.com/[email protected]/ >>> >>> To unsubscribe send a message to >>> [email protected] >>> with the subject unsubscribe. >>> >>> To change your subscription to digest mode or make any other changes, >>> please visit the list home page at >>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >>> >> >> >> >> Search for old postings at: >> http://www.mail-archive.com/[email protected]/ >> >> To unsubscribe send a message to >> [email protected] >> with the subject unsubscribe. >> >> To change your subscription to digest mode or make any other changes, >> please >> visit the list home page at >> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >> >> >> >> Search for old postings at: >> http://www.mail-archive.com/[email protected]/ >> >> To unsubscribe send a message to >> [email protected] >> with the subject unsubscribe. >> >> To change your subscription to digest mode or make any other changes, >> please >> visit the list home page at >> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in >> >> > > > -- > Cheers, > Radha > Never give up until your dreams are reached, keep dreaming then. > > > Search for old postings at: > http://www.mail-archive.com/[email protected]/ > > To unsubscribe send a message to > [email protected] > with the subject unsubscribe. > > To change your subscription to digest mode or make any other changes, please > visit the list home page at > http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in > >
Search for old postings at: http://www.mail-archive.com/[email protected]/ To unsubscribe send a message to [email protected] with the subject unsubscribe. To change your subscription to digest mode or make any other changes, please visit the list home page at http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
