Hi Radha, Great peace of knowledge!

On 7/18/12, Radha <[email protected]> wrote:
> Raaj, and others ,
> kindly have a  note:
> attackers, understanding the risks will enable you to follow safe
> computing procedures when using the Internet for everyday activities.
> It is important for you to become aware of the types of people who
> would invade your computer privacy.
>
> Hackers
>
> Hackers like the challenge of entering other computers and computer
> systems; it is like a game to them. They don’t necessarily damage
> information, but they break through secure computer networks and
> browse through, or secretly look at, data. Some Internet security
> professionals believe that most cases of browsing involve curiosity
> with no malicious, or harmful, intent. This suggests that hackers are
> more of a nuisance than a threat. In a court of law, however,
> unintentional damage to another’s computer can be treated as a crime.
> Also, recent studies in 2005 suggest that browsing is an exploratory
> activity that in many instances leads to theft or attempted theft.
> When hackers cross into this realm, they enter the world of the
> “cracker.”
>
> Crackers
>
> Crackers are hackers who have criminal intentions. They work like
> hackers except they look for weaknesses in software and computer
> systems and use them for their own gain. They browse through and
> tamper with, or harm, data or take information for negative purposes.
> They browse through systems and networks to identify the available
> information, its potential value, and how to steal the data. To steal
> money, crackers figure out a computer’s file structure and locate
> accounts that are most open to theft with low chances of discovery.
> Also, crackers test password security to discover personal
> authentication information. Personal authentication information allows
> computers and networks to identify authorized users.
>
> Computer Virus Authors
>
> Computer virus authors write the programs that infect and damage
> computer data and systems. Unfortunately, viruses are not difficult to
> write and many resources, such as virus tool kits, are available on
> the Internet. Experts in the antivirus field believe that only a few
> virus authors have destructive goals. Most virus authors are teenagers
> who want to show off to their peers or to the world. They write fairly
> simple viruses or just copy and modify other well-known viruses.
>
> Many modern computer viruses or worms, which can copy themselves from
> computer to computer, are polymorphic. This means that every copy
> differs, and copies cannot be detected by searching a computer file
> for specific text. Some malicious code can even disable, or shut off,
> antivirus software, whose job is to identify and get rid of viruses
> and other harmful software. Doing so is an unauthorized modification,
> or unpermitted change, of the victim’s computer. Criminals who write
> such malicious software are not playing a prank: they are designing a
> crime.
>
> Hijackers
>
> Hijackers take unauthorized control of your Web browser (e.g.,
> Internet Explorer) and browsing experience. For example, say you
> receive an email from an unknown person offering you something for
> free. You click on the link for the free offer, but nothing happens.
> The next time you open your browser, however, you find yourself at a
> vendor’s Web site rather than the Web page you usually see, or your
> home page. The deceptive link that you clicked on was a hijacker’s
> malicious attempt to change your browser’s home page settings to a
> vendor’s Web site. Marketers and advertisers use this method
> frequently.
>
> Spies
>
> Spies hack into secure sites to discover secrets about their friends,
> enemies, and competitors. Spies can steal anything from personal
> documents to financial information. Internet service providers, which
> provide Internet services such as Internet connection, email, and Web
> sites, conducted recent studies about spies in 2005. According to
> these studies, as many as one out of three personal computers (PCs)
> could contain spyware.
>
> Spyware is technology that secretly records sensitive personal
> information on other computers and sends it back to the creator of the
> spyware. The information is then sent to advertisers or other
> interested parties. Often, spyware is installed without the computer
> user’s consent, as when the user clicks an option in a deceptive
> pop-up advertisement window on the Web.
>
> Scammers
>
> Scammers commit computer crimes that deal with money and fraud.
> Scammers use the Internet to commit different types of fraud every
> day. Such criminals ask computer users for bank account information
> and cash payments, and they promise the users something great in
> return. For example, scammers may claim they need to move a large
> amount of money out of a particular country and into your account. In
> return for using your account, they promise that you would keep some
> of that money. If an offer appears too fantastic, it probably is a
> scam. Never give personal information, such as bank account numbers
> and passwords, over the Internet.
>
> Cyberstalkers and Harassers
>
> Cyberstalkers and harassers use information technology to bother,
> threaten, or try to scare a victim continually over time.
> Cyberstalkers, like other criminals, are opportunists: they know what
> they are looking for and how to get it. The behavior of cyberstalkers
> and harrassers may include, but is not limited to
>
> •threats and false accusations
>
> •identity theft
>
> •data theft
>
> •damage to data or equipment
>
> •the solicitation of minors, or using of children and teenagers, for
> illegal purposes
> Often cyberstalkers and harassers are driven by revenge, hatred,
> anger, jealousy, obsession, or mental illness; they want to frighten
> or embarrass their victim. On the Internet, a cyberstalker can harass
> a victim in various ways without leaving home or having any witnesses
> to the incident:
>
> •posting comments on Internet message boards to upset the victim or
> cause others to harass the victim
>
> •sending a constant stream of emails and instant messages to the
> victim or the victim’s coworkers, friends, or family
>
> •sending hateful or rude communications to the victim’s boss, family,
> friends, or significant other (in the victim’s own name, pretending to
> be the victim)
>
> •hacking into and taking over the victim’s computer or email accounts,
> or changing the password and locking the victim out of his or her own
> accounts
>
> •signing the victim up for unwanted spam or questionable offers
>
> and the type of virus or worms may hit your computer even if you visit
> a  highly protected sites.
> but the knowns to avoid are:
> Trojan horse
>
> a destructive program that hides under a false image, such as a game,
> waiting for an unsuspecting person to activate it
>
> worm
>
> a computer program that can copy itself from computer to computer and
> infect other computer networks
> But beware! You have just connected your computer to the Internet with
> very little or no protection. Recent studies have shown that your
> computer likely will be infected with a harmful piece of software
> within the first twenty-four hours of unprotected Internet connection.
> Whether a virus, worm, Trojan horse, spyware, or hacker, something or
> someone wants to infect your new machine.
>
> It is a fact that the Internet is not a safe place to connect your computer
> .
> Are we going to avoid internet? never, so let us avoid being ttrapped, .
> just keep in mind, the following.
> •Worms constantly scan for unprotected computers to infect.
>
> •Trojan horses pretending to be helpful programs actually install
> malicious ones.
>
> •Spyware secretly reports your activities back to its maker.
>
> •Hijackers take unauthorized control of your Web browser and browsing
> experience.
> Understanding how your computer can become infected and what to avoid
> when using the Internet is the most important step in keeping your
> computer clean and secure.
> anyway, happy surfing!
>
> On 7/18/12, Sheik mohammedali <[email protected]> wrote:
>> Howdy people! Indeed you do not have to scared of spamming!.  Scammers,
>> spammers and hackers are utterly different! Spammers will annoy
>> you,Scammers
>> will try to deceive you and where as hackers try to highjock your
>> accounts.
>> If you are aware of these things noone will be able to touch you! At the
>> upper side you might feel that they aren't being taken care  meticulously?
>> If so, this is your invalid assumption!.  The panel of the moderator is
>> actively monitoring those unwanted activities and they are being booted
>> immediately ☺!.  You know? I'm rather scared of access India! ☺ ☺ ☺?
>>
>> -----Original Message-----
>> From: [email protected]
>> [mailto:[email protected]] On Behalf Of Raaj
>> Sent: Tuesday, July 17, 2012 10:03 PM
>> To: [email protected]
>> Subject: Re: [AI] Books uploaded on IP
>>
>> I'm scared of that inclusive plannet.
>>
>> spammers a lots, they say.
>> ----- Original Message -----
>> From: "Radha" <[email protected]>
>> To: <[email protected]>
>> Sent: Tuesday, July 17, 2012 10:00 PM
>> Subject: Re: [AI] Books uploaded on IP
>>
>>
>>>i  can get only very few, please check inclusive planet.
>>> disclosed
>>> rationalism in politics and other essays- oakeshott
>>> rule of law- ideal or ideology
>>> political theology- schmitt
>>> homo sacer- agamben
>>> ENGLISH CONSTITUTION- BAGEHOT
>>> constitutional justice- dyzenhaus
>>> weak courts strong rights- tushnet
>>> the state democracy and anti terror legislations in india- ujwal kumar
>>> singh
>>> the jurisprudence of emergency- hussain
>>> the indian supreme court and politics- baxi
>>> laws of the postcolonial
>>> law from anarchy to utopia- singh
>>> fates of political liberalism in the british post colony- some chapters
>>> emergency powers- omar
>>> an introduction to the laws of the constitution1
>>> the fragility of goodness- nussbaum2
>>> and many more.....
>>> many thanks for your sharing  Moiz
>>>
>>> On 7/17/12, Ketan Kothari <[email protected]> wrote:
>>>> Dear Mois,
>>>>
>>>> Please name a few.  Any political memoirs or so?
>>>>
>>>> -----Original Message-----
>>>> From: moiz tundawala
>>>> Sent: Tuesday, July 17, 2012 9:31 PM
>>>> To: accessindia
>>>> Subject: [AI] Books uploaded on IP
>>>>
>>>> All,
>>>> I wrote to tell you that I frequently upload the books I get the time
>>>> to scan on IP. If you are particularly interested in public law and/or
>>>> politics, do check my collection. Just uploaded more than 40 books a
>>>> few minutes back.
>>>> Hope these help.
>>>> Best,
>>>> Moiz.
>>>>
>>>>
>>>> Search for old postings at:
>>>> http://www.mail-archive.com/[email protected]/
>>>>
>>>> To unsubscribe send a message to
>>>> [email protected]
>>>> with the subject unsubscribe.
>>>>
>>>> To change your subscription to digest mode or make any other changes,
>>>> please
>>>>
>>>> visit the list home page at
>>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>>>
>>>>
>>>>
>>>> Search for old postings at:
>>>> http://www.mail-archive.com/[email protected]/
>>>>
>>>> To unsubscribe send a message to
>>>> [email protected]
>>>> with the subject unsubscribe.
>>>>
>>>> To change your subscription to digest mode or make any other changes,
>>>> please
>>>> visit the list home page at
>>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>>>
>>>>
>>>
>>>
>>> --
>>> Cheers,
>>> Radha
>>> Never give up  until your dreams are reached, keep dreaming  then.
>>>
>>>
>>> Search for old postings at:
>>> http://www.mail-archive.com/[email protected]/
>>>
>>> To unsubscribe send a message to
>>> [email protected]
>>> with the subject unsubscribe.
>>>
>>> To change your subscription to digest mode or make any other changes,
>>> please visit the list home page at
>>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>>
>>
>>
>>
>> Search for old postings at:
>> http://www.mail-archive.com/[email protected]/
>>
>> To unsubscribe send a message to
>> [email protected]
>> with the subject unsubscribe.
>>
>> To change your subscription to digest mode or make any other changes,
>> please
>> visit the list home page at
>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>
>>
>>
>> Search for old postings at:
>> http://www.mail-archive.com/[email protected]/
>>
>> To unsubscribe send a message to
>> [email protected]
>> with the subject unsubscribe.
>>
>> To change your subscription to digest mode or make any other changes,
>> please
>> visit the list home page at
>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>>
>>
>
>
> --
> Cheers,
> Radha
> Never give up  until your dreams are reached, keep dreaming  then.
>
>
> Search for old postings at:
> http://www.mail-archive.com/[email protected]/
>
> To unsubscribe send a message to
> [email protected]
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>


Search for old postings at:
http://www.mail-archive.com/[email protected]/

To unsubscribe send a message to
[email protected]
with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please 
visit the list home page at
http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in

Reply via email to