Saturday, October 25, 2014

Cyber bulliying #10

Cyber bullying is bullying that takes place using electronic technology. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles.When cyberbullying happens, it is important to document and report the behaviour so it can be addressed.

How to stay safe using a public computer (Tips) #9

  • Avoid saving private information such as usernames and passwords
  • Don't leave the computer unattended while logged in
  • Clear your browsing data when you are about to leave
  • Watch out for people looking over your shoulder

How to Avoid Scams ? #8

Be cautious of the internet. Avoid misleading ads, strangers with offers, strange e-mails, and questionable websites. Do research to verify the validity of these offers. If someone you know is sending you messages that don’t seem like themselves, their account may have been taken over by somebody trying to get information out of you.The best way to avoid scams is to be fully informed of the deal. 

Here are some questions you should ask yourself when are creating an account etc..: 


  • How exactly does the offer work?
  • How trustworthy is the person/company making the offer?
  • What was the experience for other users regarding the same offer?
  • Is the offer too good to be true?
  • Does the offer require payment in advanced?
  • Are there hidden costs unknown to the user?
  • Are there any reviews about this offer? 
  • Stay Safe Online (Tips) #7


    Phishing #6

    Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user. Phishing emails are blindly sent to thousands, if not millions of recipients. By spamming large groups of people, the "phisher" counts on the email being read by a percentage of people who actually have an account with the legitimate company being spoofed in the email and corresponding webpage. 

    Internet Scams #5

    Internet Scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more. Internet scams is the easiest way to hack into a device and get all your personal information. If you get a virus you should immediately do something about it or it will cause a lot of trouble. 

    Password tips #4

    Passwords are often created to keep personal information and property secure.One common way that passwords may be compromised is through repeated guessing.Weak passwords make this process easier, so it is important that passwords be strong. 

    A strong password may contain the following :
    • At least 10 characters
    • Both upper and lower case letters
    • Numbers
    • Symbols (if allowed)
    • Does not contain dictionary words.
    • Does not have your name in it 
    • Each account should have a different password to reduce getting hacked 
    • Don't use old passwords