Thursday, January 21, 2010

Blog 4c

F0H5 10 – Internet Safety

BLOG 4c: Internet Defences

Section 1: With-holding Personal Information

What techniques could you use to with-hold personal information?

Explain each one.

You can with-hold your personal information by not telling anybody you’re first or second name, you can instead tell the people on the internet a nickname instead of your real name.

You can also with-hold your personal details by making sure you buy off legitimate websites so they wont steal your bank details. You can do this by making sure there is a little padlock on the right hand side of the screen, and has “https://” at the beginning of the web address.

You should never put any of your personal information in a website link that was sent over the internet, this may send your details away. A legitimate bank will not ask for any details as they will already have it.

Section 2: Real and Spoof/phishing email messages

How can you tell the difference between a phishing email and a real email?

You can tell the difference by the word choices they use, if the grammar is bad then it might by spoof email and if it has good grammar it could be a genuine email.

You can also tell whether it is genuine or not by the Graphic used in the email, there might be slight differences with the original graphic used by the company and the one used by the spoof email.

Thursday, December 3, 2009

blog 5

1. www.youtube.com can have music on their site and is free.

www.last.fm is an online music radio and you cant download the music off it.

http://new.music.yahoo.com is a new and free and has music on their website to stream on your computer.

2. www.napster.co.uk Napster is a paid service when you pay £5 and you get 5 songs to keep and 8 million songs to listen to.

http://mp3.rhapsody.com/home.html is another paid service. You pay for each album.

www.eMusic.com is a website where you pay a monthly service and you get to listen to music and get to keep a few.

3. Downloading music off of illegal websites is a breach of copyright and is punishable by law. It also makes your computer vulnerable to different types of viruses and spy-ware.

Thursday, November 26, 2009

IT Acceptable use policy for students:

Introduction:

An acceptable use policy is a set of rules and regulations that students must agree to and abide by to use the student network. If you choose to break these rules and regulations it may result in disciplinary action.

  1. You are not allowed to be using computers for your personal use if people are waiting for a computer to become available.

  1. The following is not allowed to be used on computers

    • Downloading Illegal Material
    • Grooming
    • Cyber bullying
    • Scamming People
    • Threatening people
    • Identity theft

4. When using emails you must not

· Send emails to people that you don’t know

· Send Threating messages to other people

· Use bad language when online

· Send Illegal Music through email.

· You must not attempted to mail bomb a website for example sending lots and lots of emails to one website and making there computer crash.

5. Downloading Files

When using the computer you should not download illegal music and software on to a computer if you do this you are breaking the law and could get into trouble for doing this.

6. Behaviour

You should not use the computer to hack on to other peoples Files or to get there personal details. You should never threat any one or say something that some might find not nice. You must never take indecent pictures and put them up online.

7. Using the internet

When you are using the internet you must remember that other people are on the internet as well you should not Downloading Illegal Material like for example download illegal music and software. Say something nasty on a Social networking site that might upset other users when online.

8. Breach of Internet Use Policy

If you fail to keep to this policy this may result that you may be stopped from using certain things on the internet. You will also be breaking the law and this may result in disciplinary action.

Thursday, November 12, 2009

I have learned a lot about downloading files and what I should avoid and the alternatives. Many people download illegal files off the internet, most of them are Music and films; these are downloaded and shared using P2P Software such as Kazaa, Limewire and online torrents. Almost everything on the internet is copyrighted and shouldn’t be downloaded without their consent. There is an alternative out there for downloading music such as Online Stores like Napster, iTunes and Amazon. Napster got shut down for allowing its users to download music illegally and without paying, and it has now come back as legal download software.

F0H5 10 – Internet Safety

BLOG 3: Internet Defences

Section 1: Content Filtering Software

1. In your own words, explain what content filtering software is.

Filtering software is where the administrator blocks inappropriate websites from being seen in some organisations.

2. Using an Internet search engine, find 3 different content filtering software, and answer the following questions:

a) What are the names of the 3 content filtering software you have chosen? (Also give the web address of the software).

Net Nanny Parental Controls. www.hermanstreet.com

Safe Eyes 2009 www.internetsafety.com

CyberSitter www.hermanstreet.com

b) Which of the 3 do you think is best?

Net Nanny

c) Why?

Because, it is easy to use, easy to install which makes it good for home users. It also supports ME, XP, Vista and Windows 7. The other two Filters are good they lack the ease of use and installation. Net Nanny is also the Cheapest.

Section 2: Proxy server solutions

1. In your own words, explain what a proxy server is.

A Proxy Server allows you to access web pages without communicating with them directly. Some people use Web Proxy to bypass a Blacklist of inappropriate web sites. Big Organisations use Proxy Servers to collect all of the IP addresses for each computer in the organisation.

2. Using an Internet search engine, find 3 different proxy servers, and answer the following questions:

a) What are the names of the servers? (Give the web addresses as well).

Real Hide IP 3.5.2.6 http://www.real-hide-ip.com

Hide The IP 2009 2.7 http://www.hide-the-ip.com

Smart Hide http://www.smarthide.com/

b) Which of the 3 do you think is best?

I think Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

c) Why?

Hide The IP 2009 is the best because it is easy to use and simple.
It hides your IP address as it says on the tin.

Section 3: Passwords and Password Security

In your own words explain what makes a good, secure password. Make up 3 examples of secure passwords. A Secure Password must have symbols letters and numbers. Ch£$$£YM0NK£Y, B££PL33R, C00LGl4$$3S

Section 4: Backup and Restoring Data

1. In your own words explain what backing up and restoring data is.

Backing up data is when you either create a restore point in windows so you could restore it if something went wrong, or you can create a disk image of your PC on Disk, and big companies use expensive hardware to back up data.

2. Why is it useful?

It is useful incase something goes wrong and you need to restore your PC to the way it was in the past.

Thursday, November 5, 2009

BLOG3

F0H5 10 – Internet Safety

BLOG 3: Review of Internet Threats

In your own words, explain how you would protect yourself from the following:

Phishing

You should never click on links that you think is not your bank and should also use the latest email clients to block off such spam. You can also adjust your web browser to tighten up security if you use web based email clients. Also having an internet security suite should prevent it too.

Identity Theft

The best way to prevent identity theft is to check monthly statements. If you shred all your statements then no one can see your bank details. Also, use a Credit Card online as it is a lot safer then using a Debit Card. Do not fill in details about your credit card or debit cards on online sites as they might Pharm for your details.

Hackers

Have a Good Firewall and Anti-Virus and scan your pc weekly using the anti-virus program

Cyberbullying

Block the Bully on the social networking sites and report them to either the police or to the social networking site.

Grooming

Do not give away any information about where you live and how old you are and so on… If you have told Internet Groomer this information, report it to the police ASAP!

Thursday, October 29, 2009

Cyber Bullying and Internet Grooming.

CyberBullying is when the bully uses internet services such as MSN, Bebo and Facebook. CyberBullying is a Criminal Offence and punishable by Law. CyberBullying can also happen on mobile phones using the SMS feature. There is also alot of websites trying to put out this new way of Bullying. Sometimes they also make hate websites for one person and this can cause bigotry and racism. CyberBullying is when the Bully constantly tries to annoy, upset or embarress the victim on internet services such as MSN and Bebo.

Internet Grooming is a serious problem on the internet. This is mainly aimed at younger people. The Groomer wont tell anybody much information about himself and sometimes even pretend to be someone else and younger. The aim of this is for the groomer to collect as much information about them as possible and try to be friends with them and eventually meet them in person, this is normally when the illegal activity happens, usually of sexual nature.