Rules in Netiquette


Online Safety and Security

The internet is define as the Information superhighway. This means that anyone has access to this highway, can place information, and can grab that information. It is also a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones.But it is one of the most dangerous places, especially if you do not know what you are doing with it.


Tips to Stay Safe Online

1)      Don’t post any personal information online – like your address, email address or mobile number.
2)      Think carefully before posting pictures or videos of yourself.  Once you’ve put  a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.
3)      Keep your privacy settings as high as possible.
4)      Never give out your passwords.
5)      Don’t befriend people you don’t know.
6)      Don’t meet up with people you’ve met online.  Speak to your parent or carer about people suggesting you do.
7)      Remember that not everyone online is who they say they are.
8)      Think carefully about what you say before you post something online.
9)      Respect other people’s views, even if you don’t agree with someone else’s views doesn’t mean you need to be rude.
10)   If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately.




 Internet Threats

Visit a social networking site and look for the site's privacy policy. The link is typically found at the bottom of the page and sometimes labeled only as "Privacy".

         


Virus

Virus is a program designed to copy itself and propagate, usually attaching itself to applications. It can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments.

Worms

A worm can be injected into a network by any types of means, like an USB stick or an email attachment. Email worm tends to send itself to all email addresses it finds on the infected PC. The email then appears to originate from the infected user, who may be on your trusted senders’ list, and catch you off guard.



Trojan 

It might appear harmless and even useful at first, but it leaves your PC unprotected, enabling hackers to steal sensitive information.

Spyware

Spyware is often secretly installed without users consent when a file is downloaded or a commercial pop-up is clicked. Spyware can reset your auto signature, monitor your keystrokes, scan, read and delete your files, access your applications and even reformat your hard drive. It constantly streams information back to the person that controls spyware.


Adware

This malware launches advertisements, mostly in the form of pop-ups. These are customized to you as a user, based on your behavior on the Internet, which may
be monitored by spyware.

Spam

Spam may be defined as unwanted emails. Most users are exposed to scam, which is more than 50% of all Internet emails. Though spam is not a direct threat, it can be used to send different kinds of malware. 


Phishing


This is the fraudulent acquiring of sensitive personal information such as passwords and credit card details. This is accomplished by sending official-looking emails impersonating a trustworthy sender. Users of online banking and auction sites are most likely to become a target.


Pharming

A more sophisticated form of phishing. By exploiting the DNS system, pharmers can create a fake website that looks like a real one for instance web bank page, and then collect the information users think they are giving to their real bank.


Keyloggers

Designed to record the user’s keystrokes. Keylogging allows criminals to look for particular bits of information that can be used for identity or intellectual property theft.
         

 Rogue security software

A special type of threat is software that claims to be security software. It tricks users that have installed it to pay a sum of money to be really protected (which they will not be). Most often it pretends to be antivirus and anti spyware programs.







Protecting Reputations Online 

In the past, doing something embarrassing was not much of a big deal. Nowadays, embarrassing moments are captured using any device you could imagine. What is worst is that people can easily upload it to the internet, where it can be stored forever.


Think before you click




Copyright infringement

 is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.


Know what copyrights protect.

Copyright law protects any original creation, and grants the holder of the copyright exclusive control over when, how, and by whom their work may be copied, distributed, or exhibited. This includes literary works, paintings, photographs, drawings, films, music (and its lyrics), choreography, sculptures and many other creative works.

Know what isn't protected. 


Copyright law generally does not protect the underlying ideas of a creative work, and it does not protect facts. For example, copyright doesn't prevent you from expressing in your own words ideas and facts found in a book or journal you read.


Don't confuse copyrights, trademarks, and other forms of "intellectual property.


" The term "intellectual property" itself has led to these very different things being confused with each other.


Learn about the public domain laws for your jurisdiction. 


"Public domain" is short-hand for  "uncopyrighted", not "publicly distributed". A work can be out of copyright due to age, by the nature of authorship, or other reasons. In the United States, all works authored by a federal government (not state government!) employee during the course of their official duties are public domain, as are all works published before 1923. Works first created in the European Union will usually be copyrighted until 70 years after the death of the author.


Online Research


Know what you’re looking for.


Begin your research by identifying specific topic areas you want to explore. Well-targeted keywords and search terms will deliver better results. Also, familiarizing yourself with the basic Boolean search techniques can help you narrow your search even more.

 Search a variety of resources. 

Your search results can vary depending on the search engine you use, so check a few out — Google, Bing, and Yahoo are the top three most used search engines. And don’t be afraid to seek out specific sources. Look into associations, research institutions, and journals that fit your subject area.
 Research until you feel like an “expert.”

It’s a writer’s job to understand and interpret a subject. To do this, you may have to research for hours, days, or even weeks until you fully wrap your head around a topic. Only then can you present that information in a way that makes sense to your readers.
 Scrutinize your sources.

Once you’ve put in the time to gather plenty of research, take time to evaluate it. Check your sources for credibility. If you feel uneasy about a source, see if you can find the same facts on a different, more credible site.

Always keep your eyes open. 

Research should be an ongoing process. Every once in a while you might stumble across information too good to pass up. Bookmark those pages, even if they have nothing to do with your current task. They could be the basis for your next piece.  

49 comments:

  1. Ma'am can you give us safety tips on how to avoid viruses in our computer?

    ReplyDelete
    Replies
    1. Here are some tips to avoid viruses on computers
      Protect your computer with strong security software and keep it updated. McAfee Total Protection provides proven PC protection from Trojans, hackers, and spyware. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work together to combat today’s advanced multi-faceted attacks. It scans disks, email attachments, files downloaded from the web, and documents generated by word processing and spreadsheet programs.
      Use a security conscious Internet service provider (ISP) that implements strong anti-spam and anti-phishing procedures. The SpamHaus organization lists the current top-10 worst ISPs in this category—consider this when making your choice.
      Enable automatic Windows updates, or download Microsoft updates regularly, to keep your operating system patched against known vulnerabilities. Install patches from other software manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.
      Use great caution when opening attachments. Configure your anti-virus software to automatically scan all email and instant message attachments. Make sure your email program doesn’t automatically open attachments or automatically render graphics, and ensure that the preview pane is turned off. Never open unsolicited emails, or attachments that you’re not expecting—even from people you know.
      Be careful when using P2P file sharing. Trojans hide within file-sharing programs waiting to be downloaded. Use the same precautions when downloading shared files that you do for email and instant messaging. Avoid downloading files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.
      Use security precautions for your PDA, cell phone, and Wi-Fi devices. Viruses and Trojans arrive as an email/IM attachment, are downloaded from the Internet, or are uploaded along with other data from a desktop. Cell phone viruses and mobile phishing attacks are in the beginning stages, but will become more common as more people access mobile multimedia services and Internet content directly from their phones. Mobile Anti-Virus software for a selected devices is available for free with some McAfee PC products. Always use a PIN code on your cell phone and never install or download mobile software from a un-trusted source.
      Configure your instant messaging application correctly. Make sure it does not open automatically when you fire up your computer.
      Beware of spam-based phishing schemes. Don’t click on links in emails or IM.
      Back up your files regularly and store the backups somewhere besides your PC. If you fall victim to a virus attack, you can recover photos, music, movies, and personal information like tax returns and bank statements.
      Stay aware of current virus news by checking sites like McAfee Labs Threat Center.

      Delete
  2. Mam AC, What is the top rank reason that causes viruses in computers?

    ReplyDelete
    Replies
    1. Hi Jolina :) The top rank reason that causes viruses on your computer are the following:

      -Accepting without reading
      While browsing the Internet, an Internet advertisement or window appears that says your computer is infected or that a unique plug-in is required. Without fully understanding what it is you're getting, you accept the prompt.
      When installing or updating a program, you're prompted (often check boxes already checked) if it's okay to install additional programs that you may not want or are designed to monitor your usage of the program.

      -Downloading any infected software
      When downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. Be sure to run your downloads through your antivirus and spyware scanners upon completion.

      -Opening e-mail attachments
      As a general rule, do not open e-mail you were not expecting to receive. Computers can become infected when users open e-mail attachments that contain malicious code. Even if the message is from a co-worker, friend, or family member, always use caution before opening a link or downloading an attachment.

      -Inserting or connecting an infected disk, disc, or drive
      Any disk, disc, or thumb drive connected or inserted into your computer can be infected with a virus. As long as something is writable, a virus can move from a computer to that disk, disc, or drive. A common tactic used by hackers to gain access to a network is by leaving out a thumb drive with malicious code on it. Then, when a user puts the thumb drive into their computer, it becomes infected with a virus or trojan horse.

      -Not running the latest updates
      Always keep your operating system and programs up to date. The plug-ins associated with your browser can also contain security vulnerabilities. To make sure you have the latest versions, run the Computer Hope tool to check installed plug-ins and their versions.

      -Pirating software, music, or movies
      -No antivirus spyware scanner

      Delete
  3. How can I avoid viruses even though I already install anti-virus?

    ReplyDelete
    Replies
    1. Hi Kat. Sadly, as far as I can tell, there is simply no “best” anti-virus or anti-malware package. Almost all of the name brands are good, but I’ve not run into one that really stands out above the crowd at detecting absolutely positively everything.
      In other words, no matter what anti-virus package you run, it may miss something. Different packages may miss different things, but there’s no single package that you can count on to catch everything. So it’s possible to still get infected even though your anti-malware tools are completely up-to-date.

      Delete
  4. Ma'am Ac, are there any viruses aside from the indicated viruses above? Can you list some? So that we can avoid it.

    ReplyDelete
    Replies
    1. Hi Lu ! Yes there are absolutely different viruses aside from the listed above. They are many to mention but here are some :)


      1. Resident Viruses
      2. Multipartite Viruses
      3. Direct Action Viruses
      4. Overwrite Viruses
      5. Boot Virus
      6. Macro Virus
      7. Directory Virus
      8. Polymorphic Virus
      9. File Infectors
      10. Encrypted Viruses

      Delete
  5. my friend accidentally downloaded a trojan because he thought he was downloading adobe photoshop but unfortunately it was just a disguise, how can we avoid trojans and how can we know if it's just a disguise?

    ReplyDelete
    Replies
    1. Hi Hannah! To keep your computer safe from Trojan always keep your software up to date. This goes doubly true for important programs like your operating system and browser. Hackers exploit known security holes in these types of programs that can help the Trojan do its work, and even if the vendor patches the holes, it won't do you any good unless you maintain the latest version of your software. To keep your Internet connection as secure as possible, always keep a firewall up. Both software and hardware firewalls are excellent at controlling malicious Internet traffic, and can often stop Trojans from downloading to your computer in the first place.
      All these things are helpful, but to really be secure you have to install an antivirus software or Trojan remover. This software, when kept up to date, will scan your system to make sure you haven't downloaded a Trojan, and will automatically scan any program or file you execute to ensure its safety. There are free Trojan removers on the Internet, but few are regularly updated and some are even Trojans themselves

      Delete
  6. Hi Ma'am Ac! I would like to ask how can we know if my desktop has spyware or not?

    ReplyDelete
    Replies
    1. Hi Isaac! Here are the signs that your computer has a spyware:
      1.You find a new finger-size hardware device connected between your keyboard cable's plug and the corresponding socket on the back of your computer. Or maybe someone recently offered you "a better keyboard."
      2.Your phone bill includes expensive calls to 900 numbers that you never made—probably at an outrageous per-minute rate.
      3.You enter a search term in Internet Explorer's address bar and press Enter to start the search. Instead of your usual search site, an unfamiliar site handles the search.
      4.Your antispyware program or another protective program stops working correctly. It may warn you that certain necessary support files are missing, but if you restore the files they go missing again. It may appear to launch normally and then spontaneously shut down, or it may simply crash whenever you try to run it.
      5.A new item appears in your Favorites list without your putting it there. No matter how many times you delete it, the item always reappears later.
      6.Your system runs noticeably slower than it did before. If you're a Windows 2000/XP user, launching the Task Manager and clicking the Processes tab reveals that an unfamiliar process is using nearly 100 percent of available CPU cycles.
      7.At a time when you're not doing anything online, the send or receive lights on your dial-up or broadband modem blink just as wildly as when you're downloading a file or surfing the Web. Or the network/modem icon in your system tray flashes rapidly even when you're not using the connection.
      8.A search toolbar or other browser toolbar appears even though you didn't request or install it. Your attempts to remove it fail, or it comes back after removal.
      9.You get pop-up advertisements when your browser is not running or when your system is not even connected to the Internet, or you get pop-up ads that address you by name.
      10.When you start your browser, the home page has changed to something undesirable. You change it back manually, but before long you find that it has changed back again.
      11.And the final sign is: Everything appears to be normal. The most devious spyware doesn't leave traces you'd notice, so scan your system anyway.

      Delete
  7. Maam, how come that some computers that are already have an anti virus installed but still can be affected?

    ReplyDelete
    Replies
    1. Hi Geryl! As I stated above there is no perfect antivirus each one of them has its own pros and cons, you can read the comment above.

      Delete
  8. What is the https ma'am? Because when I enter or open some sites, the http will automatically change into https. Is that harmful?

    ReplyDelete
    Replies
    1. Hi Sophia! HTTPS is not harmful, instead of HyperText Transfer Protocol (HTTP), this website uses HyperText Transfer Protocol Secure (HTTPS). Using HTTPS, the computers agree on a "code" between them, and then they scramble the messages using that "code" so that no one in between can read them. This keeps your information safe from hackers.

      Delete
  9. How can we avoid spyware? or how can we know that we are already a victim of spyware?

    ReplyDelete
    Replies
    1. Hi Anjonette! These are the tips to avoid Spyware; Download and install anti-spyware software, Lookout for pop-ups, Keep current with operating system updates, Apply patches to software installed on your computer Harden your browser settings, Enable your firewall.
      To know if you are a victim of spyware; you are subjected to endless pop-up windows, you are redirected to web sites other than the one you typed into your browser, new unexpected toolbars appear in your web browser, new unexpected icons appear in the task tray at the bottom of your screen, your browser's home page suddenly changed, the search engine your browser opens when you click "search" has been changed, certain keys fail to work in your browser (e.g., the tab key doesn't work when you are moving to the next field within a form), random Windows error messages begin to appear, your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.).

      Delete
  10. ma'am how do I know if my computer have viruses? even though I have my anti virus on my laptop.

    ReplyDelete
    Replies
    1. Hi Kate! I mention above the cause of antivirus! :)

      Delete
  11. What is the best way to avoid virus,worms and trojans?

    ReplyDelete
    Replies
    1. Hi Arnel! The best way to avoid viruses is listed above! :)

      Delete
  12. Ma'am how would i know if what am i downloading has a virus? if it has how would i avoid it?

    ReplyDelete
    Replies
    1. Hi Jonnalyn! You can read the comment above about how to avoid viruses! :)

      Delete
  13. What is the best anti-virus for android phones?

    ReplyDelete
    Replies
    1. Hi Dyvon! The folliwing are antivirus for android phones that you can use!
      360 Security – Antivirus Boost
      This antivirus and anti-malware app comes with a ton of features, including the ability to scan your device files for malware, scan your apps and games, enable real-time protection, and even comes with an anti-theft feature.

      AndroHelm Mobile Security
      The main functionality focuses solely on security with features that include real-time protection from malware and spyware, scanning apps upon installation, frequent updates of the antivirus database, quarantine mode, app backups, virus protection, and a lot more.

      Avira Antivirus Security
      Avira Antivirus Security is a relatively newer and lesser known antivirus app but it’s quickly growing into one that people really seem to like. It comes with the basic stuff like device scanning, real-time protection, and even the ability to scan the external SD.

      Antivirus and Mobile Security by TrustGo
      It has the basic features such as device scanning to look for existing threats, real-time protection, and a privacy guard that helps show you what apps are using which permissions (which, admittedly, won’t be nearly as awesome after Android 6.0).

      AVAST Mobile Security
      AVAST is definitely one of the heavier antivirus Android apps that we’ve found and it comes with a metric ton of features that creates a pretty sturdy experience. If you go pro, you’ll get even more features including remote data recovery, remote SMS, geo-fencing, ad detection, and app locking.

      AVG AntiVirus Security
      On top of that, there is a task killer, anti-theft features, remote device data wiping, and you can monitor things like battery, storage, and data usage. The interface on this one is actually pretty good comparatively speaking and the paid subscribers can also get app locking, call and message blocking, and more.

      Bitdefender Antivirus Free
      It has exactly two features which is to scan and clean your device and then it offers real-time antivirus protection on top of that. The real-time protection scans apps as they are installed and also keeps an eye on what they are doing. The scanning is simple and only takes a few moments to get everything done.

      Delete
  14. Too many things you can do now in the internet..seems nothing is impossible, it also has almost limitless of possibility for me, at the same time the threat and harm it can do to is the same..so we must be so careful about using the internet, avoid posting or doing things that can harm you or others, and as for our generation, we have the power to either make things more greater of make it worst, we must be aware in everything that we do in the internet..its up to us now how to improve it, because we are not the inventors, we are the innovators.

    ReplyDelete
    Replies
    1. Hi Marty! Thank you for the additional information! :)

      Delete
  15. Virus could cause loss of files and applications. What should we do during data loss? What is the best way to recover those lost files?

    ReplyDelete
    Replies
    1. Hi Bea! If you can't find a file on your computer or you accidently modified or deleted a file, you can restore it from a backup (if you're using Windows backup) or you can try to restore it from a previous version. Previous versions are copies of files and folders that Windows automatically saves as part of a restore point. Previous versions are sometimes referred to as shadow copies.

      Delete
  16. I wonder where do malwares really came from. Why do people create these, what is their purpose?

    ReplyDelete
    Replies
    1. Hi Bea! People created these viruses such as malwares because of the following reasons:

      To make money.
      To steal account information.
      To cause problems and trouble for others.
      To prove a point, to prove it can be done, to prove ones skill or for revenge purposes
      To cripple a computer or network

      Delete
  17. what is the way to removed this viruses?

    ReplyDelete
    Replies
    1. Hi Allysa! Here's how to remove viruses from your computer!
      Safe Mode
      First, do no harm. You need to disconnect your PC or laptop from the internet. Do so by unplugging any wired connections, and switching off Wi-Fi on your laptop. Now we're going to boot into Windows' Safe Mode. This is a version of Windows that runs without many of the programs and processes required by full Windows. It will allow you to use your PC without doing any more damage, and it should help you to find out what the problem is. Malware won't run in Safe Mode.

      delete temporary files
      This step isn't critical, but it can help. Deleting temp files will speed up virus scanning, free disk space and may even delete malware. Select Start, All Programs (or just Programs), Accessories, System Tools, Disk Cleanup. And choose to delete temporary files.

      download and run Malwarebytes.
      We're going to use the Malwarebytes Anti-Malware free on-demand scanner. To get started, reconnect to the web so you can download, install, and update Malwarebytes; but disconnect from the internet again before you start scanning. To be entirely safe the best process is to download Malwarebytes on another computer, save it to a USB flash drive, and take the flash drive to the infected computer.

      or use a virus removal device such as the FixMeStick
      This step requires you to shell out some cash. But it will be worth it if Malwarebytes hasn't solved your problem. Sometimes simply going online to download software - even security software - opens up your PC or laptop to more pain. So using a bootable USB stick with pre-installed security software is a good way of scanning and cleaning your PC without going online. To create one you just have to download and install a security software package to a USB disk. (If you are reading this story and you don't have a virus problem, this wouldn't be a terrible idea.)

      after the event
      Your PC should now be free of malware. But that may not free you from the after effects of the infection. You may find, for instance, that your web browser defaults to a weird search engine and has a home page you didn't choose. You can solve this by following the steps in our 'How to remove unwanted web browser toolbars' piece.
      More importantly, you should change all your passwords, and login details for anything that contains sensitive information.

      Delete
  18. Why can the viruses invade desktops even though it is protected by anti-viruses?

    ReplyDelete
  19. the anti-virus in our computer doesn't fully protect us from the malwares, what should we do to keep our files safe?

    ReplyDelete
    Replies
    1. Hi Kristel! Always back up your files to keep it safe. You can use Optical Drives (e.g. Writable CDs, DVDs, and Blu-ray discs), Hard Drive, you can also used Cloud storage, Social media such as Facebook or Twitter can also be a back up storage.

      Delete
  20. Can we really trust anti-viruses if they also create some malwares themselves?

    ReplyDelete
    Replies
    1. Hi JC! Its only up to you if you really wanted to trust anti viruses although they also created some of the malwares.

      Delete
  21. it's possible that the Anti Virus company is producing a Virus or Making A Virus for Computer?

    ReplyDelete
    Replies
    1. Hi Jerico! It is possible that other companies create viruses to make money, we don’t know for sure if it’s true but some programmers believe that it was an urban legends or myth.

      Delete
  22. Hi Joey! Here are the list if a spyware invades your Computer!
    • Your computer suddenly seems very slow when opening programs or processing tasks (saving files, etc.).
    •You are subject to endless pop-up windows.
    •You are redirected to web sites other than the one you typed into your browser.
    •New, unexpected toolbars appear in your web browser.
    •New, unexpected icons appear in the task tray at the bottom of your screen.
    •Your browser’s home page suddenly changed.
    •The search engine your browser opens when you click “search” has been changed.
    •Certain keys fail to work in your browser (e.g., the tab key doesn’t work when you are moving to the next field within a form).
    •Random Windows error messages begin to appear.

    ReplyDelete
  23. What is the best way to avoid viruses?

    ReplyDelete
  24. Newest and Top Casino Site | LuckyClub Live
    LuckyClub Casino offers a unique online casino experience where you can play on your favourite slot machine from anywhere. Enjoy a luckyclub.live range of exciting games and

    ReplyDelete