This is the second last lesson to work on our assignment. My one is nearly done, I am just basically adding the information to the correct webpages and making it look pretty. Below are my information and videos used in my 2 topics:
SPAM:
Spam is an unsolicited electronic 'junk mail' message, often sent out to many people at the same time by email or text messages to mobile devices. Spam may advertise or offer you unsolicited goods, services, land or business and investment opportunities. "Scam" spam messages may be used to try to trick or disadvantage you. Example: by offering you get-rich-quick schemes. But always remember if it sounds too good to be true, it probably is!Email Spam: Also known as unsolicited bulk Email (UBE) or Unsolicited Commercial Email (UCE) is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam in email started to become a problem when the Internet was opened up to the general public in the mid 1990s. Email Spam is sent via "Zombie Networks", which are networks of virus or worm infected personal computers in homes and offices around the globe.Instant Messenging: Instant Messaging spam makes use of instant messaging systems. This is used commonly because instant messaging tends to not be blocked by firewalls. This is very common on many instant messaging systems such as Skype.Mobile Phone: Mobile Phone Spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers.
Spam is increasingly generated from computers by viruses. Virus-makers and spammers are combining their efforts to compromise innocent computer users’ systems and converting them into spam-sending “drones” or “zombies”. These malicious programs spread rapidly and generate massive amounts of spam pretending to be sent from legitimate addresses. It's important for all computer owners to install and maintain anti-virus software to avoid having their computer infected and possibly become a source of spam without their knowing.Phishing Attacks are a common form of attack used by cyber criminals to fool users to disclose sensitive personal or financial information, including account credentials, for fraud purposes. Basically a phishing attack involves the use of a web site that has been set up by criminals to look like the web sites of well known organisations, such as Australian financial institutions. They have the aim of defrauding or stealing personal information from a victim. A phishing attack has 2 main stages:
1. Phishing Email: the attacker sends a spam email to thousands of email addresses pretending to be from a legitimate organisation. The email is worded to persuade the user to click on the link in the email. If the user clicks on the link, the users computer will connect to the phishing web site.
2. Phishing web site: The phishing website is created to capture any fields completed by the user(such as username and passwords). If the user completes these fields the information will be captured by the attacker.
There are many ways of how to avoid spam, here are some tips which will help you do so: 1. Look for warning signs. There are three simple ways to try to tell if an email program is spam-
-Look at the person's name. Most spam is named with a first name and a last name. Make sure to see if you recognise the name. If not, it is probably a spam.
-Look at the time it was sent. Most spam is sent between midnight and 4:00am.
-Look at the file size. Almost all spam will be 3KB.Most spam will contain a small sentence and include a link to a webpage. At the end of the link, there will be a mix of random letters. DO NOT CLICK ON THE LINK.
2. Dont post your email address on a public forum or website. It is estimated that 95% of all junk emails are caused by a person publicly disclosing his or her email address.
3. Use Spam Blocking Tools. Use the "this is spam" button if your email provider has one. This submits the email to their spam control people who can take care of business and improve their anti-spam filters. Use the "block" list and add the spammer's domain name only.
4. Report Spam. Before you delete spam, forward your spam to : spam@uce.gov as this is the spam box for the Federal Trade Commission. Mail sent to this box is investigated.
5.Do Not open spam emails and click on their links.6. Do not buy anything from a spammer. Not only do you risk comprising your security and infecting your computer with malware-viruses.
7. Never respond to a spam message. Many spammers send out emails with randomly generated email addresses trying to find new targets. If you reply to their emails, they can add you to their list.
8. Use Spam filter to block spam emails.
Videos used in spam
http://www.youtube.com/watch?feature=player_embedded&v=10ZzDzdO1Xs
GOOGLE +:
Google + (written as Google Plus or sometimes abbreviated as G+) is a multilingual social networking and identity service owned and operated by Google Inc. It was launched in June 28, 2011. As of April 2012, it had a total of 170 million registered users. Google Plus was originally called Google Circles, a name alluding to its emphasis on organising friendship information.The service was launched as an invitation-only "field test" in June 2011. But early invites soon suspended due to an "insane demand" for new accounts. On September 20, 2011, Google + was opened to everyone 18 years of age or older without the need for an invitation. Later on January 26th 2012, it was opened to a younger age group. Google + integrates social services such as Google Profiles, and introduces new services identified as Circles, Hangouts and Sparks. Google + is available on their website and also mobile devices. Many newspapers such as the "New York Times" has declared it Google's biggest attempt to rival the social networking site Facebook which currently has 800 million users.Things like Stream, Circles, Hangouts, Messenger, Instant Upload, Sparks and Games are the many new features on Google Plus. This is explained in more detail on the next page. Click "Next Page" for more information.
Videos used in Google +
http://www.youtube.com/watch?feature=player_embedded&v=A3Atj57r15U
Another component in this task is to have downloadable zip files. The files i have zipped and added on the website to be zipped are things like the background music, fact sheets and video downloads.
SPAM:
Spam is an unsolicited electronic 'junk mail' message, often sent out to many people at the same time by email or text messages to mobile devices. Spam may advertise or offer you unsolicited goods, services, land or business and investment opportunities. "Scam" spam messages may be used to try to trick or disadvantage you. Example: by offering you get-rich-quick schemes. But always remember if it sounds too good to be true, it probably is!Email Spam: Also known as unsolicited bulk Email (UBE) or Unsolicited Commercial Email (UCE) is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam in email started to become a problem when the Internet was opened up to the general public in the mid 1990s. Email Spam is sent via "Zombie Networks", which are networks of virus or worm infected personal computers in homes and offices around the globe.Instant Messenging: Instant Messaging spam makes use of instant messaging systems. This is used commonly because instant messaging tends to not be blocked by firewalls. This is very common on many instant messaging systems such as Skype.Mobile Phone: Mobile Phone Spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers.
Spam is increasingly generated from computers by viruses. Virus-makers and spammers are combining their efforts to compromise innocent computer users’ systems and converting them into spam-sending “drones” or “zombies”. These malicious programs spread rapidly and generate massive amounts of spam pretending to be sent from legitimate addresses. It's important for all computer owners to install and maintain anti-virus software to avoid having their computer infected and possibly become a source of spam without their knowing.Phishing Attacks are a common form of attack used by cyber criminals to fool users to disclose sensitive personal or financial information, including account credentials, for fraud purposes. Basically a phishing attack involves the use of a web site that has been set up by criminals to look like the web sites of well known organisations, such as Australian financial institutions. They have the aim of defrauding or stealing personal information from a victim. A phishing attack has 2 main stages:
1. Phishing Email: the attacker sends a spam email to thousands of email addresses pretending to be from a legitimate organisation. The email is worded to persuade the user to click on the link in the email. If the user clicks on the link, the users computer will connect to the phishing web site.
2. Phishing web site: The phishing website is created to capture any fields completed by the user(such as username and passwords). If the user completes these fields the information will be captured by the attacker.
There are many ways of how to avoid spam, here are some tips which will help you do so: 1. Look for warning signs. There are three simple ways to try to tell if an email program is spam-
-Look at the person's name. Most spam is named with a first name and a last name. Make sure to see if you recognise the name. If not, it is probably a spam.
-Look at the time it was sent. Most spam is sent between midnight and 4:00am.
-Look at the file size. Almost all spam will be 3KB.Most spam will contain a small sentence and include a link to a webpage. At the end of the link, there will be a mix of random letters. DO NOT CLICK ON THE LINK.
2. Dont post your email address on a public forum or website. It is estimated that 95% of all junk emails are caused by a person publicly disclosing his or her email address.
3. Use Spam Blocking Tools. Use the "this is spam" button if your email provider has one. This submits the email to their spam control people who can take care of business and improve their anti-spam filters. Use the "block" list and add the spammer's domain name only.
4. Report Spam. Before you delete spam, forward your spam to : spam@uce.gov as this is the spam box for the Federal Trade Commission. Mail sent to this box is investigated.
5.Do Not open spam emails and click on their links.6. Do not buy anything from a spammer. Not only do you risk comprising your security and infecting your computer with malware-viruses.
7. Never respond to a spam message. Many spammers send out emails with randomly generated email addresses trying to find new targets. If you reply to their emails, they can add you to their list.
8. Use Spam filter to block spam emails.
Videos used in spam
http://www.youtube.com/watch?feature=player_embedded&v=10ZzDzdO1Xs
GOOGLE +:
Google + (written as Google Plus or sometimes abbreviated as G+) is a multilingual social networking and identity service owned and operated by Google Inc. It was launched in June 28, 2011. As of April 2012, it had a total of 170 million registered users. Google Plus was originally called Google Circles, a name alluding to its emphasis on organising friendship information.The service was launched as an invitation-only "field test" in June 2011. But early invites soon suspended due to an "insane demand" for new accounts. On September 20, 2011, Google + was opened to everyone 18 years of age or older without the need for an invitation. Later on January 26th 2012, it was opened to a younger age group. Google + integrates social services such as Google Profiles, and introduces new services identified as Circles, Hangouts and Sparks. Google + is available on their website and also mobile devices. Many newspapers such as the "New York Times" has declared it Google's biggest attempt to rival the social networking site Facebook which currently has 800 million users.Things like Stream, Circles, Hangouts, Messenger, Instant Upload, Sparks and Games are the many new features on Google Plus. This is explained in more detail on the next page. Click "Next Page" for more information.
Videos used in Google +
http://www.youtube.com/watch?feature=player_embedded&v=A3Atj57r15U
Another component in this task is to have downloadable zip files. The files i have zipped and added on the website to be zipped are things like the background music, fact sheets and video downloads.
No comments:
Post a Comment