Page 60 - KEC Khaitan C6 Flipbook
P. 60

COMPUTER ETHICS


                  Computer ethics are rules that govern our actions when we use computers and the Internet.

                  Unacceptable actions in the cyber space are punishable by law. Let us discuss a few unethical
                  practices that are taking place in the cyber space.


                                                                    SPAMMING
                                                                    Spamming  refers to  the  act  of repeatedly
                                                                    sending  unwanted  e-mails  called  spam  to  a
                                                                    large number of recipients.  These  e-mails  are

                                                                    used for commercial advertisements. These are
                                                                    also known as junk e-mails.
                                                                    They choke the Internet and waste our time.
                                                                    Stopping these spam e-mails is difficult, but there

                                                                    are many services available on the Internet which
                                                                    can prevent spammers from sending these
                                                                    e-mails.
                  Following are some tips to avoid spams:

                     Avoid sharing your e-mail id with everyone.

                      Set up filters to scan your e-mails and segregate     Name of the first hacker
                    spam or junk e-mails into a separate folder.
                     Never revert to any spam e-mail.


                  HACKING

                  Hacking is the act of intruding into a computer
                  system  for harmful purposes  by  identifying  the
                  technical  weak points  of the security  system
                  using smart programming solutions. The person
                  involved in these activities is called a hacker.



                  Following are some tips to avoid hacking:

                                                                                          21 st
                      Update  your operating  system,  web                             Century   #Initiative
                                                                                         Skills
                    browser and anti-virus.
                                                                   “You  should change your  passwords
                      Install a firewall on your computer as it    regularly. Same  password  should  not  be
                    does not allow hackers and viruses to          kept for more than one account.”
                    get attached to your computer.






                   58   Premium Edition-VI
   55   56   57   58   59   60   61   62   63   64   65