Page 46 - 2611_SmartGPT Pro V(5.0) C-7
P. 46

They choke the Internet and waste our time. Stopping these spam e-mails is difficult, but there are
                  many services available on the Internet which can prevent spammers from sending these e-mails.

                  Following are some tips to avoid spams:
                     Avoid sharing your e-mail id with everyone.

                      Set up filters to scan your e-mails and segregate spam or junk e-mails into a separate folder.
                     Never revert to any spam e-mail.





                                                 What is the name of the first hacker?



                  HACKING

                  Hacking  is the act  of intruding  into  a computer
                  system  for  harmful  purposes  by  identifying  the
                  technical weak points of the security system using
                  smart programming solutions. The person involved
                  in these activities is called a hacker.

                  Following are some tips to avoid hacking:                                                                                                                             21 st
                                                                                                                                                                                      Century   #Initiative
                      Update  your  operating  system,  web  browser                                                                                                                   Skills
                    and anti-virus.
                      Install a firewall on your computer as it does not allow hackers and viruses to get attached to
                    your computer.


                  PHISHING

                  Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals
                  try to get information like user name, password and credit card details from us through e-mails.
                  People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or
                  organisation.

                  They send e-mails from legitimate-looking
                  websites  with genuine-looking  offers, rewards
                  or concerns as attachments. If opened, it installs
                  malware in our system or directs us to a website
                  for entering our sensitive information.

                  Following are some tips to avoid phishing:

                      Do not  open e-mails  without  verifying the
                    source.

                      Do not share your personal information via e-mails. It must be shared only via smartphone or
                    a secure website.



                   44   Computer Science (V5.0)-VII
   41   42   43   44   45   46   47   48   49   50   51