Page 130 - TrackpadV5.1_class7
P. 130

They choke the Internet and waste our time. Stopping these spam e-mails is difficult, but there are
                  many services available on the Internet which can prevent spammers from sending these e-mails.

                  Following are some tips to avoid spams:
                     Avoid sharing your e-mail id with everyone.

                      Set up filters to scan your e-mails and segregate     Name of the first hacker
                    spam or junk e-mails into a separate folder.
                     Never revert to any spam e-mail.


                  HACKING

                  Hacking is the act of intruding into a computer
                  system  for harmful purposes  by  identifying  the
                  technical  weak points  of the security  system
                  using smart programming solutions. The person
                  involved in these activities is called a hacker.




                  Following are some tips to avoid hacking:
                                                                                          21 st
                      Update  your operating  system,  web                             Century   #Initiative
                                                                                         Skills
                    browser and anti-virus.
                                                                   “You  should change your  passwords
                      Install a firewall on your computer as it    regularly. Same  password  should  not  be
                    does not allow hackers and viruses to          kept for more than one account.”

                    get attached to your computer.

                  PHISHING

                  Phishing is the illegal practice of obtaining sensitive information through e-mails. The criminals
                  try to get information like user name, password and credit card details from us through e-mails.
                  People  with malicious  intentions  usually  fake their identity  and pose  as a known contact  or
                  organisation.

                  They send e-mails from legitimate-looking
                  websites  with genuine-looking  offers, rewards
                  or concerns as attachments. If opened, it installs
                  malware in our system or directs us to a website

                  for entering our sensitive information.
                  Following are some tips to avoid phishing:

                      Do not  open e-mails  without  verifying the
                    source.

                      Do not share your personal information via e-mails. It must be shared only via smartphone or
                    a secure website.




                  128   Pro (V5.1)-VII
   125   126   127   128   129   130   131   132   133   134   135