Trolling is when a user anonymously abuses or intimidates others online for fun. They purposely post inflammatory statements, not as a way to bully or harass other people, but to watch the reactions.
Trolls enjoy seeing people get worked up about what they post. When they are confronted on their behaviour, they often shrug it off and claim it was all in fun.
Cyberbullies target someone and repeatedly attack them, while trolls set out to annoy whoever they can. Trolls want to provoke a reaction or response and it’s often not a personal attack because they don’t really care who they upset.
You can protect yourself and others against trolling by:
Ignore. Don't respond to nasty, immature or offensive comments
Dont give attention them ...
Attention give them more power.
Unfollow them and ask your friends to do so
Block them in groups and pages
If they pop up under a different name, block them again.
Report trolls to website administrators
Contact the social media service. Under new legislation, social media services are now obliged to take down material believed to be of a offensive nature.
Talk about it. If a troll upsets you, please talk about it with trusted friends and family and remember, it's not you, it's them.
Protect your friends from trolls. If trolls are upsetting a friend, help them to seek support.
Saturday, August 15, 2015
65. Balance your online time
Most teens play online games for fun but they need to make sure that online world does not take over their life. With more and more mobile devices make it easy stay connected 24 hours a day, 7 days a week. Learn to how and when to disconnect.
Spending too muchb time online affect your friendships, your family and your schoolwork, especially if it’s keeping you up at night.
Spending excessive amounts of time online can have significant impacts on your health, family and social life and on your academic performance at school.
If you
have ongoing headaches, eye strain and sleep disturbance
online activities interfering with your health, schoolwork and relationships
constantly talking about particular online gaming sites
withdraw from your ‘real world’ friends and activities
give more importance to your online activities and contacts
decline in your academic performance at school.
You may have a problem -- seek help
Spending too muchb time online affect your friendships, your family and your schoolwork, especially if it’s keeping you up at night.
Spending excessive amounts of time online can have significant impacts on your health, family and social life and on your academic performance at school.
If you
have ongoing headaches, eye strain and sleep disturbance
online activities interfering with your health, schoolwork and relationships
constantly talking about particular online gaming sites
withdraw from your ‘real world’ friends and activities
give more importance to your online activities and contacts
decline in your academic performance at school.
You may have a problem -- seek help
Graphic credits : Amanda Hansani
64. Help and Resources
There are many online help and guide services for cyber safety.
In Sri Lanka Techcert www.techcert.lk will advise you on appropriate action.
Respect Girls on Internet on Facebook advise you free
Send them a message
Finally
Your digital reputation is very important as well as your online privacy and safety.
The content you post about yourself and others tells what kind of person you are
So consider your posts twise before you post on-line
In Sri Lanka Techcert www.techcert.lk will advise you on appropriate action.
Respect Girls on Internet on Facebook advise you free
Send them a message
Finally
Your digital reputation is very important as well as your online privacy and safety.
The content you post about yourself and others tells what kind of person you are
So consider your posts twise before you post on-line
63. Many other scams are there
Weight Loss Claims
Lotteries and Sweepstakes Scams
Fake Check Scams
Imposter Scams
Mystery Shopper Scams
Bogus Apartment Rentals
Miracle Cures
Debt Relief Scams
Pay-in-Advance Credit Offers
Investment Schemes
The "Nigerian" Email Scam
Online Dating Scams
Money Transfer Scams
Tech Support Scams
See
https://www.onguardonline.gov/ for more
https://www.consumer.ftc.gov/scam-alerts
https://esafety.gov.au/
Lotteries and Sweepstakes Scams
Fake Check Scams
Imposter Scams
Mystery Shopper Scams
Bogus Apartment Rentals
Miracle Cures
Debt Relief Scams
Pay-in-Advance Credit Offers
Investment Schemes
The "Nigerian" Email Scam
Online Dating Scams
Money Transfer Scams
Tech Support Scams
See
https://www.onguardonline.gov/ for more
https://www.consumer.ftc.gov/scam-alerts
https://esafety.gov.au/
62. Earn money at home scams
Internet offers home-based work to users. They could be online add clicking, photo sorting, envelope-stuffing etc
The ads could be like
Be a part fastest growing internet business.
Be your own boss.
Earn thousands of dollars every month from your own home.
The ads don’t say much about the job. They will ask you to register free or by by paying a small fee.
Once you register, they will offer you a home based work pack for a fee. You wll order and receive it.
And there wont be any jobs after that.
Legitimate home-based work promoters give you all information in writing – exactly what’s involved in the program they’re selling. Before you commit any money payment
Ask
What tasks will you have to do?
How will you get paid and when ?
Who will pay you?
When will you get your first paycheck; how much will it be?
How much will you have to pay for the program registration?
What will you get for the fees you have to pay?
Verify all information you get from the promoter with current workers.
Try to visit them in person.
Find out wheather they are telling the truth.
A person started a course "1000 ways to make money from internet?" where users have to buy a book on internet business. The book had basic information on how to create web and some other stuff evey one knows. When asked the person why not you make money, he replied "this book is the 1st way"
61. They will steal your money in the bank
Randima is a doctor. He has an account with National Bank
He received following email
.
From:NatonalBankOnline@natonalbankonline.com
TO: Randima.Karunasena@mygmail.com
Subject: New Internet Banking Features
Dear Customer,
National Bank is always add new services to satisfy customers.
Our Internet Banking system added more features for you.
Internet banking Please click the following link and feel the difference.
http://www.natonalbankonline.com/login.php
Best regards
National Bank Team.
He clicked the link and entered his userid and password.
He was taken to a page in National Bank which said invalid password
What actually happens is , that he visited a URL which is almost similar National Bank.Only one letter is different. The web looked exactly like his banks. He entered his user id and password. The false website captured his password redirected to real website. In one hour all his money is gone.
The website and email sender is gone.
When you get an email like this
• Do not click the link
• Do not forward it to anyone
• Inform your bank, you are not the only one they target
• Inform authorities about this matter
He received following email
.
From:NatonalBankOnline@natonalbankonline.com
TO: Randima.Karunasena@mygmail.com
Subject: New Internet Banking Features
Dear Customer,
National Bank is always add new services to satisfy customers.
Our Internet Banking system added more features for you.
Internet banking Please click the following link and feel the difference.
http://www.natonalbankonline.com/login.php
Best regards
National Bank Team.
He clicked the link and entered his userid and password.
He was taken to a page in National Bank which said invalid password
What actually happens is , that he visited a URL which is almost similar National Bank.Only one letter is different. The web looked exactly like his banks. He entered his user id and password. The false website captured his password redirected to real website. In one hour all his money is gone.
The website and email sender is gone.
When you get an email like this
• Do not click the link
• Do not forward it to anyone
• Inform your bank, you are not the only one they target
• Inform authorities about this matter
60. They will steal your email password
Niranjan Received following e-mail
From: googleadmin@mygmail.com
To: niranjan@mygmaiil.com
Subject: Password Verification
Dear Niranjan,
Mygmail is in the process de-activating inactive accounts.
Please visit this link and confirm your user ID and password to continue using niranjan@mygmaiil.com account. verify user users’ password due to system
account upgrade. Please click on following link to confirm
<a linkhere>
Best Regards
Mygamil Admin
What niranjan thought was that he is going to loose his email. Without thinking he clicked the link and entered his user id and password. In few munites, a predator hacked into his email account.
What should you do?
• Do not reply to this e–mail
• Do not forward it to any one
• Inform “mygmail” about this matter
• Inform authorities about this matter
From: googleadmin@mygmail.com
To: niranjan@mygmaiil.com
Subject: Password Verification
Dear Niranjan,
Mygmail is in the process de-activating inactive accounts.
Please visit this link and confirm your user ID and password to continue using niranjan@mygmaiil.com account. verify user users’ password due to system
account upgrade. Please click on following link to confirm
<a linkhere>
Best Regards
Mygamil Admin
What niranjan thought was that he is going to loose his email. Without thinking he clicked the link and entered his user id and password. In few munites, a predator hacked into his email account.
What should you do?
• Do not reply to this e–mail
• Do not forward it to any one
• Inform “mygmail” about this matter
• Inform authorities about this matter
59. Don't trust emails
Story 1
Saman is businessman travelling all around the world.
His friend Sagari received following email and wire transferred money to help Samantha not knowing it as a scam. She lost her money. What actually happened was that a hacker, hacked into Saman's email acclount and sent following email to everyone in the contact list.
From: Saman@mygmail.com
To: Sagari@mygmail.com
Subject: “Sagari I need a big favor”
Hi Sagari,
Currently I am in America and I am facing a big problem.
I lost my valet last night. I had all my credit cards and money in it.
I can't pay my hotel bill and need your help to come back to Sri Lanka.
Please send me 1000 dollars to this accounts
Your help would be much appreciated.
Here is the bank account number of hotel manager
Name: Rolland Whitkins
Account Number: 4080567467
Bank: London Bridge Bank
Best Regards
Saman .
Will you be fooled to send money, if you receive a letter like this?
• Do not reply to this e-mail
• Do not send any of your personal details
• Do not transfer any money to mentioned account
• Inform authorities about this matter
Saman is businessman travelling all around the world.
His friend Sagari received following email and wire transferred money to help Samantha not knowing it as a scam. She lost her money. What actually happened was that a hacker, hacked into Saman's email acclount and sent following email to everyone in the contact list.
From: Saman@mygmail.com
To: Sagari@mygmail.com
Subject: “Sagari I need a big favor”
Hi Sagari,
Currently I am in America and I am facing a big problem.
I lost my valet last night. I had all my credit cards and money in it.
I can't pay my hotel bill and need your help to come back to Sri Lanka.
Please send me 1000 dollars to this accounts
Your help would be much appreciated.
Here is the bank account number of hotel manager
Name: Rolland Whitkins
Account Number: 4080567467
Bank: London Bridge Bank
Best Regards
Saman .
Will you be fooled to send money, if you receive a letter like this?
• Do not reply to this e-mail
• Do not send any of your personal details
• Do not transfer any money to mentioned account
• Inform authorities about this matter
58 How to avoid email virus threats
• Before you open your e-mail software
◦ Check whether the virus guard is up to date
.
• When a new e-mail received:
◦ Check the validity of the sender:
▪ If you c a n ’t validate – Discard
◦ Check the subject, body and Attachment are trusted:
▪ If you can’t trust– Discard.
Be extra careful when an e-mail received from unknown source.
Research internet for the sender, company and subject on google
Check the facebook, linkedin and g+ profile of the sender
if you are suspicious about an email
Don't click any links in the e-mail
Don't download any attachments.
Don't forward it to anyone.
Don't submit any of your personal details
57. Keep your firewall always on
A firewall is a software or a hardware device that checks information that is received from
the Internet or a network, and either blocks it or allows it to pass through to a computer.
A firewall can help prevent hackers or malicious software from gaining access to your computer through a network or the Internet. A firewall can help stop your computer from sending malicious software to other computers.
In windows use Windows Firewall with Advance Security tool to configure your firewall inbound and outbound rules.
Look for any programs allowed to send or receive data
Keep your firewall always on
56. How to protect your computer from virus attacks?
Use a firewall when using the Internet
Update all software and the operating systems on all computers when necessary
Use an up-to-date anti-virus software
Do not open emails that are received from unknown sources
Do not open unknown attachments or content (links etc.) even from a known source
Complete a virus scan before opening any email attachments
Do not visit unknown or suspicious websites
Do not share your personal details with unknown parties or services (your email, bank
accounts, credit card numbers etc.)
Use trusted websites to download applications or content
55. Symptoms of a virus infection
When your computer is virus infected
The computer will start to slow down without good reason
The computer will abruptly restart itself often and will show abnormal behavior
Applications installed on the computer will not function as expected
There might be unusual (typically badly written) error messages.
There might be new shortcuts or other icons in the computer that were not created by
the user
Users may find that their files or applications have been deleted without their
permission.
54. Computer Viruses and Malaware
Computer viruses spread via emails and email attachments and through memory sticks. They are small program that spread from one computer to another. They modify or destroy any data and distrupt normal operation of the operating system.
Most common forms of malware are Spyware, Adware, Trojan Horses,
and Worms.They can destroy or steal your data without your knowledge.
Spyware – These collect user data/information and details on the operation of computers without the knowledge of the user. They inject code into your browser or run programs at boot time. Once run they can do any damage to your computer.
Adware – These display advertisements on your computer by installing itself on a computer
without a user’s permission. Adware track internet usage data and habits of the user to deliver advertiesments.
Trojan Horses – These viruses cannot self-activate. They are harmful programs that
disguise themselves as useful at first, but will collect personal data in the background and
wait for an exact date or time to begin harming the computer. Consider it as a time bomb in your computer.
Worms – These viruses do not need human interaction to spread from one computer to another. They have the ability to self-activate within a computer. For example, It will open your mail client, make copies of itself and send emails to all people in your address book. This will repeat in computers of the recipients. They spread automatically at a rapid rate within a computer network.
Most email viruses are disguised as photos, audio and video animations etc Users need to be very extra careful when opening any email with an attachment
Its possible for you to download them from internet thinking that they are harmless software tools.
53. Keep your family safe online
How every busy you as parents, follow these steps to help keep your family safe online.
Talk with your family about online safety. Be clear about your family’s rules of using technology, and consequences for inappropriate use. Make sure they feel comfortable to ask for guidance.
Using internet and technology together is a good way to teach online safety
Discuss online services and sites you visits. Agree upon what is appropriate for each family member.
Protect passwords. Help your family learn how to set secure passwords online.
Dont share your password with children.
Remind your family not to give out their passwords.
Make sure they make a habit of signing out of their online accounts.
Use privacy settings and sharing controls.
There are many sites for sharing thoughts, photos, videos, status updates and more. Many of these services offer privacy settings and controls that help you decide who can see your content before you post it.
Talk with your family about what they should and shouldn’t share publicly.
Help them respect the privacy of others by keeping the personal details about family or friends private, and by not identifying people by name in publicly shared content.
Oline services - including Google - have age limits restricting who can use their services.
Google accounts are restricted to users 18 and older. Always check a website’s terms of use before allowing your child to sign up for an account.
Teach your family to communicate responsibly. Here’s a good rule of thumb: if you wouldn’t say it to someone’s face, don’t text it, email it, instant-message it, or post it as a comment on someone’s page. Talk about how what you say online might make other people feel
Protect your computer and identity. Use antivirus software and update it regularly
Inform your family personal information – like a ID number, phone number or home address for public view.
Keep it going. Staying safe isn’t a one-time thing—technology evolves, and so will the needs of your family. Make sure you keep up an ongoing dialogue. Re-establish your family’s ground rules, check in on everyone’s progress, and set aside time to talk at regular intervals.
52. When you are buying online
Safety Tips
If it’s too good to be true…Compare the price you’re seeing with similar goods being sold elsewhere. If the price is significantly different, use caution - make sure to research the seller and ask questions about the condition of the item. some sites sell counterfeit products using similar images or domain name incorporating the higher brand.
Do a web search for reviews from other buyers with experience with the seller. Check the site’s WhoIs record to find who owns the domain.
Use a payment method with buyer protections: Paypal gives best buyer protection
Read the fine print: Before you purchase, find shipping, warranty, and return policy.
Keep a record of the transaction: They can help you if you do need to make a return or contest unauthorized charges made to your account.
Avoid hacked sites and keep an eye on the browser’s address bar. If you click on a link and get instantly redirected, that site may have been hacked and contain malware. Always keeping an eye on the address bar to ensure the link you click in right domain.
Type sensitive web addresses into your browser's address bar: Don’t navigate to sensitive accounts by clicking a link or copying and pasting the address. Hackers create similar sites with similar domain.
In singapore I bought a phone looking android and gooqle as brand name. It was cheap and poor quality. They fooled me replacing g with a q in google and I bought the phone in the night.
Avoid entering personal information on suspicious sites and doing financial transactions on public computers.
Avoid logging into accounts that contain sensitive financial information from public or friends computer or mobile phone.
Only send personal information over secure connections: Look for the https:// connection in the address bar.When entering sensitive information like credit card data, make sure the web secure certificate is valid.
The website name will show up as green in the URL bar.
Make sure you got what you paid for: Once you’ve received the paid item, give it a quick check make sure everything is as it should be. If anything is wrong contact seller and try to resolve positively, failing, report to your company or paypal.
51. Anti Virus Programs
Following are some free Anti Virus Programs
provide real-time protection capability, including real-time antivirus, behavioral blocking features, cloud-based protection, and an automatic sandboxing function which protects users from nearly all malware is best pick for advanced users.
Panda Cloud Antivirus provide detection rate of malware, web protection, some behavioural blocker features is an excellent choice for average users. it has a simple interface.
360 Total Security is an unrestricted freeware with many engines for malware detection. You can check if anyone is stealing your wi-fi.
BrowserProtect, Desk 365, Dosearches Browser Protector, DProtect
eSave Security Control, Extended Protection, Nation Zoom browser protection
New Tabs Uninstall, Omiga plus, Wysys Control
If you’re using Chrome or Firefox, use the browser reset feature to undo the changes you see and get your settings back to normal.
Keep your browser and operating system up to date.
Keep an eye on what you click and download.
Watch this video
https://www.youtube.com/watch?v=nvIXGeB1WgE
50. Use msconfig to clean virus
In windows
Start > type msconfig and press enter to run msconfig
It will show you what programs and services are started when booting your computer.
Remove all programs that you are not aware of.
Remove all from all unknown publishers
When you are using the computer
Press Ctlt+ Alt+ del and start task manager to see if any suspicious programs or services running.
Check if any program takes excessive memory
Press right mouse button on the application and end task.
Select and end process in process section.
Your computer can crash if you stop an important system procces.
This only removes programs from current memory.
They can run next time you boot up.
49. Keep your device clean
Gingermaster is a A trojan developed for an Android platform that propagates by installing applications that incorporate a hidden malware for installation in the background. Then it creates a service that steals your information.
Another App from a ethnography website, takes your photo, lock the phone and ask a ransom of 500 USD to unlock your phone and not to make your photo public.
If you’re getting redirected from browser seeing pop-up ads, unwanted toolbars, or strange Google search results, your computer may have infected with malware. Malware is software designed to damage and take control of your computer.
To remove malware from your computer or browser
1. uninstall and reinstall.
2. Browse internet in user mode. Admin mode only should be used for maintainance of your computer. Without admin permission most Malaware can'r be installed to your computer.
3. Check your computer for programs you don’t recognize, and uninstall them.
Most harmful malaware copied to my documents, temp, appdata and under user folders.
They could have *.exe, *.dll, *.com, *.js, *.jre, like extensions.
Do a search starting your computer in safemode.
This is for experts and your actions can harm your data and applications if you dont know what you are doing.
Use a good virus guard with online protection.
Malware spreads through SPAM, and often the attachments are distributed in zipped or .rar file formats.
48. Secure your passwords
Always pick strong passwords to secure your google account. Use a unique password for each of your important accounts like email and online banking.
Keep your passwords in a secret place. Use a long password made up of numbers, letters and symbols
Try using a phrase that only you know
Shirani and Roshani are funny friends in my class from grade 1 to 12. can create “SRffims112” is a good password with lots of variations.
Remeber to set up your password recovery options in google account giving your other email and mobile number.
Always Sign out from Google, when you are not using it Gmail, YouTube or any other service.
Keeping you signed in can improve your search results. But when using public computers like in a cybercafe or library remember to sign out by clicking on your account photo or email address in the top right corner and selecting Sign out.
You can create multiple online accounts for your personal, community and business needs. You can forward several emails to one account. Your informaytion in one account is not combined with any other Google Account. If you deside, You can link those accounts together.
You can toggle between your Google Accounts easily and quickly, both on desktop and on mobile.Once you have set up a primary account, you can easily add other accounts.
Lock your screen or device with a password when you are not using them.
In your device select settings, Personel and Screen security touch Screen lock. If you’ve already set a lock, you’ll need to enter the pattern, PIN, or password before you can choose a different lock, Touch the screen lock and select options.
47. Google Account Activity
Account Activity
Account Activity makes it simple for you to review how you’re using Google services and make sure only you have been using your account. You can get a monthly report with how much email has been sent and received from your account, the countries from which your account has been accessed, and what the top Google searches from your account have been.
Google Takeout
Google Takeout provides you with an easy-to-use tool to download your personal data, like your documents or photos, so that you can have a copy of your data.
Google Web History controls
Google Account, Web History provide you with more relevant results and recommendations.
Ads Preferences Manager
Ads help fund many of the free online services on the web you use every day. This tools help you to set how ads are selected for you, control your information that is used to select ads, and block specific advertisers.
Google Analytics opt-out
Google Analytics generates statistics about visitors to websites to help website publishers improve their sites. If you don’t want your browser data to be shared with publishers , you can install an opt-out.
46. Google Talk & Circles
Google Talk
Use chats off the record mode in your contact’s Gmail chat history.
Google+ Circles
Google+ circles help you manage your friends and contacts. You can put your friends in one circle, your family in another just like real life and share relevant content with the right people.
Unlisted and private videos on YouTube
You can choose unlisted or private option when you upload your video.
Google Dashboard
The Google Dashboard shows you what’s stored in your Google Account. From one central location, you can easily view and update your settings for services such as Blogger, Calendar, Docs, Gmail, Google+ etc
Me on the Web
Me on the Web help you manage what people see when they search for you on Google. It helps you set up Google Alerts so you can monitor if information about you appears online, and it automatically suggests some search terms you may want to keep an eye on.
45. Google security and privacy
Google gives you variety of tools that can help keep you safe and keep your information private and secure.
Google Account Settings
On your Account settings page, you can see services and information associated with your Google Account and change your security and privacy settings.
Keep your google account safe
https://www.youtube.com/watch?v=RMYjsBkXOAI
2-step verification in apps
https://www.youtube.com/watch?v=xK9GJYNs2-E
Stay secure and private
You can setup 2-step Verification in Google Account. It requires you to give your mobile number for google to send a code to login
https://www.youtube.com/watch?v=iup3HTrcO28
Incognito mode in Chrome
When you use incognito mode in google chrome, pages you open and files you download aren’t recorded in browsing or download history.
https://www.youtube.com/watch?v=bu5b_jYWVcQ
How to block unwanted messages
https://www.youtube.com/watch?v=uSj2_Ru6qjI
What to do when you forget your password
https://www.youtube.com/watch?v=w3xuPuEQm4k
44. Phishing
Sometimes people create fake websites that look like Facebook and may ask you to login.
This is phishing and it’s a way to try to steal usernames, passwords and other info. Remember, Facebook will never send an email asking for your account password, social security or tax id number or your full credit card number.
If you ever receive a suspicious email, don't click on any links in it or respond to it.
If you accidentally click on a spam post, it might lead you to a site that would install a spyware or virus into your computer.
Be aware of what you click in your emails and text messages.
To learn about ways to keep your account secure, visit Facebook Help Center.
https://www.facebook.com/help/
43. Is your data secure with Facebook ?
Facebook will not share your personal information without your permission or unless required by the law.
Government officials sometimes make requests for data about people who use Facebook as part of official investigations. They are mostly related to criminal cases, such as robberies or kidnappings.
Facebook policy is to let the person know of such requests but there are some circumstances, like cases involving child exploitation, the user will not be notified.
42. Spam in Facebook
Spam can be a post, a message or even a friend request.
If you see something that looks suspicious or sounds too good to be true, don't click on it or share it, but do report it.
Tap the arrow in the upper right corner of the post.
Tap Report this Post as spam.
41 Two step verification
You can set two step verification by turning on login approvals
When a login is attempted from a different computer or phone or browser you haven’t used before Facebook will notify you and ask you to approve it with a security code. Facebook will sms the code to you or you can get it in your
Facebook app.
"Once I logged from Singapore because I had not the local phone number roaming in Singapore."
"Once I logged from Singapore because I had not the local phone number roaming in Singapore."
You can set up trusted contacts for your friends to help you get back into your account if you ever lose your password.
Go to Security Settings , Tap Trusted Contacts. Tap Add Friends to get started.
Choose 3 to 5 good friends - friends you know you can easily contact by phone
If you can’t get into your account, Facebook will give your trusted contacts a security code that you can use to get back into your account. Only you can log in with the code - your friends can't.
If you can’t get into your account, Facebook will give your trusted contacts a security code that you can use to get back into your account. Only you can log in with the code - your friends can't.
Subscribe to:
Posts (Atom)