• توجه: در صورتی که از کاربران قدیمی ایران انجمن هستید و امکان ورود به سایت را ندارید، میتوانید با آیدی altin_admin@ در تلگرام تماس حاصل نمایید.

آموزش Internet Safety -En

A M I R

کاربر ويژه


Introduction to Internet Safety

Passwords: The First Step to Safety

Protecting Your Computer from Internet Threats

Email Tips for Scams and Spam

Staying Safe While Browsing

Protecting Your Financial Transactions

Smart Social Networking and Communication Tips

Cyber-Harassment, Stalking and Addiction

Wireless and Mobile Device Safety



 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Introduction

We all know we need to stay safe while using the internet, but we may not know just how to

do that. In the past, internet safety was mostly about protecting your computer from

viruses
. But today, the internet's vast reach, constantly changing technologies and

growing social nature have made users more vulnerable to identity theft, privacy

violations
and even harassment


This lesson will introduce you to the types of threats you may

encounter while online. It will teach you basic strategies like how

to Google yourself and create strong passwords, in addition to encouraging you

to adopt a safer mindset toward using the internet


intro_lesson1.jpg




 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Adopting a Safer Mindset

When it comes to the internet, people generally think they are safer than they actually

are. Why? Well, often the impersonal nature of technology can give us a false sense

of security
. After all, no one can physically attack us through a computer screen


We tend to have an it-won't-happen-to-me attitude. We may even believe that

our computer programs and the "powers that be" are automatically taking care of

all that internet security stuff for us. Sometimes we just avoid it all together

because, to be frank, we just don't get it. Does this sound like you? Consider the following the questions


Have you ever Googled yourself to see what information can be found on you?

Have you set your computer's security program to make sure you are getting regular updates?

Do you have an external back-up source for your computer?

Are you enticed by emails or advertisements with special discount offers?

When shopping online, do you check a website's security status before entering your billing information?


Have you customized your privacy settings for your social networking accounts like ********, MySpace, Skype, etc.?


laptop_woman_thinking.jpg





Do these questions make you nervous? Don't worry, this tutorial is not meant to scold or scare you, but to make you realize that there are precautions we should all be taking on a regular basis to maintain our personal safety and protect our computer while using the internet.


 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety




[h=4]Think of the Internet as You Would a Shopping Mall

Generally a mall is not considered a dangerous place. We go there to shop, run

errands and meet people, but we also take precautions while there. We wouldn't leave

our car unlocked in the parking lot or walk around with our wallet hanging out of our

purse. We wouldn't tell a sales clerk our social security number or give our address to a stranger we just met


The same applies when we are on the internet. We need not fear our

every mouse click, but we should take precautions to ensure our safety


 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Understanding Internet Threats Before we can learn how to protect ourselves, we need to understand what

the threats are on the internet. Click the buttons in the interactive below to learn

common internet safety terms that pertain to our computers and identity theft
ThreatsTagCloud.jpg




 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Pharming
Pharming is a technique used to redirect a legitimate website's traffic to

another illegitimate website
in order to gain access to a user's personal information

.



 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Virus

A virus is a self-replicating software program that is designed to infect a

computer by rapidly spreading from one file to another
sometimes causing

great harm. it is spread by humans when they copy or add email attachments of infected files


*Worms are similar, execpt they are usually spread over a network without human help.



 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Phishing
Phishing is mail or instant message scams that are disguised to look like

official communications from a legitimate website. They fool users into

providing sensitive information like passwords, credit card details, etc


phishing_cropped.jpg





 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Trojan Horse
A Trojan horse is a malware that appears to be benign or desirable and thus tricks

the user into allowing the program access to their computer, usually through a download or email attachment


virus_alert_resized.jpg





 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Malware

Malware is an intentionally malicious software or code that is designed to

damage your computer or collect information without your knowledge


Viruses, Trojan horses, worms, spyware and keystroke logging snoopware are

all considered malware. Sometimes adware and freeware can also be malicious





 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Spam


Spam is unsolicited email or junk mail, much of which contains money scams or sexual content.


spam_1_resized.png







 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety
[h=3]Spyware
Spyware is a type of malware that collects information about users without their

knowledge
, often to track browsing habits and to create

pop-up advertisements. Along with invading your privacy it can sometimes interfere with a computer's functions


It can be attached to a malicious adware and freeware that is privacy-invasive.




.

 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Browser Hijacking

Browser hijacking occurs when malware or spyware replaces your browser's home

page
with its own in order to force more hits to a particular website.



 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Clickjacking
Clickjacking is a technique that tricks users into clicking on a malicious link

by adding the link to a transparent layer over what appears to be a legitimate web page

Users think they are clicking on buttons or links in the legitimate page, when

in reality they are clicking on the concealed links in the hidden page and

often providing access to confidential information
in the process






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Hoax

A hoax is an email chain letter that warns of impending viruses and tries to scare users into forwarding and continuing the hoax email.



 

A M I R

کاربر ويژه
Introduction to Internet Safety





Pharming

Pharming is a technique used to redirect a legitimate website's traffic to another illegitimate website in order to gain access to a user's personal information.


Mousetrapping



Mousetrapping is commonly used by pornographic sites, this technique keeps visitors

from leaving a website
by locking them into a window, opening multiple windows on

the desktop, or relaunching their website in a window that can't be closed






For the latest internet terms and text and chat acronyms, go to NetLingo.com.
 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Internet Safety and Privacy

In the past, internet safety generally referred to threats to our computer hardware or

identity theft, but now with the internet becoming more and more social, privacy

has become a significant safety concern. Privacy violations can especially affect

our mental and physical well-being, thus creating distress or harm from the following




  • Undesired advertisements that can be annoying
  • Embarrassing or humiliating photos or videos
  • Legal entanglements from libelous posts
  • Cyber-harassment or cyber-stalking
  • Identity theft
  • Offline or "real world" crimes


 

A M I R

کاربر ويژه
[h=2]ntroduction to Internet Safety


[h=3]Sockpuppet

A sockpuppet is a fake identify that someone creates and uses to deceive others for

some kind of personal gain. On most websites it is possible to have more than one account, so it is easy to create sockpuppets


For example, John could have a few online identities for the same

chat service: John45, Sarah03, and HarmonicasRock12. When he

is HarmonicasRock12, he might pretend to be a 30-year-old music

enthusiast to find out what music stores you go to. And when he is

Sarah03, he might pretend to be a 20-year old college student to

find out where you went to college






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Avatar

An avatar is a virtual representation of yourself. The term usually refers to a virtual image.


Instead of using your picture on a social networking profile, you might use an avatar to protect your privacy.


avatar_images.png






 
بالا