• توجه: در صورتی که از کاربران قدیمی ایران انجمن هستید و امکان ورود به سایت را ندارید، میتوانید با آیدی altin_admin@ در تلگرام تماس حاصل نمایید.

آموزش Internet Safety -En

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Dooced

If someone loses their job because of something they posted on a blog or social networking site, they have been dooced.



 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Troll

A troll is a person who posts comments just to get a rise out of people and cause a distraction.

Trolls might say something rude, assert incorrect information, or ask questions

unrelated to the topic at hand. People who respond to obvious trolling posts

are said to be feeding the trolls, which often causes the trolls to return and continue disrupting the discussion








 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Flame War
A flame war is a heated argument in a social media outlet such as a web forum, mailing

list or chat room, in which intentionally insulting comments and personal attacks

become a focus of conversation






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Screen Name

A screen name, sometimes called a user name, is a virtual name that is used

to identify users of a website where social media is a component. Your screen

name can be your real name or a pseudonym



On sites where you regularly interact with strangers, it is a good idea to choose

a pseudonym. When choosing a descriptive pseudonym such as tennis247 or

partyboy18, keep in mind the image it might protray and the response it will solicit






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Flamebait

A comment posted by someone trying to provoke a flame, or an angry response, is called flamebait.


If anyone responds to the comment, they are said to have taken the bait.








 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Meme

Meme is something that has gone viral, or spread rapidly around the internet, such

as a catchphrase, hoax, topic, concept or piece of media



Memes are often cute, funny or curious and make you want to pass

them on! If you are forwarding an email, just remember that everyone who gets

that email in the future could have access to your email address








 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Posts
Content that people publish on websites involving social media, such as

blogs, newsgroups, and forums are called posts. Twitter calls the posts that users make to Twitter sites tweets.



Posts are available to everyone who has access to the site. You do not always

have the option to change or delete your post once it is posted. It is an

instantly public representation of you or your online identify. Think before you post






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=3]Chats

Chats are live, online conversations. You can chat with people in a chat room or by using an instant messaging service.


Unlike having a conversation with someone out loud, everything you write in your chat

session can easily be saved and shared with others. Think before you press send

chat_conversation_resized2.png






 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety


[h=3]Googling Yourself

Do you know how much anyone can quickly find out about you and your background

just by doing a simple web search? Most people don't know that personal records such

as their address, phone number, and sometimes even pictures can be easily

accessible to anyone online. While this information may not be harmful, in some

situations you could put yourself at risk by not knowing what is out there. For instance, someone

only needs to find out your home phone number, and they can find your address and directions

to your house just by doing a simple online search. Google yourself regularly to find out which

websites and public databases share information about you





 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety




[h=4]Make the Most out of Your Search

google_yourself.jpg



Enter search terms such as your name, email address, home and work address, and phone

numbers
in a variety of ways to get the most accurate and complete results. Also, putting

quotes around your search terms tells the search engine to find a specific phrase

just how you wrote it. This will make your search more efficient




  • First name and last name: "Will Bolding”
  • First, middle, and last name: “Will Edward Bolding”
  • Last name followed by a comma and then your first name: “Bolding, Will”
  • Last name followed by a comma, your first name and middle name: “Bolding, Will Edward”
  • Street address: “2521 Street Address Lane”
  • Phone number (using no spaces or hyphens searches all instances of your number): “9195554444”
  • Email address: “boldingsoccer@email.com”




 

A M I R

کاربر ويژه
[h=2]Introduction to Internet Safety



[h=4]Removing Your Information from Websites

You can ask a website to remove your information. Keep in mind that they are not

always obligated to comply with your request. If the information posted about you is a

direct threat to your safety and you need help negotiating with a website to remove the

content, you can contact WiredSafety.org. They will be able to advise you on your specific case

You can also pay an outside service like ReputationDefender to remove your personal information

online. For most people, this kind of service is unnecessary, but keep in mind that it is an option






 

A M I R

کاربر ويژه
[h=2]Passwords: The First Step to Safety


[h=3]Passwords: The First Step to Safety

Most people don't put a lot of thought into creating a password. It's usually easiest just

to create a short, easy-to-remember password, or even just to use the same password for

every account you have. After all, the average person probably won't be able to guess your password


However, hackers often use password-cracking software that can keep testing

many different passwords until they find the correct one, and they can easily crack

weak passwords
. By creating strong passwords, you can greatly reduce the chance

that your personal or financial information will be stolen


 

A M I R

کاربر ويژه
[h=2]Passwords: The First Step to Safety



[h=4]Common Password Mistakes

Many people create passwords based on their spouse's name, a hobby, or a simple pattern, since

those types of passwords are easy to remember. Unfortunately, they are also very easy

for hackers to guess. To create a strong password, you will need to avoid these types of common mistakes

Review the infographic below to learn some common password mistakes

infographic_passwords.jpg



To see more examples of common password mistakes, check out 25 Worst Passwords of 2011 Revealed.




 

A M I R

کاربر ويژه
[h=2]Passwords: The First Step to Safety



[h=4]Tips For Creating Strong Passwords:

Never use personal information such as your name, birthday, or spouse's name. Personal

information is often publicly available, which makes it much easier for someone to guess your password


Use a longer password. Your password should be at least six characters long, and

for extra security it should ideally be at least twelve characters (if the site allows it



If you need to write down your passwords, keep them in a secure place. It's even

better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand


Don't use the same password for each account. If someone does discover

your password for one account, all of your other accounts will be vulnerable.





  • Try to include numbers, symbols and both uppercase and lowercase letters
  • (if the site allows it).
  • Avoid using words that can be found in the dictionary. For
  • example, "swimming1" would be a very weak passwor.



Random passwords are the strongest. Use a password generator instead of trying to think of your own.

Random passwords are harder to remember, so create a mnemonic device. For

example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA

paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize




 

A M I R

کاربر ويژه
[h=2]Passwords: The First Step to Safety


[h=4]Using Password Managers
Instead of writing your passwords on paper where others can easily see them, you can

use a password manager to encrypt and store them online. Some password managers

can also generate random passwords, making your information even more secure. Examples

of password managers include LastPass, KeePass, Firefox's password manager, and

Google Chrome's password manager


For example, when using LastPass, you will first need to install the LastPass

browser plugin
. Whenever you type a password on a website, the browser

plugin will ask you whether you want to save it. The next time you go to the

website, LastPass can automatically enter the password for you. If someone

else wants to use your computer, you can simply log out of LastPass to

prevent the other person from accessing your information


passwords_lastpass.png


Saving a password with LastPass

 

A M I R

کاربر ويژه
[h=2]Protecting Your Computer from Internet Threats



[h=3]Introduction

Viruses, Trojan horses, worms and spyware are all threats that can damage our computer

systems. We know we need to protect our computer, but with so many antivirus programs

on the market, how do we know what's best for our specific needs


In this lesson, we will review what kind of antivirus protection you might need and

how you can determine which product is best for you. In addition, we will discuss

how to back up your system and get the most out of your security programs


intro_lesson2.jpg




 

A M I R

کاربر ويژه
[h=2]Protecting Your Computer from Internet Threats

[h=3]What Protection Do You Need?
The best defense against internet threats is good antivirus software, or anti-malware as

it is sometimes known. Antivirus software can protect you from infected email

attachments, corrupt websites, internet worms, spyware and more. There are

a ton of antivirus products on the market, so figuring out what you need can

be quite confusing and overwhelming. Therefore, we will outline the things you

need to consider to give you a better idea of what you should be looking for

in an antivirus program




 

A M I R

کاربر ويژه
[h=2]Protecting Your Computer from Internet Threats

[h=4]Multiple Protections
The protection you obtain should include the following three components:

Antivirus - specifically protects against viruses

Anti-spyware - protects against malicious software that may be gathering your information without your knowledge

Firewall - screens out threats that try to reach your computer over the internet


Some security suites offer a lot of additional protections, but these are the three main components that you will need.




 

A M I R

کاربر ويژه
[h=2]Protecting Your Computer from Internet Threats


[h=4]Security Suites
Most antivirus companies offer both a stand-alone product that only scans for

viruses, and a packaged security suite that offers additional protections like

firewalls, spam ******ing, anti-spyware tools and more




 

A M I R

کاربر ويژه
[h=2]Protecting Your Computer from Internet Threats


Security Suites

Security suites are generally easier to manage and offer a wide range of protection which

can be useful if you are a beginner. However, in some cases the extra functions of a suite

are not as good as the stand-alone products for that function. In addition, some suites

have a tendency to slow down a computer


 
بالا