Friday, 25 April 2014

Blog

Blogging

A blog, short for web log, is a website that is regularly updated with new posts, similar to a diary. Services such as Blogger, WordPress and MSN Spaces have made it easy for private individuals and companies to set up their own blogs.

The Risks
Take Note:
  • Never disclose private information when blogging.
  • Remember that what goes online stays online.
  • Your details could be discovered even if you blog under an assumed name, or anonymously. For example, blogs that are stored outside the EU may not be covered by the same data protection or privacy regulations we enjoy in the UK.
  • You might regret later, something that you blog about. For example, you may lose your job or fail an interview because of embarrassing posts, or upset a friend, relative or loved one.
  • Blogs are subject to libel law. Posting something that is untrue about an individual or organisation could incur serious penalties.
  • Remember – what you post online stays online ... anything you post remains in the public domain and accessible indefinitely. Even if you subsequently delete the post, it may have been cached in a search engine or internet archive, or in a company server.
  • You may think you have a small audience, but blogs are public and it is very easy for people to find information on them via search engines.
  • The ‘comment’ feature present on many blogs could be exploited by spammers including links to websites they are promoting, cyber-criminals including links to fraudulent websites, or people using abusive or threatening language.
  • Children unwittingly revealing personal information or posting photographs of themselves.
Safe Blogging
  • If you want your blog to be public, disclose only what you want everyone on the Internet to know. Otherwise, keep your blog private. 
  • Periodically review who has access to your site and make changes if necessary. 
  • Keep details that identify you only to yourself and trusted people.
  • Do not post confidential information that might be used to steal your identity such as credit card numbers, passport details or home address.
  • Consider using an assumed name if you wish to keep your identity secret for personal safety, political reasons or security of employment.  
  • Be careful what information you disclose such as your address, school, place of work or birthday.
  • Be careful about the photos you post as they may reveal things about you that you would rather keep private. 
  • Be careful about what private feelings you share in your blog.
  • Be aware of what friends blog about you, or write in comments on your blog, particularly about your personal details and activities. 
  • Be cautious about meeting in person someone you only know through blogging.
  • Ensure that children are aware of the dangers of blogging to a public audience. 
  • If you are new to blogging, start cautiously. Understand the features of the software you use and how the blogging community (the ‘blogosphere’) works, including how to filter comments.
  • Do not post anything that may cause you embarrassment at a later date.

Computer worm

computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Many worms that have been created are designed only to spread, and do not attempt to change the systems they pass through. However, as the Morris worm and Mydoom showed, even these "payload free" worms can cause major disruption by increasing network traffic and other unintended effects. A "payload" is code in the worm designed to do more than spread the worm—it might delete files on a host system (e.g., the ExploreZip worm), encrypt files in a cryptoviral extortion attack, or send documents via e-mail. A very common payload for worms is to install a backdoor in the infected computer to allow the creation of a "zombie" computer under control of the worm author. Networks of such machines are often referred to as botnets and are very commonly used by spam senders for sending junk email or to cloak their website's address. Spammers are therefore thought to be a source of funding for the creation of such worms, and the worm writers have been caught selling lists of IP addresses of infected machines. Others try to blackmail companies with threatened DoS attacks.
Backdoors can be exploited by other malware, including worms. Examples include Doomjuice, which can spread using the backdoor opened by Mydoom, and at least one instance of malware taking advantage of the rootkit and backdoor installed by the Sony/BMG DRM software utilized by millions of music CDs prior to late 2005

References

  1. Jump up
    ^ Barwise, Mike. "What is an internet worm?". BBC. Retrieved 9 September 2010.
  2. Jump up
  3. Jump up
    ^ Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply"The Seattle Times.
  4. Jump up
    ^ McWilliams, Brian (October 9, 2003). "Cloaking Device Made for Spammers"Wired.
  5. Jump up
  6. Jump up
    ^ "Uncovered: Trojans as Spam Robots"hiese online. 2004-02-21. Archived from the original on 2009-05-28. Retrieved 2012-11-02.
  7. Jump up
    ^ "Hacker threats to bookies probed"BBC News. February 23, 2004.

Sunday, 20 April 2014

NZ

  • New Zealand
    Country
  • New Zealand is an island country in the southwestern Pacific Ocean. The country geographically comprises two main landmasses – that of the North Island, or Te Ika-a-Māui, and the South Island, or Te Waipounamu – and numerous smaller islands. 
  • Area268,680 km²
  • CurrencyNew Zealand dollar
  • Official languagesEnglish Language, Māori language, New Zealand Sign Language
  • GovernmentUnitary state, Constitutional monarchy, Parliamentary system

  • GERMANY

  • Germany
    Country
  • Germany, officially the Federal Republic of Germany, is a federal parliamentary republic in western-central Europe. The country consists of 16 states and its capital and largest city is Berlin. 
  • GovernmentFederal republic, Constitutional republic, Representative democracy, Parliamentary republic
  • Official languageGerman Language
  • NIGERIA

  • Nigeria
    Country
  • Nigeria, officially the Federal Republic of Nigeria, is a federal constitutional republic comprising 36 states and its Federal Capital Territory, Abuja. 
  • Area923,768 km²
  • CurrencyNigerian naira
  • Official languageEnglish Language
  • GovernmentPresidential system, Federal republic
  • KENYA

  • Kenya
    Country
  • Kenya, officially the Republic of Kenya, is a sovereign state in the African Great Lakes region of East Africa. Its capital and largest city is Nairobi.
  • Area582,650 km²
  • CurrencyKenyan shilling
  • Official languagesSwahili Language, English Language
  • GovernmentPresidential system, Representative democracy, Republic
  • ITALY

  • Italy
    Country
  • Italy, officially the Italian Republic, is a unitary parliamentary republic in Southern Europe. To the north, Italy borders France, Switzerland, Austria, and Slovenia, and is approximately delimited by ...