Technology is being successfully used to support and enhance the ability of personal teaching by making attractive, positive and effective teaching and making teaching more flexible, creative and accessible. Find out safe ways to use technology with learners to promote self-esteem, perseverance, participation and develop friendship. To promote and discuss ‘Neticate’, e-protection and digital literacy. Show the learners that adults understand the techniques used by them – or protect women and children on the Internet.
Chatting friends attract their female friends using words like “beautiful figure”, “sexy”, and “attractive” etc., which is actually the beginning of a trap of obscenity. Gradually, the culprit takes his female friends into confidence and inspires them to become a victim of the crime of the virtual world. Troll them on any issue raised by them and bother women by sending porn e-mails, chasing women using a chat room, website etc., even the criminal threatens the victim girl that if she discusses any incident related to the sexual harassment caused by the said criminal with someone, she will transmit MMS and in some cases she could not tolerate insults and rich in some cases.
Explain to someone and assure that the woman has done the right thing; Refer to any existing priest aid/process. Help women and children to keep relevant evidence for any investigation (for example, do not remove the messages received, and take screen capture shots and note the web addresses of online cyber bullying events). Since the criminal is behind the screen and not in a public place, he gets the benefit of keeping the name secret. Therefore, everyone needs to be aware of the effects of cyber crimes against women and other types of crimes. Law enforcement agencies and parents should be made aware of the responsibilities of women and children in the use of information and communication technology, and should also be told what punishment can be imposed on its misuse. Women and children should know who can help them in case of cyber crime.
There are always more than one way to solve the problem. Hacker and hacking words are being misinterpreted and misunderstood with the negative side. But, the quality and type of hackers depends on the attitude towards technology and it is related to practical methods of learn and learning. Hacking: The art of investigating various security violations is called hacking.
Hackers: Hackers are intelligent computers professionals who create safety awareness by sharing knowledge. It is a team that works to find out what is happening on the depth of the system, what is happening behind the screen and detect potential security weaknesses in the system. The hacker clock allows you to report and share information, which helps to deal with and prevent the spread of internet hazards and unwanted network traffic. Hacking behavioral science and technology can also be an alternative to institution-based work. Computer security is a continuous fight. As computer security is getting tight, hackers are becoming more smart.
Hackers are of three types and are classified on the basis of their intentions and hacking morality.
Gray shades: Many security experts classify hackers as white hats or black hats but in fact, most hackers come somewhere in the middle.
Vulnerability: This is a weakness that allows the attacker to reduce the information assurance of the system.
Crackers: A person who makes a dent in the computer with malicious intentions and can create unauthorized access to the system and can damage, destroy, destroy or reveal confidential information. Their purpose is to compromise the system to harass, harass or take revenge on the system to refuse to serve them. They can cause financial loss and image/reputation damage to individuals or organizations, defamation in society.
Freex: These are the individuals who use computer devices and software to make a dent in the phone network. They find flaws in the security of the phone network and make phone calls for free. They actually used your number to call and maybe you have to pay a large amount of phone bills without doing anything !!!
Script Kidies: These are the people who do not have technical skills to hack computer. They use the available information about the weaknesses known to dent distance systems. It is a work done for entertainment or curiosity in which no person or organization is damaged.
The reconnaissance can be described as a phase before the attack and it is a systematic effort to detect, assemble, identify and record information about the goal. The hacker wants to get more information about the goal as much as possible.
Read Also:
Technical writing is also called the science of designing and packaging information that is prepared…
Technical writing is a form of writing that helps explain complex and intricate processes related…
In today's busy life, weakness and fatigue are common things. A person must have felt…
Do you always feel tired? Is the complexion of your face not the same as…
The dark web refers to encrypted online content that is not indexed by traditional search…
The Dark Web Explained—96 percent of the Internet is the Dark Web. This is an…