Skip navigation

Category Archives: Internet

Go to fullsize image

A 30 years old women from Minnesota are liable for sharing copyrighted music online.  Jammie Thomas are liable and  jurors ordered  her to pay record companies $220,000 — or $9,250 for each of 24 songs for which the companies sought damages. They could have awarded damages as low as $750 per song. six recording company accused Thomas for downloading illegaly and offer the songs through a Kazaa file sharing accounts. Thomas had denied wrong doing and during the trial testified that she didn’t have a Kazaa account.

but thomas gives conflicting dates for the replacement of her computer hard drive,  Richard Gabriel attorney of Six Companies told that Thomas done  that to cover her tracks.

Now that label companies win the trial how can jammie pay that $220k?

Find More Related issue: Wired.com,LA Times

Can Computer Games affect our kids? In my own opinion and experience the effects of computer games  on our children are very alarming now adays, look at this computer shops that you will see everywhere most of their costumers are kids, more than  7 years old and above, like my son he is very eager to play this  popular game LF2 (little fighter 2) that you can download for free on the Internet, my 6 years  old son downloaded it from the Internet and play it everytime… I’m very confuse why he liked this very much then i try to watch him when he was playing with this LF2, i see that this kind of games is very addictive in our kids because  my son play this game for almost 1 hour or more can you imagine that,  it’s very alarming that he spend more time on computers than to study his lessons, so right now I’m lessen the time i given  him playing computer games like that,  if you have kids like mine that very addicted to computer games be sure to monitor what he is doing and lessen the time you give to them instead force them to other sports like basketball, swimming or other indoor activities that will help them to develop their stealing  minds…  

  

Criminal Organizations are using Internet to gain enourmous amounts of money, according to German police (Berlin),10 suspected people are arrested for being involved in international Internet Scam, 18 month long waiting for probe has resulted in raids in german cities, were involved in ” phishing ” . the group targeted the bank accounts of the customers who recieves email, attached to the email is a trojan horse software which can records data that entered into the computer.

PHISHING – (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.

Phishing, also referred to as brand spoofing or carding, is a variation on “fishing,” the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

TROJAN HORSE – A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse’s hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.

Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are:

Remote Access Trojans
Data Sending Trojans