Thursday 7 May 2009

'Ill' worker fired over Facebook (My View)

http://news.bbc.co.uk/2/hi/technology/8018329.stm

above is the link to the article i was reading about. which is about a swiss women who i sacked because she said she had a migraine and that she needed to be in a darkened room but she was found to be on her wiki.

i think it is unfair to sack an employee if they are on a computer at home because one they might just have hurt there self and are caipable of using a computer but in this case well i see it as unfair as she could have recovered from her migraine and there is also a big difference in being in your bed using a phone than sitting in work on a computer. At home there is no pressure to get work done she can relax and really does not have to focus but at work she does. her work knew she was on it so they were checking up on her which means they cant trust her so why have her employed in the first place.

So in conclusion i think workplaces should not have the right to spy no matter what. If they employ us then we must be trusted . So why not trust we are not fit enough for work

Tuesday 17 June 2008

Acceptable Use Policy

An acceptable use policy (AUP; also sometimes acceptable usage policy) is a set of applied by rulesnetwork and websit owners which restrict the ways in which the network or may be used. AUP documents are written for site corporations, businessess, universities, school, and website owners often to reduce the potential for legal actions that may be taken by a user, and often with little prospect of enforcement.

Acceptable use policies are also integral to the framework of information security policies; it is often common practice to ask new members of an organization to sign an AUP before they are given access to its information systems. For this reason, an AUP must be consise and clear, while at the same time covering the most important points about what users are, and are not, allowed to do with the IT systems of an organization. It should refer users to the more comprehensive security policy where relevant. It should also, and very notably, define what sanctions will be applied if a user breaks the AUP. compliance with this policy should, as usual, be measured by regular audits.

E-mail spam

E-mail spam, also known as "bulk e-mail" or "junk e-mail," is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. A common synonym for spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. "UCE" refers specifically to "unsolicited commercial e-mail."

E-mail spam slowly but exponentially grew for several decades to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users. Laws against spam have been sporadically implemented, with some being opt-out and others requiring opt in e-mail. The total volume of spam (over 100 billion emails per day as of aprill 2008has leveled off slightly in recent years, and is no longer growing exponentially. The amount received by most e-mail users has decreased, mostly because of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets networks of virus-infected computers, are used to send about 80% of spam. The cost of spam is borne mostly by the recipient, so it is a form of postage due advertising.

E-mail addresses are collected from chatrooms, websites, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. Much of spam is sent to invalid e-mail addresses. ISPs have attempted to recover the cost of spam through lawsuits against spammers, although they have been mostly unsuccessful in collecting damages despite winning in court.

Friday 2 May 2008

Anit Virus

There are many manufacturers of anti-virus software including BullGuard, BitDefender, Frisk, Grisoft, McAfee, Sophos, SymantecandTrend. Some, such as Grisoft, even supply a free version of their AVG anti-virus software, while others, such as Trend, offer a free online virus scan.


McAfee Plus offers proactive PC security to prevent malicious attacks, so you can protect what you value as well as surf, search, and download files online with confidence.

AVG offers All in one (Anti-Virus, Anti-Spyware, Anti-Rootkit, Anti-Spam, Firewal, Safe Downloads, Safe Instant Messaging, Safe Search, Safe Surf, System Tools, Technical Support)

with AVG antivirus, the signature updates are seamless and unobtrusive. The way security updates should be. But as a user - besides AVG offering a freebasic version of its software.
I like AVG Antivirus because it delivers on a simple promise, and not a fantasy of how information might be managed in the future

Tuesday 8 January 2008

Be Careful when meeting people

Many people have gone on to from lasting friendships with people they have originally met online, but you must be very careful if you are asked to a real-life meeting with someone you have only met online. You should think about why they want to meet you for real.
If you do decide that you want to meet them, arrange the meeting in a public place and take along a parent or an older friend that you can trust. Anyone who won't agree to these arrangements probably has something to hide.
Go to the Netsafe web site and view the video entitled "Be cautious about meeting online friends".
You've now reached the end of this section of the course. You can return to any topic by using the menu at the left-hand side of the screen, or you can return to the home page for the course by clicking the NetSafe logo at the top left of the screen.

Be Cautious with E-mail

The best way of dealing with e-mails from an address you don't recognise is to discard them completely. That way, they can't cause any harm to you or your machine.
You should never open an e-mail attachment from anyone you don't know. The attachment could easily be a virus or some kind of objectionable material - this is one of the commonest ways in which viruses are spread.
Many e-mail programs prevent users from opening attachments with any kind of "active" content, ie: anything which runs a program or script which could damage your computer.
You should also avoid following hyperlinks in e-mail messages from anyone you don't know, as they can lead to web sites which will infect your system with a virus or spyware, or display objectionable material.
Finally, never reply to unwanted emails. That simply lets the sender know that your e-mail address is genuine and is likely to lead to more unwanted emails in future.

Reporting Abuse

A moment ago, we mentioned that you can report abuse online to CEOP, the Child Exploitation and Online Protection Centre by clicking on the Report Abuse button:

If you click on this button you'll be taken to a page where you'll be warned that you must agree to the content of your report being shared with international law enforcement agencies and that you will be required to enter your name, age and at least one means of contact. If you are not willing to accept these conditions, you can click another link to be taken to a page where you can make an anonymous report.
If you agree to these conditions, you will be directed to another page where you will be asked whether you want to report online content or online abuse. Once you have made your choice you will be asked to enter your personal details, then directed to the appropriate reporting site.