Sunday, September 13, 2009

What Will You Do if You had been Victimized by Scammers?

Most people nowadays while we are now moving forward towards the advance generation of computer technology the scammers are making the full use of the system to fool other people for their personal interests. For some people, something illegal is just an easy way to get money. Lots are tempted to involve themselves into fraudulent acts.

Here are some tips if you had been victimized by scammers:

1. If you are suspecting that you have dealt with scammers the first thing to do is to report to the local authorities for verification and further investigation.

2. Once confirmed then you can alert your friends not to deal with such company that engaged into fraudulent activities.

3. Spread the news by taking advantage of the available media such as internet to inform everybody. You can go to social media like blog sites and join the online forums.

4. Make follow ups with the local authorities that handle the internet crimes and other related acts.

5. Do not cry if you have given money try to do some ways to get it back. Do not just sit down and be worried without doing anything. Take note about their business address and contact numbers if they have. Follow the advices of the authorities who conduct investigation or entrapment operation since they are more expert than you.




6. To overcome your trauma from spending your money for nothing, keep yourself busy on other things.

7. Try to accept within yourself that you did not lose instead you have gained experience that would make you strong. That was only trials and hiccups in your life. Like me, although I was a registered associate with a networking company and spent much of my savings to it 5 years ago I never lose hope in life and yet I considered it as blessing in disguise. Even though I lose money from it by investing I am so grateful that by attending many free seminars I became a different person. Before becoming an associate I was contented with the 8x5 office-work and wait for monthly salary but I have realized that in getting into business through its seminars I could possibly earn more than twelve months of my salary in just a month. All I have to do is to think with an entrepreneurial spirit. Did I lose anything, of course my money but it was for the exchange to my experience to become stronger. I considered that the seminar was the prize I got from spending huge amount of money. I know I could not learn from school all those experiences they shared. It inspired me until now as I go on in on to become successful.

Tuesday, September 1, 2009

History of Virus

History of Virus:

The first computer virus had been firstly detected on the early ‘70s. In 1971 there was a computer virus that was called Creeper virus and it was detected thru the Advanced Research Projects Agency Network or commonly known as ARPANET. Creeper was the fruit of experiment by Bob Thomas. This Creeper program has the capability to replicate itself. The main purpose of this virus was to inflict the Mainframe made by DEC in the late 1960s. This mainframe was called PDP-10 or Program Data Processor Model 10 that ran under TENEX operating system. The Creeper virus was famous with the line saying, “I’m the creeper, catch me if you can” for all those infected computers. Because of this first virus there was a first anti-virus that had been made and it was called the “Reaper” that has the capability to delete the Creeper virus.

“Rother J” was the first virus that had gone out over the networks.This virus had been written by Richard Skrenta. Apple DOS 3.3 was the operating system that had been victimized by this virus and the spread had been possible through its floppy disks. Out of amusement during Richard’s high school life it was injected into a game.

During the times before the popularity of computer networks the viruses can only be spread through the use of media files, portable storages like floppy drives, etc.

Nowadays, viruses can be spread through networks and they have the capability not just to take control of your program in your computer but to detect your activities and get some non-disclosure information about you.

A simple virus can be made by using the assembly language program and those virus generators have other ways by using other type of programs to give harm to others.

There are some rumors that allegedly they are accusing those anti-virus makers as one of those who make viruses to spread over the networks. As some bad business concept, they create problem in order to sell the solution!

Friday, August 28, 2009

Virus? How it Works?

This article is about "virus". How this virus had started? Who are those behind the viruses in computer? How does it affect you? Do you want to hear some stories about the virus? How to get rid of virus


Well, I will one by one discuss it here. See my next post and keep you informed!

Monday, August 24, 2009

Knowing the Truth

How would you know the truth if the company that you are dealing with is engaged with fraudulent business? Well, to answer this question it can only be limited to investigate by gathering facts and not just listen to what other people say. Do not just rely on one person saying bad things about the company or a person. Sometimes other people want just to imply damage on others. Some people who work with that company maybe were saying good thing but because they are associates or affiliates and would like to fool others to protect their interest they use blog communities and other forms of media. While reading some online forums, make sure that the comment against a person or company does not come in just one source. Review all the forums available on the internet and make an assessment of your own. Check the credibility of the websites that had made comments either good or bad as well. Although some websites have no control on the sharing of opinions of their followers the best thing to do is to further investigate. Actually you have moved one step ahead if you have done checking what other people saying about your concerns. Investigate with the famous search engines and key in the company name, the filename of the intended files to be downloaded, etc and match it with the common keywords such as “fraud”, “scam”, and other terms alike. Always make this searching before you click a button to accept the suspected company’s offer. Although some of the readers already knew what to do it is good to be reminded with this simple way of getting the truth behind the suspected fraudulent company before you blame yourself out of impulsion.

It is good to check the trusted government websites that deal about the internet crimes and fraud. As what I said credibility of the company is need to be known.

Friday, August 21, 2009

The Internet Scammers Game

Everywhere there are people who think about how to fool others to make for a living!
No wonder that even if we are now in computer age they also seen online and make disguise about themselves! They are scammers that are often related to the following:
1.Pretender,
2.Quack,
3.Rascal,
4.Rogue,
5.Shark,
6.Swindler,
7.Trickster,
8..and lot of negative connotations!

The bottom line question here is how to get rid of them?

I pity all those victims that's why I have made an article that deals and discuss about the Online World of Crimes!
If you have some experiences let us know so that we could notify others before they engage themselves with the scammers! What we need here is how to detect if you are dealing one of these "tricksters"!

Brace yourself as I am going to reveal the secrets of these scammers! All what we know will be posted here! These will be based from our own personal experiences, what we have heard, what we have read. Those former scammers are also welcome to reveal their secrets! As the saying goes, "preventive is better than cure" let us prevent all these by early detection and once we have some doubts or gathered evidences we can report these to authorities.

Friday, August 14, 2009

Internet Scams

If you have some concerns about internet fraud please do not hesitate to post or make any comments. New,similar or related from what I have posted here can be subject for discussion.

Thursday, August 13, 2009

Hackers


Hackers are the professionals which can be made up by the group of individuals or just an individual alone (hacker, singular form) who hack or get undisclosed information of the corporation or people for their own or personal interest which is against the will or consent of the source.

Beware of hackers and just be observant and cautious in dealing with untrusted websites and pop-ups on your computer screen!

On the internet do not just engage with sites that offer free downloads. Before allowing the files to be downloaded to your personal computer make sure that they are from trusted sites. Investigate and search for the forums or blogs concerning about the websites or the filename to be downloaded if there are complains about it.
It would be better if you do scanning on your hard disks, either built-in or external storage.

If you are using old version of the anti-virus software do not be contented of the scanning. Some viruses cannot be detected by the old version of anti-virus program. Make sure you have the latest version. Even if you have the latest version let us face the fact that there are new viruses being released that even if your new version of anti-virus may not the complete solution.

I would advise that you do multiple scanning. even if I have the latest version I do at least 2 times of scanning my personal computers and my external storage devices. Sometimes, one time scanning can skip other files to be scanned well so I run another scanning and I will stop it after I made sure that the result has "no virus found". It would be better if you update your anti-virus software from time to time if it prompts you to do so while you are online. As what I have said be careful and make sure that all downloads to your computer should be verified and has certificates or information about the source.

Avoid sites that have pornographic contents as much as possible since there are lots of virus spreading over the said sites. If you cannot resist just be careful!

I believe that those who spread viruses over the internet are the hackers.They are using programs and software to keep themselves informed about your activities online and get your personal information while you are registering to your email, signing ups, and keying your credit card info. To keep hackers away from getting into your confidential information some of the credit card companies are using special online alpha-numeric pad and you may key in by choosing the character using your mouse pointer.

To keep hackers out of the picture be cautious, observant, and hear what people say but do not just listen, support it by gathering facts and other relevant information.