How to Be Safe on Internet?

0
212

Before getting into the technical stuff, I would first like to introduce what the Internet is. The Internet is just a huge network of devices that are somehow connected. These devices include web servers, file servers, Personal computers, and many others. We will keep our focus on PCs in this text.  ll These are connected through cables or satellites. Now, we know that when things are connected, data sharing is possible. That’s the sole job on the Internet. Data is being transferred from one place to another all the time. Now, we come to the dark side of data shared. The problem is that there is so much data that every bit of data can not be checked what this is and where it is going. Who is accessing this?

Whether he is the right person to have this data or not. Unfortunately, we don’t have any effective method to check this. I believe someday; we will have some way to control this and restrict malicious people from accessing data they are not supposed to access.

 

Related Articles : 

I am now listing all the possible negative consequences of the Internet; then, I will try to explain them and share potential solutions.

1. Hacking
2. Cybercrimes.
3. Loss of privacy.
4. Data Corruption.
5. Adult material (not suitable for children).
6. Forbidden Knowledge.
7. Plagiarism.
8. Time wastage.
9. Health Hazards.

Hacking:

Many of us think everyone is aware of this term and knows what this means. It is unauthorized access to anything. Today, hacking has victimized many ordinary people, companies, and even computer firms worldwide. This is something that can be done at any level. There is a saying, “If you can make it, then you can break it.”

Today, billions of people have accounts on many free email sites, social networking sites, and others, and tons of them have lost their accounts with some important personal data inside. Those who have experienced this thing know how scary this is, and those who have not, believe me, can be your worst nightmare.

Now, coming to the technical side. There are several types of hacking. We will only concentrate on internet hacking, which involves ordinary people. What has a normal person on the Internet? Two things: Email accounts and social networking site profiles. He has most personal data in these two places, making his privacy vulnerable. If he, unfortunately, has some acquaintance who is not a good person and possesses sound knowledge of the Internet, then that person might face the consequences somewhere in the future.

Hackers use several ways to get access to the victim’s data. On the Internet, “social engineering” is the easiest and most effective way. Hackers develop a relationship with the victims and then exploit it. One way is to send the email with a link to another website. When you open the link, it asks the user to enter the username and password, and when they do so, it goes to the hacker and the user with some error message.
The irony of the situation is that the victim would never know what happened to him. This is called “Phishing.” Only people having good knowledge of programming can do this. One can get away from such a trick if he gets a little careful and does not open emails from unknown people or enter any passwords when asked if he has come to that website from an indirect link. Another way is to install software that keeps making a log of whatever activity is being done on a computer with all the data entered and on which website that data is entered. This can also happen using a university, school, workplace, or public computer. So, always remember where you are sitting and what information you are trying to access. Avoid using your accounts from public computers as much as possible because you never know who is watching you.

Instant messengers can also be used to get the work done. Hackers can send you some links that may cause the loss of your email account. Do not follow irrelevant-looking links, even if someone close to you has sent that, because you do not know who uses that account. The hacker does use people’s accounts to get access to their friends.

Your secret questions can also sometimes lead to your destruction. Many people do not recognize the importance of the personal question, and they write things that are obvious to their friends and the people around them.

Therefore, never use something predictable as your security question because if some friend, colleague, or acquaintance gets to guess it correctly, he is in your account. And this goes for passwords as well. Try to make passwords complex and difficult to guess. Many people use their birth dates, cell phone numbers, and some obvious words like “password” as their password. This makes hackers a workpiece of the cake. So, for your own sake, don’t do that.