Malware News


Grandparents Use DNA Analysis to Prevent and Treat Inherited Diseases for Future Generations

[ad_1]

Why is DNA Analysis important to me?

Knowing your family’s genetic history may someday save your life or that of someone you love. Based on state-of-the-art genetic technology, a unique DNA Profile can be generated for you to keep for years to come. DNA Storage for up to 25 years is available for future genetic testing, upon your request. What better gift can a loved one leave behind?

What role does DNA have in Funeral Service?

The purpose of this article is to familiarize Funeral Directors about DNA activities, and related areas. Realizing that this technology is what we as caregivers are used to discussing, is a field that is of concern to many of our clients and their families. The vast spectrum of DNA can give us insight on the value it can play in our community. In a series of articles, we would like to give you a basic knowledge about the different but related studies involving DNA.

It takes three generations to determine predisposition to most of the genetic inherited diseases / disorders. It is now known that families should store DNA for future use. Banking specimens containing DNA from the same Family provides invaluable information for the health of current and future offspring. We as Funeral Directors have an opportunity to make a Family aware that such a service is available. After burial, retrieving DNA can be expensive. Obtaining DNA after cremation is much more difficult. The success rate of recovering DNA within the first year of cremation is approximately 50%. Offering storage and or profiling DNA of the deceased, gives Funeral Directors a Unique opportunity to offer a Service that can have a lasting impact on those we serve. If you as a Funeral Director do not see the need for this service, it does not mean that families do not need this service. Statistics tell us that families place a tremendous amount of trust in their Funeral Director. This is because we care so deeply in what we do. Informing a Family of their options, while guiding them through the most difficult times in their life is a responsibility that a Funeral Director accepts and excels in.

It is our hope that Funeral Homes throughout the United States will contact us and give us their input as to the value of DNA in a Funeral service.

Why we firmly believe in what we do.

At the National Funeral Directors Association meeting in October 2001, we outlined all the reasons for the value of DNA storage such as paternity/inheritance, genealogy, missing persons, forensic issues; identification of hereditary disorders, congenital birth defects; predisposition to allergies, mental, metabolic, cardiovascular, bleeding/clotting disorders, genetic cancers, microbial diseases. The potential does not end with the above. Rapidly evolving technologies in cloning pets, stem cell/gene therapy are currently being done, all to improve the quality of life.

Recently we had four interesting success stories…

1. A 62-year-old female dies of complications resulting from Breast Cancer. The deceased women leave 2 daughters and 1 granddaughter. During a “Pre-Need Consultation”, the woman elected to have her DNA profiled and the sample banked.

2 years later; one of the daughters is diagnosed with the same Breast Cancer as the Mother. The second daughter has her DNA profiled and compared to the mothers. It is determined that the second daughter does not have the same genetic structure as the mother that would pre-dispose her to the cancer. However, the Granddaughters DNA is profiled and it is determined that she possesses the same genetic disorder as the Grandmother. Pharmacogenomics and gene therapy are begun to prevent the cancer in the granddaughter before it develops.

2. The mother of a Divorced son was interested in identifying the granddaughter’s father. Was he her husband were her son? We identified her son is the alleged father. This was a “Paternity” issue.

3. The three sons of the deceased lady came to request identification of their mothers remains between two occupants of a gravesite that had collapsed. She passed away seven years ago, so the atypical specimen sources were bone marrow and vertebrae. Procedures were laborious, but we identified their mother. Her remains can now be transferred to another site. This is “Profiling”.

4. A friend’s baby presented with what appeared to be a Bleeding tendency at 3 months of age. The baby was admitted to Children’s Hospital, Cincinnati, extensively treated but expired at age 8 months. An autopsy revealed universal capillary involvement (small blood vessels) by a clotting abnormality resulting in damaging complications in vital organs such as heart, liver and spleen. This leaves a Protein called von Willebrand factor and is coded by a Gene called ADAMSTS 13. The parents are currently being tested for “Mutations” in order to know who transmitted to the gene. The baby’s DNA is currently in storage it doesn’t matter who stores DNA in life and in death provided it is properly collected and stored because although it’s stable, it can be contaminated and it can disappear during purification; this complicates genetic testing. Before the advent of Pharmacogenomics, astute clinicians treating HIV patients relied on drug resistance testing to predict outcomes; complementary to resistance testing his current genotyping, which includes identifying mutations, associated with resistance. In the not-too-distant future, the combination of drug resistance testing and pharmacokinetic testing will provide a better idea of in-vivo relevance of resistance data. Stored DNA lasts forever; it will provide an endless source for multiple testing that will hopefully improve clinical outcomes.

Pharmacogenomics

The terms “Pharmacogenomics” and “Pharmacokinetics” are sometimes used interchangeably to describe the analysis of genes involved in drug response.

Pharmacogenomics is more inclusive; it refers not only to the effects of individual genes, but also to complex interaction between genes from every part of the genome affecting drug response.

Pharmacogenomics is an aid to diagnosis and prognosis. Routine diagnosis is not always straightforward. A patient does not always come with textbook type symptoms of the disease. In some cases, a single gene variation has been shown to be responsible for disease, and a Genetic test for this scan confirms the diagnosis as in cystic fibrosis and Huntington’s disease. Sometimes more than one gene is involved, such as to Breast Cancer genes, Alzheimer’s Disease genes, and susceptibility to Migraine genes. The most likely publicly visible contribution of Pharmacogenomics to improved health care would be delivery of a number of drugs coupled to diagnostic tests based on genetic markers for head and neck, pancreatic cancers, and solid tumors.

Pharmacogenomics classifies patients into responders and non-responders to particular therapeutic options. Breast cancers that over express a Protein for the herceptin genes are candidates for monoclonal antibody therapy. The cholesterol-lowering drug PRAVACHOL works according to the number of copies of the transfer protein gene. HIV Phenotyping is an important and practical adjunct to the treatment of AIDS.

Pharmacogenomics can save lives lost to adverse drug events, the 6th leading cause of death in the US. A blood test now enables physicians to tailor a certain drug dosage to their patient’s genetic profiles. However, the cause and effect association remains unknown. Implementation of rapid automated DNA genotyping capabilities still, over time, provides individual genotypes of patients. Clinical data that is properly collected and managed identifies patient subpopulations at risk for adverse events, while allowing others to continue to receive the benefits of pharmaceutical therapy.

Pharmacogenomics and Gene Therapy

Mutation is a change of DNA sequence leading to aberrant or absent expression of the corresponding protein. It is the mutation, not the gene that causes predisposition to disorder/disease. Polymorphism is the quality of existing in several different forms. Sequencing of parts of the genome has demonstrated that some of these polymorphisms are in genes whose functions are important in responses of individual patient to therapy. The pathologist will need to profile common polymorphisms in patients who are beginning therapy for common diseases such as diabetes, hypertension, cancer and infections. The laboratory definition of the genotype/phenotype will determine the specific drug and doses suitable for him. This puts the pathologist in a more definitive position to determine appropriate therapy than traditional predictions of disease behavior based on morphology of lesions (microscopic patterns) or cultural characteristics of infectious organisms. The lab also monitors the success of gene therapy. After a gene is introduced, the tissue where the gene is inserted (i.e.: Transgenic Monkey or Mouse) must be active and should be monitored for normal expression of the introduced gene and normal structure and function of the gene product. The lab must also monitor the “integrating transfected genes” such that integration allows both normal gene expression and does not produce abnormal function or structure of the patient’s other genes. In summary, molecular pathology is permeating and penetrating, as was immunopathology 20 years ago. “Immunopathology” an example of which is vaccine therapy is nothing new, a German/Austrian vaccine “UKRAIN” is supposed to destroy cancer cells through APOPTOSOS (programmed cell death) without attacking healthy cells. The US now has “GLEEVAC” with identical results. It also has been proven that in breast cancers there are genetically divergent CLONES that account for different microscopic components resulting in different responses to therapy.

Future Direction

As the human genome Project continues to uncover important disease genes (especially those for common disorders) at an ever increasing rate and technologies for high-speed DNA sequencing and multiplex mutation detection continued to improve, we can anticipate diagnostic molecular genetics assuming a far more dominant role in public health and preventive medicine. The advance of DNA “CHIPS” containing thousands of probes may someday allow extensive genotyping and lifetime disease prediction for thousands of disorders from a single drop of blood. Also, a poster on Human Genome Landmarks in the US Department of Energy, identifies a whole gamut of diseases/disorders with the corresponding position of the defective gene! Against these promising advances will have to be weighed ethical issues, especially in the field of gene therapy. Whatever the ultimate balance reached, there’s no doubt that molecular genetics will be the driving force behind an ever greater proportion of evidence based medical practice in the 21st century and virtually every patient whether healthy or ill will feel the impact.

The impact of DNA storage on clinical practice

Evidence based medicine is the gold standard for the 21st century.

What do we do that contributes to the practice of this medicine? What specific examples and daily living indicate that storing DNA is a “Must”?

The event of 9/11 mainly profiling and identifying the deceased was laborious and expensive on federal funds despite which only approximately 2000 persons have been identified. One does not realize the importance of the death certificate without which burial cannot be accomplished until death occurs! Soldiers “missing in action” cannot be declared dead until their bodies are found and identified.

An article in USA Today concerned a “Mystery killer” that involved a young couple; studies failed to give a definitive answer despite autopsy and numerous laboratory tests. Since chances that the suspected disease that clinically presented to be contagious (plague) proved negative on repeated testing. Had DNA been stored, further testing may have led to the diagnosis and cause of death

A TV program about a Serial killer in Juarez Mexico led to more than 200 missing women and “no leads”. Profiling and storing of DNA when these women were newborns would have helped identify the remains that took months to surface. The women after being raped were doused with gasoline and burned! The problem is ongoing.

Although Chandra Levy was missing for a year before the body was found, DNA is stable, and after profiling samples from her remains she can now be laid to rest. Since degraded DNA is difficult to purify, tests on her remains are ongoing to hopefully identify the killer. The FBI in USA Today declared, “there still are no clues to the killer”. Samples are from her remains such as hair, teeth, bone; even old blood can still be stored and tested along with a Suspect’s samples until results are conclusive.

A complex disease such as Parkinson’s disease and the genes whose polymorphic forms can increase any person’s risk but not necessarily cause it is the second most common in a Neuron-degenerative disorder. Parkinson’s disease has neither a Polygenic (multiple genes) or multifactoral (genes and environment) cause. Over the past few years, debate has occurred between Parkinson’s disease having a Genetic component or is just secondary to environmental influences. To evaluate the possible genetic component, open quote gene mapping” is the way to go. The availability of data from the Human Genome Project is opening new possibilities in studying common diseases such as Parkinson’s disease. The multitude of molecular techniques and statistical tools applied to this data now allows us to potentially move medicine from a “reactive” discipline to one that can prevent disease. However, once found, how these “susceptibility genes” will be used in the future remains to be seen.

A newborn (the 3rd child) was diagnosed to have a “Rare protein allergy”. Surgery was successful the baby is now seven years of age and healthy. Two other siblings are healthy. Storing this baby’s DNA would have enabled testing of future siblings for mutations related to this rare congenital predisposition to allergies.

At three months of age a Baby presented with a Bleeding disorder; she was admitted, traded and died at the Children’s Hospital in Cincinnati. The baby’s profile showed a defective ADAMSTS 13 gene. The parents are being tested for this “mutation” and the baby’s blood, buccal smears, and hairs are stored.

Will everyone be gene type early in life to prevent disease that they are at risk for? How will this affect employment/applications for competitive educational opportunities? Wolf farm code genetic genotyping be routine to determine patients with the risk for side effects or variability in efficacy? If the patient refuses typing will third-party payers is still pay for medications and/or treatment? Someday mandatory DNA storage and testing in life and death will enhance the quality of life and improve clinical outcomes because increasing knowledge of genetic variations sheds light on the role of genetic and environmental factors and disease susceptibility, aggression and therapeutic response.

Specialists can now screen eggs for the faulty gene that closes early onset Alzheimer’s disease, enabling women who carry their rare disorder to avoid passing it on to their children.

FDA approved GLEEVEC has been very effective in chronic myelogenous leukemia and rare (stromal) stomach cancers; causes of relapse do so because they have developed mutations that alter GLEEVEC’s target site in the leukemic cells, a Phenomenon well known to infectious disease clinicians. Just as microbes developing drug resistance mutations, so do cancer cells.

Summarizing the future of cancer treatment: in the past, pathologic diagnosis was based on histology. In the future it will be based on molecular profiling of tissue both that the genetic and proteinomic level. In the past, therapy was chosen by disease category. In the future, combination therapy will be aimed in tailored to individual patient profiles or classes of profiles. Select, monitor, and reevaluate.. that’s hope for the future!

[ad_2]

Source by Scott Nizborski

Cybercriminals – Who They Are and What They Do

[ad_1]

Cybercriminals are clever, organized in gangs, well-funded, and very tech savvy. The goal of these criminals is can be explained in two words: make money. They have hundreds of clever ways to accomplish their goal. They may capture sensitive data such as user names and passwords, credit card numbers, or e-mail addresses. They then either sell this information over the Internet in bulk to other cybercriminals or use the data themselves to make money.

Their crimes fall into two general types that often work together.

The first type of Internet crime is called social engineering. It is often an attempt to convince a user to open an email attachment or click on a link in an e-mail. These links may lead to a forged website where the user is asked to provide their username and password. This practice is called ‘phishing.’ Another example of social engineering is the scam that tries to convince a victim to send money.

The second type of crime takes advantage of software vulnerabilities to install malware. The e-mail links in the example above may lead to a malicious website that installs malware.

A few examples:

– Suppose cybercriminals break into a number of existing social media accounts – Facebook, MySpace, etc. and capture the usernames and passwords of those accounts. Access to those accounts allows them to capture the names and details of friends of those accounts. One way to monetize that information directly is to pose as the account holder and e-mail their friends with an imaginary emergency and ask those friends to wire money to a specific address or account immediately.

– Suppose they are able to download malware into your computer. This malware captures usernames and passwords of bank accounts, along with e-mail addresses from your address book. They the cybercriminals proceed to empty your bank accounts and send spam to everyone in your address book in your name attempting to infect them with the same malware.

– Maybe they are able to download malware that opens a backdoor to your computer. More malware is then downloaded to take control your computer remotely. Without your knowledge it has then become a ‘bot’ or ‘zombie,’ one of thousands, or even hundreds of thousands of computers in a network known as a ‘botnet.’ Hundreds of botnets are known to exist. These botnets may be used by cybercriminals either to send out billions of spam messages per day or rented out to attack other websites, or even other countries.

The fact is that these methods of Internet crime work. According to the Anti-Phishing Working Group, good credible estimates of the direct financial losses due to “phishing” alone exceed $1 billion dollars per year. And that is just one small slice of the Internet crime pie.

How many botnets exist? It is hard to tell. Several dozen large botnets are known to exist according to many experts. The number of smaller botnets is more difficult to determine. A 2009 post on SecureList.com estimates that at least 3600 botnets exist.

[ad_2]

Source by D. K. Palmer

How to Remove Malware 2009 – Malware 2009 Removal Made Easy

[ad_1]

About Malware 2009: Malware 2009 is a program which displays fake security alerts and pop-ups that warn about computer infections. The pop-ups will then urge you to run an anti-malware scanner in order to remove the bugs from your computer. Once you click the pop-up, you’ll reach an advertisement page faking to be a scanner. You will then be alerted about malware on your computer, and prompted to download and install Malware 2009 in order to protect your computer. Once this happens, your the trojan will begin its attack on your computer, putting you at serious danger of corrupted files and identity theft.

Malware 2009 is a rogue that is promoted by the Trojan Vundo infection. Once installed it will automatically load every time you start your computer and alert you about malware that must be removed. These infections, of course, are fake, and your problems will only get worse before, during, and after the installation, download, and purchase of Malware 2009. Bundled with this awful trojan is another trojan, it’s called C:WindowsSystem32wcenter.exe, which displays a fake Windows Security Center display on your desktop. It’s purpose is to display fake alerts through this medium in order to prompt the user to purchase the Trojan software. It’s a big mess.

As if running a computer with a trojan like this one isn’t bad enough, Malware 2009 will also slow your computer down to a crawl. The constant popups and fake threat alerts will distract and slow down the user. It’s an awful piece of spyware that is gaining as of this writing. To remove this malware and the Vundo Trojan infection, you should use a trusted automatic spyware and anti-virus removal tool.

In order to remove Malware 2009 you need to delete all its parts at once. This can include but is not limited to:

1. Removing all Malware 2009 related processes (any malicious EXE files) 2. Removing any associated DLL files (Dynamic Link Library) 3. Removing any malicious .lnk files associated with the virus 4. Go into the registry, locate and remove dangerous files in following directories

HKEY_LOCAL_MACHINE HKEY_CURRENT_USER

Manual removal is strictly recommended for advanced computer users.

Why? Because if you delete the wrong registry files, you may cause serious harm to your computer. Not only is that a threat, but additionally if all files that make up the virus are not removed, the infection will regenerate the next time the computer is started up. For this reason, I recommend a proven, automatic Malware 2009 removal tool. Your malware 2009 problem can be solved in minutes, with live protection and protection from future attacks.

[ad_2]

Source by Bob L Walker

How Safe Is Your Computer Data?

[ad_1]

As recently as December 2007, a New Zealander was subject to an FBI investigation on world-wide cyber crime which also resulted in Dutch authorities imposing strong penalties on companies using his malicious software.

Managing data security is unavoidable in today’s business environment and is a critical task for many. But what has all of this got to do with the small business owner?

Perhaps the cost of your laptop or your office personal computers does not amount to that much in the grand scheme of things. Have you ever stopped and wondered how long it would take to replace the data that you stored on them; or what damage losing customers’ sensitive data would have on your business.

I recall an ex-colleague at a large, international accounting and consulting firm whose laptop was stolen from his car. He stored valuable information about several blue-chip clients’ projects he was working on his hard drive. Not only did he lose the only copies that the firm had (which meant that weeks of work was lost) but he potentially put the firm at serious risk of bad publicity and losing major clients.

How well do you protect your computer hardware and data? How much would it cost to replace them? The following are just a few tips to help protect you.

  • Use Anti-Virus software and keep it software up-to-date. Hundreds of new viruses are discovered each month. You are not just protecting yourself when using virus software, but also others you communicate with.
  • Always use a Firewall – A firewall is an “internal lock” for information on your computer. Many computer operating systems already have firewalls installed and you must activate them. There are many other firewalls available to download or buy that help you secure your computer.
  • Learn the risks & rules associated with sharing files or your internet connection. You can be exposed to danger via e-mail, file-sharing, a broadband connection or a wireless connection
  • Disconnect from the net when idle. If you’re not using your net connection, (when you go to bed as an example) turn it off. It’s much harder to hack your computer when it is not connected. This is especially important if you have a high-speed connection.
  • Use strong, unique passwords and don’t share them with anyone & back up your data frequently
  • Take immediate action if you think you have been hacked or infected by a virus and contact your ISP

Protecting your information can be a major deal for a small business owner but using the proper tools can ease the burden significantly. Such efforts will dramatically reduce the chance of a major security breach and also the costs and damage to your company’s reputation that such an event causes.

[ad_2]

Source by Mark Gwilliam

Trace Back a Phone Number – Cell Or Landline

[ad_1]

Whether it’s a cell phone or a land line, you can trace back a phone number on your own, and find out where the call is coming from.

If you are receiving annoying call, prank calls, or mysterious numbers are popping up on your phone, you can trace them back and find out where the origin of the calls are coming from, and the persons name who is placing them.

There are also very positive benefits to tracing back a call. It very well could be an old girlfriend or boyfriend trying to get hold of you but to embarrassed to leave a message.

On the other hand it could be an enemy or telemarketing company who is continually harassing you. In any event, you can now remove the mystery from those odd phone numbers by finding out where the call is coming from and who is making the calls.

How to trace back the phone number:

There are now programs on the internet where you can simply type in the mysterious cell phone number and then get a return name and even address of where the call is coming from. Whether it’s a land line, another cell phone, or even an “unlisted number”, reverse cell phone look up programs can trace back the number and find the origin of the caller.

Usually these services will require a fee, but it’s a great tool to have and re-use again and again whenever a mysterious or unrecognizable phone number comes up. Plus the information you get from tracing back a number will include everything from full names to actual addresses of where the calls are coming from.

[ad_2]

Source by Chess McDoogle

Cyber Crimes and Their Consequences

[ad_1]

Be it for classes or social networking, business or amusement, huge numbers of people around the world utilize the Internet every single day. Of course, not everybody does so with the best motives. In ’09, the money suddenly lost to net violations was over five hundred million, approximately two times the damages from only 2008. Below are some of the most typical net offenses, and tips on how you might defend against being a target.

The most frequent type of online wrongdoing is identity fraud. This takes place when anybody creates a web page (or sends a mass email directing people to their web page) in the hopes that the victim will provide his or her personal information, like bank card data or SSN. The person or agency responsible for the fraud then uses your credit card for transactions, or in the case of bank-based cards, empty your account. This could also occur if you unconsciously acquired a computer virus from a web page or e-mail add-on. You’ll want to be cautious prior to getting any type of attachment from an unfamiliar site, and find some type of virus protection on your system. Additionally, keep clear of all unsolicited business enterprise proposals from those you do not recognize. These are nearly always a hoax, and people found in charge of developing and releasing viruses may get jail time.

Yet another net crime which could upset several thousand individuals, even major organizations, is hacking. Cyber criminals use numerous ways to get hold of passwords and various details so they can modify a web page’s elements, send e-mail from somebody else’s names and take your personal data.

Based on the hacker’s intended target, this could lead to considerable and wide-spread complications. Besides various other fees and penalties, this could warrant as many as 3 years of incarceration; any person planning to hack into a government site or computer network may be looking at a full 10 years in jail. Replacing passwords frequently is a good strategy to discourage prospective cyber criminals, but now and again this happens irrespective of the effectiveness of your attempts to secure your details.

[ad_2]

Source by Greg L Stevens

Cyberethics (Information System Ethics)

[ad_1]

In order to examine ethical issues, it is first necessary to define ethics. Today, we regard ethics as a “rational process founded on certain principles.” However, I believe a definition that is more applicable to this project is the ethical theory that existed in ancient Greece. There, ethics was the study of what was good for both the individual and society. We will look at some online issues and how they may be good and/or bad for society. Cyberethics is quite simply the study of ethics on the Internet.

“Ethics begins when elements within a moral system conflict.”

Cyberethics is often called as Information System Ethics. Information System ethics can be defined as “The study of moral, legal, ethical issues involving the use of information and communication technologies”

There are many unique challenges we face in this age of information. They stem from the nature of information itself. Information is the means through which the mind expands and increases its capacity to achieve its goals, often as the result of an input from another mind. Thus, information forms the intellectual capital from which human beings craft their lives and secure dignity.

However, the building of intellectual capital is vulnerable in many ways. For example, people’s intellectual capital is impaired whenever they lose their personal information without being compensated for it, when they are precluded access to information which is of value to them, when they have revealed information they hold intimate, or when they find out that the information upon which their living depends is in error. The social contract among people in the information age must deal with these threats to human dignity. The ethical issues involved are many and varied in Information System Ethics.

Ethics is required in information Systems to overcome the following ethical issues.

Privacy: What information about one’s self or one’s associations must a person reveal to others, under what conditions and with what safeguards? What things can people keep to themselves and not be forced to reveal to others?

Accuracy: Who is responsible for the authenticity, fidelity and accuracy of information? Similarly, who is to be held accountable for errors in information and how is the injured party to be made whole?

Property: Who owns information? What are the just and fair prices for its exchange? Who owns the channels, especially the airways, through which information is transmitted? How should access to this scarce resource be allocated?

Accessibility: What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?

Information System ethics explores and evaluates:

o the development of moral values in the information field,

o the creation of new power structures in the information field, information myths,

o hidden contradictions and intentionality’s in information theories and practices,

o the development of ethical conflicts in the information field. etc

Now let us take a look at privacy by the following examples. A few years ago, Florida lawmakers gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized. Students and faculty vehemently protested that the monitors violated their privacy. State officials said that the value of the information gained through the study was more important than the threat to privacy. Other issues like collection of private data of the users using internet by monitoring the traffic is strongly related to one’s policy as that information can be further used for illegal purposes. These types of privacy issues are needed to be addressed properly so that they should not exploit one’s freedom. One issue that I kept thinking about when I was constructing my Web page was whether it was ethical to lift an image from someone’s home page and use it on my Web page without crediting the source. Such ethical issues come under property.

One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites. Simply put, if no one had access to online pornography no one would care. With this another issue “Censorship” comes which should be deal in efficient way as it is not easy to implement. Ethical issues can also be religious, moral or any other.These type of issues are not easy to deal with.

Similarly, let us take China into consideration on the issue of “Censorship”. China has implemented the methods of censoring the internet that are somewhat harder to bypass for people generally unfamiliar with the way internet works. There is ,for example internet censorship as implemented in China–using a list of banned words that are censored on the fly. As users in china request a webpage , the incoming page is first inspected by government servers n blocked if a banned term such as “Democracy” is present. Human censors are also actively looking at what people browse on the internet, and block websites as they see fit.

Crimes on internet are also increasing in a continuous manner.Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, Industrial espionage, child porn, kidnapping children via chat rooms, scams, cyber terrorism, viruses, spam and so on. All such crimes are computer related and facilitated crimes. Many recent cases seen like Microsoft’s website was brought down for a little time resulting in a huge loss to Microsoft. Similarly, NUST, one of the best considered university in Pakistan got Hacked and redirected to another domain. Credit card fraud have grown in an increasingly manner. Leakage of Military information from internet is another internet crime. Software known as Google earth, which shows information about different places including military land or can lead to robbery planning, is becoming an ethical issue around the world. Many people protest against this leakage of information but still one can’t deny that it is one of the major enhancements in Information Technology.

The question about how to police these crimes has already been constructed, but this task is turning out to be an uphill battle. Since the first computer crime law, the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984, the governments have been trying to track down and stop online criminals. The FBI of different countries have tried many programs and investigations in order to deter Internet crime, like creating an online crime registry for employers .The reality is that Internet criminals are rarely caught. One reason is that hackers will use one computer in one country to hack another computer in another country. And that criminal isn’t working alone. Loosely organized groups–which security experts call “Web gangs”–conduct much of the illegal activity online. The structure of Web gangs may be patterned on that of traditional organized crime, in which the members of the group may never come into contact with one another and may never be aware of who they are working for.

Conclusion:

We live in an exciting time in history. The widespread availability of computers and Internet connections provides unprecedented opportunities to communicate and learn. Unfortunately, although most people use the Internet as a powerful and beneficial tool for communication and education, some individuals exploit the power of the Internet for criminal or terrorist purposes.

We can minimize the harm that such individuals do by learning ourselves, and teaching young people, how to use the Internet safely and responsibly. The term “cyberethics” refers to a code of safe and responsible behavior for the Internet community. Practicing good cyberethics involves understanding the risks of harmful and illegal behavior online and learning how to protect ourselves, and other Internet users, from such behavior. It also involves teaching young people, who may not realize the potential for harm to themselves and others, how to use the Internet safely and responsibly.

[ad_2]

Source by Bilal Azmat

Internet – Online Predators Statistics – Dangers For Kids

[ad_1]

The internet is a great tool for our children to use for research when completing homework assignments. It is also a great tool to use to follow personal interests, keep up with the news, or to socialize with friends.

Unfortunately the internet also poses many dangers to our teenagers and kids.

One of the major dangers is the presence of the internet predator.

Online predator statistics:

*There is estimated to be over 5,000,000 predators that surf the internet

*These predators are online around the clock looking for targets

*Sexual predators use forums, chat rooms, and instant messaging to locate and communicate with children.

*There is a fifty percent chance that if your child is in a chat room designated for under aged children, the stranger he or she is talking to is a sexual predator logged in under a false identity.

*Sexual predators especially enjoy the use of private messaging, private chat rooms, and the webcam to make advances towards their victims.

*Surveys show that one in five of our kids will receive sexual advances while online but that less than 25 per cent of them will inform a parent or adult.

*Approximately 5 percent of our kids were aggressively approached by a sexual predator. This means they asked to meet the child offline, called them on the phone, or sent them money or gifts in the mail.

*89 percent of all sexual advances towards our children take place in internet chat rooms and through instant messaging.

*75 percent of our kids are willing to share personal information with a stranger on the internet, exactly what the sexual predator is looking for.

*77 percent of the targets of online predators were 14 or older. 22 percent were between the ages of 10 and 13.

*30 percent of those that are victimized by sexual predators are boys.

*Sexual predators are usually between the ages of 18 and 55. They are predominately males. Many have no prior criminal record.

*64 percent of the teens surveyed admitted they did things online that they would not want their parents to know about.

*Approximately 19 percent of our teens say they have considered meeting someone offline that they have only known online.

*Approximately 9 percent of our teens state that they have actually met offline a stranger they previously only knew and met online.

The internet predator has three favorite tools they love to use to target their victims:

*Online chat rooms that offer private messages or private rooms that they can isolate your child and become aggressive without being observed by others.

*Internet messaging, again, because they can get your child one-on-one and try and take advantage of them.

*The webcam is one of the favorite tools of the predator to find out what your child looks like, to try and gain personal information about them, and to manipulate them into doing things on camera to compromise their safety.

[ad_2]

Source by John W Sheridan

Sealed For Your Protection

[ad_1]

I opened a new bottle of probiotics this morning, and it had one of those circular “seals” on the top, you know, the one that says “Sealed for your protection.”

And that seal got me thinking… how much protection do we need? How much security is enough?

How much homogenization, pasteurization, disinfection, national security, etc… do we need before we stop, or at least slow down and allow nature (and our own individual and collaborative thoughts) to do the rest?

How many wars (not just abroad I’m afraid), surveillance methods, widespread data gathering efforts, etc… do we need before we say we have ENOUGH?

(In my opinion, the idea of “World Peace” will never happen if we keep fighting, and finding more reasons to fight etc… )

And don’t get me wrong…

I respect our soldiers for what they do, my best friend was a Marine. I respect the good intentions of all the people involved in trying to make our lives safer and more comfortable (with less diseases, safer food processes etc… ).

My intention here isn’t really “against” anything, like in a protest-style of mindset, nope. (I also wonder why we always have to have a “for” and “against”)

But I just think we have to start asking some serious questions as a whole (in addition to the ones I’ve already pointed out).

For example…

The NSA recently has been revealed to have abused their stated mission by Edward Snowden, and as usually happens in these situations, some of the politicians and officials are lying to cover their tracks because they don’t like the fact they got caught with their pants down (it is the Information Age, duh).

They say they are doing all of this in the interest of “national security”… but I’m asking how much national security do we need before we reach a point of diminishing returns?

How many times are we going to keep going to the well of referencing the tragic events of 09/11 to justify deepening security, while we continue sacrificing more of our privacy?

Why do they feel the need to violate everything we hold dear in this country to do their jobs at the NSA (and FBI, and CIA, etc… )?

I get it NSA, secure the nation, but as experts in that national security (because most information is classified, except to the NSA officials), as experts you have to also know when enough is enough.

But continuing on, in addition to our “sealed for protection” national situation, let’s pose another series of questions…

Remember when you used to play in the dirt as a child (or watch as other kids did it)?

Remember when you got a cold, which may (in a few cases) turn into a sinus infection, and you just “rode it out” instead of going to your doctor and lighting up another round of antibiotics?

You developed natural immunity (always the best kind)… and moved on.

Not every disease is a “cold”… I get that… but…

Are we striving for creating some sort of “clean room society” where nothing can infect us? Is that really beneficial?

Can we relax a bit on the “kills 99% of germs” mentality?

There isn’t, nor will there ever be, a 100% secure, disease-proof, clean room quality, fluffy, perfect world folks. In fact when it comes to viruses and bacteria, it seems that the harder we try to make it that way, the more Nature kicks our ass.

For more on the security idea, I recommend you read from an expert on the subject.

In the end, I think we have a choice to make, do we do the impossible task of striving for an “airtight” society, attempting to block out all invaders (natural, and otherwise)… which if we want to proceed this way, we would at some point have to factor in this and this…

… or do we relax a bit, and just keep our heads about us… calmly accepting the fact that “Sealed for your protection” might not always be the best course of action.

I’m obviously thinking deeply about the latter.

[ad_2]

Source by Joseph Ratliff

What Is a Rootkit Virus?

[ad_1]

Sometimes it’s not just running your anti-virus program to get rid of a terrible virus such as a rootkit. What a rootkit does is hack its way through allowing itself to have master privileges on a computer. Then it disguises itself so that most antivirus software won’t be able to recognize it. Then, once it is disguised from the major anti-virus programs, it begins to download malware such as spyware and other types of viruses. Rootkits are usually only detected with a trained eye from a virus removal professional.

What are the symptoms of a rootkit?

  1. If you have a respected virus removal program installed and running and are still continuously running into spyware and viruses, this is the number one sign you have a rootkit.
  2. Your anti-virus program is not running or is missing altogether. It’s common practice for rootkits to kill anti-virus programs.
  3. You are connected to the internet but not able to view web pages. Rootkits like to change the proxy settings in your internet options so you can’t go online to view websites or download anti-virus programs.
  4. Your desktop background changes or is disabled every time your computer starts.
  5. Your computer seems like it’s running really slow even though you aren’t doing anything major

The spyware, rogueware and other malware programs are likely to be recognized and removed by an anti-virus program, which is good. The problem is catching it before it’s too late. Your sensitive information can be stolen by these programs. So if you are getting a lot of spyware on your computer over time, it might be that you have a rootkit. A very bad type of virus. Seek out a virus removal specialist and ask them about the possibility of a rootkit.

[ad_2]

Source by John Hallquist