Cyber Wellness - Crime

Wednesday, November 27, 2013

Chapter 6
Explain legal consequences of cyber crimes

What is cyber crime?

"Cyber crime is a term used broadly to describe criminal activity in which computers and networks are a tool, a target, or a place of criminal activity.” Cyber crime or internet crime is a term used to describe offences that are committed or facilitated over the internet. These are criminal acts related to the use of computers such as:
  • Gaining unauthorized access to computer to view, modify, destroy, copy or use its data.
  • Crimes committed using the internet as a medium (e.g. cyber bullying, online auction fraud etc.)
Although the term cyber crime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.
  • Examples of cyber crime which the computer or network is a tool of the criminal activity include spamming and criminal copyright crimes, particularly those facilitated through peer-to-peer networks.
  • Examples of cyber crime in which the computer or network is a target of criminal activity include unauthorized access (i.e. defeating access controls), malicious code, and denial-of-service attacks.
  • Examples of cyber crime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.
  • Examples of traditional crimes facilitated through the use of computers or networks include social engineering frauds (e.g., hacking "Phishing", identity theft, child pornography, online gambling, securities fraud, etc.). Cyber-stalking is an example of a traditional crime.
  • Additionally, certain other information crimes, including trade secret theft are sometimes considered cyber crimes when computers or networks are involved.
  1. Cyber crimes against persons - E.g. A minor girl in India was lured to a private place through cyber chat by a man, who, along with his friends, attempted to molest her. As some passers-by heard her cry, she was rescued. Another example where in the damage was not done to a person but to the masses is the case of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.
  2. Cyber crimes against property - E.g. A upstart engineering company lost a lot of money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber-spy.
  3. Cyber crimes against government - E.g. an individual "cracks" into a government or military maintained website.

Different examples of cyber crime

  • Using one's own programming abilities with malicious intent to gain unauthorized access to a computer or network are very serious crimes.
  • Similarly, the creation and dissemination of harmful computer programs which do irreparable damage to computer systems is another kind of Cyber crime.
  • Software piracy is also another distinct kind of Cyber crime which is done by many people online who distribute illegal and unauthorized pirated copies of software.
  • Computer-related fraud can involve:
    • altering computer input in an unauthorized way;
    • destroying, suppressing, or stealing output;
    • making unapproved changes to stored information; or
    • Amending or misusing programs
  • Script-kiddies” gain "root" access to a computer system, giving them the same power over a system as an administrator – such as the power to modify features. They cause damage by planting viruses.
  • Very common cyber crime involves the use of credit card details that have been dishonestly obtained through website spying methods. The card details are then used to make fraudulent transactions, often via the internet.
  • Usually directed at any institution/company, 'Denial of Service' (DoS) is the name given to attacks involving hackers preventing the normal flow of internet traffic to websites. Hackers overload networks with data in an effort to disable them.
  • Incitement to racial hatred is an offence for a person to publish or distribute material which is threatening or abusive or insulting if it is intended thereby to stir up racial hatred.
  • Cyber-stalking, which is simply an extension of the physical form of stalking, is where the electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion. There are a wide variety of means by which individuals may seek out and harass individuals even though they may not share the same geographic borders, and this may present a range of physical, emotional, and psychological consequences to the victim.
Declaration: I mean no harm or infringement of copyright, am re-posting to share and create awareness on Cyber Wellness only.
Source: ITE Cyber Wellness Notes
1

Season of gifting

Tuesday, November 26, 2013
I had just receive my cash out from Nuffnang earnings months ago and this was my 2nd time cashing out from Nuffnang. A great thank you to all my readers here, without you I wouldn't have the chance to cash out.

To reward my readers

Because Christmas Day and New Year Day is nearing, I am sure you need to get some present and new clothing and accessories for this season. To thank all my readers who have been supporting me and my blog all these year, months or even weeks I have a giveaway for you! Click here

Celebrate this season with ZALORA and get a 15% discount with this voucher code: ZBAP16T
Sign up for Zalora newsletter and you will be entitles to a $10 cash voucher and receive first hand information on their deals and promotion.


The top I am wearing found in one of the most popular blog post is actually from Zalora

You can find many top brand from Zalora, such as:
American Tourister, Ben Sherman, Coach, Converse, Flesh Imp, Havaianas, Lacoste, M)phosis, Melissa, Mitju, Nike, Nine West, Onitsuka Tiger, Puma, Rip Curl, River Island, Steve Madden, Superga, Vans and even more!

To reward myself

If you do notice I have bought back my domain name. During 2010 I started to own xiangtingk.com for 1 year, however after it expire I did a renewal but I did not know how to configure it to link to Blogger so I ditch that domain name and it was let out for sales until recently I bought it back.

November will be my final exam month and will determine if I can further my studies or join the working industry so I won't be updating often here until next month, in the meantime follow me at "Dayre" a place where I will be updating short post about my daily life. http://dayre.me/xiangtingk

I have also donate part of my earning to the victims in the recent Typhoon at Philipines Haiyan/Yolanda, I hope you can do your part and help the victims of Typhoon Haiyan today.

0

Burst Drain Pipe

Saturday, November 23, 2013
After I am done using the toilet around 1:50AM I heard the sound of water splashing and car siren so I thought it started to rain again, however it doesn't sounds like water droplets so I went back to take a look.

It was my first time witnessing a burst drain pipe, it happen at the vicinity around Shunfu Road. I was so stupid to call the police and they refer me to the town council, I am still young and didn't know what to do, all I know is to call police but still they don't need to reply me in a matter that they can't do anything about this matter. I thought I could remember the town council telephone number without needing the police to repeat them but then I forgotten the last few digit and I went to Google for it. By the time when I call the town council someone had already made a report and the plumber is on their way. Without realising I took 150 over pictures but I can't be possibly uploading them all so I will only upload a few here, because if you know there's a limit and there's a price to pay.

This was the first shot I have taken, water level was around 4 storey

After that I thought I can take a few long exposure shot



The plumber then arrive around 30 minute later at 2:27AM and the water rise up to around x2 level

It was suppose to be a long exposure shot ONLY, however I was too busy body and it turn out to become a blog post for those people who are sleeping to find out about this happening

Not long later 2 more vehicles arrive


If I am not wrong the one in blue polo-tee are the plumbers 

I somehow feel that this is a dangerous act, if the water force is strong enough he will be push up to the air

Another plumber came to open up the drain cover and I realise it was not the pipe that was burst, it was the gutter hidden underneath the grass patch. Imagine someone walking pass it when it burst.

The two plumber was then startled when the water rush out again 




A van with three plumber drove off at 2:45AM

2:57AM, At this moment the water has being turn off including the water at my house

The plumber was trying to take a picture with his phone I think and the water gushed out



The van that left then came back at 3:07AM


The "construction worker" then arrive in between 3:10AM to 3:40AM and now there's hope

They have been digging since then...

All the way until 4:25AM it started to rains and they went under the shelter to take a cover

A lot of water are wasted tonight. Water is a kind a luxury, you will never know how precious it is until you lose it. Many people are sleeping soundly and yet there are still people being called back to work, I know it is their job but who doesn't want to sleep at this kind of timing. If any kind soul saw them by chance do bring them some breakfast if you don't mind. Goodnight :)
0

DIY: Elastic Hair Ties (Twistband)

Friday, November 22, 2013

About Twistband

Twistband are made of Fold-Over Elastic, unlike the traditional hair ties that hurt the head and wrist foldover elastic is a ultra soft and stretchy material that doesn't crease, pull or cause damage to hair. They are able to support any hairstyle and sleek to wear it on the wrist.

These are the retailing price for Twistband sold in our local Watson store

Why DIY?

One reason why I decided to DIY this is because I felt that it was too costly to purchase one at the retailing price and I wouldn't spend that kind of money even though I really want it so I decided to make some by myself at home at a cheaper price, all I need is the supplies. Why do I want a Twistband is because I am afraid that other elastic band would ruin my perm hair, on the other hand Twistband can add a twist to my outfit whether using it as a headband, hair ties or bracelet. What's more is you can't tell the difference between a real Twistband and a DIY one so why not do it my own. Below is a tutorial on how to create your own Twistband.


Supplies:
  • 5/8 inch foldover elastic trim
  • Scissors
  • Ruler
  • Candle (optional)

Step 1: Measure out 8 inches of foldover elastic trim and cut it out

Step 2(optional): Use the candle flame to cauterize the edge

The flame melts the nylon surrounding the elastic strip and ensure that the edge will not fray.

Step 3: Fold the elastic with the “shiny” side facing out, take the two ends and tie an overhand knot

To make sure the loop is tight pull and tug the elastic from the inside of the twistband.

Tada~ now I have loads of  ready-to-wear Twistband!

Because it is so pretty I made a whole lots of them. I have actually bought more than what I need to give out to my blog readers, just by following these simple step this could be yours for FREE

Step 1: Like my Facebook page to qualify


Step 2: Like the photo below (share to increase your chance of winning)


10 lucky winner will be picked out on 1 January 2014 to receive elastic hair ties in sets of 3 absolutely free, winner will be announce on my Facebook page. Winner address must be Singapore. Prize will be mail out by Singpost normal postage. Choosing of colours is while stock last. Winner may receive one set of Twistband regardless of how many time you are selected as a winner. Winner will be selected by random name picker. Prizes that are not claim within a month will be forfeited.
0

Cyber Wellness - Internet Addiction

Wednesday, November 20, 2013

Chapter 5
State the symptoms and effects of internet addiction

Hmm, seems like the chapter is getting more and more interesting but I doubt it would last long.

What is “internet addiction”?

Addiction is a compulsion to repeat a behaviour regardless of its consequences. Internet addiction refers to any online-related compulsive behaviour that interferes with normal living and causes severe stress on the individual. It is a disorder similar to gambling. Addicts do not regard the internet as just an information and communication tool nor for enjoyment but they use internet as a means to escape from their problems while they spend time online like alcoholics when they drink.

There are various types of Internet Addiction in the following forms:
  1. Cyber-relational Addiction - Individuals spending excessive time on chat rooms, instant messaging, or social networking sites, become over-involved in online relationships or may even engage in virtual adultery. Those who are lonely or have low self-esteem will seek for companionship in the virtual environment and neglect reality. There is also a tendency for real life relationships with family and friends to be replaced with online friendships.
  2. Gaming Addiction - Online gaming addiction is an addiction to online video games, role-playing games, or any interactive gaming environment available through the Internet. The collaborative or competitive nature of working with or against other players in strategy-based internet games makes it difficult for players to take a break.
  3. Net Addiction - The wealth of data on the Internet gives rise to a new type of compulsive behaviour involving excessive web surfing and database searches. Individuals are so obsessed with data gathering that they spend a lot of time searching, collecting and organizing online information.
There is actually one more where the book forget to specify "Shopping addiction"!

Symptoms of internet addiction

  • Frequent thoughts about previous online activity
  • Anxiously waiting for next online session
  • Observable increase in the amount of time spent on the internet for satisfaction
  • On stopping internet use, they may experience feelings of restlessness, moodiness, depression or irritability
  • Neglecting schoolwork
  • Lying to friends and family about computer use
  • Dropping out of other social groups (clubs or sports) and neglecting friends when they choose to use the computer
Most common activities that suffer because of excessive computer/internet use:
  • Time with family
  • Social events
  • Reading
  • Watching T.V.
  • Time with friends
  • Exercise
  • Hobbies (gardening, woodworking, sewing, etc.)
  • Sleep
There are several self-assessment tests available on the internet to test if you are a internet addict, try asking Mr. Google :)

Strategies to prevent internet addiction

Internet is no longer a luxury but a necessity in our society. That is why it is important to exercise control over internet usage and reduce time spent online to cope with internet addiction.

Below are some strategies to prevent internet addiction:
  • Keep the computer in a place accessible to all be it at home or in school where monitoring internet usage is easy
  • Set a time limit for internet use
  • Encourage to engage in other social activities
  • Participate in internet safety programs designed by community groups
  • Explore ways to surf the Internet more efficiently
  • Find yourself some other hobbies which include outdoor activities or just activities outside your house.
Stop internet addiction is good but I hope you don't get yourself into any other bad addiction.

Declaration: I mean no harm or infringement of copyright, am re-posting to share and create awareness on Cyber Wellness only.
Source: ITE Cyber Wellness Notes
0

Cyber Wellness - Blogs

Wednesday, November 13, 2013

Chapter 4
Describe various issues of on-line diaries (Blogs or Web logs)

I believe many of you have your own online diary, even old people have one too how can you not own one? During the Silver Info-comm Day 2013 I have taught many senior citizen on how to use computer, one of the class is teaching on "How to Blog" I couldn't believe that senior citizen would blog too. Don't believe? Check out laozhaobor.blogspot.sg. If you still do not have a blog I guess after reading this post you would start creating one or this might be a guideline for you?

Terms Blogs or Web logs

A weblog, sometimes written as web log or Weblog, is a Website that consists of a series of entries arranged in reverse chronological order, often updated frequently with new information about particular topics. The information can be written by the site owner or contributed by users. Many blogs provide commentary or news on a particular subject; others function as more personal online diaries.
A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. The ability for readers to leave comments in an interactive format is an important part of many blogs. The weblog seems popular because the viewer knows that something changes every day, there is a personal point-of-view, and, on some sites, there is an opportunity to collaborate or respond with the Web site and its participants.

As an emerging tool, blogging uses have still not been completely explored. Some current uses:
  • Knowledge sharing and knowledge management
  • Customer service
  • Interactive journalism
  • Communication
  • Self-expression
  • Learning
  • Self-marketing
  • Campaigning/social reform
  • Community building
  • Experience tracking
  • Storytelling
Most common uses for blogging are personal. Emerging uses promise opportunities in corporations and education.

Benefits of blogging

Benefits of blogging are numerous that’s why it is growing so rapidly. An overriding benefit is the democratization of information. In classic models, knowledge flow was "stopped" and administered by news sources (paper, magazines, TV).
  • It encourages diversity of thought
  • Free flow – Any idea can be expressed and accessed by anyone.
  • Real time – Discussions and interactions happen immediately.
  • Multiple perspectives – One sided perspectives of newspapers are replaced by passionate debates exploring every side of an idea or concept.
  • Blogging allows people to communicate with people across barriers.
  • Blogs can be used in the education field to help students learn in a medium they are comfortable with. Some schools have embarked on blogging-based reading programs to help students learn better.
  • Personal growth - Some people consider blogging as a hobby, channeling their passion and hobby on writing. Blogging is something that you can start as long as you like to learn and share information.
  • Blogging is a very effective tool for popularizing business, networking etc. Blogs serve as channel to promote your brand and company.
Some people actually earn from blogging, currently xiaxue is the most famous blogger in south east asia and has receive much sponsorship from various company. I have seen some teens that wanted to be like her started blogging just because they want to earn free sponsorship and they ended up e-mailing retailer to sponsor them items instead of being approach, we should not beg for stuff like this! People will approach you if you are good, please do not don't beg because blogging should be a kind of hobby, you blog because you like it not because you want freebies.

Negative effects of blogging (so true!)

  • Blogging contributes to internet addiction, especially when bloggers spend significant part of their waking hours either updating their blogs or reading other people’s blogs.
  • Social/physical isolation - some bloggers communicate about their life experiences only through their blogs and in the process neglect interactions with others.
  • Offensive remarks can be propagated to generate hatred among the masses. (Anti-social / racist remarks)
    • October 2005, Two Singaporean bloggers were jailed for posting racist remarks online.
    • August 2005, Suspension of 5 junior college girls for posting offensive remarks about their teachers on their blogs.
  • Personal particulars of bloggers lead to internet crime. Criminals utilize the information published on the blogs to identify and assess potential victims for their future crimes.

Basic guidelines for bloggers

  • Never offer any personal information including your last name, contact information, home address, phone numbers, school's name, e-mail address, last names of friends or relatives, instant messaging names, age, or birth date.
  • Support a Culture of Collaboration and Contribution: The Read/Write Web is a place that welcomes participation. In industries where lots of people are online, blogging is the single best way to communicate and interact. Discussions shouldn’t just be unidirectional rather they should engage and invite a larger community to participate. Multiple authors on blogs and enabling comments, makes a massively connected peer-review process.
  • Blogs are meant for quick formulation and dissemination of ideas, not perfectly published prose. You don’t need to have a perfect article, just a topic to discuss. Still, be responsible. Use appropriate grammar and punctuation. Spell check.
  • Create a visible link to your blog's RSS feed (an XML format for sharing content among different Websites) and provide email subscription features to alert your readers when you’ve updated content.
  • Original content is what generates readership, at least for most bloggers. People come to your blog to hear something more – your perspective! Great content is the best publicity for your blog.
  • Don’t Say Anything You Don’t Want Others To Know. If something is on the Web, it’s discoverable. When you are adding to the dialogue on to the latest hot topic, remember to double-check and triple-check your post for tone, content, and civility. “Don’t say anything you wouldn’t say in person.”
  • Blog is not a license for bad behavior.
  • Respect Legal Boundaries, especially Copyright. General legal principles that apply to the rest of the media world also apply to blogs. It is still important to attribute your source, when applicable, and be aware of laws that can affect you in the virtual world. The main legal liability issues in blogging include: fair use, defamation, intellectual property (copyright/trademark), trade secrets, right of publicity and publication of private facts.

Commonly used internet lingo

What are lingo? Lingo can be so-called "twit" which are acronyms. I have actually learned something new from here and they are funny. If you're new to chat rooms, instant messaging, or e-mail, the above acronyms may seem vaguely official or even intimidating. Relax. These acronyms simply mean laughing out loud (LOL), rolling on the floor laughing (ROTFL) etc. They're just a few examples of the everyday cyberspace shorthand.
Internet slang, Internet language, chat room shorthand, is slang that Internet users have coined and promulgated. Such terms typically originated with the purpose of saving keystrokes, and many people use the same abbreviations in text messages. They are also very commonly used in instant messaging. The terms often appear in lower case, with capitals reserved for emphasis

Examples:
afk - Away from keyboard
ZZZ - Sleeping, Bored, Tired
cu - See you
bfn -Bye for now brb Be right back
spamming - the act of sending unsolicited email,
blogging - using online "web logs", or blogs
googling - searching through the Google search engine
egosurfer - searching the internet for references of oneself
mouse potato - someone who spends a lot of time at the computer, in analogy to the term 'couch potato' for TV-addicts.
troll - someone who attempts to gain infamy in chat or on forums by use of controversial and usually irrelevant or off-topic messages in an online community.
HTML - HyperText Markup Language, the coding language used to create hypertext documents for the World Wide Web.
trashers - someone who searches for information via whatever means needed... which would compromise the security of your site.
youtuber - a person who watches a lot of videos on the popular video sharing website YouTube.
ADSL - Asymmetric Digital Subscriber Line is a technology for transmitting digital information at a high bandwidth on existing phone lines to homes and businesses.
Cable modem - Uses digital information transmitted over a cable television infrastructure.
Dial-up - Uses the voice spectrum of the telephone lines to transmit data.
1D10T (one-D-ten-tee) is a common variant. A highly popularized example of this is a user mistaking their CD-ROM tray for a cup-holder, or a user looking for the any key. However, any variety of stupidity or ignorance induced problems can be described ID10T errors.
Guru – A more experienced user
Newbie – A new user of the internet
MUD – Multiple User Dungeon. Each user can take up a computerized avatar. They can walk around, chat with other characters etc.
Shouting – Typing in all CAPS. It is equivalent to raising voice.
Snail mail – Conventional paper mail
ISP – Internet Service Provider
MOO – Multi user dimension Object Oriented. They are multimedia, interactive environments in virtual space.

Declaration: I mean no harm or infringement of copyright, am re-posting to share and create awareness on Cyber Wellness only.
Source: ITE Cyber Wellness Notes
0

I've won the Skechers Blogging Contest

Sunday, November 10, 2013

Skechers had open a new concept store at Bugis Junction, it was at the space which was previously occupied by BHG and because my blog post has made it to the TOP 5 entries from the Skechers blogging contest I am invited to attend their store opening as well as to receive a pair of Skechers footwear worth up to $169.

SKCH +3 was the pair of Skechers I have chosen partly is because I have never own a wedges sneakers but then I am so fickle minded, I like both colours and I can't decide on which one to receive. I feel so bad that I can't make up my mind.

Chevy accompanied me to the event as well, me the shorty really need some SKCH +3 for some height boosting 

Not forgetting my boyfriend whom helps me to take pictures when I am unable to.

Check out Typicalben in Skechers LIV and Rachell Pxdkitty in Skechers SKCH +3

While waiting to be presented to my chosen Skechers 

So happy to receive a pair of Skechers for free. You can own one for free too!

Here's a picture of me with the rest of the winner.

A short interview on why I choose this model and design.

Like what I said I am not very tall, with SKCH +3 I can have that extra boost of height secretly without many people knowing hehehe and actually blue and red is one of my lucky colour said by the fortune teller. Other than the looks of it every Skechers is design for comfort.

On the opening day itself there's also a 30% discount so I purchase a pair of Skechers Active, even without the promotion I also will purchase one because I really like this pair.

With Skechers Active it will make my life really better. This pair of shoe is so casual and easy to slip onto, it is also light weight and flexible. This is my idea shoe for driving, photo hunting, cycling and which ever activity that requires me to move around often. With the white edges this pair of sneakers is also suitable for mild hiking as it would gives you that extra grip.

Other than the funky appearance that made of soft smooth fabric what I like about this pair of sneaker is the insole, it is not made of cotton means that it will not absorb your sweat and your foot wouldn't become stinky after long wearing. This pair of sneakers also require no tying of shoe laces which will save a lot of time.

Skechers SRR is my pair of first skechers that I have owned, it has served me well for that past 1 year plus as a running shoe. I have wore it from land, to water and mud and it is still good to go. This pair of intelligent shoe actually had some secret in it which I just found out today. If used properly it can actually helps burn up to 13.2% more calories, it's technology also helps reduce injuries and enhances performance. Sadly SRR couldn't be found in stores anymore. 

I personally had my eye on the Skechers GoRun, when I first held it I feel like love in first sight. What amaze me was the weight, it was super duper light that you will feel like you are running barefoot, one thing is I did not bought it as it cost $159 but is ok cause I still have my Skechers SRR.

Here is a sneak preview of what is coming up, the Skechers Nite Owl. This is series of Go Run is going to be my next target for running shoe hehehe. In this pair of running shoe Skechers used photoluminescent technology that will make this shoe glows in the dark, with this I don't need to worry when I am out at night cause I am sure that the glow gives out by this shoe would definitely grab your attention.

Here are some of the Go Run for Womens.

Fret not if you missed out the 30% discount cause there's more.


Do drop by Bugis Junction Concept Store and enjoy their opening deals, at the same time you could also take pictures of your favourite pair of Skechers to blog about it and stand a chance to win a pair of Skechers footwear.


It was a wonder that Skechers could develope shoe that is comfortable and beneficial while retaining the appearance. Many girls would suffer pain and discomfort for looks but with Skechers they can achieve the looks and comfort, I love how great it can be.


0
www.xiangtingk.com by Serene Koh. Powered by Blogger.