Technology

The wobbly people on the web

Yes, there are negative influences online

Yes, mean and nasty people are everywhere on the web. These people will guess your passwords, trick you into embarrassing yourself, infect your machine with remote control software viruses, cause you emotional distress, and even make you feel personally attacked and threatened. . Be warned: Not everyone is a good online user and it’s a good idea to be prepared.

01 of 11

Internet Trolls: the mosquitoes of online culture

Hands typing on the computer in the dark
d3sign/Getty Images
Trolls are arguably the most common form of online bad guys. These people love to get a rise out of people; They take pleasure in sowing conflict and bringing anger to others. Everywhere on the World Wide Web, you are bound to find domes. More “

02 of 11

Haters: Racists, Bigots, Enemies
ad
Smokers are similar to chumps, but they are usually much more extreme in their emotions. You see, haters stand out online because they intentionally spew hate and bigotry as they attack other people’s ideas and beliefs. While some sunny martyrs just play roles for trolling fun, other “five-star stars” are frankly full of bigotry, racism and other extreme anti-social beliefs. More “

03 of 11

Cyberstalkers: Now more common than physical Stalkers
Cyberstalking is now more common than physical harassment. Disturbed individuals express their pathological obsessions using email, mail, instant messages, Facebook comments, and even GPS tracking with smart devices. While cyberstalkers are still a very small minority of society, it is a sad reality that needs to be acknowledged. More “

04 of 11

Cyberbullies: Digital Harassment and Cruelty
Cyberbullying is now as common as physical bullying. A direct relative of cyberstalking, cyberbullying is asserting dominance over another person through online harassment. Unlike cyberstalking, however, online harassment often involves involving others in the harassment. Cyber ​​stalkers will publicly destroy their targets by posting Facebook or blog posts that poison other people’s opinions against the target. This is not a trivial teenage craze. Cyberbrain causes deep emotional trauma and, in some cases, has contributed to suicide.

05 of 11

Clickjackers: Nab Nab will click your mouse to launch Nasties
Clickjackers are anti-social developers who place invisible buttons on web pages. Clickjack buttons will cover legitimate buttons and we victims unwittingly activate their commands. Before you know it, Facebook’s privacy settings have changed. You’re following a stranger’s Twitter feed. Maybe your camera has just been secretly activated. Or even worse: a remote control program is now installed on your computer. Yikes! These ticks play dirty, and their modern scams are a nasty force to be reckoned with. More “

06 of 11

Phishermen: Modern Artists with Fake Emails and Fake Websites
Modern followers are called “phishermen” online. Named for a combination of “fake” and “fish”, these fishermen usually accept their prey in bogus emails. These emails are called ‘spoofs’. explains email spoofs and phishing here. More “

ad
07 of 11

Zombie Masters: Programmers who take over your computer
Being “zombie” (also known as “botted”) is a particularly unpleasant invasion of privacy. In this case, clever but flawed developers will install remote control programs on your computer and take over your machine to do their bidding. Many times, a zombie computer is used to send thousands of spam emails. In other cases, a zombie computer will perform hacker attacks on other websites. Don’t become zombie food. Read how your computer can get zombies and how you can protect it. More “

08 of 11

Hackers and their different motivations
We’ve all heard of “hackers,” and we see them in movies. But what exactly is a modern computer hacker? And are they the same as “haxors”? Well friends, there are actually four different kinds of hackers / haxors in the universe and not all of them are bad. In fact, if you press

with your computer, you might be a low-level “hacker” yourself. More “

09 of 11

Spammers, and how they attack you with Ratware
Have you received offers for pharmaceutical products by email? Have you been invited to transfer $20 million to your account from Nigeria? If you get spam from such messages, then you have been attacked by ratware. You see, ratware is the custom software that spammers use to crack-send millions of illegal messages. And this is how spammers attack you with ratware. More “

10 out of 11

Hoaxers: They will trick you with their excellent emails
Is a giant shark really mauling a British navy diver? Do rich Nigerians really want to transfer $4.5 million to my bank account? Does the Snakehead fish really walk the earth and did Mel Gibson really get amputated as a teenager?

Don’t embarrass yourself by falling for these pranks … if you forward these to your friends, you will be ashamed of your kindness. Here’s the real scoop on flare photos, chain emails, and weird stories in your email! More “

11 out of 11

Sexting: Don’t play this game
‘Sexters’ aren’t technically evil, but their indiscriminate motives will lead you into a world of humiliation, whether they’re pestering you with their private photos, or tricking you into embarrassing yourself with your own. 39% of all American teens have engaged in some form of sexting. 46% of young people have reported seeing explicit personal photos forwarded to strangers. These are not the statistics of a rage, this is the viral danger of how young people can unknowingly disturb themselves in the eyes of thousands of people.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button