This document provides tips for staying safe online and discusses various internet threats. It begins by outlining best practices for internet safety, such as being mindful of personal information shared online and using strong passwords. It then describes various types of malware and fraudulent activities people may encounter on the internet, including adware, trojans, viruses, worms, spyware, phishing, and keyloggers. The document concludes by defining netiquette as internet etiquette for appropriate online behavior.
This document provides tips for staying safe online and discusses various internet threats. It begins by outlining best practices for internet safety, such as being mindful of personal information shared online and using strong passwords. It then describes various types of malware and fraudulent activities people may encounter on the internet, including adware, trojans, viruses, worms, spyware, phishing, and keyloggers. The document concludes by defining netiquette as internet etiquette for appropriate online behavior.
This document provides tips for staying safe online and discusses various internet threats. It begins by outlining best practices for internet safety, such as being mindful of personal information shared online and using strong passwords. It then describes various types of malware and fraudulent activities people may encounter on the internet, including adware, trojans, viruses, worms, spyware, phishing, and keyloggers. The document concludes by defining netiquette as internet etiquette for appropriate online behavior.
This document provides tips for staying safe online and discusses various internet threats. It begins by outlining best practices for internet safety, such as being mindful of personal information shared online and using strong passwords. It then describes various types of malware and fraudulent activities people may encounter on the internet, including adware, trojans, viruses, worms, spyware, phishing, and keyloggers. The document concludes by defining netiquette as internet etiquette for appropriate online behavior.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1/ 3
E-TECH
ADWARE - When a person surfs the internet,
Internet - is defined as the information adware is a sort of virus that displays unwanted superhighway advertisements. A valid technique of generating Here are some tips to help you stay safe when advertising money that help fund development using the Internet. is frequently included in many shareware or freeware downloads. Some websites, on the 1. Be mindful of what you share and what site other hand, are tainted with dangerous adware you share it to. that is downloaded to your computer 2. Do not just accept terms and conditions; automatically. read it. 3. Check out the privacy policy page of a TROJANS website. Trojans leave your computer vulnerable to 4. Know the security features of the social hackers, allowing them to steal any data on networking site you use. your computer. Trojans frequently disguise 5. Passwords should not be shared with themselves as harmless computer programs in anyone. Your password should be treated order for hackers to gain access to your like a toothbrush. Allow no one to use it, computer without being detected by you. and replace it every six months. 6. Logging into public networks/Wi-Fi is a bad VIRUS – one of the most talked about internet idea. Hackers' ability to position themselves threats. Because viruses are designed to between you and the connection point is propagate at an alarming rate, they usually one of the most serious dangers to free attach themselves discreetly to downloads. WiFi. As a result, instead of speaking Antivirus software is often attached to files for directly with the hotspot, you send your data download, shares virus-infected email to the hacker. Any information you provide attachments, or loaded onto computers via or gain access to on these networks is gone CDs, DVDs, and USB sticks. in a blink of an eye. 7. Do not talk to strangers whether online or WORMS – malicious email attachments or face-to-face. USB sticks are the most common ways for 8. Never post anything about future vacation. worms to get onto a computer. When a worm You are inviting the burglar to rob your infects your computer, it will most likely send house at that date. itself to every email account on your machine. 9. Add friends you know in real life. Your email will appear innocent to the recipient 10. Avoid visiting untrusted websites. until they read it and find themselves infected 11. On your computer, install and update by the same worm. antivirus software. To avoid conflicts, use only one antivirus software. PHISHING – a type of fraudulent behavior in its 12. If you have a Wi-Fi at home, make it a most basic form. Official-looking emails private network by adding a password. impersonating a well-known source, such as a 13. Downloading anything from untrusted bank, are frequently sent. It is the purpose of websites is a bad idea. Malware can infect these emails to acquire people's passwords your computer if you visit certain websites. and credit card information. 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious SPYWARE – is another type of malware. emails. Known as spyware, it is an all-encompassing Internet Threats - the internet is an excellent internet ailment that is commonly associated source of communication and information, with downloading file pop-ups. Spyware can there are a lot of dangerous risks to be aware monitor your keystrokes, read, and destroy of. When utilizing the Internet, here are some your files, reformat your hard drive, and access of the hazards you should be aware of. your apps once it is installed on your computer. Without your knowledge, the individual in SPAM - Most of our email accounts come with charge of the spyware has access to your a ‘Spam’ or ‘Junk’folder. Spam emails are a personal information. huge issue, with more than 50% of emails being syphoned into these folders. Aside from being an annoyance, spam emails are not a direct threat, but many can contain malware. KEYLOGGERS – are similar to spyware, 8. If someone asks a question and you know record a user's keyboard operations. The the answer, offer to help. majority of keyloggers will hunt for easily 9. Thank others who help you online identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to keylogging.
PHARMING – a more sophisticated form of
phishing that takes advantage of the DNS system. Pharmers frequently construct web pages that look like those of a reputable company, such as an online banking log-in page. Users will then submit their credentials, assuming they are logging in to their regular service, and the pharmer will steal their credentials.
ROGUE SECURITY SERVICE
This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer.
NETIQUETTE – a short for "Internet etiquette,"
and it is a code of appropriate online behavior that is similar to politeness in society. Email, social media, online chat, web forums, website comments, multiplayer gaming, and other forms of online communication are all examples of this.
While there is no official list of netiquette rules
or guidelines, the general idea is to respect others online. Below are ten examples of rules to follow for good netiquette: 1. Avoid posting inflammatory or offensive comments online (aka flaming). 2. Respect others' privacy by not sharing personal information, photos, or videos that another person may not want published online. 3. Never spam others by sending large amounts of unsolicited email. 4. Show good sportsmanship when playing online games, whether you win or lose. 5. Don't troll people in web forums or website comments by repeatedly nagging or annoying them. 6. Stick to the topic when posting in online forums or when commenting on photos or videos, such as YouTube or Facebook comments. 6. Don't swear or use offensive language. 7. Avoid replying to negative comments with more negative comments. Instead, break the cycle with a positive post. PAGBASA Pang-ugnay - Paggamit ng mga pangatnig KOHESYONG GRAMATIKAL o COHESIVE upang makabuo o pag-ugnayin angisang DEVICE pangungusap. Halimbawa: - Hindi sila Ang kohesyong gramatikal ay mga salitang nagtagumpay sa kanilang binabalak sapagkat nagsisilbing pananda upang hindi hindi lahat ay nakiisa. babanggitin nang paulit-ulit. TALATA (PARAGRAPH) - ay binubuo ng isang Panghalip pangungusap o lipon ng pangungusap na Halimbawa: ito, dito, doon, iyon naglalahad ng isang bahagi ng buong (bagay/lugar/hayop) sila, siya, tayo, kanila, pagkukuro, palagay, o paksang diwa. kaniya (tao/ hayop) Mauuri sa lokasyong katatagpuan nila sa loob ng isang komposisyon. Mga Panandang Kohesyong Gramatikal Panimulang talata, talatang ganap, talata Pagpapatungkol ng paglilipat-diwa attalatang pabuod. Elipsis Pagpapalit o Substitution Panimulang Talata Pang-ugnay Ito ang una at kung minsan ay hanggang sa ikalawang talata ng komposisyon. Pagpapatungkol - Paggamit ng mga Layunin nito ang ilahad ang paksa ng panghalip upang humalili sa pangngalan. komposisyon. Dalawang Uri: Sinasabi rito kung ano ang ipaliliwanag, ang Anapora- Panghalip na ginagamit sa isasalaysay, ang ilalarawan o bibigyan ng hulihan bilang pamalit sa pangngalang nasa katuwiran. unahan. Halimbawa: Matulungin si Anna sa mahihirap kaya’t siya ay pinagpapala ngPanginoon. Katapora- - Mga panghalip na matatagpuan sa unahan ng pangungusap bilang pamalit sa pangngalang nasa hulihan. Halimbawa: Siya ay hindi karapat-dapat sa aking apelyido. Si Juan ay kahiya-hiya.
Elipsis - Pagtitipid sa pagpapahayag.
Halimbawa: - Pumunta si Erick sa tindahan at bumili si Erick ng tinapay. - Pumunta si Erick sa tindahan at bumili ng tinapay. Pamalit o Substitution - Mga salitang ipinapalit sa iba pang bahagi ng pangungusap na naunang nabanggit.
Mga Uri ng Pamalit o Substitution:
Nominal - Pinapalitan ay ang pangngalan. Halimbawa: - Ang wikang Filipino ay ang daan upang tayo ay magkakaunawaan, kailangan lang nating pagyamanin ang ating wikang pambansa.
Berbal - Pinapalitan ay ang pandiwa.
Halimbawa: - Inaayos ni Tatay ang mesa at sinimulan naman ni kuya ang silya Clausal- Pinapalitan ay sugnay. Halimbawa: - Hindi mahabol ng mga tao ang magnanakaw at hindi rin nagawa ng mga pulis na hulihin sila