~Welcome to Legal Issue In Internet! The purpose to create this blog is to let you and I understand more about Legal Issue in Internet. Feel free to drop some comment and constantly visit our blog we will be appreciated. Thank You ~

Friday, March 20, 2009

Poll 9 Result

Poll 9 Result

The title of Week 9 poll is "What is your reaction when you received irretated hyperlinked which contains virus for the first time?", the result of the poll shows that the majority respondent which is 2 respondents (66.6%) choose "you open it because you think something is related to you." Only 1 respondent (33.3%) just ignored it without any reason. Whereby none of the respondent (0%) don't know what it is so they open it and none of the respondent choose they know that might be a virus they ignored to open it.
From the result we can know most of us are the victims always get this kind of irretated hyperlinked that contains virus when they first time click on it they didn't alert of the virus inside and harm their pc because they think something is important and didn't ignored it. The awareness of people of beware this kind of hyperlinked was low but as this kind of situation happen and happen around us, some of the respondent choose to ignored it without any reason because they know it's a virus after the experiences. I hope there will be a solution to solve this problem and I really hope some organization should take action of this kind of behaviour that harm people's computer software or maybe some people just trying to do some hacking. It's so irritating as people need to reinstall their software once they get viruses and sometimes the important documents will lost caused by the virus. It's a issue that getting serious, people remember try to avoid to click on it to protect your pc.

Thursday, March 19, 2009

The Ethnical issue of Online Dating is cheating

While the online dating websites do allow us to find a relationship very efficiently, like anywhere else, there are people who will try to misuse the system. Men can go pretty wild when they know that they are anonymous. I had seen my cousin brother he was just in age of 11 years old he often play online games where create a female account to get people get in trap. What he did was people thought he was a young lady then my cousin brother keep asking for advantage where asking them give "her" a good weapon and give "her" some points so "she" able to upgrade her level faster. He use this way to cheating people stuff which is related to ethical issue merely because they even knew they had not meet each other they might know is a risk to a trap but they are willing to give. However when he getting too over of it, once a guy want to date "her" for movie, ofcourse my cousin avoid to go. Even smarter he asked his sister to act as "her" so those guy would easily to believes the present of "her" is real.

It is an ethical issue to get advantage of people it is really immorality do cheat people in this way. In the reality of social networking such as FaceBook and Friendster, MSN Messenger and so on when come to a lonely person you might tend to act like a silly person just simply find a partner chit chat and this is how you "fall in love" with the person while you never get to see each other before. In a reality word to describe you are "falling in love" with the chatting process while get you out of loneliness. A relationship that never meet each other but maybe in the webcam but this are not a real relationship should be. Indeed, none of the people would want to marry a person that just through internet tool chatting. This is a fake relationship just to satisfy each of party's needs in a temporary period. However some of the innocent victims never realize they get in the trap when they are "fall in love deeply" because love is blind! Not only men will cheat but girls will cheat as well. How do men cheat? Some of the wild men they ask for sexual show in front of the webcam. They persuade the girls to take off shirt or perform sexy posting just to satisfy their needs. How about the girls cheat the guys? In my opinion I think most of the girls expert in cheating money. Maybe the scenario will be this way, for example the guy persuade the girl to take off the shirt the girl will request for take off one piece of clothes pay $XXX as a money transaction banking into her account. How can you imagine you just sex in front of the webcam doing alone? This is a serious issue thats often happened in our society for this recent years. Its is so disgusting but it is so hard to avoid or stop this unhealthy activities to happen continously.

Tuesday, March 17, 2009

Internet crimes in Los Angeles and punishments

The term "internet crime" is a sort of catchall phrase that can represent so many crimes. In its most basic meaning, a Los Angeles internet crimes are any crime committed while using the Internet. Some of the most frequently seen internet crimes in Los Angeles include phishing, credit card fraud, illegal downloading, child pornography, illegal pornography, and illegal distribution of viruses or spam. Phishing, for those who may not know, is a type of fraud where an individual or group poses as an otherwise trustworthy entity such as a bank and asks for personal information such as bank account numbers, credit card numbers, social security information or account passwords.
With such information, they can then access a person’s bank accounts or credit cards, or proceed to commit identity theft. Phishing scams are so common that I myself was approached twice in the last month with e-mails claiming to be from banks that Credit card fraud is nearly interchangeable with online auction fraud. In these cases, the victim tries to purchase something online with their credit or debit card that is never delivered to them. Bank and credit card account numbers are often the information that is being sought after.

Punishment for Internet crimes varies widely depending on the facts of each case. Depending on the scale of the damage done, imprisonment, large monetary fines & restitution, community service, probation or parole may be handed down by a judge as punishment. As in most cases, a first-time offender will likely be given a less severe punishment while the opposite is true for repeat offenders. One important note here is that if the defendant committed a sex crime while using the Internet that involved a minor, he or she may be subjected to greater charges with correspondingly greater punishments.

Los Angeles criminal law blog
http://keglawyers.com/blog/?cat=18

The punishment of internet crimes in Los Angeles is really good and give alert to the people who wants to commit a crimes through internet. For my opinion, I wish the Malaysia could practise like what Los Angeles government do to protect the users of the internet. At the mean time, the users of the internet must also have self-knowledge to overcome and smart while online to avoid to fall into the trap of the profiteers and the bad people in the internet world.

Sunday, March 15, 2009

Poll 8 Result

Poll 8 Result The title of Week 8 poll is "Have you ever receive the porn testimonial in your Friendster?", the result of the poll shows that the majority respondent which is 4 respondents (80%) did received the porn testimonial and they just ignore it. Only 1 respondent (20%) had never noticed any porn testimony in the Friendster. Whereby none of the respondent (0%) accept the testimony.
From the result we can know most of us are the victims always get this kind of testimony but is so hard to ignore it because the same thing will continous happened. Not sure what is the purpose they people send to us maybe it contain virus thats why people are afraid accept any kind of application or files. People are more security now thats is why whatever any strange information they will just ignore it. Some of the picture are so scandalous and you will get tired to delete as well because even after you will delete you will get the same thing very soon. Is there any solution to ignore this to happen? Is this one of the reason people change their mindset to use Facebook instead of Friendster?

Thursday, March 12, 2009

Man-In-The-Middle-Attack

The topic that Im going to discuss is Man in the middle attack. The man-in-the middle attack intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.

In a simple explanation, man in the middle is one kind of the computer crime that duplicate the information that the user sent over. It's basically means the private and confidential info are passing around through the net. Let's have a simple example, Alice and Jason is using webcam through MSN, the attacker would intercept the video call and get to see what the user are seeing. It might be use for illegal purposes.

So far me and the friends around me are never involved in this kind of computer crimes therefore I have no experience to share with you guys. Anyway, I knew some solution to avoid this man in the middle attack crimes. By using Encryption, which is you type the "unknown words" then your friend would read it through some softwares while the attackers can't get your information so that they couldn't attack your pc and your confidential information as well.

Let's show you guy a picture to understand better.


man in the middle attack

Hope it works and makes you understands more about Man in the middle attack computer crimes. =)

Man-in-the-middle attack
http://www.owasp.org/index.php/Man-in-the-middle_attack

Wednesday, March 11, 2009

Irritated Hyperlinked in MSN Messenger

Has been so annoyed by the hyperlinked that sent by many friends in MSN Messenger for the past few months but recently this cases happened getting more serious. Last few days I just on my MSN chatroom suddenly many windows pop up, I thought was my friend nudge me so fast because I just online. But realized those are not message by friend but the hyperlinked which contain your email address and your name. Is a virus to attacked your MSN get lagging to run your program and keep sending the same message to all your friend who in your friend list. Actually those messaged we received, the sender are not sending in purpose but they are also one of the victims because the virus will auto spread. I was experienced once and it goes like this "I find interested picture of Yvonnegirl063@hotmail.com click on http://party-Yvonnegirl063.com" I was get shocked and curious what it is about then I go to click the hyperlinked after that my MSN get lagging and then keep sending the same content to my friends. Eventhough I try to logout from MSN and then login again but the incident was remaining to spread the virus to others users. I had no choice and uninstall MSN Messenger, after that I restore MSN Messenger again then everything was fine already.
After this incident I will totally ignore all this kind of hyperlinked and will give advice to my friends do not click on the hyperlink.

I was really piss off after the get those message from anyone. I just quite pity some of my friends get this virus. Hope they know the solution to solve this problem and I really hope MSN Authorizer should take action of this kind of behaviour that harm people's computer software or maybe some people just trying to do some hacking. I think most of the time people get this same experienced in MSN as well, If you have this experienced please share some here and give some opinion to let us prevent this.

Sunday, March 8, 2009

Poll 7 results

have you received spam or junk mail in your mailbox? (poll result)The week 7th poll topic is "Have you noticed the spam mail or junk mail in your mailbox?" the results of the respondents has shows that most of them have ever received the junk mail in their mailbox. There are 10 of the respondents which is 90% of the result they had received it and they ignored it. whereas others answer, "No, didn't notice" of the poll was 10% which is only one respondent select this answer.From the chart result is obviously most of our respondents are receiving the junk mails and they normally ignored to open it. This is not a good sign because the Spam systems which is sending those commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services is getting serious as spreading around the mail system. I advised the respondents be careful when selecting the email and if possible try to avoid to open up the junk mail and delete it. This is because some of the junk mails may be chargeable. I hope the mail system could stricten and filter the mails to ensure the peoples doesn't receive the unwanted mails.

Friday, March 6, 2009

The Sensitive Issue

We all want to encourage out grandparents, adults, chilren and others a sensitive disposition to surf internet. However sometimes we do end up on a video sharing website like YouTube, where the comments appear that written by friends or stranger in extreme emotional pain or porn picture in Facebook or Friendster this are strictly not encourage to appear and cause the curiousity of people tend to have a view on it. This seems like not a big issue but its influence and affected the young generation about this sensitive issue.

The online gaming chat box often happened this kind of incident where by some one you even never met before maybe is the enemy of your team then they will type all kind of emotional fault word to express their feeling. Sometimes is hard to ignore it though the administrator had control some of the fault word cannot be appear but they will have their way to type all kind of fault words. Sometimes are irritating and you are hardly to ignore it.

I had experienced in my Friendster account at the testimonial box I met friends that I do not met before and paste hot and sexy picture there. Its is normal for all of us till we are just bored to bother it and just leave it there. Are you same as me so lazy to bother this kind of situation?

Tuesday, March 3, 2009

China shuts down 23 websites for illegal drug sales

illegal drug sales
China's State Food and Drug Administration (SFDA) has listed on-line drug sales as a priority target this year and strengthening crackdowns on false advertising of drug products, according to the food and drug watchdog.


The websites, most disguised under the names of certain hospitals or medical institutions, either sold counterfeit drugs or publicized illicit content. They included false, exaggerated or misleading information regarding cures to various ailments, the spokesman pointed out.


I felt very surprised after read this news. The people is going too far as they are selling drugs online! It's a quite embarrassing news for China as the China people are misused and forgot the importance of internet and it's touch the most highest risk in China as the punishment is heavy of selling drugs!


Luckily the government will take and tightens the law and actions to make sure their residents does not become the victims of those illegal websites.I hope the public to be alert and avoid falling victim to similar websites this is because the drugs is the harmful things for our body. So far has never heard about the Malaysia involved in this kind of illegal issue in internet thanks god and hope it won't spread in Malaysia or other countries as well!


Be careful!!


China tightens scrutiny over illegal online drug sale


Sunday, March 1, 2009

Poll 6th Result

Poll 6 result
The week 6th poll topic is "Would you ever try Online Gambling?" the results of the respondents has shows that there are not interested at all in online gambling. There are 7 of the respondents which is 100% of the result they are not interested at all. Where by others answer, "Yes. I want to have a try how fun it is","Yes. Because I no need to go casino because I'm still underage", "Yes. Because my parent don't know" all of the answer of the poll was 0% which is no any respondent select this answer.

From the chart result is obviously most of our respondents are not interesting and addicted in online gambling. This is a good sign that people will not interesting on gambling because once people addicted in gambling then they will tend to keep gambling and gambling till lose all their money or even borrow money from "loan shark". In Malaysia, not much people will try for online gambling because this are not encourage especially some are parental control and if people they are mature enough they will not want to get trouble. So, is good that the result show in positive way.

Saturday, February 28, 2009

Spam Issue in internet

What is SPAM?

The term SPAM was first used in the early 1990s to describe e-mail messages, not related to the topic of discussion and postings that swamped newsgroups.
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.

Top Ten Blog tips! ways to fight SPAM!



Spam
1. Use a contact form. Don’t make your email address public. Especially not as a clickable link. Here are some more reasons to avoid using clickable email address links.


2. Use a different email for each site you sign up for. Then if one email account starts getting spammed, you only have to change it in one place. This is more to do with email spam than blog spam, though.


3. Use a different email when posting comments. Who knows if the blog you’re commenting on will keep that email private? They might start sending you messages you didn’t ask for with no way to unsubscribe. Best to use a dedicated email address just for posting comments.


4. Banning IP addresses. This is a bit extreme unless you notice some very clear patterns in the spam you receive. Also, be careful, as banning by IP can also block legitimate internet issue.


5. Moderation. This means that every comment on your blog will be held until you approve it. The downside is that it requires a lot of manual effort, and may not be an option for blogs that get hundreds of comments every day. However, if you can add users to an “approved” list so you only have to approve their first comment, this seems like a very sensible solution to the spam problem. Well, unless your blog attracts lots of new users every day and many of them only write a small number of comments.


6. Anti-spam plugins. WordPress users will probably know about Akismet, a plugin that analyses comments as they come in and attempts to flag the ones that look like spam. Generally, it works well, but no system is perfect.


7. Word verification. Also know as a CAPTCHA, this uses an image of distorted letters and numbers and requires you to type the characters into a box. Get it wrong and you have to try again. I think these are quite effective so long as they are easy to read

8. Closing comments after a specified period of time. This method works on the assumption that a few months down the line, nobody will want to add anything new to your post. Spammers seem to enjoy targeting posts that have long since disappeared from the front page of a site, hoping that the site owner won’t notice the spam.

9. Requiring registration. This is likely to limit your comments drastically, and is still not a guaranteed way to stop spam. It’s a good method for blogging networks or sites that offer more than just a blog, but it’s a bit too draconian for most blogs.

10. Turning off comments altogether. No comments, no spam, right?! OK, you might not get any comment spam this way, but don’t cut off your readers! This method is a bit extreme.

I have experienced as I opened up the mail box (hotmail) there are many junk mails and I didn't know about the sender as well. Actually all these is the SPAM email which is contains those commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.

Besides that, there are also many messages that contain the "sex message" they will asked you to click and enter the web site sometimes all these is chargable. So becafeful when clicking it and identify the sender is you know them only click "show content".

What is Spam?

http://spam.abuse.net/overview/whatisspam.shtml

10ways to fight spam

http://www.toptenblogtips.com/10-ways-to-fight-spam/

Tuesday, February 24, 2009

Online Privacy issue in internet

Privacy is an issue refers to all of us as a user who use the web. The growth of the Internet has created a number of privacy issues and cause many victims in troubles. But nowadays this issue are common and sometimes even the users they might not know their privacy information has been steal. However, privacy and online hacking are different. Hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. Whereby Internet privacy is an important ethical issue because most organizations engaging in e-commerce have not yet developed policies and codes of conduct to encourage responsible behavior.

To avoid this to happened, few types that you may need to do is do not easily get stranger to get close to your house unless you allow them to access to all the data on it. Which mean do not easily let unknown software such as virus which it the most common incident that happen in our daily lives. The best solution is install an anti-virus program to protect your privacy data. A good anti-virus program don't pose privacy threats, also checks for and removes trojans. Some trojans can open your computer up to remote control by anyone who has the right software. computer has detected trojan, they can do anything they want with your machine. They can check your read any information or download it such as personal email, photos, banking and credit card information or account password, video, any kind of files and so on all kind of data. They might can delete it or run program. It can be controlled by them without knowing.

Fortunately, it's fairly easy to avoid becoming infected by a trojan.
-Don't ever run attachments from anyone but trusted sources.
-Download software only from reputable sites.
-Run a virus checker on every new program you install, no matter where it came from.
-Regularly update your anti-virus software, and check your system for infection frequently.
Just those few steps will drastically reduce the potential for serious invasion of your privacy

On the other hand, another common incident is email virus stalker. It happened while attachments, opened email themselves to everyone in your address book. Some of these have been set up to send private info, like passwords and account information, to their programmers.

These are usually infected MS Office file such as Word docs, Excel spreadsheets, or other MS Office documents, Acess, PowerPoint without taking proper security steps. Macro-viruses can infect any of these document types.It's also a good idea to just delete file of the types listed above that you weren't expecting. These viruses would only come from people you actually know and sometimes even the sender they do not know they was a victims as well detected by the "other Users".Again, run a virus scanner at all times. And avoid using Microsoft email programs where you can. They have some serious security problems in the default configurations.

Internet ScamBusters™, Audri and Jim LanfordCopyright © ,
http://www.scambusters.org/Scambusters41.html


E-center for business ethics
http://www.e-businessethics.com/internet.htm







Sunday, February 22, 2009

Analysis of poll 5 question

Poll 5 resultsThe week 5th chart shows whether respondents have ever but the pirated software like Adobe Photoshop. There are 6 respondents (85%) have buy pirated software before and only 1 respondent (15%) never buy pirated software and they don't touch illegal issue. This is a bad sign that nowadays more people buy pirated software.

People tends to buy pirated software is because the pricing of the pirated software is much more different with the original software. they do not care about the legal law that would violate the copyright of the original software. they also don't know the consequences of using the pirated software they are many consequences as I mentioned in the previous article as well.

However, I think the original software copyrighter should lower down the pricing like many below RM100, then the people would consider to buy original instead of pirated software. buying original software is much safer and it's guaranteed the safeness of our pc, laptop, and all the documents.

Friday, February 20, 2009

Is Online Gambling Legal?

Some states have specific laws against online gambling of any kind. In addition, owning an online gaming operation without proper licensing would be illegal, and no states are currently granting online gaming licenses. Various forms of online gambling are legal and regulated in many countries. However, Malaysia has recently taken its action against Internet gambling activities.

There are some website are legal gambling and some are illegal gambling. Just beware some are illegal not proven license. Some people choose to online gambling because online gambling website is very secure so that you no need worry about your information will be publish. Besides that why people choose to online gambling because is convenient and the gambler no need to dress nice and most important they no need to carry lots of cash. Just by credit card they are able to participate.


On the other hand, Some people think that gambling is the easiest way out of being in the slums. However, the odds of losing in gambling are much higher than that of winning. The online gambling is control by the owner. For example, they are many people buying casino NO.3 then the computer will not spin to this NO. This is all control by them that's why the changes of losing is higher than winning.

Some people under age want to have a try or do not want to let parents and family know they gambling so they decide sign up for online gambling these are the important issue that public concern about especially those illegal set up trap for the newbies who do not know much about online gambling. And this is why to set up a legal online gambling website is not easy and many laws to be prove and access.

If the bill becomes law, it would essentially hit Internet gambling by choking off the money supply -- making it illegal to write a check or use a credit card or any other form of payment in gambling online. Provisions in the bill would have bank regulators use their enforcement powers to go after the banks to stop payments from going to the cyber casinos.So, getting back to our fearless sports talker, is online gambling legal this bowl season? Can't say for sure, but it may never again be so easy.

References:


The surf's up


http://www.the-surfs-up.com/news/gamblingonlinenews.html



WORLDLawDirect.com, Inc.

http://www.worldlawdirect.com/article/1559/Is_online_gambling_legal.html





WORLDLawDirect.com, Inc.

http://www.worldlawdirect.com/forum/law-wiki/5953-online-gambling.html


Online Gambling blogspot.:

http://on9gambling.blogspot.com/search?updated-max=2009-02-05T23%3A11%3A00%2B08%3A00&max-results=7

Wednesday, February 18, 2009

illegal website that I visited

I had visited a website recently. It's from "gutt.......blogspot.com". Why is that so special that I need to mention it and write in my blog? Actually it's a blog that provide all the celebrities, models, politician,students, scandal, and even more about all those naked picture and personal videos as well!
The content including the latest Zhang Ziyi, Edison Chen scandal, Top model, Britney Spears and I saw the famous Malaysia Majalah 3 host's personal naked picture too! When I click on it, all the picture appears without censored. Moreover, all the photos categories in "model", "celebrities", "Malaysia", "Indonesian", "students" and hundred over of categorization.

I'm wondering why the web service, the blogspot.com does allow all these content of blog exist for so long in the internet because you can find the older scandal from there and all these without any censorship?? Definitely all of these content, picture does really violate the people's privacy and had totally break the legal issue in internet!

I can't believe if one day the popular of this blog being increase and the innocent children, or the people who are unmatured and underage visit it, the consequences will goes worst than what we having right now in the society.

The blog does give the surfer the space of imagination, if all of these is being imitates by the under age students?

Is it because nobody report it or the web service owner doesn't want to care about it?
They need to take action!!!!

Sunday, February 15, 2009

Week 4th Poll Question Analysis

Poll 4 results
The week 4th chart shows on the top that whether respondents have ever experienced computer hack by hacker. There are 3 respondents (20%) have experienced hack by hacker and 12 respondents (80%) never experienced hacking by hacker. However this is a good sign to find out most of the respondents did not get hacked.

But sometimes while people get hacked they still do not know their computer has been hacked until when they facing touble in computer only they realize their computer got hacked. Most of the time people will not know they has been hacked because the invent of hacker are very intelligent they are not easy to let you find them once they have an intention of stealing information. This are consider the moral values that they not consider people's right and protect own privary. So eventhough you think you have not be hacked do not be too excited who knows some hacker are stealing your information without you realize take note in this situation.

Thursday, February 12, 2009

Pirated software?

Today let's talk about the pirated software. Nowadays, pirated software selling around the public area. The public area is like shopping mall, computer shop, or even night market (normally known as "pasar malam"). Finding a pirated software is very easy to get already and the pricing compared with the original is much more different!

From the research, the top pirated software on the Internet includes anti-virus programs followed by AutoCAD and Adobe Photoshop.

Most Pirated Software Programs on the Internet
http://www.labnol.org/internet/favorites/most-pirated-software-programs-on-the-internet/2373/

Why are the public likes to buy pirated software instead of using the original? The reason is very common as the pirated software is cheaper! For example like buying a Microsoft Office 2007 software cost us around RM100-RM200, but for the pirated software, it maybe only cost us RM10 only. And then, the people will definitely buy the pirated software? Why spend about 10TIMES of budget to get the SAME software? this is what people think, and it set in my mind previously.

The risk of using pirated software for your pc are includes the possibility of someone hacking into your computer and stealing valuable information, unfortunately, without you even knowing it. This is because pirated software don't have complete file components of genuine copies, and often contain viruses, malicious bugs and spyware. Hence, installing pirated software leaves your computer unstable and defenceless against intruders.

The risk of using pirated Windows & Office
http://www.microsoft.com/malaysia/genuine/vog/

Pirated software may contain viruses, spyware, computer failures. While virus and spyware is attack your pc and documents, it can cost us even thousands of riggit or more! Moreover, losing the money and documents is a troublesome matter to solve.

So people, don't take the risk! It cost you thousands!

Things that you may Concern before Creating Domain Name

Domain name is a recognizable names for most of the internet address. globally or locally in an intranet, in effect changing the IP address. This translation from domain names to IP addresses is accomplished with the global facilities of Domain Name System (DNS)



Domain names have a first and second level. In the blogspot.com domain name, the ".com" portion is considered the first or top level domain name, and "blogspot" is considered a second level domain name. There are many common at 2nd level domain (profit based business ogranisation) such as .com (which is the most popular), .biz, .cc, .co. There are also non-profit based business organisation such as .org, .tv, .edu, .gov and etc.



The selection and protection of a domain name may be the most important detail in the creation of a web site. Domain names function as the address for a web site, and disputes over domain names have become more common and more heated as the popularity of the Internet grows.

To check whether your domain name not be taken you can go WhoIs search to find out. In addition, it may be wise to perform a trademark search to verify that the chosen domain name is not infringing on another party's trademark.

To create a domain name are requires to registrer through online register such as http://readyspace.com.sg/. There are some of the rules and regulation youe need to be concern. If you discover that someone else has already taken their corporate name or trademark as a domain name. In most cases, there is little that can be done because the other party has equal right to use that name. However, it is possible to contest a registered domain name based upon superior rights to that name. Such a contest can be made through the courts or through InterNIC's domain name dispute policy. On the other hand, If you afraid losing your domain name and you want to protect you can obtain a trademark registration on your domain name.
If you want to register a domain name this are the information you need to concern before creating a domain name.


References:




http://www.bitlaw.com/internet/webpage.html#linking

http://www.moniker.com/news/legal-issues.jsp

http://en.wikipedia.org/wiki/Domain_name

http://www.biz-ready.com/legalissue_reg.htm

Saturday, February 7, 2009

Analysis of Poll 3

Poll 3 results
This is the chart which showing the results of the poll question of the 2nd week. 55 percents (5 respondents) out of 100 percents of the respondents thinks that online purchase groceries can be trust yet they do not purchase any groceries from internet. 22 percents (2 respondents) of the respondent they do not rely on online purchase whereby 44 percent ( 4 respondents) of respondent thinks that online purchasing can be trust and they will buy it often.
Through this voting we can know that part of us do not rely on online purchasing especially for the habits of Malaysian because most of the Malaysian they need to touch and test the quality of product only make decision to buy. Therefore is hard for them to rely on online purchasing without see and experience the quality and buy it for warranty so for safety purpose they not rely on online purchasing although it might be cheaper yet still they want to sense the touch of quality before purchase. Beside that, there are some of the cases whereby online cheating such as online grocery hacked by Hackers who trying to steal the information or passwords of customers.The confidence of online purchasing in Malaysia still need to be improve and put more effort to build the confidence of consumers purchase online groceries.
But there are also part of the people do rely on online purchase because nowadays online grocery are more convenient to get instead of windows shopping at the shopping mall. Online grocery also can check through internet online of the information before purchase for example lets say if you want to buy a gadget just online seach the application and then do comparison of the model and mean while you just give some information then pay through credit card so they will provide courier service send to your house. Therefore for in this new modern era people are prefer on online grocery especially in the modern country such as Japan, United States, United Kingdom, Hong Kong and so on.

Translation to Japanese as below:

これは、第2週の世論調査の質問の結果を示すグラフです。 55 %の回答者のうち100 % ( 5人)は、オンラインで購入する食料品はまだありませんが、インターネットからの食料品を購入しないことが信頼できると考えている。回答者の22 %がオンライン購入では44 % ( 4人に依存していない回答者( 2人) )は、オンラインでの購入を信頼することができますには、しばしばそれを買うだろうと考えている。
この投票を通じ、オンライン購入のマレーシアの習慣に依存しない、特に私たちの知っていることが、マレーシアはその部分に触れることだけを購入する決断をする製品の品質検査を行う必要が多いため。オンラインでの購入を参照してくださいに頼ることなくして、品質保証のために彼らの経験とは、オンライン購入の安いかもしれないが、それでもまだ購入前に品質のタッチ感を頼る安全目的のためにそれを買うため難しい。その傍ら、いくつかの例がありますでは、オンライン食料品店のハッカーたちはまださを向上させ、信頼を醸成する努力が必要な情報やマレーシアでのオンライン購買顧客。そのハッキングしようとして信頼のパスワードを盗むなどのオンライン不正行為消費者のオンライン食料品を購入してください。したがって、現代の時代の人々のための新しいオンライン食料品店の上の近代的な国を中心に日本、米国など、この方は、イギリス、香港などなど。

Thursday, February 5, 2009

What is Podcasting???

Nowadays many people had created podcast as in distribute a form of broadcasting upload the audi or video content to your web server over the internet for playback on a mobile device or a personal computer.

Podcasts applies to creative and expressive works, which are most of the things that are included in a podcast. Such as performances, scripts, interviews, musical works and sound recordings. Ofcourse right and permissions are necessary to protect the materials. The main legal issues that you might able to face that are unique to podcasters are related to copyright, publicity rights and trademark issues. Besides that, publicity rights are relevant because in many instances, a podcaster will conduct audio or video interviews, entertainments and all sorts of spoken or visual content podcaster may need to get permission from the individuals if they are using others voice or images for commercial purposes. For example the podcaster interview someone and got their song album to promote their podcast or commercial use they are requires consent from the individual appearing in the voice over. For those who interested create video podcast this are some of the issue that you must concern before publish if not you might get into troubles. Everything preferable to get permission especially some materials which are not belongs to you then you might need consent from the individual for safety purpose.


PDF File reference:
http://mirrors.creativecommons.org/Podcasting_Legal_Guide.pdf



When you make a podcast, you potentially invoke several of copyright's exclusive rights, such as:
-Copying the work to include it into a podcast;
-Adapting or changing the work to include it into the podcast;
-Making a work available as part of a podcast for transmission to members of the public;
-Authorizing members of the public to make a copy of the podcast and use it according to the terms you apply to the podcast.


Reference:
http://wiki.creativecommons.org/Podcasting_Legal_Guide#Legal_Issues_In_Creating_Your_Own_Podcast.

This is one of the example of podcast in mov.file


Tuesday, February 3, 2009

Computer Hacking

Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word "hack" has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computer work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

What is computer hacking?
URL: http://www.wisegeek.com/what-is-computer-hacking.htm

Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking,and a prestige that accompanies being part of a relatively "elite" group of individuals who possess technological savvy and are willing to take the risks required to become a true "hacker".

Computer hacking written by David M Stone, University Laboratory High School
URL: http://www.ed.uiuc.edu/wp/crime/hacking.htm

The hacker is a slang term for a computer enthusiast, example, a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject. After reading these articles, hacking can be use to 2 ways, the best way is you can defend from the hacker to protect the resources, for example, a company hire a hacker to prevent the hacking cases happen. The bad way that is intrusion of personal/organization privacy, in other words, unauthorized access to the security of the computer or network, it's a crime cases and against the cyber law which protect the internet activities.
The hacker not really have the professional skills, while the cracker have the professional skills with special training. Everybody can be a hacker if they have a little intelligent.

The purpose of being a hacker, there are 2reasons that I found and analyzed are:
-Maybe they just want to challenge themselves whether they can do it or not.
-Secondly it become an attack, with purposely, without authorization of the owner, they hacking to steal things/information.

As a conclusion, Human always like to challenge themselves and tend to use it on the wrong way as human is greedy and like to destroy the environment. Being a hacker must have moral, they should practise to contribute to the society, instead of bringing harm to the people and organization. This is because it could let them go to jail because this is a serious case as they access without permission.

Monday, February 2, 2009

Analysis of the poll 2 results

Poll 2 Result
This is the chart which showing the results of the poll question of the 2nd week. 50 percents (3 respondents) out of 100 percents of the respondents thinks that no point of doing insert watermark in their pictures. 33 percents (2 respondents) of the respondent are lazy to insert watermark in their pictures whereby 17 percents ( 1 respondent) of respondent will insert watermark in their pictures.
Through the chart and the votes of respondent we clearly understand different people and in different situation poeple will insert watermark some people use for business purpose and some just posted somewhere in facebook, blog or friendster just a sharing with friends. They just want to quickly upload pictures is fine for them because no point of others to steal their picture because insert watermark perhaps have to do some work on it and this cause people lazy to doing extra work . In this case, most probably those are the pictures with group of friends where more related to lifestyle pictures. But there are some situation watermark are requires due to afraid of stealing ideas and copyright issue such as a flower business need to protect their product while posting picture in internet they can insert the watermark to prevent others stealing of ideas or copy. Therefore to insert of watermark in the pictures is depends on the posting purpose of the users. To insert watermark indeed have to do some work on it and this cause people lazy to doing extra work

Friday, January 30, 2009

let's talk Cyber Law

The world of information technology is growing tremendously. More and more computer users surf the cyberspace everyday. Advancement in communication technology enables the usage of Internet in various aspects of our daily live. Cyberspace is a space without boundary, law enforcement and virtual. Computers are used as a medium to surf this space with Internet technology. Various activities ranging from business, education, government ruling and others uses Internet. The wide usage of Internet imposes a new problem, computer crime. The law enforcement for computer crimes is categorized as Cyber Law.
This is a very specific law to prevent unlawful activities involving the usage of computers. Cyber Law should be amended frequently along with the growth of Internet technology. This law has to be comprehensive. The definition used has to be precise to avoid any confusion. The definition analysis on computer crime act has to be conducted regularly. This is to ensure latest definition in the world of information technology is updated on a timely manner. Computer crimes can be prevented using prevention steps. These steps will help to curb these crimes.

A study on the computer crime Act.
Masters thesis, Universiti Utara Malaysia.
URL:http://eprints.uum.edu.my/1308/


The above article is briefly explain what is Cyber Law. As it stated, It prevent the computer crimes by enforcing the law. Moreover, I found out that the world has one called the cyber law enforcement organization. the officer are specialize to do investigation of cybercrime, and training to be assist to the cyber crime victims online. Just like they are handling child pornography.

I think the cyber law is good enough to handle those unwanted crime cases or anything that would affect the children because we all know the children are easy to be influenced and tend to learn and imitate everything when they see a picture, sound, or video as well. However, I think it's not stricten enough because nowadays there are still many crime cases happen around through internet. For example, people who like to online dating, they are easily to let the cheater to spot them because they believe them although has not meet before. Therefore, I do really hope the cyber law can be stricten to protect the surfer, so that in the future we can just do useful thing in the net instead of bring harm to our life.

Wednesday, January 28, 2009

Some issues may concern to build an Online Business in Blog

Nowadays many people are keep creating blog to build an online business selling groceries such as fashion is one of the most popular. By creating a blog to sell stuff is the cheapest way and begin without cost because we no need to pay rental no need to pay telephone bills, eletric bills water bills, staff salary and so on. Everyone intend to begin this business but some of the issue they might be concern while build up their network.
This is myself experience whereby me myself also bought some shirts through friends blog. I wanted to create a blog account and build up my network to function this as for my part time carrier manage to manage my business. Somehow I asked some professionals to give some opinion about creating a blog to sell shirts they thought me about what to be concern. Is not simply to create a blog then you can selling any stuff in internet. If I am going to selling the shirt with brand image we could not just post up online we could not just buy a MNG shirt from MNG shop then sell it in your blog. You may have to get permission of copyright to publish your selling stuff. Even if you are selling a shirt with Mickey Mouse logo Mickey Mouse company have a right to sue you related into copyright issue. The safetest way is create your own product such as handmade or creating own designed shirt which is totally original created by you. Therefore do not neglect some important issue when you start an online business blogging.

This is one of the example for reference bout how people build up online business by blogging. My friend had created this blog selling shirt in internet:
URL: http://myclosetgiggles.blogspot.com/

Sunday, January 25, 2009

Analysis of the poll 1 results.

Poll 1 results
This is the chart which showing the results of the poll question. Hundred percents (100%) of the respondents thinks that the public have neglect the legal issue in internet. The results shows how serious of this issue around us.

Ya everyone of us knew the importance of the legal issue, yet people would do anything for free stuff! The public not even care about all these legal issues when they download songs, movie, copy people's work from the internet, It's free! who don't want?

More over, some of them thinks that the original discs or books are too expensive for them especially for the students.Therefore, clicking a link and download the latest, hottest stuff from the website which is not cost them became the "must" action for them when they start surfing the net.

This is too bad because it's violating the original work of the authors or the composers. It will make their sales decrease badly as everyone is relying on the net and it's make the country's economy drop as well! Am I too serious? No, It's not an exaggeration. For my opinion, the government need to do something to prevent this issue gone to worse and to protect the authors. Hopefully someday someone who invent a "detecter" which can stop people from downloading the original work, or every of the laptop/pc install a system which will automatically delete the items after 24 hours of the download. I think this is much more effective than what the government do? Am I right? =)

Thursday, January 22, 2009

What Do You Know About Plagiarism?

What do you know about plagiarism?

Plagiarism refers to the use of another information or writing without proper acknowledgment of the original source. Is just like simply copy and paste use as your own work. Its too often happened especially student in universities tend to copy assignment when they have not enough time to do research. Last minutes work have the tendency to copy others and due to carelessness in the writer's information gathering process. Directly copying a public-domain work is still plagiarism unless the original work is noted.

Somehow I think we did the same mistake when the beginning we step into college do our assignment we also tend to copy and paste without doing references just treat as our own work. Actually is exactly stealing people works. just like we doing this project of blogging Mr.Andrew thought us make sure to put referencing must do reference every piece of information that you borrow from another source because the intellectual property of the individuals or groups of people who have produced it. All statements, opinions, conclusions, images, etc. which you have taken from someone else ’ s work should be acknowledged, whether the work is mentioned, described, reproduced, summarised, paraphrased or directly quoted by you, Mr Andrew says.
P.eople will have the right to sue you if you been suspect copy without permission and did not do referencing. So you now you understand the plagiarism is so scary. Think before you copy others work!

Resources:
URL - Wikimedia Foundation, Inc., a U.S. registered 501(c)(3) tax-deductible nonprofit charity. http://en.wikipedia.org/wiki/Plagiarism
URL- http://www.unc.edu/depts/wcweb/handouts/plagiarism.html
URL - http://www.mumnme.net/sitepics/mum%20n%20me%20flower%20logo%20smaller.jpg
The example of Copy the sourceCopy the source
Paste into your workPaste into your work
This is how plagiarism works. Copy + Paste
This is how plagiarism works. Copy + Paste



Tuesday, January 20, 2009

A sharing of my friend

I got a friend is doing law for her studies.
Here is some information that she shares with me about trademark.

A trade mark can be a logo, picture, a slogan or any combination of all these.

Here is the examples :-
nike logo Example of trademark slogan and logo


walkman logoExample of trademark logo


fcuk logo Example of trademark logo
Konica logo Example of trademark picture (Konica)

Mc donalds logoExample trademark of combination of logo and slogan

More over, she told me that, not every name is registrable, for example like PERFECT. Actually not everyone have to apply for trademark, however if somebody is infringing your mark and the mark is not registered, there will be a "passing off" law and this action is very expensive.

After these, I had understand more deeply about what is trademark and it's lucky to have a friend like her. In the future I think if I'm doing business I would be apply for the trademark to ensure my mark is not infringe by others.

Sunday, January 18, 2009

The example of Trademark

The example of Trademark
This is the example of trademark. I just created my own with this picture in microsoft power point and edit it with adding a logo as the example of trademark. Right hand side picture with own designed trademark where as left hand side picture without trademark. The trademark can be designed by own as an identity of your own picture and to protect your sources instead of get steal by those who copy without permission and just copy for as their own sources.
Can you identify it? I think this is easier the clarify the meaning of the previous blog. Picture can speaks more than words.

Thursday, January 15, 2009

A brief of trade mark

Trade mark is a distinctive name, symbols, motto, or design that legally identifies a company or its product and services, and sometimes prevents others from using identical or similar marks.

URL: http://www.investorwords.com/5023/trademark.html

Sometimes people will get confuse by the different between trade mark, patent and copyright. So what is the different between three of these? Trade mark is different from copyright and patent while a copyright provides protection for an artistic or literary work. And, a patent provides protection for an invention. Unlike copyrights and patents, trade marks rights
may be renewed for each consecutive period of 10 years indefinitely, if the trade mark continues to be used.

Besides that, is it everyone can register a trade mark? Actually it is not, only the owner of the trade mark can register the trade mark. The owner can be an individual, partnership or a company.

In Malaysia, the registration of trade mark does takes approximately 18-24 months to get registered from the date the application is filed. This is provided the application does not encounter any objections or oppositions.

URL: http://cnssolution.net/CNS%20Pens%20-%20Trademark%20FAQ.pdf

After I read these article, I understand well about what is trade mark all about. I start understand better about the different of copyright and trade mark as the copyright is only protected the literary like a song, a drawing only. the trade mark will be like prevent using the similar marks for example, Mc Donald have trade mark normally known as TM, people can't copy the name.

So do you guys understand the trade mark after read my article and can give some feedback? hopefully it's work. Thanks have a great day!



Joanne Wong

Tuesday, January 13, 2009

Beware when you download music!!!

Nowadays is so convenience for us to download our favorite music from internet instead of buying CD from shop either pirated! just search the website most popular is Limewire and Baidu for (especially for chinese songs) click the button of Downloading, file sharing program after collected all the song and burn into CD-ROM then you can get all your favorite singer's latest song or old song as well. Any song is possible to find through internet.

But i just read an article bout about downloading music is the copyright protection laws that people break everyday by downloading some music tracks off the Internet. but laws regarding the sharing and dowloading of music on the internet are different from country to country. So different countries different law issue about this copyright of music downloading!

Such as Canada dowloading copyright music networks is legal but for US Copyright Act is much more strict and illegal. In more general items that related is about the copyright are unauthorized reproduction, adaption or distribution of recodings.

So guys, get some knowledge before download songs. For Malaysian I am not sure about this, but my opinion is quite unfair for the singers and distributors' right. For what I knew surrounding us we will only buy and support our own favourtie singers. Those unwell known singer just simply download from the website is convenience and did not cost us a single cent. Recession is coming is this another excuse for people 'free donwload' from website rather than buy a CD that cost us 30 to 40 bucks?

Yvonne
 
Copyright © 2009 Legal Issue in Internet,All Rights Reserved, Last Update 19th Feb 2009, Time: 17:36 (GMT +0800) Best Supported by Google Chrome,Mozilla Firefox,Internet Explorer,Internet Explorer 7 Any enquiry do make a comment in our blog or email to gorgeousgirl2009@hotmail.com