~Welcome to Legal Issue In Internet! The purpose to create this blog is to let you and I understand more about Legal Issue in Internet. Feel free to drop some comment and constantly visit our blog we will be appreciated. Thank You ~

Saturday, February 28, 2009

Spam Issue in internet

What is SPAM?

The term SPAM was first used in the early 1990s to describe e-mail messages, not related to the topic of discussion and postings that swamped newsgroups.
Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.

Top Ten Blog tips! ways to fight SPAM!



Spam
1. Use a contact form. Don’t make your email address public. Especially not as a clickable link. Here are some more reasons to avoid using clickable email address links.


2. Use a different email for each site you sign up for. Then if one email account starts getting spammed, you only have to change it in one place. This is more to do with email spam than blog spam, though.


3. Use a different email when posting comments. Who knows if the blog you’re commenting on will keep that email private? They might start sending you messages you didn’t ask for with no way to unsubscribe. Best to use a dedicated email address just for posting comments.


4. Banning IP addresses. This is a bit extreme unless you notice some very clear patterns in the spam you receive. Also, be careful, as banning by IP can also block legitimate internet issue.


5. Moderation. This means that every comment on your blog will be held until you approve it. The downside is that it requires a lot of manual effort, and may not be an option for blogs that get hundreds of comments every day. However, if you can add users to an “approved” list so you only have to approve their first comment, this seems like a very sensible solution to the spam problem. Well, unless your blog attracts lots of new users every day and many of them only write a small number of comments.


6. Anti-spam plugins. WordPress users will probably know about Akismet, a plugin that analyses comments as they come in and attempts to flag the ones that look like spam. Generally, it works well, but no system is perfect.


7. Word verification. Also know as a CAPTCHA, this uses an image of distorted letters and numbers and requires you to type the characters into a box. Get it wrong and you have to try again. I think these are quite effective so long as they are easy to read

8. Closing comments after a specified period of time. This method works on the assumption that a few months down the line, nobody will want to add anything new to your post. Spammers seem to enjoy targeting posts that have long since disappeared from the front page of a site, hoping that the site owner won’t notice the spam.

9. Requiring registration. This is likely to limit your comments drastically, and is still not a guaranteed way to stop spam. It’s a good method for blogging networks or sites that offer more than just a blog, but it’s a bit too draconian for most blogs.

10. Turning off comments altogether. No comments, no spam, right?! OK, you might not get any comment spam this way, but don’t cut off your readers! This method is a bit extreme.

I have experienced as I opened up the mail box (hotmail) there are many junk mails and I didn't know about the sender as well. Actually all these is the SPAM email which is contains those commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services.

Besides that, there are also many messages that contain the "sex message" they will asked you to click and enter the web site sometimes all these is chargable. So becafeful when clicking it and identify the sender is you know them only click "show content".

What is Spam?

http://spam.abuse.net/overview/whatisspam.shtml

10ways to fight spam

http://www.toptenblogtips.com/10-ways-to-fight-spam/

Tuesday, February 24, 2009

Online Privacy issue in internet

Privacy is an issue refers to all of us as a user who use the web. The growth of the Internet has created a number of privacy issues and cause many victims in troubles. But nowadays this issue are common and sometimes even the users they might not know their privacy information has been steal. However, privacy and online hacking are different. Hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. Whereby Internet privacy is an important ethical issue because most organizations engaging in e-commerce have not yet developed policies and codes of conduct to encourage responsible behavior.

To avoid this to happened, few types that you may need to do is do not easily get stranger to get close to your house unless you allow them to access to all the data on it. Which mean do not easily let unknown software such as virus which it the most common incident that happen in our daily lives. The best solution is install an anti-virus program to protect your privacy data. A good anti-virus program don't pose privacy threats, also checks for and removes trojans. Some trojans can open your computer up to remote control by anyone who has the right software. computer has detected trojan, they can do anything they want with your machine. They can check your read any information or download it such as personal email, photos, banking and credit card information or account password, video, any kind of files and so on all kind of data. They might can delete it or run program. It can be controlled by them without knowing.

Fortunately, it's fairly easy to avoid becoming infected by a trojan.
-Don't ever run attachments from anyone but trusted sources.
-Download software only from reputable sites.
-Run a virus checker on every new program you install, no matter where it came from.
-Regularly update your anti-virus software, and check your system for infection frequently.
Just those few steps will drastically reduce the potential for serious invasion of your privacy

On the other hand, another common incident is email virus stalker. It happened while attachments, opened email themselves to everyone in your address book. Some of these have been set up to send private info, like passwords and account information, to their programmers.

These are usually infected MS Office file such as Word docs, Excel spreadsheets, or other MS Office documents, Acess, PowerPoint without taking proper security steps. Macro-viruses can infect any of these document types.It's also a good idea to just delete file of the types listed above that you weren't expecting. These viruses would only come from people you actually know and sometimes even the sender they do not know they was a victims as well detected by the "other Users".Again, run a virus scanner at all times. And avoid using Microsoft email programs where you can. They have some serious security problems in the default configurations.

Internet ScamBusters™, Audri and Jim LanfordCopyright © ,
http://www.scambusters.org/Scambusters41.html


E-center for business ethics
http://www.e-businessethics.com/internet.htm







Sunday, February 22, 2009

Analysis of poll 5 question

Poll 5 resultsThe week 5th chart shows whether respondents have ever but the pirated software like Adobe Photoshop. There are 6 respondents (85%) have buy pirated software before and only 1 respondent (15%) never buy pirated software and they don't touch illegal issue. This is a bad sign that nowadays more people buy pirated software.

People tends to buy pirated software is because the pricing of the pirated software is much more different with the original software. they do not care about the legal law that would violate the copyright of the original software. they also don't know the consequences of using the pirated software they are many consequences as I mentioned in the previous article as well.

However, I think the original software copyrighter should lower down the pricing like many below RM100, then the people would consider to buy original instead of pirated software. buying original software is much safer and it's guaranteed the safeness of our pc, laptop, and all the documents.

Friday, February 20, 2009

Is Online Gambling Legal?

Some states have specific laws against online gambling of any kind. In addition, owning an online gaming operation without proper licensing would be illegal, and no states are currently granting online gaming licenses. Various forms of online gambling are legal and regulated in many countries. However, Malaysia has recently taken its action against Internet gambling activities.

There are some website are legal gambling and some are illegal gambling. Just beware some are illegal not proven license. Some people choose to online gambling because online gambling website is very secure so that you no need worry about your information will be publish. Besides that why people choose to online gambling because is convenient and the gambler no need to dress nice and most important they no need to carry lots of cash. Just by credit card they are able to participate.


On the other hand, Some people think that gambling is the easiest way out of being in the slums. However, the odds of losing in gambling are much higher than that of winning. The online gambling is control by the owner. For example, they are many people buying casino NO.3 then the computer will not spin to this NO. This is all control by them that's why the changes of losing is higher than winning.

Some people under age want to have a try or do not want to let parents and family know they gambling so they decide sign up for online gambling these are the important issue that public concern about especially those illegal set up trap for the newbies who do not know much about online gambling. And this is why to set up a legal online gambling website is not easy and many laws to be prove and access.

If the bill becomes law, it would essentially hit Internet gambling by choking off the money supply -- making it illegal to write a check or use a credit card or any other form of payment in gambling online. Provisions in the bill would have bank regulators use their enforcement powers to go after the banks to stop payments from going to the cyber casinos.So, getting back to our fearless sports talker, is online gambling legal this bowl season? Can't say for sure, but it may never again be so easy.

References:


The surf's up


http://www.the-surfs-up.com/news/gamblingonlinenews.html



WORLDLawDirect.com, Inc.

http://www.worldlawdirect.com/article/1559/Is_online_gambling_legal.html





WORLDLawDirect.com, Inc.

http://www.worldlawdirect.com/forum/law-wiki/5953-online-gambling.html


Online Gambling blogspot.:

http://on9gambling.blogspot.com/search?updated-max=2009-02-05T23%3A11%3A00%2B08%3A00&max-results=7

Wednesday, February 18, 2009

illegal website that I visited

I had visited a website recently. It's from "gutt.......blogspot.com". Why is that so special that I need to mention it and write in my blog? Actually it's a blog that provide all the celebrities, models, politician,students, scandal, and even more about all those naked picture and personal videos as well!
The content including the latest Zhang Ziyi, Edison Chen scandal, Top model, Britney Spears and I saw the famous Malaysia Majalah 3 host's personal naked picture too! When I click on it, all the picture appears without censored. Moreover, all the photos categories in "model", "celebrities", "Malaysia", "Indonesian", "students" and hundred over of categorization.

I'm wondering why the web service, the blogspot.com does allow all these content of blog exist for so long in the internet because you can find the older scandal from there and all these without any censorship?? Definitely all of these content, picture does really violate the people's privacy and had totally break the legal issue in internet!

I can't believe if one day the popular of this blog being increase and the innocent children, or the people who are unmatured and underage visit it, the consequences will goes worst than what we having right now in the society.

The blog does give the surfer the space of imagination, if all of these is being imitates by the under age students?

Is it because nobody report it or the web service owner doesn't want to care about it?
They need to take action!!!!

Sunday, February 15, 2009

Week 4th Poll Question Analysis

Poll 4 results
The week 4th chart shows on the top that whether respondents have ever experienced computer hack by hacker. There are 3 respondents (20%) have experienced hack by hacker and 12 respondents (80%) never experienced hacking by hacker. However this is a good sign to find out most of the respondents did not get hacked.

But sometimes while people get hacked they still do not know their computer has been hacked until when they facing touble in computer only they realize their computer got hacked. Most of the time people will not know they has been hacked because the invent of hacker are very intelligent they are not easy to let you find them once they have an intention of stealing information. This are consider the moral values that they not consider people's right and protect own privary. So eventhough you think you have not be hacked do not be too excited who knows some hacker are stealing your information without you realize take note in this situation.

Thursday, February 12, 2009

Pirated software?

Today let's talk about the pirated software. Nowadays, pirated software selling around the public area. The public area is like shopping mall, computer shop, or even night market (normally known as "pasar malam"). Finding a pirated software is very easy to get already and the pricing compared with the original is much more different!

From the research, the top pirated software on the Internet includes anti-virus programs followed by AutoCAD and Adobe Photoshop.

Most Pirated Software Programs on the Internet
http://www.labnol.org/internet/favorites/most-pirated-software-programs-on-the-internet/2373/

Why are the public likes to buy pirated software instead of using the original? The reason is very common as the pirated software is cheaper! For example like buying a Microsoft Office 2007 software cost us around RM100-RM200, but for the pirated software, it maybe only cost us RM10 only. And then, the people will definitely buy the pirated software? Why spend about 10TIMES of budget to get the SAME software? this is what people think, and it set in my mind previously.

The risk of using pirated software for your pc are includes the possibility of someone hacking into your computer and stealing valuable information, unfortunately, without you even knowing it. This is because pirated software don't have complete file components of genuine copies, and often contain viruses, malicious bugs and spyware. Hence, installing pirated software leaves your computer unstable and defenceless against intruders.

The risk of using pirated Windows & Office
http://www.microsoft.com/malaysia/genuine/vog/

Pirated software may contain viruses, spyware, computer failures. While virus and spyware is attack your pc and documents, it can cost us even thousands of riggit or more! Moreover, losing the money and documents is a troublesome matter to solve.

So people, don't take the risk! It cost you thousands!

Things that you may Concern before Creating Domain Name

Domain name is a recognizable names for most of the internet address. globally or locally in an intranet, in effect changing the IP address. This translation from domain names to IP addresses is accomplished with the global facilities of Domain Name System (DNS)



Domain names have a first and second level. In the blogspot.com domain name, the ".com" portion is considered the first or top level domain name, and "blogspot" is considered a second level domain name. There are many common at 2nd level domain (profit based business ogranisation) such as .com (which is the most popular), .biz, .cc, .co. There are also non-profit based business organisation such as .org, .tv, .edu, .gov and etc.



The selection and protection of a domain name may be the most important detail in the creation of a web site. Domain names function as the address for a web site, and disputes over domain names have become more common and more heated as the popularity of the Internet grows.

To check whether your domain name not be taken you can go WhoIs search to find out. In addition, it may be wise to perform a trademark search to verify that the chosen domain name is not infringing on another party's trademark.

To create a domain name are requires to registrer through online register such as http://readyspace.com.sg/. There are some of the rules and regulation youe need to be concern. If you discover that someone else has already taken their corporate name or trademark as a domain name. In most cases, there is little that can be done because the other party has equal right to use that name. However, it is possible to contest a registered domain name based upon superior rights to that name. Such a contest can be made through the courts or through InterNIC's domain name dispute policy. On the other hand, If you afraid losing your domain name and you want to protect you can obtain a trademark registration on your domain name.
If you want to register a domain name this are the information you need to concern before creating a domain name.


References:




http://www.bitlaw.com/internet/webpage.html#linking

http://www.moniker.com/news/legal-issues.jsp

http://en.wikipedia.org/wiki/Domain_name

http://www.biz-ready.com/legalissue_reg.htm

Saturday, February 7, 2009

Analysis of Poll 3

Poll 3 results
This is the chart which showing the results of the poll question of the 2nd week. 55 percents (5 respondents) out of 100 percents of the respondents thinks that online purchase groceries can be trust yet they do not purchase any groceries from internet. 22 percents (2 respondents) of the respondent they do not rely on online purchase whereby 44 percent ( 4 respondents) of respondent thinks that online purchasing can be trust and they will buy it often.
Through this voting we can know that part of us do not rely on online purchasing especially for the habits of Malaysian because most of the Malaysian they need to touch and test the quality of product only make decision to buy. Therefore is hard for them to rely on online purchasing without see and experience the quality and buy it for warranty so for safety purpose they not rely on online purchasing although it might be cheaper yet still they want to sense the touch of quality before purchase. Beside that, there are some of the cases whereby online cheating such as online grocery hacked by Hackers who trying to steal the information or passwords of customers.The confidence of online purchasing in Malaysia still need to be improve and put more effort to build the confidence of consumers purchase online groceries.
But there are also part of the people do rely on online purchase because nowadays online grocery are more convenient to get instead of windows shopping at the shopping mall. Online grocery also can check through internet online of the information before purchase for example lets say if you want to buy a gadget just online seach the application and then do comparison of the model and mean while you just give some information then pay through credit card so they will provide courier service send to your house. Therefore for in this new modern era people are prefer on online grocery especially in the modern country such as Japan, United States, United Kingdom, Hong Kong and so on.

Translation to Japanese as below:

これは、第2週の世論調査の質問の結果を示すグラフです。 55 %の回答者のうち100 % ( 5人)は、オンラインで購入する食料品はまだありませんが、インターネットからの食料品を購入しないことが信頼できると考えている。回答者の22 %がオンライン購入では44 % ( 4人に依存していない回答者( 2人) )は、オンラインでの購入を信頼することができますには、しばしばそれを買うだろうと考えている。
この投票を通じ、オンライン購入のマレーシアの習慣に依存しない、特に私たちの知っていることが、マレーシアはその部分に触れることだけを購入する決断をする製品の品質検査を行う必要が多いため。オンラインでの購入を参照してくださいに頼ることなくして、品質保証のために彼らの経験とは、オンライン購入の安いかもしれないが、それでもまだ購入前に品質のタッチ感を頼る安全目的のためにそれを買うため難しい。その傍ら、いくつかの例がありますでは、オンライン食料品店のハッカーたちはまださを向上させ、信頼を醸成する努力が必要な情報やマレーシアでのオンライン購買顧客。そのハッキングしようとして信頼のパスワードを盗むなどのオンライン不正行為消費者のオンライン食料品を購入してください。したがって、現代の時代の人々のための新しいオンライン食料品店の上の近代的な国を中心に日本、米国など、この方は、イギリス、香港などなど。

Thursday, February 5, 2009

What is Podcasting???

Nowadays many people had created podcast as in distribute a form of broadcasting upload the audi or video content to your web server over the internet for playback on a mobile device or a personal computer.

Podcasts applies to creative and expressive works, which are most of the things that are included in a podcast. Such as performances, scripts, interviews, musical works and sound recordings. Ofcourse right and permissions are necessary to protect the materials. The main legal issues that you might able to face that are unique to podcasters are related to copyright, publicity rights and trademark issues. Besides that, publicity rights are relevant because in many instances, a podcaster will conduct audio or video interviews, entertainments and all sorts of spoken or visual content podcaster may need to get permission from the individuals if they are using others voice or images for commercial purposes. For example the podcaster interview someone and got their song album to promote their podcast or commercial use they are requires consent from the individual appearing in the voice over. For those who interested create video podcast this are some of the issue that you must concern before publish if not you might get into troubles. Everything preferable to get permission especially some materials which are not belongs to you then you might need consent from the individual for safety purpose.


PDF File reference:
http://mirrors.creativecommons.org/Podcasting_Legal_Guide.pdf



When you make a podcast, you potentially invoke several of copyright's exclusive rights, such as:
-Copying the work to include it into a podcast;
-Adapting or changing the work to include it into the podcast;
-Making a work available as part of a podcast for transmission to members of the public;
-Authorizing members of the public to make a copy of the podcast and use it according to the terms you apply to the podcast.


Reference:
http://wiki.creativecommons.org/Podcasting_Legal_Guide#Legal_Issues_In_Creating_Your_Own_Podcast.

This is one of the example of podcast in mov.file


Tuesday, February 3, 2009

Computer Hacking

Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word "hack" has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computer work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

What is computer hacking?
URL: http://www.wisegeek.com/what-is-computer-hacking.htm

Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking,and a prestige that accompanies being part of a relatively "elite" group of individuals who possess technological savvy and are willing to take the risks required to become a true "hacker".

Computer hacking written by David M Stone, University Laboratory High School
URL: http://www.ed.uiuc.edu/wp/crime/hacking.htm

The hacker is a slang term for a computer enthusiast, example, a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject. After reading these articles, hacking can be use to 2 ways, the best way is you can defend from the hacker to protect the resources, for example, a company hire a hacker to prevent the hacking cases happen. The bad way that is intrusion of personal/organization privacy, in other words, unauthorized access to the security of the computer or network, it's a crime cases and against the cyber law which protect the internet activities.
The hacker not really have the professional skills, while the cracker have the professional skills with special training. Everybody can be a hacker if they have a little intelligent.

The purpose of being a hacker, there are 2reasons that I found and analyzed are:
-Maybe they just want to challenge themselves whether they can do it or not.
-Secondly it become an attack, with purposely, without authorization of the owner, they hacking to steal things/information.

As a conclusion, Human always like to challenge themselves and tend to use it on the wrong way as human is greedy and like to destroy the environment. Being a hacker must have moral, they should practise to contribute to the society, instead of bringing harm to the people and organization. This is because it could let them go to jail because this is a serious case as they access without permission.

Monday, February 2, 2009

Analysis of the poll 2 results

Poll 2 Result
This is the chart which showing the results of the poll question of the 2nd week. 50 percents (3 respondents) out of 100 percents of the respondents thinks that no point of doing insert watermark in their pictures. 33 percents (2 respondents) of the respondent are lazy to insert watermark in their pictures whereby 17 percents ( 1 respondent) of respondent will insert watermark in their pictures.
Through the chart and the votes of respondent we clearly understand different people and in different situation poeple will insert watermark some people use for business purpose and some just posted somewhere in facebook, blog or friendster just a sharing with friends. They just want to quickly upload pictures is fine for them because no point of others to steal their picture because insert watermark perhaps have to do some work on it and this cause people lazy to doing extra work . In this case, most probably those are the pictures with group of friends where more related to lifestyle pictures. But there are some situation watermark are requires due to afraid of stealing ideas and copyright issue such as a flower business need to protect their product while posting picture in internet they can insert the watermark to prevent others stealing of ideas or copy. Therefore to insert of watermark in the pictures is depends on the posting purpose of the users. To insert watermark indeed have to do some work on it and this cause people lazy to doing extra work
 
Copyright © 2009 Legal Issue in Internet,All Rights Reserved, Last Update 19th Feb 2009, Time: 17:36 (GMT +0800) Best Supported by Google Chrome,Mozilla Firefox,Internet Explorer,Internet Explorer 7 Any enquiry do make a comment in our blog or email to gorgeousgirl2009@hotmail.com