Web Application and Security
Web Application and Security
KEYBOARD TABS-
INTERNET –
Chat Etiquities-
• Whenever your friend in the contact list is online you can see the
person along with a green dot.
• Always ask if the other person has time to chat first - regardless of
how important you think what you have to say is, it’s not going to be
well received if the recipient is busy.
www.blogger.com
www.wordpress.com
www.weebly.com
www.blog.com
Online Threats –
1) Phishing :- The act of acquiring personal / private and
sensitive data from personal computers for use in
fraudulent activities. For eg. Mails from unknown persons
that ask for your credit / debit card details. 2) Email
spoofing :- It is the creation of email messages with a
forged sender address. For eg. Sending an email with a
forged email address which appears to be original. These
mails are infected mails which contain worms.
2) Chat Spoofing:- Spoofing means hoax, trick, or deceive
which contains false information. Hiding / Faking the
identity of another person over the internet is called chat
spoofing
Healthy Living