6. TEN RULES OF NETIQUETTE
Rule No. 1: Remember the human
• You need to remember that you are talking to a
real person when you are online.
• The internet brings people together who would
otherwise never meet.
• Remember this saying when sending an email:
Would I say this to the person’s face.
7. Rule No. 2: Adhere to the same standards online
that you follow in real life.
• You need to behave the same way online that
you do in real life.
• You need to remember that you can get caught
doing things you should not be doing online just
like you can in real life.
• You are still talking to a real person with feelings
even though you can’t see them.
8. Rule no. 3: Know where you are in cyberspace.
• Always take a look around when you enter a new
domain when surfing the web.
• Get a sense of what the discussion group is
about before you join it.
9. Rule no. 4: Respect other people’s time and
bandwidth.
• Remember people have other things to do
besides read your email. You are not the center
of their world.
• Keep your post and emails to minimum by
saying what you want to say.
• Remember everyone won’t answer your
questions.
10. Rule no. 5: Make yourself look good online.
• Be polite and pleasant to everyone.
• Always check your spelling and grammar before
posting.
• Know what you are talking about and make
sense saying it.
11. Rule no. 6: Share expert knowledge
• Ask questions online
• Share what you know online.
• Post the answers to your questions online
because someone may have the same question
you do.
12. Rule no. 7: Help keep flame wars under control
• Netiquette does not forgive flaming.
• Netiquette does however forbid people who
are flaming to hurt discussion groups by putting
the group down.
13. Rule no. 8: Respect other people’s privacy.
• Do not read other people’s mail without
their permission.
• Going through other people’s things could
cost you, your job or you could even go to jail.
• Not respecting other people’s privacy is a
bad netiquette.
14. Rule no. 9: Don’t abuse your power.
• Do not take advantage of other people just
because you have more knowledge or power than
them.
• Treat others as you would want them to treat
you if the roles were reversed.
15. Rule no. 10: Be forgiving of other people’s
mistake.
• Do not point out mistakes to people online.
• Remember that you were once the new kid
on the block.
• You still need to have a good manners even
though you are online and cannot see
the person face to face.
16. Questions
• Are digital media a big part of your life?
• What kind of impact do digital media have on
you(Little, some, a lot)?
• What are your favorite and least-favorite thing
to do with digital media?
• Do you connect with others or create things
with digital media? Finish this statement: MY
media life is like___________________
• Because___________________
17. Types of System Intruders
• Masquerader
• Hackers
• Clandestine user
18. A computer virus has three parts
• Infection mechanism - How a virus spreads, by modifying
other code to contain a (possibly altered) copy of the
virus. The exact means through which a virus spreads is
referred to as its infection vector. This doesn't have to be
unique - a virus that infects in multiple ways is called
multipartite.
• Trigger - The means of deciding whether to deliver the
payload or not.
• Payload - What the virus does, besides spread. The
payload may involve damage, either intentional or
accidental. Accidental damage may result from bugs in
the virus, encountering an unknown type of system, or
perhaps unanticipated multiple viral infections.
19. Virus Stages
• Dormant phase.
– The virus is idle.
• Propagation phase.
– The virus places an identical copy of itself into other
programs or into certain system areas on the disk.
• Triggering phase.
– The Virus is activated to perform the function for
which it was intended.
– Caused by a variety of system events.
• Execution phase.
– The virus function is performed.
20. • Key Terms
• Cyber crime- a crime committed or assisted through the
use of the Internet.
• Privacy Policy/Terms of Services (ToS) - tells the user how
the website will handle its data.
• Malware- stands for malicious software.
• Virus- a malicious program designed to transfer from one
computer to another in any means possible.
• Worms- a malicious program designed to replicate itself
and transfer from one file folder to another and also
transfer to other computers.
• Trojan-a malicious program designed that is disguised as a
useful program but once downloaded or installed, leaves
your PC unprotected and allows hacker to get your
information.
21. • Spyware- a program that runs in the background
without you knowing it. It has the ability to monitor
what you are currently doing and typing through key
logging.
• Adware- a program designed to send you
advertisement, mostly pop-ups.
• Spam- unwanted email mostly from bots or advertisers..
• Copyright- a part of law, wherein you have the rights to
work, anyone who uses it w/o your consent is
punishable by law.
• Fair Use- means that an intellectual property may be
used w/o consent as long as it is used in commentaries,
criticism, parodies, research and etc.
• Keyloggers- used to record the keystrokes done by user.
This is done to steal passwords or any other sensitive
information