Internet Security Tips and Information HTML version

l Harassment on victim's out website- another type of cyber bullying occurs when the
bully posts negative material in abundance on the victim's own website. This can come in the
form of negative comments, threats, and other types of general harassment.
l Slander- if the bully has their own site (like a blog or a facebook or myspace page) they
might make slanderous comments about the victim. These can be falsities, such as claiming
that the victim is cheating on their spouse/significant other, or they can be harmful truths that
the general population doesn't need to need.
l Accusations- a rare form of cyber bullying, but equally dangerous, is when the bully actually
accuses the victim of doing the same thing that the bully is doing. An example would be this: the
bully sends negative e-mails to the victim. Then, the bully gets on their own blog or website and
writes about ow upset they are due tot he fact that the victim is sending THEM negative emails. In
such cases, the bully might even receive sympathy and the victim is then harassed even more by
people who feel sorry for the victim.
So why do things like this happen?
It is very difficult to know why. Anger, resentment, lack of self-esteem, or sometimes plain
boredom can lead to cyber bullying. In addition, the anonymity of the internet makes it easier
than every to bully someone. Still, cyber bullying can be emotionally devastating and can
threaten your own emotional security. If it is happening to you, don't sit back and let it continue.
5 Tips to Ensure Internet Security
Do you want to keep your computer and personal information safe? Of course you do. Here
are 5 tips to help ensure your internet security.
1. Be careful of em-mail attachments
One of the most common ways to threaten your internet security is to open an e-mail
attachment that contains a virus. Sometimes, just clicking on the attachment itself will unleash
the virus. If you receive an email from someone that you don't know and it contains an
attachment, don't open it just to be on the safe side. You can always send a message to that
person to verify that the email is legitimate. It's best to invest in an anti virus software program
that can scan the attachment before you open it. Some e-mail systems will scan emails for you.
However, if you go through a free program (like hotmail) don't count on the system being as
complete as an email account that you pay for.
2. Anti-virus software
You must invest in anti-virus software. It is one of the most important things for your computer.
In addition to keeping you safe from viruses, it can also scan your hard drive and clear out
unnecessary information, thus making your computer run more efficiently as well. Anti-virus
software programs are everywhere but it helps to do some research before investing in one.
With some of them, you have to update them and pay again every year.
3. Update security patches for your browser