Thursday, 14 June 2012

The effectiveness of using a blog.

Blogs are a very good advantage to people who want to express themselves. You can write about different topics and spread it through the web. People can obtain confidence in life from the blog and are able to add their own ideas. Once someone has followed your blog, they will receive notifications when you update a post.

Blogs can inform people from all around the world. Blogs are laid out in a way that the readers can spot the information they are looking for. The information are separated into paragraphs and has underlined titles for each paragraph to make it clear for the readers to find valuable information.

My blog informs people on how dependent we are on IT and how much IT has an affect on the people who are not up to date with technology, such as pensioners. People that are aware of the blog can visit and find ideas on the social affects of IT. People can also forward any valuable information to other people.

Potential Threats IT has Introduced

In this blog, I will be talking about many different types of potential threats that are introduced by IT.
I will be talking about Cyber-Bullying, Spam, Computer Hacking, Junk E-Mails, Phishing and Trojans.
They will be separated into different paragraphs.

Cyber-Bullying is one of the main threats IT has introduced. Cyber-Bullying is when someone is a victim to threats and harrasment over the internet. These are mainly on social networking sites such as Facebook, MySpace, Twitter etc. 42% of children have been bullied while surfing on the internet and 1 out of 4 have been bullied more than once. Cyber-Bullying happens either over the internet, text or email. To prevent being bullied, you should never share personal information with noone you have never met. You should tell someone as soon as it starts and make sure you have the evidence.

Spam is also another piece of threat which can spread very quickly. Spam spreads when someone opens a spam e-mail and it gets sent to everyone in their contact list. Spam isn't really a major threat to your computer but in worst case scenario it can bring an entire network down.

Computer hacking is another piece of threat which needs to be stopped before it makes things worse. A hacker is someone who breaks into computers or computer networks. People may hack into peoples computer for many reasons. Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Computer hacking is a real problem because people who hack into peoples computers could find personal details of that person and could use for the same reasons as identify theft. They can find credit/debit card details and it can lead to a terrible ending.

Junk emails are often sent to a users email and are usually found within the user’s junk folder. These often contain emails telling the user about certain offers on things that are available online. These usually hold viruses. By opening the email you will not have the viruses affect your computer but by clicking on the links that these emails have will result in your computer being infected with viruses.

There are also emails that are Phishing scams. These emails will try to convince you that they are real life business and will try to get you to type in your personal information. They do this by asking the user to visit a certain website and type in your details so they can check your account for anything unusual. These emails should definitely be deleted.
There are 3 things that can affect your computer Viruses, Worms and Trojans. Viruses tend to make your computer run slower, Worms tend to cause some serious harm to your computer and a Trojan will almost always cause a large amount of damage to your computer.