Dr. D Manjunath, Principal, Kendriya Vidyalaya No.1 Raipur video shooting the students while they were performing song on CWNA
This Website is meant for bringing awareness among NET USERS especially children who fall prey to anonymous users get bullied and become aggressive and perverted
Monday, August 2, 2010
Safety Rules while your are in Chat room
Internet 'Chat Room' Safety Tips
Follow all of the above guidelines, and:
1) Don't include any part of your name, date of birth, location, or anything sexually suggestive in your 'chat' name
2) Don't go in to private chat rooms.
3) When choosing an online chat room, be cautious of the chat room name. Stick to chat rooms created by the online service, rather than 'member created' rooms.
4) Don't say anything in a chat room that you wouldn't say in public, in front of your parents or friends.
5) If you start to chat regularly with someone, let an adult or parent know.
6) Remember, you are in control. If a conversation starts to get strange or make you feel uncomfortable, then leave. Leave the chat room, and log off. If it is someone saying sexual things to you, tell an adult.
7) Never meet anyone face to face that you met on the Internet unless you tell a parent or adult first, and they go with you.
8) Don't think of people you've met on the Internet as 'real life' friends. They're just not!
9) Don't click on links or go to sites that you're not familiar with.
10) Never post a picture of yourself online and never e-mail pictures of yourself to people you don't know.
11) Never give out your password and make sure it's something only you know.
12) Don't respond to 'flames'- people trying to start an argument, or insults, bad language, etc.
SKIT ON CWNA_Presented by students of KV No.1 Raipur, Chhatisgarh
The above video is al about Problems usually children face while on Net browsing. The skit is presented by the students of Kendriya Vidyalaya No.1 Raipur, Chhattisgarh (under KVS RO Jabalpur).
Videos on Cyber Crimes
The above video is a downloaded one from http://www.youtube.com/ and is on cyber bullying. What is Cyber Bullying? Cyber bullying is the use of e-mail, instant messaging, chat rooms, pagers, cell phones, or other forms of information technology to deliberately harass, threaten, or intimidate someone. Cyber bullying is often done by children, who have increasing access to these technologies. However, it is by no means confined to children. The problem is compounded by the fact that a bully can hide behind an electronic veil, disguising his or her true identity. This makes it difficult to trace the source, and encourages bullies to behave more aggressively than they might face-to-face.
Cyber bullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus, and flooding an e-mail inbox with nonsense messages. If you are a victim, you can deal with Cyber bullying to some extent by limiting computer connection time (not being always on), not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize. It is not recommended that you retaliate in kind because such behavior can lead to civil actions or criminal charges against you.
Cyber bullying can include such acts as making threats, sending provocative insults or racial or ethnic slurs, gay bashing, attempting to infect the victim's computer with a virus, and flooding an e-mail inbox with nonsense messages. If you are a victim, you can deal with Cyber bullying to some extent by limiting computer connection time (not being always on), not responding to threatening or defamatory messages, and never opening e-mail messages from sources you do not recognize. It is not recommended that you retaliate in kind because such behavior can lead to civil actions or criminal charges against you.
Cyber Crimes in India
Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. There are many times of cyber crimes in the world and so is India. Cyber Crimes are usually categorized in two ways viz., (i) the Computer as a target – it means using a computer and attacking another computer by means of Hacking, Virus/Worms attack, DOS (Denial of Service) attack etc., while the 2nd kind is the computer as a weapon – it means using a computer as a aid to commit real world crimes such as Cyber Terrorism, IPR violations, Credit Card Fraud (Remember for instance Bombay IIT student) Pornography specially of children. To understand the cyber crimes to depth, let us understand the words, Hacking and Child Pornography.
Hacking
Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening him to publish the stolen information which is critical in nature.
Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
Motive behind The Crime
(i) Greed, (ii) Power (iii) Publicity (iv) Revenge; (v) Adventure; (vi) Desire to access forbidden information; (vii) Destructive mindset; (viii) Wants to sell n/w security services
Child Pornography
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. The technological explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, and then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, and then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. At this stage the actual exploitation of the children starts by offering them money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet.
In physical world, parents know the face of dangers and they know how to avoid & face the problems by following simple rules and accordingly they advice their children to keep away from dangerous things and ways. But in case of cyber world, most of the parents do not themselves know about the basics in internet and dangers posed by various services offered over the internet. Hence the children are left unprotected in the cyber world. Pedophiles take advantage of this situation and lure the children, who are not advised by their parents or by their teachers about what is wrong and what is right for them while browsing the internet
How do they Operate
1. Pedophiles use false identity to trap the children/teenagers
2. Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen.
3. Extract personal information from the child/teen by winning his confidence.
4. Gets the e-mail address of the child/teen and starts making contacts on the victims e-mail address as well
5. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it
6. Extract personal information from child/teen
7. At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object
8. In order to prevent your child/teen from falling into the trap of pedophile, read the tips under Tips & Tricks heading.
Hacking
Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening him to publish the stolen information which is critical in nature.
Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
Motive behind The Crime
(i) Greed, (ii) Power (iii) Publicity (iv) Revenge; (v) Adventure; (vi) Desire to access forbidden information; (vii) Destructive mindset; (viii) Wants to sell n/w security services
Child Pornography
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. The technological explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, and then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, and then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. At this stage the actual exploitation of the children starts by offering them money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet.
In physical world, parents know the face of dangers and they know how to avoid & face the problems by following simple rules and accordingly they advice their children to keep away from dangerous things and ways. But in case of cyber world, most of the parents do not themselves know about the basics in internet and dangers posed by various services offered over the internet. Hence the children are left unprotected in the cyber world. Pedophiles take advantage of this situation and lure the children, who are not advised by their parents or by their teachers about what is wrong and what is right for them while browsing the internet
How do they Operate
1. Pedophiles use false identity to trap the children/teenagers
2. Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen.
3. Extract personal information from the child/teen by winning his confidence.
4. Gets the e-mail address of the child/teen and starts making contacts on the victims e-mail address as well
5. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it
6. Extract personal information from child/teen
7. At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object
8. In order to prevent your child/teen from falling into the trap of pedophile, read the tips under Tips & Tricks heading.
Cyber Wellness & Netiquetter Awareness
The Internet is the community of the future. However, you would definitely agree with my view that; these days almost everything is hijacked by unscrupulous, malicious and downright dangerous criminals and organised gangs, exploiting things for their own ends and more worse is cyber–space and the Internet has opened up a secret platform for these criminals, a whole new world of opportunities, and made it relatively easy for them to operate in total secrecy. The most worrying aspect is the ever – increasing and specific targeting of children and young people, which the existence of the Internet has made all too easy. There are many unforeseen dangers that can wreck the life of a child and to name a few are;
- Anonymous users
- Pedophiles
- Cyber Bullies
- Porn Content (Audio/Video)
- Video Games
- Songs/Movies
Subscribe to:
Comments (Atom)
