How to Be Safe on Internet? – Safety Tomorrow

Safety Tomorrow

Safety Tips, Safety News

Safety News

How to Be Safe on Internet?

Before going into the technical details, I would first like to introduce what is the Internet wholesale. The Internet is just a network, a huge network of devices that are sort of connected to each other. These devices include web servers, file servers, personal computers, and more. We will continue to focus on PCs in this text. All of these are connected via cables or satellite.

We now know that when things are connected, data sharing is possible. This is the solo work of the internet. Data is transferred from one place to another all the time. We now come to the dark side of the transferred data. The problem here is that there is so much data that every bit of data can not be verified what it is and where it is going. Who accesses this. If he is the right person to have this data or not. Unfortunately, we have no effective method to verify this. I think that someday we will have a way to control this and prevent malicious people from accessing data that they are not supposed to have access to.

I now list all possible negative consequences of the Internet, then I will try to explain them and share possible solutions.

1. Piracy
2. Cyber ​​crimes.
3. Loss of privacy.
4. data corruption.
5. Adult material (not suitable for children).
6. forbidden knowledge.
7. Plagiarism.
8. Loss of time.
9. Health risks.


Many of us, in fact, I think that all of us are aware of this term and know what it means. It’s an unauthorized access to something. Today, worldwide, hacking has been used by many citizens, businesses and even IT companies. It is something that can be done at any level. As there is a saying, “if you can do it, then you can break it”.

Today, billions of people have accounts on many free email sites, social networks and others, and many of them have lost their account with some important personal data. For those who have experienced this thing, they know how scary it is, and those who have not done it, believe me, this can be your worst night at night.

Let’s move on to the technical side. There are several types of hacking. We will only focus on Internet piracy involving ordinary people. What is an ordinary person on the internet? Two things: email accounts and social network site profiles. He has most personal data in both places and this is where his privacy becomes vulnerable. If, unfortunately, he has knowledge that is not a good person and have a good knowledge of the Internet, then that person could suffer the consequences.

Hackers use many ways to access victim data. On the Internet, “social engineering” is the easiest and most effective way to do it. Hackers develop relationships with the victims and then exploit them. One of the solutions is to send an email containing a link to another website. When you open the link, it asks the user to enter the username and password. When it does, it sends the intruder and the user a kind of error message. The irony of the situation is that the victim will never know what happened to him. It’s called “phishing”. This can only be done by people who know the programming.

We can avoid this kind of maneuver if it is a little cautious, do not open the mails of unknowns and do not enter any password when asked if he arrived on this website by an indirect link.

Another way is to install software that continuously records all activities performed on a computer with all the data entered and on which website these data are entered. This can also happen if you use a university, school, workplace or public computer.

So, always keep in mind that you are sitting at what information you are trying to access. Avoid using your personal accounts from public computers as much as possible because you never know who is watching you.

Instant messengers can also be used to wok. Hackers can send you a link that could lead to the loss of your email account.

Do not follow any irrelevant search links, even if someone you know has sent it because you do not know who is using this account. Hackers use people’s accounts to access their friends.


Your email address will not be published. Required fields are marked *