Looking for something? Use this facility....
Custom Search

Friday, December 26, 2008

Are You the Victim of a Cyber Stalker

by: Ed Opperman

It is funny, in a sad way, that no matter what form of communication we use people can find negative uses for it and find ways to make other peoples lives hell. Now with the 'always on' world that we live in it is becoming increasingly easy for people to get to you for good and bad purposes.

Maybe it is the apparent anonymity of text messages, emails and chatrooms that has fuelled the sharp increase in cyber-bullying in recent years? I mean in a face to face situation the person usually has to have some power over you, being bigger than you, being higher up in an organisation, or being in company when you are not. All those are situations where a bully will start to emerge and stalk their prey, but behind the electronic shield of modern communications then it could be a 11 year old child who is bullying an adult!

Yes that's right, it is not just children who are victims of cyber-bullying, adults are just as susceptible if not more (due to adults having accumulated more problems they want to take out on people). A recent survey by i-SAFE inc shows 42% of kids have been bullied online and 58% of kids have been subjected to hurtful communications online, so the figure for adults may be even higher...

So what can you do? Nobody should be subjected to any sort of harassment in my opinion and should not even have to try and avoid it, but if you do need to then there are methods you can use.

The first technique is to change your details, change your email address, change your chatroom name, change your mobile number or house phone number, this should prevent that person from contacting you. Of course they can identify you again, from your messages, or try and find out your new home number etc, even worse, they could spread malicious information about you all over the internet in frustration.

The second technique is to try and get some official sources involved. Contact the chat room owners, if the perpetrator contacts you via email go to their email provider or internet service provider, even better, go to the police! Of course none of these may be able to, or be willing to help, so in steps technique number three...

The third technique is to fight them on their own ground, did you know you can hire a Private Investigator to trace email addresses, phone numbers, even identify withheld or blocked numbers that keep calling you? With that information in hand you can then set about getting the police involved or just take away their anonymity, if you let them know that you are aware they live just three doors up from you then they will probably stop for good!

Before you hire a private investigator be sure to do your homework. Do a Google search on the private investigators name to see if they are recognized as an expert of authority in skip tracing and people search investigations. Also do a search on the web site name and company name to see if their are any Internet postings from former clients who are either satisfied or not.

Last check out the pricing and turn around times for the results. Are they competitive? Beware of companies that are too cheap and offer "instant" searches. This information will almost always be inaccurate and out dated. Be leery if you see a site offering "unlimited" searches for one low price. If it looks too good to be true it usually is.

You either fight or flee, either way can work, but do not let the bullying continue by stubbornly refusing to let it affect your life and change your details or seek help, the psychological strain is just not worth it.

Source : http://www.articlesbase.com/computers-articles/are-you-the-victim-of-a-cyber-stalker-696390.htmlstalker-696390.html

Wednesday, December 17, 2008

Online Work From Home

There are several ways you can work from home online. You can work for a company, you can work for other people, or you can be self employed and work for yourself.

Each of these are a great way to online work, but each way might be better for different personalities. For instance, if you like the security of having a job, then you would want to work for a company. There are two very common ways you can do this. You can become another sales rep or a telemarketer. There are even companies that hire people to work from home doing sales calls with benefits.

If that isn't what you want to do, you can do customer service from home. You will most likely make less money, but you will probably enjoy the job better. Each company has different ways of doing business. One company might let you choose your hours as long as you choose a minimum. Another company might choose your hours while you choose how little you work.

If you are interested in doing work for others you would want to do freelancing or contracting. This is where you do jobs for different businesses or people but you aren't considered even part-time. You bid on jobs on different freelancing sites, and you get awarded payment after the work is done. This is a good job to do if you want to do some writing or other online work. You can learn how to do work in PHP, CSS, or HTML, or even website scripts. If the clients like your work you can get more continuous work but not the promise of any work in the future. However there are always more new people posting jobs on the site that need to be completed.

One last way you can work online is by working for yourself. If you want to start your own online business this is called internet marketing. You can get your own website, sell a service or do affiliate marketing. This would be a good addition to any freelance work you do. While you are working online for a company you could start to learn this.

Having your own website gives you your own piece of online real estate and there are several ways to monetize your site and time online. You could tell people about your life and your experiences in your online work or you could write product reviews on a blog. Thousands of people have blogs and if you go about them with a business mind, they tend to do quite well.

There are many ways to make money within these 3 methods to work at home online. But now that you have some foundation for your online careers you can decide what avenue you want to go down.

Article Source: http://www.articlesbase.com/internet-articles/online-work-from-home-686753.html

Thursday, December 11, 2008

Wireless-networking-guide


Author: Silvia Holloran

Just how do we go about connecting to the internet wirelessly? A wireless network needs to have two components a Wireless Router/Modem to share the internet connection a suitable Wireless card in your laptop or desktop Just about every new laptop has a wireless card built in, the actual type is the mini PCI

But what if you have an older laptop that does not have a wireless network card built in?

Luckily though there is a number of options available to us to make virtually any desktop or laptop computer wireless. The best type of wireless card, which is suitable only for laptops, to install is the mini PCI type, you will need to make sure your computer has a mini PCI slot to accommodate this type of card, and then you will need to either remove the keyboard or small panel on the bottom, but once fitted its totally unobtrusive.

The USB wireless type or dongle is perhaps the most common as its just a case on installing its software plugging in the dongle and you are pretty much ready to go The big advantage of this type of network card is the ease of installation, but on the downside it means you will need to remove it if you ever travel and they do have a habit of getting knocked if your limited by your USB ports, this type of network card is suitable for desktop and laptop computers, just make sure your computer has USB type 2 ports or you might find it too slow.

For desktop computers a PCI card is a good choice, all we need to do is install the software, shutdown the computer remove the case, fit the card In a spare PCI port, put the case back on, power on the computer, it will then recognize the new hardware and automatically install the drivers for it and after a minute or so thats it all installed.

Lastly we have the PCMCIA type of wifi network card, although PCMCIA ports are pretty much redundant just about every laptop has one of two of this type of long horizontal port, if your short of USB ports this could be just what your looking for, maybe not as obtrusive as the USB type, but it still needs to be removed when travelling with your laptop though.

Due to the amount of wifi network cards around the prices have really come down a lot over the past year and now really good wifi cards can be bought for as little as 15 pounds by good we mean either a 54mbps or 54g type of card, rather than the much slower 802.1l b type of cards.

Installing

When installing a wifi network card, make sure that you read the manuals prior to installing, most cards need to have the software installed before the wifi card is connected or plugged in, otherwise the software drivers may fail to load or Windows will attempt to locate a driver from elsewhere, giving driver or configuration issues which can be a hard to resolve it may mean removing the card again.

Now your ready to connect, you should see a pop-up at the bottom right of the screen when a wireless network is in range of the card, click on the pop-up and you'll be able enter your pass key (if you have one set ) to connect to your wireless network.

Notes

Only connect to wireless networks you trust, especially if you need to disclose credit card details for any reason. If you have setup your own wireless network you must ensure that you have some form of wifi security, if your router is not protected, not only can anyone simply just connect and browse from your Wifi network, but if so could be much more malicious, performing such actions as changing your router passwords, stopping you from accessing your own internet connection, they will also be see any able to see any computers or devices attached to your router and may try to gain access to these.

Its imperative to make sure any wireless connections are secure, check out more articles on Wireless security, plus much more at So please make sure any wireless connections are secure, feel free to checkout more on Wireless security, plus all of our other articles at computer-adviser.com

About Author

At http://www.computer-adviser.com articles are focused around general computer questions that we get asked every on a regular basis

Article Source: http://www.1888articles.com

 

blogger templates 3 columns | Make Money Online