Firewall with Windows - can use Windows as a firewall
![]() | |||
| Microsoft Management Console |
![]() |
| Adding the IP Security Policy Management |
![]() | ||
| Snap-in dialog with the IP Security Policies |
![]() |
| Manage Filter Actions tab |
![]() |
| Firewall Properties dialog |
![]() |
| Adding a new rule |
"He who lives in harmony with himself lives in harmony with the universe." - Marcus Aurelius
![]() | |||
| Microsoft Management Console |
![]() |
| Adding the IP Security Policy Management |
![]() | ||
| Snap-in dialog with the IP Security Policies |
![]() |
| Manage Filter Actions tab |
![]() |
| Firewall Properties dialog |
![]() |
| Adding a new rule |
Posted by Robin at 01:45
Posted by Robin at 23:39
Posted by Robin at 01:01
Posted by Robin at 02:57
Posted by Robin at 02:37
Posted by Robin at 02:51
Posted by Robin at 00:45
Posted by Robin at 02:43
Posted by Robin at 22:56
Posted by Robin at 01:11
![]() |
| Freewebhostingarea.com |
Posted by Robin at 02:27
Posted by Robin at 01:47
Posted by Robin at 23:10
![]() |
| SPlayer-Screenshot |
Posted by Robin at 22:15
Posted by Robin at 02:23
![]() |
| internet browser rank |
Posted by Robin at 02:16
![]() |
| Samsung Galaxy Tab |
Posted by Robin at 23:06
Google has announced a new feature of Priority Inbox for Gmail. Gmail has always been pretty good at filtering junk mail into the “spam” folder. But today, in addition to spam, Priority Inbox is like your personal assistant, helping you focus on the messages that matter without requiring you to set up complex rules. Priority Inbox can help save you time if you’re overwhelmed with the amount of email we get. It attempts to automatically identify our important incoming messages and separates them out from everything else. Read More

Posted by Robin at 22:11
Identity Theft :- It could happen to you
Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft can suffer adverse consequences if they held accountable for the perpetrator's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent are also victims.
Identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs.
Identity thieves might want to impersonate someone else for a couple of reasons. In one form of the crime, an opportunistic thief obtains several pieces of information about a victim and uses the information to obtain goods or services for free, for a short period of time. For instance, the thief opens a credit card account using your Photo Ids and Proof of Residence, name, and address, and then the thief makes several purchases.
Another form of identity theft involves someone with the goal of long-term Impersonation. For instance, someone opens a bank account in your name and then has the statements sent to his own location instead of yours. Another example of this type of crime involves someone obtaining mobile SIM connection by using fake/stolen documents. These mobiles could be used in any disruptive activities including terrorist activities. With almost every major terror investigation revealing the use of SIMs procured on the basis of fake Ids. Unfortunately, there is no central database of mobile subscribers. So you cannot check if any other mobile number has been issued in your name.
Types of Identity Theft
Financial fraud :- This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.
Criminal activities :- This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get illegal mobile connection, hide one's own identity, or commit acts of terrorism. These criminal activities can include: Computer and cyber crimes.
How you can protect yourself
1) Be Informed and Up-to-Date :- We use photo ids and proof of address copies in every day life from getting phone connection, open bank accounts. Have you ever realized that the same photo ids can be put to misuse and lead you to troubles? Always cross the photocopy of the identity proof you give to bank, mobile company e.t.c. And write over it as 'given for bank…for identity verification on this date… '
2) Avoid becoming another Hopeless Victim of Identity Theft:- Identity theft occurs once a thief assumes another person’s identity by using confidential information supposed to be known exclusively by that person. The thief will commit fraud using the person’s name, addresses, date of birth and important confidential
3) Ways to Protect Yourself from Computer Identity Theft:- Identity theft is considered as a huge problem in our society. Since everyday, there is an increase in the number of user of Internet and most people consider computer, as a big part of their lives, there is also an increase of cases of identity theft. Individuals who are new in using the Internet sometimes become to victim to computer identity theft systems. In most cases, the people involved in the identity theft systems use your credit cards to buy supplies and merchandise for themselves.
Posted by Robin at 06:17
Labels:
bank fraud,
credit card,
crime,
cyber crimes,
fake Ids,
fraud,
FTC,
identity proof,
Identity Theft,
Internet.,
mail fraud,
misuse,
mobile SIM,
person's identity,
Photo Ids,
terrorism,
victim
3
comments