Rabu, 04 Maret 2009

Cyber Privacy

Each active internet users around the world
certainly understand correctly, that the cyber world (online) is a world in which
all visitors are from the real world (offline). However, although
Therefore cyber world is not the same as the real world. Cyber world
the world is different, unique and interesting place to be. Either
two examples of the differences of this world, namely in terms of communicating
directly with each other. Opponent in the offline world we attend the talk
manifest before us, while in the online world, we do not talk opponent
kasat even have eyes. To bring the talk to her opponent
before us in virtual worlds is our own imagination. The
equipment such as pic chat, avatars, cam, and voice, is just
power tool to help us in the working brain berimajinasi at the time
that. Unique is not it?


Uniqueness of other, more cyber world offers
things that are privacy. Must write down the username and
password must first register for each event in each
server that provides the facility to chat, e-mail, and
website, one of the proof of protection against privacy servers
users.
Chat in the world, for example, servers that are
we use is very or extremely protect protect its customers.
For example, when other people will add to or take ID
(nickname) to us is stored in the messenger list it, there is a quote
first from the server related to us as a friend to chat people
, and agree whether or not ID our add-in by the man? When
agree, we live to click the box labeled allow, if not
just click the box labeled block / reject / deny. When the chance we
when using a webcam chat, also can not be any person
can be opened (to accept) we cam. Process the same request ijinnya
like when someone you want to add a list of others in the ID to its list.
Another example, when we do not want to be online by the
that have been terlanjur to add our ID, easy course, use the technique
invisible, so all our cyber friends think we're off.
Then we choose to live, where the ID that we want to do. One
example again, if we feel disturbed by one of his attitude friend
we have a virtual terlanjur often use to chat with us
PM (private message), the technique can be set disiasati presence
offline, so that the friend thought it frustrating that we are not
online aliases are off on our individual online. Had friends
chat is frustrating that we have been very comfortable with the
we socialize in the cyber, too easy to complete,
"Tendang" only he's our list. But when he was already IN the tedaftar
our messenger list, first delete its ID, and do not linger
ignore-it or blocking its ID.

But do not terlena with
facilities that function to protect internet users,
circumspection and vigilance still needed a Netter. And when
we experience things that are not desired, for example, our password
known people, or without us realize there are people who already know
many things about our private, that's not all one opponent to speak
us, also not a computer let alone a server. All the resultant
by our own carelessness, which is perhaps less at a time
response on the situation and the environment that we're enter
at the time, so that we unconsciously dijebak people to
broaden our privacy.

So essentially berhati2lah with whom we deal with someone in the cyber world. what u see is not always what u get.

0 komentar:

Posting Komentar

By :
Free Blog Templates