-+1+Collaboration

Read the article in this link:


 * [|http://www.washingtonpost.com/wp-dyn/content/article/2010/01/12/AR2010011203024.html?wpisrc=nl_pmtech]**
 * Read the following newspapers that can be found in the library:

International Herald Tribune - Jan 15, 2010 (Friday) and Jan 16-17, 2010.

You can also find another copy on top of my black pinter in the ICT Lab.**


 * Each of you should work on the criterion.

Place your research under each criterion.

CRITERION A [Chen and Gina]** Both Google and the Chinese government are experiencing rising tension as Google e-mails are said to have been attacked once again. There had been a compromise being established between these two parties concerning the content of information displayed, but the conflict between Google and the government has been escalating.

The Chinese government continues to have clashes over Google ’ s censorship of the contents which include what is considered as politically offensive. This forced Google to try providing the service within the law and satisfy the policies of Chinese government. However, Beijing had blamed Google for search results that had been considered pornographic and Beijing had blocked Google and its e-mail temporarily as a punishment. Consequently, advocates applauded Google for standing up against Chinese censorship and The State Department is providing funds to help companies get over the firewalls set by China.

Furthermore, due to the Chinese government having illegally accessed approximately ten different e-mails, individuals are subject to the spread of confidential information. Despite this breach of privacy, Google has claimed that only two e-mails out of the ten were hacked and that the contents viewed were relatively insignificant. However, it is apparent that this act has threatened the privacy of users.


 * CRITERION B [John, Terry]**

Email is an abbreviation of Electronic Mail (Tschabitscher, Date Unknown). Email much the same as a letter, only that it is exchanged through an electronic network such as internet (Tschabitscher, Date Unknown). Email messages are transferred instantly to another computer. It move as fast as current in copper wires or light in optical cables, which is very quick. When you send an email it leaves your computer and arrives at the recipient's inbox immediately. You can potentially have a conversation with a person over email internet users to send emails to any location to another email user in a very short time. (Unknown Author, Date Unknown). People really wanted to send messages through the net as quick as possible to any location just like a mail, also as mails were sometimes not sent to the right location so people wanted it to be sent to an accurate direction (Peter, Date Unknown).

This IT system, Email, was created by a man named Ray Tomlinson in 1972. Before Tomlinson, “messages could be sent between users but only those connected to the same computer. They could not be targeted to a particular individual. Tomlinson devised a way to address email to certain users.” (Black, Date Unknown).

However, all Email messages are not highly secured, some internet hackers choose to send worms and viruses via email and in the process it leads to a malicious damage to the computer, in addition they tend to hack into your computer and steal personal data. A virus email can often be very difficult to detect, because some people just open it without taking any notice to it, and especially people with very little knowledge of computer viruses and how they work (Vollmond, 2009).


 * CRITERION C [Mike Kang, Mike An]**


 * CRITERION D [Do-Yup]**

The hacking of e-mail accounts has become a serious threat to big companies such as Adobe, and governments. However, there a few ways to prevent you’re e-mail account from being hacked. Google officials predict that hackers used phishing scams to hack e-mails. Phishing is “the attempt to fraudulently acquire sensitive information (e.g., passwords, account numbers, or financial information) by masquerading as a trustworthy person or business in a seemingly official communication” (Infosat, Date Unknown). Primarily, in order to prevent yourself from being phished, “you should never execute or download software or files that are not from a trusted source” (Subhash, 2007). If you download malicious software, or Trojan, the hacker will be able to gain access to your e-mail and confidential information. A Trojan is “a program that appears desirable but actually contains something harmful” (Wordnet, Date Unknown). Thus, you should always be careful of who the sender of an e-mail is.

Another way to tackle this issue is by using anti-phishing and anti-virus software and firewalls that are frequently updated. Anti-virus software can help eliminate the damage of downloading harmful files, while firewalls prevent the contact of unauthorized sources (Naraine, 2004). In addition, having specialized spam filters is useful because it automatically removes spam mails or mails that may contain harmful contents.

However, despite these solutions, if you log on to your e-mail at a public place such as Internet cafes or libraries, it is likely that they have keyloggers installed, which could copy your password (Ji, 2008). Thus, you should try avoid logging in to your e-mail account at public places.


 * CRITERION E [Everybody]**

Everyone should contribute under this criterion.

example:

www.yahoo.com [ceejayjader]

Black, Ken. "What is Email". WiseGeek. 18/01/2010 . [John Ro and Terry Kim]

Peter, Ian. "Net History". The history of email. 18/01/2010 . [John Ro and Terry Kim]

Tschabitscher, Heinz. "What Email is and How It Works". about.com. 18/01/2010 . [John Ro and Terry Kim]

Unknown Author. "Advantages of email -or electronic mail". Web Developers Notes. 18/01/2010 . [John Ro and Terry Kim]

Vollmond, "Advantages and Disadvantages of Email". Buzzle.com. 18/01/2010 . [John Ro and Terry Kim]

Ji, Granth Sahib. "Tips to prevent Your Email Accounts from being hacked by hackers". Digital World. 19/01/10 []. [DoYup Lim]

Naraine, Ryan. "How Not to 'Get Phished'". 19/01/10 []. [DoYup Lim]

Subhash. "How to prevent your mail account getting hacked". Technade. 19/01/10 []. [DoYup Lim] WordNet. Princeton. 20/01/10 []. [DoYup Lim]

Nakashima, Ellen, Steven Mufson, and John Pomfret. "Google threatens to leave China after attacks on activists' e-mail." 13/Jan/2010. The Washington Post, Web. 19 Jan 2010. <[]>. [Chen&Gina]

Due: Wednesday, Jan.20, 2010 before 6pm.