Skip to main contentdfsdf

  • Oct 13, 13

    Score-82
    Context was what I was looking for, and I didn't need to go looking got other websites.
    Content is meant to be humorous but also informative.

    • What are the Possible Consequences of Computer Hacking?
    • Black Hat and White Hat. Black Hat hacking is criminal in nature. White Hat isn't. White Hat hacking is probably what most hackers reading this perceive themselves as doing. Now, this is possible, but it is often a matter of perspective.

    2 more annotations...

  • Oct 13, 13

    Score=92
    Context-Gave me everything I was looking for
    Citation-Clearly listed all of the sources

    • PREVENTION:

       

      1. Buy a cross-cut type shredder (you can  purchase cross-cut type shredder very cost effectively for approximately $60 - $70.) Shred  all your important papers and especially pre-approved credit applications received in your  name and other financial information that provides access to your private information.  Don't forget to shred your credit card receipts.

        

      2. Be careful of "Dumpster  Diving." Make sure that you do not throw anything away that someone could use to  become you. Anything with your identifiers must be shredded (cross-cut) before throwing  away.

       

      3. Be careful at ATM's and using Phone  Cards. "Shoulder Surfers" can get your "Pin Number" and get access to  your accounts.

       

      4. Get all of your checks delivered to  your bank - not to your home address.

        

      5. Do not put checks in the mail from your  home mailbox. Drop them off at a U.S. Mailbox or the U.S. Post Office. Mail theft is  common. It's easy to change the name of the recipient on the check with an acid wash.

    • 6. When you order new credit cards in the  mail, or your previous ones have expired, watch the calendar to make sure that you get the  card within the appropriate time. If it is not received by a certain date, call the credit  card grantor immediately and find out if the card was sent. Find out if a change of  address was filed if you don't receive the card or a billing statement.

       

      7. Cancel all credit cards that you do not  use or have not used in 6 months. Thieves use these very easily - open credit is a prime  target.

       

      8. Put passwords on all your accounts and  do not use your mother's maiden name. Make up a fictitious word.

       

      9. Get a post office box or a locked  mailbox, if you possibly can.

       

      10. Ask all financial institutions,  doctors' offices, etc., what they do with your private information and make sure that they  shred it and protect your information. Tell them why.

    2 more annotations...

  • Oct 13, 13

    Score=80
    Content-serious, and informative
    Connectivity will always stay updated beings that it is a regularly viewed new station.

    • Federal law grants you a free credit report each year, and each of the three major credit reporting agencies must provide one.
    • you can freeze your credit report. This prevents new creditors from accessing your credit report.

    1 more annotation...

  • Oct 13, 13

    Score=63
    Critical thinking skills come in handy when your reading something about protecting yourself, you don't want accidentally make yourself vulnerable.
    Comparability from this article is very good, it states the same things to protect yourself from identity theft as the other helpful articles.

  • Oct 13, 13

    Score=95
    Context
    Comparability

    • It’s no secret that criminals often hide their true identity in order to trick people into falling for their scams. And it’s so easy to pose as someone else on the internet, especially since those who you’re talking to can’t really see you
    • refers to how cybercrooks actually trick their target – by posing as a well-known, trustworthy entity.

    2 more annotations...

  • Oct 13, 13

    Score=75
    Critical Thinking
    Comparability

    • The losses suffered as a result of software piracy directly affect the profitability of the software industry.
    •  Because of the money lost to pirates, publishers have fewer resources to devote to research and development of new products, have less revenue to justify lowering software prices and are forced to pass these costs on to their customers

    3 more annotations...

    • 72 percent of teenagers have profiles on social networking websites.
    • Online, people freely attack and slander each other anonymously.

    4 more annotations...

  • Oct 14, 13

    Score=83
    Connectivity
    Continuity

1 - 15 of 15
20 items/page
List Comments (0)