Sabado, Hulyo 2, 2011

True or False?



Law and order  is about the murder of a psychologist reveals evidence that the killer had access to secret information possessed by the victim. Investigating, the detectives end up at the door of a computer company which sells information about its clients. The D.A.'s office must prove that such transactions are dangerous violations of privacy -- and that the computer firm is just as liable for the psychologist's death as the actual perpetrator. Briscoe and Green believe the fatal stabbing of psychologist Tracy Conley may be linked to confidential client information on her computer. They learn one of the files on her hard drive has been tampered with since her death - information that would have ensured a known rapist spends another five years behind bars. 

I need to research about the different issues about the computer myths that are related to Law and Order.

  •  Files are still recovered in the drive after deleting it.
According to http://www.akdart.com/priv9.html, many computer users, including some who should know better, are unaware that deleted files can be recovered — undeleted — and can yield information which can be used against the person who deleted them.  This information can be as common as a deleted email message or as important as sensitive business records or government transactions.  Those who are less technically astute may assume that if a file doesn't show up in a directory (or folder), it's gone forever.  Few people know that deleted files are not erased; the data is just hidden, and the files can be undeleted.  Still fewer users know how to undelete files, either to recover from accidental deletion or to "go fishing" for interesting data.
              
 Another source is http://www.rickysays.com/recover-deleted-files, it said that when you delete a file, Windows only marks the file as deleted, but doesn't actually remove it from your system. Those files are only truly deleted when other data is saved to the same location on your hard drive.
If you accidentally delete files from your system, they can usually be undeleted - even if you deleted them from your recycle bin - as long as you attempt to recover the files shortly after you delete them, and before Windows saves other data in those same file locations on your hard drive.


This issue is TRUE.

  • The more information you post on the internet, the more safer you are.
According to http://www.us-cert.gov/cas/tips/ST06-003.html, although the features of social networking sites differ, they all allow you to provide information about yourself and offer some type of communication mechanism (forums, chat rooms, email, instant messenger) that enables you to connect with other users. While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that's available. 

The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.

Additionally, because of the popularity of these sites, attackers may use them to distribute malicious code. Sites that offer applications developed by third parties are particularly susceptible. Attackers may be able to create customized applications that appear to be innocent while infecting your computer or sharing your information without your knowledge.
                         
It is obviously FALSE.

  • Files can be opened though password protected.
It is TRUE because nowadays, there are many hackers that can access your accounts and files even if you have passwords. hackers uses a program to get into other computers for accessing it. They run the program that cracked the file sharing password.

For example, Facebook is the number 1 social networking site today. Hackers can easily detect and open your accounts. I read an article about it and it teaches you how to hack passwords.It said that there are several methods on how to hack Facebook passwords like Facebook Phishing, Keylogging, Social engineering, and Primary email address hack.If you are interested to know it, just go to this site, http://www.rafayhackingarticles.net/2010/01/4-ways-on-how-to-hack-facebook-password.html