Law and order is about the murder of a psychologist reveals evidence that the killer had access to secret information possessed by the victim. Investigating, the detectives end up at the door of a computer company which sells information about its clients. The D.A.'s office must prove that such transactions are dangerous violations of privacy -- and that the computer firm is just as liable for the psychologist's death as the actual perpetrator. Briscoe and Green believe the fatal stabbing of psychologist Tracy Conley may be linked to confidential client information on her computer. They learn one of the files on her hard drive has been tampered with since her death - information that would have ensured a known rapist spends another five years behind bars.
I need to research about the different issues about the computer myths that are related to Law and Order.
- Files are still recovered in the drive after deleting it.
Another source is http://www.rickysays.com/recover-deleted-files, it said that when you delete a file, Windows only marks the file as deleted, but doesn't actually remove it from your system. Those files are only truly deleted when other data is saved to the same location on your hard drive.
If you accidentally delete files from your system, they can usually be undeleted - even if you deleted them from your recycle bin - as long as you attempt to recover the files shortly after you delete them, and before Windows saves other data in those same file locations on your hard drive.
This issue is TRUE.
- The more information you post on the internet, the more safer you are.
The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.
Additionally, because of the popularity of these sites, attackers may use them to distribute malicious code. Sites that offer applications developed by third parties are particularly susceptible. Attackers may be able to create customized applications that appear to be innocent while infecting your computer or sharing your information without your knowledge.
It is obviously FALSE.
- Files can be opened though password protected.
For example, Facebook is the number 1 social networking site today. Hackers can easily detect and open your accounts. I read an article about it and it teaches you how to hack passwords.It said that there are several methods on how to hack Facebook passwords like Facebook Phishing, Keylogging, Social engineering, and Primary email address hack.If you are interested to know it, just go to this site, http://www.rafayhackingarticles.net/2010/01/4-ways-on-how-to-hack-facebook-password.html.