Pages

Tuesday, May 25, 2010

Defamation Law

domain name a big furtune for cybersquatters!!!


Hi friends.I hope you have enjoyed so far my weblog. I am trying post regularly some new and interesting things so that that's going to be useful for us.I hope so.today's topic is also interesting. have you ever had a lot of effort to make a business? whether or not you know it's inescapable fact that many businessmen really make lots of effort to make their product and service well known and famous.I think you agree with me that well known name can be main part of branding.now suppose a business having tried a lot in market and have acheived good positionig in consumer's mind , is going to develop a website under its name to extend its communication with customers. though somtimes there is a big problem. someone has taken that website name under his or her own. if you like use that website name which is named after your business name, you have to pay lots of money to that person to buy it. it's really unfurtunate case for you. this kind of actions is called as cybersquatting and the opportunitist person who wanna extort you in a way is called cybersquatter. nowadays there are too many of like these cases that make problem for people. you can read more about it if interested, in the following address:
http://cybersquattingcases.com/

Sunday, May 16, 2010

What Is Cyberstalking?


Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require only that the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously.
What To Do If You Are Being Cyberstalked

If you are receiving unwanted contact, make clear to that person that you would like him or her not to contact you again.
Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials.
You may want to consider blocking or filtering messages from the harasser. Many e-mail programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete e-mails from a particular e-mail address or that contain offensive words.
read more in:
http://www.cyberguards.com/CyberStalking.html
http://blogs.pitch.com/plog/2009/07/cougar_de-clawed_judge_orders_johnson_county_woman_to_pay_millions_for_sexually_victimizing_man.php

Wednesday, May 12, 2010

Identity theft- A research review


Hi there. I'm glad I have a chance to communicate with you via this weblog. Today I'like to share some information regarding Identity Theft which I found it useful for us. knowing this sort of things can be useful because apart from our course study we'll need it with respet to our lives and every things are going around us to be protected against some harmful actions. some people are scared to use internet facilities for doing their daily affairs and they avoid to get close that kind of facilities, however others are really dependent to internet function to get their business or tasks done. anyway there are some risk in this regard which can not be ignored. offcours government have taken some action needed in respect to legislation and preventional measures, but may be we have to be more careful against some threats come from bad people. I have a useful topic following I suppose you will like it.to read it go to:
http://www.ojp.usdoj.gov/nij/publications/id-theft/welcome.htm

Friday, May 7, 2010

Era of cyber war


Hi freiends.wow!!,it looks like Hollywood movies.I remember, I used to like movies whose stories were about electronic war, when I was a child and now after years it comes true.reading a news about The NATO Cyber War Agreement,we can see time for cyber war is going on and every thing's going to be cyber-based.the issue I read is dealing with that two years ago, NATO established a Cyber Defense Center in Estonia. This, and the recent agreement, is a result of being called on by Estonia, three years ago, to declare Cyber War on Russia. That was because Russia was accused of causing great financial harm to Estonia via Cyber War attacks, and Estonia wanted this sort of thing declared terrorism, and dealt with. NATO agreed to discuss the issue, but never took any action against Russia.to find more look at:http://www.strategypage.com/htmw/htiw/articles/20100501.aspx

Thursday, May 6, 2010

Click-Wrap


Hi there. today I'd like deal with Click-Wrap.Have you ever faced with a web site that you had to click on "I agree" to download or having transaction? This is a click-wrap agreement, made at or before the time of purchase on a web site. The purchaser is required to click “I agree” before the transaction will continue, the installation will proceed or the user will gain access to the web site.There are issues about how to treat terms that are not proposed or discloseduntil after the user has already agreed to go forward with the transaction and has tendered the required consideration. Find more in if you are interested in:
http://www.murdoch.edu.au/elaw/issues/v9n3/kunkel93_text.html#Shrinkwrap%20License%20Cases_T

Tuesday, April 27, 2010

what is the phishing?


Hi friends.
are you familiar with phishing? ya may be every one is familiar with fishing but I don't mean fishing,haha..., todays this phrase has been prevailed in cyber space. there are some people seek to illigally grab money of others. here we can know some things about this issue, so understand about it let me in the following show you a video related to the phishing.
http://www.youtube.com/watch?v=QlUR7DND2fo&NR=1