You are on page 1of 2

COLEGIO de DAGUPAN

Jamaila D. Tomelden QLTY CONCIOUSNESS, HABITS &PROCESS

Cyber-Crime Detector
Nowadays, cyber crime is ranging to catastrophic. And thats why I made this to catch those cyber criminals, cracker, and distributors of viruses. Etc. People can make those crimes unintentionally. For example, In a computer, a virus is a program which modifies other programs so they replicate the virus. In other words, the healthy living cell becomes the original program, and the virus affects the way the program operates. How? It inserts a copy of itself in the code. Thus, when the program runs, it makes a copy of the virus. This happens only on a single system. However, if a virus infects a program which is copied to a disk and transferred to another computer, it could also infect programs on that computer. This is how a computer virus spreads. To catch those criminals who threat people to danger. I made this in order to prevent from spreading virus. People who are well-trained are the one who can use this. To catch those hackers. People leave a lot of information about themselves online. Such information can leave you vulnerable to cyber stalking, a term that essentially refers to using the Internet to stalk someone in the traditional sense. This one is made for to find those people who are trying to steal identity of one another. Drug addicts are selling illegal drugs trough internet and that why this one made for. Drug traffickers are increasingly taking advantage of the internet to sell their illegal substances through encrypted e-mailand other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away. Child pornography. This is made to exploit those children. Cyber terrorism can be defined as an act of terrorism trough computers. To catch those internet stalkers. This was made to prevent internet war.

Cyber bullying is the use of the Internet to harass other people. A particularly nasty kind of personnel breach we've seen lately is harassment on the Internet. Sending threatening email messages and slandering people on bulletin board systems and newsgroups is all too common. In a recent harassment case, a student from the University of Michigan was indicted for posting a particularly graphic story about a sex murder on an Internet newsgroup. Because he used the name of an actual female student at Michigan, his activities were initially considered to be harassment. These kinds of attacks are not new, and personally threatening remarks can as easily be sent by letter or posted on a wall, as they can be sent over the Internet. But the electronic audience is a much larger one, and such messages, sent out from an organization's network domain, may damage the reputation of the organization as well as that of the particular perpetrator. To catch those computer trespasses. To prevent internet suicide.

You might also like