<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5799558270937279474</atom:id><lastBuildDate>Wed, 22 Oct 2025 06:58:24 +0000</lastBuildDate><category>Hyperlinked</category><category>hacker</category><category>junk mail</category><category>online gambling</category><category>picture</category><category>pirated software</category><category>&quot;passing off&quot; law</category><category>China</category><category>IP</category><category>Los Angeles</category><category>MSN Messenger</category><category>Online purchase</category><category>SFDA</category><category>SPAM</category><category>Virus Attack</category><category>Your Name</category><category>anti-virus program</category><category>buy</category><category>casino</category><category>censorship</category><category>chat box</category><category>cheating</category><category>computer crime</category><category>computer failures</category><category>computer hacking</category><category>consecutive period</category><category>convenient</category><category>copy and paste</category><category>cracker</category><category>criminal law</category><category>cyber law</category><category>designed trademark</category><category>distributors&#39;right</category><category>domain name</category><category>download music</category><category>email</category><category>ethnical issue</category><category>experienced</category><category>expressive works</category><category>fake relationship</category><category>fall in love</category><category>fight SPAM</category><category>free download</category><category>friendster</category><category>government</category><category>ignore</category><category>illegal drugs sales</category><category>illegal website</category><category>imagination</category><category>infringe</category><category>infringement</category><category>intellectual property</category><category>intercept</category><category>law enforcement</category><category>legal online gambling website</category><category>loan shark</category><category>logo</category><category>mail system</category><category>man in the middle attack</category><category>modifying</category><category>naked</category><category>online business</category><category>online dating</category><category>online privacy issue</category><category>original work</category><category>plagiarism</category><category>podcasters</category><category>podcasting</category><category>poll 1</category><category>poll 2</category><category>poll 3</category><category>poll 5</category><category>poll 6</category><category>poll 7</category><category>poll 8</category><category>poll 9</category><category>porn testimonial</category><category>prevent crimes</category><category>profiteers</category><category>punishment</category><category>quasi-legal services</category><category>realize</category><category>recognizable names</category><category>reference</category><category>risk</category><category>scandal</category><category>scandalous</category><category>selling shirt in internet</category><category>sensitive issue</category><category>sexy pictures</category><category>sharing</category><category>similar marks</category><category>slogan</category><category>spam mail</category><category>spyware</category><category>testimonial box</category><category>trade mark</category><category>trademark</category><category>translation to Japanese</category><category>trojan</category><category>unlawful activities</category><category>violating</category><category>viruses</category><category>watermark</category><category>week 4th poll</category><title>Legal Issue In Internet</title><description></description><link>http://legalissue-dmc.blogspot.com/</link><managingEditor>noreply@blogger.com (legalissue-dmc)</managingEditor><generator>Blogger</generator><openSearch:totalResults>30</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-7118263883107558666</guid><pubDate>Thu, 19 Mar 2009 17:06:00 +0000</pubDate><atom:updated>2009-10-03T17:41:06.230+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hyperlinked</category><category domain="http://www.blogger.com/atom/ns#">ignore</category><category domain="http://www.blogger.com/atom/ns#">poll 9</category><title>Poll 9 Result</title><description>&lt;a href=&quot;http://4.bp.blogspot.com/_g5HsCABehl8/ScKHNh0JjfI/AAAAAAAAAR4/QQEHia1iyOA/s1600-h/Picture1.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5314959176735755762&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 287px; TEXT-ALIGN: center&quot; alt=&quot;Poll 9 Result&quot; src=&quot;http://4.bp.blogspot.com/_g5HsCABehl8/ScKHNh0JjfI/AAAAAAAAAR4/QQEHia1iyOA/s400/Picture1.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The title of Week 9 poll is &quot;What is your reaction when you received irretated hyperlinked which contains virus for the first time?&quot;, the result of the poll shows that the majority respondent which is 2 respondents (66.6%) choose &quot;you open it because you think something is related to you.&quot; Only 1 respondent (33.3%) just ignored it without any reason. Whereby none of the respondent (0%) don&#39;t know what it is so they open it and none of the respondent choose they know that might be a virus they ignored to open it.&lt;br /&gt;From the result we can know most of us are the victims always get this kind of irretated hyperlinked that contains virus when they first time click on it they didn&#39;t alert of the virus inside and harm their pc because they think something is important and didn&#39;t ignored it. The awareness of people of beware this kind of hyperlinked was low but as this kind of situation happen and happen around us, some of the respondent choose to ignored it without any reason because they know it&#39;s a virus after the experiences. I hope there will be a solution to solve this problem and I really hope some organization should take action of this kind of behaviour that harm people&#39;s computer software or maybe some people just trying to do some hacking. It&#39;s so irritating as people need to reinstall their software once they get viruses and sometimes the important documents will lost caused by the virus. It&#39;s a issue that getting serious, people remember try to avoid to click on it to protect your pc.&lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/03/poll-9-results.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_g5HsCABehl8/ScKHNh0JjfI/AAAAAAAAAR4/QQEHia1iyOA/s72-c/Picture1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-2891576924055944867</guid><pubDate>Thu, 19 Mar 2009 13:12:00 +0000</pubDate><atom:updated>2009-03-20T02:31:28.303+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cheating</category><category domain="http://www.blogger.com/atom/ns#">ethnical issue</category><category domain="http://www.blogger.com/atom/ns#">fake relationship</category><category domain="http://www.blogger.com/atom/ns#">fall in love</category><category domain="http://www.blogger.com/atom/ns#">online dating</category><title>The Ethnical issue of Online Dating is cheating</title><description>While the online dating websites do allow us to find a relationship very efficiently, like anywhere else, there are people who will try to misuse the system. Men can go pretty wild when they know that they are anonymous. I had seen my cousin brother he was just in age of 11 years old he often play online games where create a female account to get people get in trap. What he did was people thought he was a young lady then my cousin brother keep asking for advantage where asking them give &quot;her&quot; a good weapon and give &quot;her&quot; some points so &quot;she&quot; able to upgrade her level faster. He use this way to cheating people stuff which is related to ethical issue merely because they even knew they had not meet each other they might know is a risk to a trap but they are willing to give. However when he getting too over of it, once a guy want to date &quot;her&quot; for movie, ofcourse my cousin avoid to go. Even smarter he asked his sister to act as &quot;her&quot; so those guy would easily to believes the present of &quot;her&quot; is real.&lt;br /&gt;&lt;br /&gt;It is an ethical issue to get advantage of people it is really immorality do cheat people in this way. In the reality of social networking such as FaceBook and Friendster, MSN Messenger and so on when come to a lonely person you might tend to act like a silly person just simply find a partner chit chat and this is how you &quot;fall in love&quot; with the person while you never get to see each other before. In a reality word to describe you are &quot;falling in love&quot; with the chatting process while get you out of loneliness. A relationship that never meet each other but maybe in the webcam but this are not a real relationship should be. Indeed, none of the people would want to marry a person that just through internet tool chatting. This is a fake relationship just to satisfy each of party&#39;s needs in a temporary period. However some of the innocent victims never realize they get in the trap when they are &quot;fall in love deeply&quot; because love is blind! Not only men will cheat but girls will cheat as well. How do men cheat? Some of the wild men they ask for sexual show in front of the webcam. They persuade the girls to take off shirt or perform sexy posting just to satisfy their needs. How about the girls cheat the guys? In my opinion I think most of the girls expert in cheating money. Maybe the scenario will be this way, for example the guy persuade the girl to take off the shirt the girl will request for take off one piece of clothes pay $XXX as a money transaction banking into her account. How can you imagine you just sex in front of the webcam doing alone? This is a serious issue thats often happened in our society for this recent years. Its is so disgusting but it is so hard to avoid or stop this unhealthy activities to happen continously.</description><link>http://legalissue-dmc.blogspot.com/2009/03/ethnical-issue-of-online-dating-is.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-6131944690713379569</guid><pubDate>Tue, 17 Mar 2009 02:51:00 +0000</pubDate><atom:updated>2009-03-19T15:27:34.537+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">criminal law</category><category domain="http://www.blogger.com/atom/ns#">Los Angeles</category><category domain="http://www.blogger.com/atom/ns#">profiteers</category><category domain="http://www.blogger.com/atom/ns#">punishment</category><title>Internet crimes in Los Angeles and punishments</title><description>&lt;p&gt;The term &quot;internet crime&quot; is a sort of catchall phrase that can represent so many crimes. In its most basic meaning, a Los Angeles internet crimes are any crime committed while using the Internet. Some of the most frequently seen internet crimes in Los Angeles include phishing, credit card fraud, illegal downloading, child pornography, illegal pornography, and illegal distribution of viruses or spam. Phishing, for those who may not know, is a type of fraud where an individual or group poses as an otherwise trustworthy entity such as a bank and asks for personal information such as bank account numbers, credit card numbers, social security information or account passwords.&lt;br /&gt;With such information, they can then access a person’s bank accounts or credit cards, or proceed to commit identity theft. Phishing scams are so common that I myself was approached twice in the last month with e-mails claiming to be from banks that Credit card fraud is nearly interchangeable with online auction fraud. In these cases, the victim tries to purchase something online with their credit or debit card that is never delivered to them. Bank and credit card account numbers are often the information that is being sought after.&lt;/p&gt;&lt;p&gt;Punishment for Internet crimes varies widely depending on the facts of each case. Depending on the scale of the damage done, imprisonment, large monetary fines &amp;amp; restitution, community service, probation or parole may be handed down by a judge as punishment. As in most cases, a first-time offender will likely be given a less severe punishment while the opposite is true for repeat offenders. One important note here is that if the defendant committed a sex crime while using the Internet that involved a minor, he or she may be subjected to greater charges with correspondingly greater punishments.&lt;/p&gt;Los Angeles criminal law blog&lt;br /&gt;&lt;a href=&quot;http://keglawyers.com/blog/?cat=18&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://keglawyers.com/blog/?cat=18&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The punishment of internet crimes in Los Angeles is really good and give alert to the people who wants to commit a crimes through internet. For my opinion, I wish the Malaysia could practise like what Los Angeles government do to protect the users of the internet. At the mean time, the users of the internet must also have self-knowledge to overcome and smart while online to avoid to fall into the trap of the profiteers and the bad people in the internet world.</description><link>http://legalissue-dmc.blogspot.com/2009/03/conclusion.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-1029331533882743302</guid><pubDate>Sun, 15 Mar 2009 08:05:00 +0000</pubDate><atom:updated>2009-03-20T04:12:46.161+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">friendster</category><category domain="http://www.blogger.com/atom/ns#">poll 8</category><category domain="http://www.blogger.com/atom/ns#">porn testimonial</category><category domain="http://www.blogger.com/atom/ns#">scandalous</category><title>Poll 8 Result</title><description>&lt;div align=&quot;left&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJa1G2stChOVEb5t_IvTShLYlSYYFKiUvVoPmuQVnTB23vU6h6esZQAxwK5awM6XaZ5G2L2CVX8XO1JqNhTabmiRMhd8Hor6e5RvgDI3JC7Tnvl5ECgLlsc8ylJAyhx8PxtBTQ0LfBiWZ0/s1600-h/Picture2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5313416966210987026&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 254px; TEXT-ALIGN: center&quot; alt=&quot;Poll 8 Result&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJa1G2stChOVEb5t_IvTShLYlSYYFKiUvVoPmuQVnTB23vU6h6esZQAxwK5awM6XaZ5G2L2CVX8XO1JqNhTabmiRMhd8Hor6e5RvgDI3JC7Tnvl5ECgLlsc8ylJAyhx8PxtBTQ0LfBiWZ0/s320/Picture2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; The title of Week 8 poll is &quot;Have you ever receive the porn testimonial in your Friendster?&quot;, the result of the poll shows that the majority respondent which is 4 respondents (80%) did received the porn testimonial and they just ignore it. Only 1 respondent (20%) had never noticed any porn testimony in the Friendster. Whereby none of the respondent (0%) accept the testimony.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;From the result we can know most of us are the victims always get this kind of testimony but is so hard to ignore it because the same thing will continous happened. Not sure what is the purpose they people send to us maybe it contain virus thats why people are afraid accept any kind of application or files. People are more security now thats is why whatever any strange information they will just ignore it. Some of the picture are so scandalous and you will get tired to delete as well because even after you will delete you will get the same thing very soon. Is there any solution to ignore this to happen? Is this one of the reason people change their mindset to use Facebook instead of Friendster?&lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/03/title-of-week-8-poll-is-have-you-ever.html</link><author>noreply@blogger.com (Yvonne Low)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJa1G2stChOVEb5t_IvTShLYlSYYFKiUvVoPmuQVnTB23vU6h6esZQAxwK5awM6XaZ5G2L2CVX8XO1JqNhTabmiRMhd8Hor6e5RvgDI3JC7Tnvl5ECgLlsc8ylJAyhx8PxtBTQ0LfBiWZ0/s72-c/Picture2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-2022542824892463404</guid><pubDate>Thu, 12 Mar 2009 07:46:00 +0000</pubDate><atom:updated>2009-03-20T01:18:04.821+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer crime</category><category domain="http://www.blogger.com/atom/ns#">intercept</category><category domain="http://www.blogger.com/atom/ns#">man in the middle attack</category><title>Man-In-The-Middle-Attack</title><description>The topic that Im going to discuss is Man in the middle attack. The man-in-the middle attack intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.&lt;br /&gt;&lt;br /&gt;In a simple explanation, man in the middle is one kind of the computer crime that duplicate the information that the user sent over. It&#39;s basically means the private and confidential info are passing around through the net. Let&#39;s have a simple example, Alice and Jason is using webcam through MSN, the attacker would intercept the video call and get to see what the user are seeing. It might be use for illegal purposes.&lt;br /&gt;&lt;br /&gt;So far me and the friends around me are never involved in this kind of computer crimes therefore I have no experience to share with you guys. Anyway, I knew some solution to avoid this man in the middle attack crimes. By using Encryption, which is you type the &quot;unknown words&quot; then your friend would read it through some softwares while the attackers can&#39;t get your information so that they couldn&#39;t attack your pc and your confidential information as well.&lt;br /&gt;&lt;br /&gt;Let&#39;s show you guy a picture to understand better.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5312213802087964818&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 222px; TEXT-ALIGN: center&quot; alt=&quot;man in the middle attack&quot; src=&quot;http://2.bp.blogspot.com/_g5HsCABehl8/SbjGTsRhYJI/AAAAAAAAAQo/Oy-LmG_a_68/s400/Main_the_middle.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;br /&gt;Hope it works and makes you understands more about Man in the middle attack computer crimes. =)&lt;br /&gt;&lt;br /&gt;Man-in-the-middle attack&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;&lt;a href=&quot;http://www.owasp.org/index.php/Man-in-the-middle_attack&quot;&gt;http://www.owasp.org/index.php/Man-in-the-middle_attack&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/03/man-in-middle-attack.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g5HsCABehl8/SbjGTsRhYJI/AAAAAAAAAQo/Oy-LmG_a_68/s72-c/Main_the_middle.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-7655612579742512029</guid><pubDate>Tue, 10 Mar 2009 17:01:00 +0000</pubDate><atom:updated>2009-03-12T14:31:49.807+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hyperlinked</category><category domain="http://www.blogger.com/atom/ns#">MSN Messenger</category><category domain="http://www.blogger.com/atom/ns#">Virus Attack</category><category domain="http://www.blogger.com/atom/ns#">Your Name</category><title>Irritated Hyperlinked in MSN Messenger</title><description>Has been so annoyed by the hyperlinked that sent by many friends in MSN Messenger for the past few months but recently this cases happened getting more serious. Last few days I just on my MSN chatroom suddenly many windows pop up, I thought was my friend nudge me so fast because I just online. But realized those are not message by friend but the hyperlinked which contain your email address and your name. Is a virus to attacked your MSN get lagging to run your program and keep sending the same message to all your friend who in your friend list. Actually those messaged we received, the sender are not sending in purpose but they are also one of the victims because the virus will auto spread. I was experienced once and it goes like this &quot;I find interested picture of Yvonnegirl063@hotmail.com click on http://party-Yvonnegirl063.com&quot; I was get shocked and curious what it is about then I go to click the hyperlinked after that my MSN get lagging and then keep sending the same content to my friends. Eventhough I try to logout from MSN and then login again but the incident was remaining to spread the virus to others users. I had no choice and uninstall MSN Messenger, after that I restore MSN Messenger again then everything was fine already.&lt;br /&gt;After this incident I will totally ignore all this kind of hyperlinked and will give advice to my friends do not click on the hyperlink.&lt;br /&gt;&lt;br /&gt;I was really piss off after the get those message from anyone. I just quite pity some of my friends get this virus. Hope they know the solution to solve this problem and I really hope MSN Authorizer should take action of this kind of behaviour that harm people&#39;s computer software or maybe some people just trying to do some hacking. I think most of the time people get this same experienced in MSN as well, If you have this experienced please share some here and give some opinion to let us prevent this.</description><link>http://legalissue-dmc.blogspot.com/2009/03/irritated-hyperlinked-in-msn-messenger.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-695584458918071227</guid><pubDate>Sun, 08 Mar 2009 13:46:00 +0000</pubDate><atom:updated>2009-03-12T15:45:41.056+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">junk mail</category><category domain="http://www.blogger.com/atom/ns#">mail system</category><category domain="http://www.blogger.com/atom/ns#">poll 7</category><category domain="http://www.blogger.com/atom/ns#">quasi-legal services</category><category domain="http://www.blogger.com/atom/ns#">spam mail</category><title>Poll 7 results</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SbPhfwlaBNI/AAAAAAAAAQY/UHai5p7Qj-4/s1600-h/Presentation11.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5310836321333937362&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; HEIGHT: 300px; TEXT-ALIGN: center&quot; alt=&quot;have you received spam or junk mail in your mailbox? (poll result)&quot; src=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SbPhfwlaBNI/AAAAAAAAAQY/UHai5p7Qj-4/s400/Presentation11.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;The week 7th poll topic is &quot;Have you noticed the spam mail or junk mail in your mailbox?&quot; the results of the respondents has shows that most of them have ever received the junk mail in their mailbox. There are 10 of the respondents which is 90% of the result they had received it and they ignored it. whereas others answer, &quot;No, didn&#39;t notice&quot; of the poll was 10% which is only one respondent select this answer.From the chart result is obviously most of our respondents are receiving the junk mails and they normally ignored to open it. This is not a good sign because the Spam systems which is sending those commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services is getting serious as spreading around the mail system. I advised the respondents be careful when selecting the email and if possible try to avoid to open up the junk mail and delete it. This is because some of the junk mails may be chargeable. I hope the mail system could stricten and filter the mails to ensure the peoples doesn&#39;t receive the unwanted mails.</description><link>http://legalissue-dmc.blogspot.com/2009/03/poll-7-results_08.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g5HsCABehl8/SbPhfwlaBNI/AAAAAAAAAQY/UHai5p7Qj-4/s72-c/Presentation11.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-7052607246149704265</guid><pubDate>Fri, 06 Mar 2009 03:44:00 +0000</pubDate><atom:updated>2009-03-08T23:19:33.458+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">chat box</category><category domain="http://www.blogger.com/atom/ns#">sensitive issue</category><category domain="http://www.blogger.com/atom/ns#">sexy pictures</category><category domain="http://www.blogger.com/atom/ns#">testimonial box</category><title>The Sensitive Issue</title><description>We all want to encourage out grandparents, adults, chilren and others a sensitive disposition to surf internet. However sometimes we do end up on a video sharing website like YouTube, where the comments appear that written by friends or stranger in extreme emotional pain or porn picture in Facebook or Friendster this are strictly not encourage to appear and cause the curiousity of people tend to have a view on it. This seems like not a big issue but its influence and affected the young generation about this sensitive issue.&lt;br /&gt;&lt;br /&gt;The online gaming chat box often happened this kind of incident where by some one you even never met before maybe is the enemy of your team then they will type all kind of emotional fault word to express their feeling. Sometimes is hard to ignore it though the administrator had control some of the fault word cannot be appear but they will have their way to type all kind of fault words. Sometimes are irritating and you are hardly to ignore it.&lt;br /&gt;&lt;br /&gt;I had experienced in my Friendster account at the testimonial box I met friends that I do not met before and paste hot and sexy picture there. Its is normal for all of us till we are just bored to bother it and just leave it there. Are you same as me so lazy to bother this kind of situation?</description><link>http://legalissue-dmc.blogspot.com/2009/03/sensitive-issue.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-7198619851736107202</guid><pubDate>Mon, 02 Mar 2009 16:39:00 +0000</pubDate><atom:updated>2009-03-08T23:24:53.654+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">China</category><category domain="http://www.blogger.com/atom/ns#">illegal drugs sales</category><category domain="http://www.blogger.com/atom/ns#">SFDA</category><title>China shuts down 23 websites for illegal drug sales</title><description>&lt;a href=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SawOMkKCrlI/AAAAAAAAAPY/A-vUaTckn6Y/s1600-h/illegal_drugs_cocaine.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5308633669789986386&quot; style=&quot;margin: 0px auto 10px; display: block; width: 350px; height: 231px; text-align: center;&quot; alt=&quot;illegal drug sales&quot; src=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SawOMkKCrlI/AAAAAAAAAPY/A-vUaTckn6Y/s400/illegal_drugs_cocaine.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;China&#39;s State Food and Drug Administration (SFDA) has listed on-line drug sales as a priority target this year and strengthening crackdowns on false advertising of drug products, according to the food and drug watchdog.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;The websites, most disguised under the names of certain hospitals or medical institutions, either sold counterfeit drugs or publicized illicit content. They included false, exaggerated or misleading information regarding cures to various ailments, the spokesman pointed out. &lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;I felt very surprised after read this news. The people is going too far as they are selling drugs online! It&#39;s a quite embarrassing news for China as the China people are misused and forgot the importance of internet and it&#39;s touch the most highest risk in China as the punishment is heavy of selling drugs!&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Luckily the government will take and tightens the law and actions to make sure their residents does not become the victims of those illegal websites.I hope the public to be alert and avoid falling victim to similar websites this is because the drugs is the harmful things for our body. So far has never heard about the Malaysia involved in this kind of illegal issue in internet thanks god and hope it won&#39;t spread in Malaysia or other countries as well!&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Be careful!!&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;China tightens scrutiny over illegal online drug sale&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;http://english.people.com.cn/90001/90782/90880/6390544.html&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://english.people.com.cn/90001/90782/90880/6390544.html&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/03/china-shuts-down-23-websites-for.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g5HsCABehl8/SawOMkKCrlI/AAAAAAAAAPY/A-vUaTckn6Y/s72-c/illegal_drugs_cocaine.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-8257351194756477192</guid><pubDate>Sat, 28 Feb 2009 18:11:00 +0000</pubDate><atom:updated>2009-03-08T23:23:50.082+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">loan shark</category><category domain="http://www.blogger.com/atom/ns#">online gambling</category><category domain="http://www.blogger.com/atom/ns#">poll 6</category><title>Poll 6th Result</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin1PH1fFOCbhmhNEb6GndqC-pU2dFQ9Zoapvjie3Kzo0tPq6P0JfqkaMq469x0xYqvBtaXnkOYqJdrFTv0k0HlDkGLL5IsnEQPRijzN8zQqpHaS1JPJ97dkzGe9wut5HDAbwIzHIPptrLB/s1600-h/poll+6+chart.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5307912636627757682&quot; style=&quot;margin: 0px auto 10px; display: block; width: 320px; height: 242px; text-align: center;&quot; alt=&quot;Poll 6 result&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin1PH1fFOCbhmhNEb6GndqC-pU2dFQ9Zoapvjie3Kzo0tPq6P0JfqkaMq469x0xYqvBtaXnkOYqJdrFTv0k0HlDkGLL5IsnEQPRijzN8zQqpHaS1JPJ97dkzGe9wut5HDAbwIzHIPptrLB/s320/poll+6+chart.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;The week 6th poll topic is &quot;Would you ever try Online Gambling?&quot; the results of the respondents has shows that there are not interested at all in online gambling. There are 7 of the respondents which is 100% of the result they are not interested at all. Where by others answer, &quot;Yes. I want to have a try how fun it is&quot;,&quot;Yes. Because I no need to go casino because I&#39;m still underage&quot;, &quot;Yes. Because my parent don&#39;t know&quot; all of the answer of the poll was 0% which is no any respondent select this answer.&lt;br /&gt;&lt;br /&gt;From the chart result is obviously most of our respondents are not interesting and addicted in online gambling. This is a good sign that people will not interesting on gambling because once people addicted in gambling then they will tend to keep gambling and gambling till lose all their money or even borrow money from &quot;loan shark&quot;. In Malaysia, not much people will try for online gambling because this are not encourage especially some are parental control and if people they are mature enough they will not want to get trouble. So, is good that the result show in positive way.</description><link>http://legalissue-dmc.blogspot.com/2009/03/poll-6th-result.html</link><author>noreply@blogger.com (Yvonne Low)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin1PH1fFOCbhmhNEb6GndqC-pU2dFQ9Zoapvjie3Kzo0tPq6P0JfqkaMq469x0xYqvBtaXnkOYqJdrFTv0k0HlDkGLL5IsnEQPRijzN8zQqpHaS1JPJ97dkzGe9wut5HDAbwIzHIPptrLB/s72-c/poll+6+chart.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-8682709736262742365</guid><pubDate>Sat, 28 Feb 2009 11:20:00 +0000</pubDate><atom:updated>2009-03-01T13:09:13.534+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">email</category><category domain="http://www.blogger.com/atom/ns#">fight SPAM</category><category domain="http://www.blogger.com/atom/ns#">IP</category><category domain="http://www.blogger.com/atom/ns#">junk mail</category><category domain="http://www.blogger.com/atom/ns#">SPAM</category><title>Spam Issue in internet</title><description>&lt;strong&gt;What is SPAM?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The term SPAM was first used in the early 1990s to describe e-mail messages, not related to the topic of discussion and postings that swamped newsgroups.&lt;br /&gt;Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.&lt;br /&gt;&lt;br /&gt;One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Top Ten Blog tips! ways to fight SPAM!&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5307809419082026770&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 162px; TEXT-ALIGN: center&quot; alt=&quot;Spam&quot; src=&quot;http://2.bp.blogspot.com/_g5HsCABehl8/Sakgi2_bTxI/AAAAAAAAAPQ/RJKZIbR1Afc/s320/ways-to-combat-spam.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;1. Use a contact form. Don’t make your email address public. Especially not as a clickable link. Here are some more reasons to avoid using clickable email address links.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;2. Use a different email for each site you sign up for. Then if one email account starts getting spammed, you only have to change it in one place. This is more to do with email spam than blog spam, though.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;3. Use a different email when posting comments. Who knows if the blog you’re commenting on will keep that email private? They might start sending you messages you didn’t ask for with no way to unsubscribe. Best to use a dedicated email address just for posting comments.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;4. Banning IP addresses. This is a bit extreme unless you notice some very clear patterns in the spam you receive. Also, be careful, as banning by IP can also block legitimate internet issue.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;5. Moderation. This means that every comment on your blog will be held until you approve it. The downside is that it requires a lot of manual effort, and may not be an option for blogs that get hundreds of comments every day. However, if you can add users to an “approved” list so you only have to approve their first comment, this seems like a very sensible solution to the spam problem. Well, unless your blog attracts lots of new users every day and many of them only write a small number of comments.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;6. Anti-spam plugins. WordPress users will probably know about Akismet, a plugin that analyses comments as they come in and attempts to flag the ones that look like spam. Generally, it works well, but no system is perfect.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;7. Word verification. Also know as a CAPTCHA, this uses an image of distorted letters and numbers and requires you to type the characters into a box. Get it wrong and you have to try again. I think these are quite effective so long as they are easy to read&lt;/p&gt;&lt;p&gt;8. Closing comments after a specified period of time. This method works on the assumption that a few months down the line, nobody will want to add anything new to your post. Spammers seem to enjoy targeting posts that have long since disappeared from the front page of a site, hoping that the site owner won’t notice the spam. &lt;/p&gt;&lt;p&gt;9. Requiring registration. This is likely to limit your comments drastically, and is still not a guaranteed way to stop spam. It’s a good method for blogging networks or sites that offer more than just a blog, but it’s a bit too draconian for most blogs.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;10. Turning off comments altogether. No comments, no spam, right?! OK, you might not get any comment spam this way, but don’t cut off your readers! This method is a bit extreme.&lt;/p&gt;&lt;p&gt;I have experienced as I opened up the mail box (hotmail) there are many junk mails and I didn&#39;t know about the sender as well. Actually all these is the SPAM email which is contains those commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. &lt;/p&gt;&lt;p&gt;Besides that, there are also many messages that contain the &quot;sex message&quot; they will asked you to click and enter the web site sometimes all these is chargable. So becafeful when clicking it and identify the sender is you know them only click &quot;show content&quot;.&lt;/p&gt;&lt;p&gt;What is Spam?&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://spam.abuse.net/overview/whatisspam.shtml&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://spam.abuse.net/overview/whatisspam.shtml&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;10ways to fight spam&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://www.toptenblogtips.com/10-ways-to-fight-spam/&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.toptenblogtips.com/10-ways-to-fight-spam/&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/spam-issue-in-internet.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_g5HsCABehl8/Sakgi2_bTxI/AAAAAAAAAPQ/RJKZIbR1Afc/s72-c/ways-to-combat-spam.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-6413124242275232078</guid><pubDate>Tue, 24 Feb 2009 05:18:00 +0000</pubDate><atom:updated>2009-03-08T23:26:23.796+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">anti-virus program</category><category domain="http://www.blogger.com/atom/ns#">online privacy issue</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><title>Online Privacy issue in internet</title><description>Privacy is an issue refers to all of us as a user who use the web. The growth of the Internet has created a number of privacy issues and cause many victims in troubles. But nowadays this issue are common and sometimes even the users they might not know their privacy information has been steal. However, privacy and online hacking are different. Hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. Whereby Internet privacy is an important ethical issue because most organizations engaging in e-commerce have not yet developed policies and codes of conduct to encourage responsible behavior.&lt;br /&gt;&lt;p&gt;To avoid this to happened, few types that you may need to do is do not easily get stranger to get close to your house unless you allow them to access to all the data on it. Which mean do not easily let unknown software such as virus which it the most common incident that happen in our daily lives. The best solution is install an anti-virus program to protect your privacy data. A good anti-virus program don&#39;t pose privacy threats, also checks for and removes trojans. Some trojans can open your computer up to remote control by anyone who has the right software. computer has detected &lt;strong&gt;trojan&lt;/strong&gt;, they can do anything they want with your machine. They can check your read any information or download it such as personal email, photos, banking and credit card information or account password, video, any kind of files and so on all kind of data. They might can delete it or run program. It can be controlled by them without knowing.&lt;/p&gt;&lt;p&gt;Fortunately, it&#39;s fairly easy to avoid becoming infected by a trojan.&lt;br /&gt;-Don&#39;t ever run attachments from anyone but trusted sources.&lt;br /&gt;-Download software only from reputable sites.&lt;br /&gt;-Run a virus checker on every new program you install, no matter where it came from.&lt;br /&gt;-Regularly update your anti-virus software, and check your system for infection frequently.&lt;br /&gt;Just those few steps will drastically reduce the potential for serious invasion of your privacy&lt;/p&gt;&lt;p&gt;On the other hand, another common incident is email virus stalker. It happened while attachments, opened email themselves to everyone in your address book. Some of these have been set up to send private info, like passwords and account information, to their programmers.&lt;/p&gt;&lt;p&gt;These are usually infected MS Office file such as Word docs, Excel spreadsheets, or other MS Office documents, Acess, PowerPoint without taking proper security steps. Macro-viruses can infect any of these document types.It&#39;s also a good idea to just delete file of the types listed above that you weren&#39;t expecting. These viruses would only come from people you actually know and sometimes even the sender they do not know they was a victims as well detected by the &quot;other Users&quot;.Again, run a virus scanner at all times. And avoid using Microsoft email programs where you can. They have some serious security problems in the default configurations.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;Internet ScamBusters™, Audri and Jim LanfordCopyright © ,&lt;br /&gt;&lt;a href=&quot;http://www.scambusters.org/Scambusters41.html&quot;&gt;http://www.scambusters.org/Scambusters41.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;E-center for business ethics&lt;br /&gt;&lt;a href=&quot;http://www.e-businessethics.com/internet.htm&quot;&gt;http://www.e-businessethics.com/internet.htm&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.scambusters.org/Scambusters41.html&quot;&gt;&lt;/a&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/online-privacy-issue-in-internet.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-8199183102255696071</guid><pubDate>Sun, 22 Feb 2009 11:22:00 +0000</pubDate><atom:updated>2009-02-26T17:35:07.520+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">pirated software</category><category domain="http://www.blogger.com/atom/ns#">poll 5</category><title>Analysis of poll 5 question</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://1.bp.blogspot.com/_g5HsCABehl8/SaE7Dg4XgvI/AAAAAAAAAPA/rvTxFs-KKks/s1600-h/Picture3.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5305586767571157746&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: pointer; HEIGHT: 267px; TEXT-ALIGN: center&quot; alt=&quot;Poll 5 results&quot; src=&quot;http://1.bp.blogspot.com/_g5HsCABehl8/SaE7Dg4XgvI/AAAAAAAAAPA/rvTxFs-KKks/s400/Picture3.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;The week 5th chart shows whether respondents have ever but the pirated software like Adobe Photoshop. There are 6 respondents (85%) have buy pirated software before and only 1 respondent (15%) never buy pirated software and they don&#39;t touch illegal issue. This is a bad sign that nowadays more people buy pirated software.&lt;br /&gt;&lt;br /&gt;People tends to buy pirated software is because the pricing of the pirated software is much more different with the original software. they do not care about the legal law that would violate the copyright of the original software. they also don&#39;t know the consequences of using the pirated software they are many consequences as I mentioned in the previous article as well.&lt;br /&gt;&lt;br /&gt;However, I think the original software copyrighter should lower down the pricing like many below RM100, then the people would consider to buy original instead of pirated software. buying original software is much safer and it&#39;s guaranteed the safeness of our pc, laptop, and all the documents.</description><link>http://legalissue-dmc.blogspot.com/2009/02/analysis-of-poll-5-question.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_g5HsCABehl8/SaE7Dg4XgvI/AAAAAAAAAPA/rvTxFs-KKks/s72-c/Picture3.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-3575829516245755201</guid><pubDate>Fri, 20 Feb 2009 10:35:00 +0000</pubDate><atom:updated>2009-03-08T23:28:10.763+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">casino</category><category domain="http://www.blogger.com/atom/ns#">convenient</category><category domain="http://www.blogger.com/atom/ns#">legal online gambling website</category><category domain="http://www.blogger.com/atom/ns#">online gambling</category><title>Is Online Gambling Legal?</title><description>Some states have specific laws against online gambling of any kind. In addition, owning an online gaming operation without proper licensing would be illegal, and no states are currently granting online gaming licenses. Various forms of online gambling are legal and regulated in many countries. However, Malaysia has recently taken its action against Internet gambling activities.&lt;br /&gt;&lt;p&gt;There are some website are legal gambling and some are illegal gambling. Just beware some are illegal not proven license. Some people choose to online gambling because online gambling website is very secure so that you no need worry about your information will be publish. Besides that why people choose to online gambling because is convenient and the gambler no need to dress nice and most important they no need to carry lots of cash. Just by credit card they are able to participate.&lt;/p&gt;&lt;br /&gt;&lt;p&gt;On the other hand, Some people think that gambling is the easiest way out of being in the slums. However, the odds of losing in gambling are much higher than that of winning. The online gambling is control by the owner. For example, they are many people buying casino NO.3 then the computer will not spin to this NO. This is all control by them that&#39;s why the changes of losing is higher than winning.&lt;/p&gt;&lt;p&gt;Some people under age want to have a try or do not want to let parents and family know they gambling so they decide sign up for online gambling these are the important issue that public concern about especially those illegal set up trap for the newbies who do not know much about online gambling. And this is why to set up a legal online gambling website is not easy and many laws to be prove and access.&lt;/p&gt;If the bill becomes law, it would essentially hit Internet gambling by choking off the money supply -- making it illegal to write a check or use a credit card or any other form of payment in gambling online. Provisions in the bill would have bank regulators use their enforcement powers to go after the banks to stop payments from going to the cyber casinos.So, getting back to our fearless sports talker, is online gambling legal this bowl season? Can&#39;t say for sure, but it may never again be so easy.&lt;br /&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt;References:&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;The surf&#39;s up&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.the-surfs-up.com/news/gamblingonlinenews.html&quot;&gt;http://www.the-surfs-up.com/news/gamblingonlinenews.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;WORLDLawDirect.com, Inc.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.worldlawdirect.com/article/1559/Is_online_gambling_legal.html&quot;&gt;http://www.worldlawdirect.com/article/1559/Is_online_gambling_legal.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;WORLDLawDirect.com, Inc.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.worldlawdirect.com/forum/law-wiki/5953-online-gambling.html&quot;&gt;http://www.worldlawdirect.com/forum/law-wiki/5953-online-gambling.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Online Gambling blogspot.:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://on9gambling.blogspot.com/search?updated-max=2009-02-05T23%3A11%3A00%2B08%3A00&amp;amp;max-results=7&quot;&gt;http://on9gambling.blogspot.com/search?updated-max=2009-02-05T23%3A11%3A00%2B08%3A00&amp;amp;max-results=7&lt;/a&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/is-online-gamling-legal.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-4276213746299723057</guid><pubDate>Tue, 17 Feb 2009 22:40:00 +0000</pubDate><atom:updated>2009-02-19T17:58:17.030+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">censorship</category><category domain="http://www.blogger.com/atom/ns#">illegal website</category><category domain="http://www.blogger.com/atom/ns#">imagination</category><category domain="http://www.blogger.com/atom/ns#">naked</category><category domain="http://www.blogger.com/atom/ns#">scandal</category><title>illegal website that I visited</title><description>I had visited a website recently. It&#39;s from &quot;gutt.......blogspot.com&quot;. Why is that so special that I need to mention it and write in my blog? Actually it&#39;s a blog that provide all the celebrities, models, politician,students, scandal, and even more about all those naked picture and personal videos as well!&lt;br /&gt;The content including the latest Zhang Ziyi, Edison Chen scandal, Top model, Britney Spears and I saw the famous Malaysia Majalah 3 host&#39;s personal naked picture too! When I click on it, all the picture appears without censored. Moreover, all the photos categories in &quot;model&quot;, &quot;celebrities&quot;, &quot;Malaysia&quot;, &quot;Indonesian&quot;, &quot;students&quot; and hundred over of categorization.&lt;br /&gt;&lt;br /&gt;I&#39;m wondering why the web service, the blogspot.com does allow all these content of blog exist for so long in the internet because you can find the older scandal from there and all these without any censorship?? Definitely all of these content, picture does really violate the people&#39;s privacy and had totally break the legal issue in internet!&lt;br /&gt;&lt;br /&gt;I can&#39;t believe if one day the popular of this blog being increase and the innocent children, or the people who are unmatured and underage visit it, the consequences will goes worst than what we having right now in the society.&lt;br /&gt;&lt;br /&gt;The blog does give the surfer the space of imagination, if all of these is being imitates by the under age students?&lt;br /&gt;&lt;br /&gt;Is it because nobody report it or the web service owner doesn&#39;t want to care about it?&lt;br /&gt;They need to take action!!!!</description><link>http://legalissue-dmc.blogspot.com/2009/02/illegal-website-that-i-visited.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-7939244761630944606</guid><pubDate>Sun, 15 Feb 2009 05:10:00 +0000</pubDate><atom:updated>2009-02-26T17:36:27.695+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">experienced</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">realize</category><category domain="http://www.blogger.com/atom/ns#">week 4th poll</category><title>Week 4th Poll Question Analysis</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLs5l-9SE9C8wKzAywBeXRVtkMzaygCUk9dOf0NSY30-8SMhF1JNHUouY-k_9DA6hgRbnm1WmD0cBw7aN34uY6cCcxwb-R6IeGuuGS7YVsTulAi5X630Veb-V5MEOZseg_ehp93ynGvgX/s1600-h/chart+2.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5302945474542305202&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 218px; TEXT-ALIGN: center&quot; alt=&quot;Poll 4 results&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLs5l-9SE9C8wKzAywBeXRVtkMzaygCUk9dOf0NSY30-8SMhF1JNHUouY-k_9DA6hgRbnm1WmD0cBw7aN34uY6cCcxwb-R6IeGuuGS7YVsTulAi5X630Veb-V5MEOZseg_ehp93ynGvgX/s320/chart+2.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;The week 4th chart shows on the top that whether respondents have ever experienced computer hack by hacker. There are 3 respondents (20%) have experienced hack by hacker and 12 respondents (80%) never experienced hacking by hacker. However this is a good sign to find out most of the respondents did not get hacked.&lt;br /&gt;&lt;br /&gt;But sometimes while people get hacked they still do not know their computer has been hacked until when they facing touble in computer only they realize their computer got hacked. Most of the time people will not know they has been hacked because the invent of hacker are very intelligent they are not easy to let you find them once they have an intention of stealing information. This are consider the moral values that they not consider people&#39;s right and protect own privary. So eventhough you think you have not be hacked do not be too excited who knows some hacker are stealing your information without you realize take note in this situation.&lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/week-4th-chart-shows-on-top-that.html</link><author>noreply@blogger.com (Yvonne Low)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPLs5l-9SE9C8wKzAywBeXRVtkMzaygCUk9dOf0NSY30-8SMhF1JNHUouY-k_9DA6hgRbnm1WmD0cBw7aN34uY6cCcxwb-R6IeGuuGS7YVsTulAi5X630Veb-V5MEOZseg_ehp93ynGvgX/s72-c/chart+2.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-6652013070443838333</guid><pubDate>Thu, 12 Feb 2009 08:14:00 +0000</pubDate><atom:updated>2009-02-19T17:56:24.076+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer failures</category><category domain="http://www.blogger.com/atom/ns#">pirated software</category><category domain="http://www.blogger.com/atom/ns#">risk</category><category domain="http://www.blogger.com/atom/ns#">spyware</category><category domain="http://www.blogger.com/atom/ns#">viruses</category><title>Pirated software?</title><description>Today let&#39;s talk about the pirated software. Nowadays, pirated software selling around the public area. The public area is like shopping mall, computer shop, or even night market (normally known as &quot;pasar malam&quot;). Finding a pirated software is very easy to get already and the pricing compared with the original is much more different!&lt;br /&gt;&lt;br /&gt;From the research, the top pirated software on the Internet includes anti-virus programs followed by AutoCAD and Adobe Photoshop.&lt;br /&gt;&lt;br /&gt;Most Pirated Software Programs on the Internet&lt;br /&gt;&lt;a href=&quot;http://www.labnol.org/internet/favorites/most-pirated-software-programs-on-the-internet/2373/&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.labnol.org/internet/favorites/most-pirated-software-programs-on-the-internet/2373/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Why are the public likes to buy pirated software instead of using the original? The reason is very common as the pirated software is cheaper! For example like buying a Microsoft Office 2007 software cost us around RM100-RM200, but for the pirated software, it maybe only cost us RM10 only. And then, the people will definitely buy the pirated software? Why spend about 10TIMES of budget to get the SAME software? this is what people think, and it set in my mind previously.&lt;br /&gt;&lt;br /&gt;The risk of using pirated software for your pc are includes the possibility of someone hacking into your computer and stealing valuable information, unfortunately, without you even knowing it. This is because pirated software don&#39;t have complete file components of genuine copies, and often contain viruses, malicious bugs and spyware. Hence, installing pirated software leaves your computer unstable and defenceless against intruders.&lt;br /&gt;&lt;br /&gt;The risk of using pirated Windows &amp;amp; Office&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/malaysia/genuine/vog/&quot;&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;http://www.microsoft.com/malaysia/genuine/vog/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Pirated software may contain viruses, spyware, computer failures. While virus and spyware is attack your pc and documents, it can cost us even thousands of riggit or more! Moreover, losing the money and documents is a troublesome matter to solve.&lt;br /&gt;&lt;br /&gt;So people, don&#39;t take the risk! It cost you thousands!</description><link>http://legalissue-dmc.blogspot.com/2009/02/pirated-software.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-4064635710288077795</guid><pubDate>Thu, 12 Feb 2009 05:59:00 +0000</pubDate><atom:updated>2009-02-19T17:55:31.923+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">domain name</category><category domain="http://www.blogger.com/atom/ns#">recognizable names</category><title>Things that you may Concern before Creating Domain Name</title><description>Domain name is a recognizable names for most of the internet address. globally or locally in an intranet, in effect changing the IP address. This translation from domain names to IP addresses is accomplished with the global facilities of Domain Name System (DNS)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Domain names have a first and second level. In the blogspot.com domain name, the &quot;.com&quot; portion is considered the first or top level domain name, and &quot;blogspot&quot; is considered a second level domain name. There are many common at 2nd level domain (profit based business ogranisation) such as .com (which is the most popular), .biz, .cc, .co. There are also non-profit based business organisation such as .org, .tv, .edu, .gov and etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The selection and protection of a domain name may be the most important detail in the creation of a web site. Domain names function as the address for a web site, and disputes over domain names have become more common and more heated as the popularity of the Internet grows.&lt;br /&gt;&lt;br /&gt;To check whether your domain name not be taken you can go &lt;a href=&quot;http://rs.internic.net/cgi-bin/whois&quot;&gt;WhoIs search&lt;/a&gt; to find out. In addition, it may be wise to perform a &lt;a href=&quot;http://www.bitlaw.com/trademark/search.html&quot;&gt;trademark search&lt;/a&gt; to verify that the chosen domain name is not infringing on another party&#39;s trademark.&lt;br /&gt;&lt;br /&gt;To create a domain name are requires to registrer through online register such as &lt;a href=&quot;http://readyspace.com.sg/&quot;&gt;http://readyspace.com.sg/&lt;/a&gt;. There are some of the rules and regulation youe need to be concern. If you discover that someone else has already taken their corporate name or trademark as a domain name. In most cases, there is little that can be done because the other party has equal right to use that name. However, it is possible to contest a registered domain name based upon superior rights to that name. Such a contest can be made through the courts or through InterNIC&#39;s domain name dispute policy. On the other hand, If you afraid losing your domain name and you want to protect you can obtain a trademark registration on your domain name.&lt;br /&gt;If you want to register a domain name this are the information you need to concern before creating a domain name.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;References:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.bitlaw.com/internet/webpage.html#linking&quot;&gt;http://www.bitlaw.com/internet/webpage.html#linking&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;a href=&quot;http://www.moniker.com/news/legal-issues.jsp&quot;&gt;http://www.moniker.com/news/legal-issues.jsp&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Domain_name&quot;&gt;http://en.wikipedia.org/wiki/Domain_name&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://www.biz-ready.com/legalissue_reg.htm&quot;&gt;http://www.biz-ready.com/legalissue_reg.htm&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/things-that-you-may-concern-before.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-3688939270384172562</guid><pubDate>Sat, 07 Feb 2009 14:00:00 +0000</pubDate><atom:updated>2009-02-26T17:37:05.685+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Online purchase</category><category domain="http://www.blogger.com/atom/ns#">poll 3</category><category domain="http://www.blogger.com/atom/ns#">translation to Japanese</category><title>Analysis of Poll 3</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpA1ju6AWCCHl0Gtu52inlB8c8QfD08ZiHZBROe9IcgKLmwlsC0L2wre8KeyPqRnL5LiVeZ1BBUlPDbCFm8OE_XaOI-1ArBrylMFc5xFvIcqkoYtxzICozmO2PDtr5FCr9TtFzFwMWf_gb/s1600-h/chart.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5300457363842060946&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; HEIGHT: 214px; TEXT-ALIGN: center&quot; alt=&quot;Poll 3 results&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpA1ju6AWCCHl0Gtu52inlB8c8QfD08ZiHZBROe9IcgKLmwlsC0L2wre8KeyPqRnL5LiVeZ1BBUlPDbCFm8OE_XaOI-1ArBrylMFc5xFvIcqkoYtxzICozmO2PDtr5FCr9TtFzFwMWf_gb/s320/chart.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisjqbQhUdsNdX0MIoIKaL7ZTaE1Q4Y53JtbUWwNaoodWylYMf_e2kT-bbIzZA7F_jJt7cnWfAvmKBHSvlF7J7useOQ4eM5XU9zZueLYFgLhtTvQAYJN6PmIWmQCQzg5jum9R9V07P_dqEe/s1600-h/chart.png&quot;&gt;&lt;/a&gt;This is the chart which showing the results of the poll question of the 2nd week. 55 percents (5 respondents) out of 100 percents of the respondents thinks that online purchase groceries can be trust yet they do not purchase any groceries from internet. 22 percents (2 respondents) of the respondent they do not rely on online purchase whereby 44 percent ( 4 respondents) of respondent thinks that online purchasing can be trust and they will buy it often.&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;Through this voting we can know that part of us do not rely on online purchasing especially for the habits of Malaysian because most of the Malaysian they need to touch and test the quality of product only make decision to buy. Therefore is hard for them to rely on online purchasing without see and experience the quality and buy it for warranty so for safety purpose they not rely on online purchasing although it might be cheaper yet still they want to sense the touch of quality before purchase. Beside that, there are some of the cases whereby online cheating such as online grocery hacked by Hackers who trying to steal the information or passwords of customers.The confidence of online purchasing in Malaysia still need to be improve and put more effort to build the confidence of consumers purchase online groceries. &lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt;&lt;/div&gt;&lt;div&gt; &lt;/div&gt;&lt;div&gt;But there are also part of the people do rely on online purchase because nowadays online grocery are more convenient to get instead of windows shopping at the shopping mall. Online grocery also can check through internet online of the information before purchase for example lets say if you want to buy a gadget just online seach the application and then do comparison of the model and mean while you just give some information then pay through credit card so they will provide courier service send to your house. Therefore for in this new modern era people are prefer on online grocery especially in the modern country such as Japan, United States, United Kingdom, Hong Kong and so on.&lt;br /&gt;&lt;br /&gt;Translation to Japanese as below:&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&lt;br /&gt;これは、第2週の世論調査の質問の結果を示すグラフです。 55 ％の回答者のうち100 ％ （ 5人）は、オンラインで購入する食料品はまだありませんが、インターネットからの食料品を購入しないことが信頼できると考えている。回答者の22 ％がオンライン購入では44 ％ （ 4人に依存していない回答者（ 2人） ）は、オンラインでの購入を信頼することができますには、しばしばそれを買うだろうと考えている。&lt;br /&gt;この投票を通じ、オンライン購入のマレーシアの習慣に依存しない、特に私たちの知っていることが、マレーシアはその部分に触れることだけを購入する決断をする製品の品質検査を行う必要が多いため。オンラインでの購入を参照してくださいに頼ることなくして、品質保証のために彼らの経験とは、オンライン購入の安いかもしれないが、それでもまだ購入前に品質のタッチ感を頼る安全目的のためにそれを買うため難しい。その傍ら、いくつかの例がありますでは、オンライン食料品店のハッカーたちはまださを向上させ、信頼を醸成する努力が必要な情報やマレーシアでのオンライン購買顧客。そのハッキングしようとして信頼のパスワードを盗むなどのオンライン不正行為消費者のオンライン食料品を購入してください。したがって、現代の時代の人々のための新しいオンライン食料品店の上の近代的な国を中心に日本、米国など、この方は、イギリス、香港などなど。 &lt;blockquote&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/this-is-chart-which-showing-results-of.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpA1ju6AWCCHl0Gtu52inlB8c8QfD08ZiHZBROe9IcgKLmwlsC0L2wre8KeyPqRnL5LiVeZ1BBUlPDbCFm8OE_XaOI-1ArBrylMFc5xFvIcqkoYtxzICozmO2PDtr5FCr9TtFzFwMWf_gb/s72-c/chart.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-680197123013580374</guid><pubDate>Thu, 05 Feb 2009 08:53:00 +0000</pubDate><atom:updated>2009-02-19T17:53:33.122+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">expressive works</category><category domain="http://www.blogger.com/atom/ns#">podcasters</category><category domain="http://www.blogger.com/atom/ns#">podcasting</category><title>What is Podcasting???</title><description>Nowadays many people had created podcast as in distribute a form of broadcasting upload the audi or video content to your web server over the internet for playback on a mobile device or a personal computer.&lt;br /&gt;&lt;br /&gt;Podcasts applies to creative and expressive works, which are most of the things that are included in a podcast. Such as performances, scripts, interviews, musical works and sound recordings. Ofcourse right and permissions are necessary to protect the materials. The main legal issues that you might able to face that are unique to podcasters are related to copyright, publicity rights and trademark issues. Besides that, publicity rights are relevant because in many instances, a podcaster will conduct audio or video interviews, entertainments and all sorts of spoken or visual content podcaster may need to get permission from the individuals if they are using others voice or images for commercial purposes. For example the podcaster interview someone and got their song album to promote their podcast or commercial use they are requires consent from the individual appearing in the voice over. For those who interested create video podcast this are some of the issue that you must concern before publish if not you might get into troubles. Everything preferable to get permission especially some materials which are not belongs to you then you might need consent from the individual for safety purpose.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;PDF File reference:&lt;br /&gt;&lt;a href=&quot;http://mirrors.creativecommons.org/Podcasting_Legal_Guide.pdf&quot;&gt;http://mirrors.creativecommons.org/Podcasting_Legal_Guide.pdf&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;When you make a podcast, you potentially invoke several of copyright&#39;s exclusive rights, such as:&lt;br /&gt;-Copying the work to include it into a podcast;&lt;br /&gt;-Adapting or changing the work to include it into the podcast;&lt;br /&gt;-Making a work available as part of a podcast for transmission to members of the public;&lt;br /&gt;-Authorizing members of the public to make a copy of the podcast and use it according to the terms you apply to the podcast.&lt;br /&gt;&lt;p&gt;&lt;br /&gt;Reference:&lt;br /&gt;&lt;a href=&quot;http://wiki.creativecommons.org/Podcasting_Legal_Guide#Legal_Issues_In_Creating_Your_Own_Podcast&quot;&gt;http://wiki.creativecommons.org/Podcasting_Legal_Guide#Legal_Issues_In_Creating_Your_Own_Podcast&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;This is one of the example of podcast in mov.file&lt;/p&gt;&lt;p&gt;&lt;br /&gt; &lt;/p&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/httpmirrors.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-2188495894125967064</guid><pubDate>Tue, 03 Feb 2009 03:24:00 +0000</pubDate><atom:updated>2009-02-19T17:51:57.667+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer hacking</category><category domain="http://www.blogger.com/atom/ns#">cracker</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">infringement</category><category domain="http://www.blogger.com/atom/ns#">modifying</category><title>Computer Hacking</title><description>Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word &quot;hack&quot; has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.&lt;br /&gt;Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computer work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.&lt;br /&gt;&lt;br /&gt;What is computer hacking?&lt;br /&gt;URL: &lt;span style=&quot;font-size:85%;&quot;&gt;http://www.wisegeek.com/what-is-computer-hacking.htm&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking,and a prestige that accompanies being part of a relatively &quot;elite&quot; group of individuals who possess technological savvy and are willing to take the risks required to become a true &quot;hacker&quot;.&lt;br /&gt;&lt;br /&gt;Computer hacking written by David M Stone, University Laboratory High School&lt;br /&gt;URL: &lt;span style=&quot;font-size:85%;&quot;&gt;http://www.ed.uiuc.edu/wp/crime/hacking.htm&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The hacker is a slang term for a computer enthusiast, example, a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject. After reading these articles, hacking can be use to 2 ways, the best way is you can defend from the hacker to protect the resources, for example, a company hire a hacker to prevent the hacking cases happen. The bad way that is intrusion of personal/organization privacy, in other words, unauthorized access to the security of the computer or network, it&#39;s a crime cases and against the cyber law which protect the internet activities.&lt;br /&gt;The hacker not really have the professional skills, while the cracker have the professional skills with special training. Everybody can be a hacker if they have a little intelligent.&lt;br /&gt;&lt;br /&gt;The purpose of being a hacker, there are 2reasons that I found and analyzed are:&lt;br /&gt;-Maybe they just want to challenge themselves whether they can do it or not.&lt;br /&gt;-Secondly it become an attack, with purposely, without authorization of the owner, they hacking to steal things/information.&lt;br /&gt;&lt;br /&gt;As a conclusion, Human always like to challenge themselves and tend to use it on the wrong way as human is greedy and like to destroy the environment. Being a hacker must have moral, they should practise to contribute to the society, instead of bringing harm to the people and organization. This is because it could let them go to jail because this is a serious case as they access without permission.</description><link>http://legalissue-dmc.blogspot.com/2009/02/computer-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-1881854837079100852</guid><pubDate>Mon, 02 Feb 2009 13:16:00 +0000</pubDate><atom:updated>2009-02-26T17:37:45.517+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">poll 2</category><category domain="http://www.blogger.com/atom/ns#">sharing</category><category domain="http://www.blogger.com/atom/ns#">watermark</category><title>Analysis of the poll 2 results</title><description>&lt;div align=&quot;left&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYu9X4lRZLbt2eLWs1cjZFq-cYiF-plPHZB9b9KeVJMYAJZzIm6TPOiFhZYALt9n5bt6vIBwojAkr2Bj_hCbT4SJei_dKaEGnYUr9JAOKTB385BABDEKmjEGTvS1M60SNGF5H0ArFiaP21/s1600-h/Chart+2.png&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5298188653695902658&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 190px; TEXT-ALIGN: center&quot; alt=&quot;Poll 2 Result&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYu9X4lRZLbt2eLWs1cjZFq-cYiF-plPHZB9b9KeVJMYAJZzIm6TPOiFhZYALt9n5bt6vIBwojAkr2Bj_hCbT4SJei_dKaEGnYUr9JAOKTB385BABDEKmjEGTvS1M60SNGF5H0ArFiaP21/s320/Chart+2.png&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;This is the chart which showing the results of the poll question of the 2nd week. 50 percents (3 respondents) out of 100 percents of the respondents thinks that no point of doing insert watermark in their pictures. 33 percents (2 respondents) of the respondent are lazy to insert watermark in their pictures whereby 17 percents ( 1 respondent) of respondent will insert watermark in their pictures.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt; &lt;/div&gt;&lt;div align=&quot;left&quot;&gt;Through the chart and the votes of respondent we clearly understand different people and in different situation poeple will insert watermark some people use for business purpose and some just posted somewhere in facebook, blog or friendster just a sharing with friends. They just want to quickly upload pictures is fine for them because no point of others to steal their picture because insert watermark perhaps have to do some work on it and this cause people lazy to doing extra work . In this case, most probably those are the pictures with group of friends where more related to lifestyle pictures. But there are some situation watermark are requires due to afraid of stealing ideas and copyright issue such as a flower business need to protect their product while posting picture in internet they can insert the watermark to prevent others stealing of ideas or copy. Therefore to insert of watermark in the pictures is depends on the posting purpose of the users. To insert watermark indeed have to do some work on it and this cause people lazy to doing extra work &lt;/div&gt;</description><link>http://legalissue-dmc.blogspot.com/2009/02/analysis-of-poll-2-results.html</link><author>noreply@blogger.com (Yvonne Low)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYu9X4lRZLbt2eLWs1cjZFq-cYiF-plPHZB9b9KeVJMYAJZzIm6TPOiFhZYALt9n5bt6vIBwojAkr2Bj_hCbT4SJei_dKaEGnYUr9JAOKTB385BABDEKmjEGTvS1M60SNGF5H0ArFiaP21/s72-c/Chart+2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-3490724413919848745</guid><pubDate>Thu, 29 Jan 2009 20:33:00 +0000</pubDate><atom:updated>2009-02-19T17:49:25.618+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber law</category><category domain="http://www.blogger.com/atom/ns#">law enforcement</category><category domain="http://www.blogger.com/atom/ns#">prevent crimes</category><category domain="http://www.blogger.com/atom/ns#">unlawful activities</category><title>let&#39;s talk Cyber Law</title><description>The world of information technology is growing tremendously. More and more  computer users surf the cyberspace everyday. Advancement in communication  technology enables the usage of Internet in various aspects of our daily live.  Cyberspace is a space without boundary, law enforcement and virtual. Computers are  used as a medium to surf this space with Internet technology. Various activities  ranging from business, education, government ruling and others uses Internet. The  wide usage of Internet imposes a new problem, computer crime.  The law enforcement for computer crimes is categorized as &lt;span style=&quot;font-weight: bold;&quot;&gt;Cyber Law&lt;/span&gt;.&lt;br /&gt;This is a  very specific law to prevent unlawful activities involving the usage of computers.  Cyber Law should be amended frequently along with the growth of Internet  technology. This law has to be comprehensive. The definition used has to be precise  to avoid any confusion. The definition analysis on computer crime act has to be  conducted regularly. This is to ensure latest definition in the world of information  technology is updated on a timely manner. Computer crimes can be prevented using  prevention steps. These steps will help to curb these crimes.&lt;br /&gt;&lt;em&gt;&lt;br /&gt;&lt;span style=&quot;font-size:85%;&quot;&gt;A study on the computer crime Act.&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-size:85%;&quot;&gt; Masters thesis, Universiti Utara Malaysia.&lt;br /&gt;URL:http://eprints.uum.edu.my/1308/&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The above article is briefly explain what is Cyber Law. As it stated, It prevent the computer crimes by enforcing the law. Moreover, I found out that the world has one called the cyber law enforcement organization. the officer are specialize to do investigation of cybercrime, and training to be assist to the cyber crime victims online. Just like they are handling child pornography.&lt;br /&gt;&lt;br /&gt;I think the cyber law is good enough to handle those unwanted crime cases or anything that would affect the children because we all know the children are easy to be influenced and tend to learn and imitate everything when they see a picture, sound, or video as well. However, I think it&#39;s not stricten enough because nowadays there are still many crime cases happen around through internet. For example, people who like to online dating, they are easily to let the cheater to spot them because they believe them although has not meet before. Therefore, I do really hope the cyber law can be stricten to protect the surfer, so that in the future we can just do useful thing in the net instead of bring harm to our life.</description><link>http://legalissue-dmc.blogspot.com/2009/01/lets-talk-cyber-law.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-4326298872743608389</guid><pubDate>Wed, 28 Jan 2009 15:24:00 +0000</pubDate><atom:updated>2009-02-19T17:47:59.981+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">buy</category><category domain="http://www.blogger.com/atom/ns#">online business</category><category domain="http://www.blogger.com/atom/ns#">selling shirt in internet</category><title>Some issues may concern to build an Online Business in Blog</title><description>Nowadays many people are keep creating blog to build an online business selling groceries such as fashion is one of the most popular. By creating a blog to sell stuff is the cheapest way and begin without cost because we no need to pay rental no need to pay telephone bills, eletric bills water bills, staff salary and so on. Everyone intend to begin this business but some of the issue they might be concern while build up their network.&lt;br /&gt;This is myself experience whereby me myself also bought some shirts through friends blog. I wanted to create a blog account and build up my network to function this as for my part time carrier manage to manage my business. Somehow I asked some professionals to give some opinion about creating a blog to sell shirts they thought me about what to be concern. Is not simply to create a blog then you can selling any stuff in internet. If I am going to selling the shirt with brand image we could not just post up online we could not just buy a MNG shirt from MNG shop then sell it in your blog. You may have to get permission of copyright to publish your selling stuff. Even if you are selling a shirt with Mickey Mouse logo Mickey Mouse company have a right to sue you related into copyright issue. The safetest way is create your own product such as handmade or creating own designed shirt which is totally original created by you. Therefore do not neglect some important issue when you start an online business blogging.&lt;br /&gt;&lt;br /&gt;This is one of the example for reference bout how people build up online business by blogging. My friend had created this blog selling shirt in internet:&lt;br /&gt;URL: http://myclosetgiggles.blogspot.com/</description><link>http://legalissue-dmc.blogspot.com/2009/01/nowadays-many-people-are-keep-creating.html</link><author>noreply@blogger.com (Yvonne Low)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5799558270937279474.post-4246855410973592256</guid><pubDate>Sun, 25 Jan 2009 07:08:00 +0000</pubDate><atom:updated>2009-02-26T17:38:30.985+08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">government</category><category domain="http://www.blogger.com/atom/ns#">original work</category><category domain="http://www.blogger.com/atom/ns#">poll 1</category><category domain="http://www.blogger.com/atom/ns#">violating</category><title>Analysis of the poll 1 results.</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SXwUSBwQ9CI/AAAAAAAAANk/H_rsJDAPmGo/s1600-h/Presentation1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 300px;&quot; src=&quot;http://3.bp.blogspot.com/_g5HsCABehl8/SXwUSBwQ9CI/AAAAAAAAANk/H_rsJDAPmGo/s400/Presentation1.jpg&quot; alt=&quot;Poll 1 results&quot; id=&quot;BLOGGER_PHOTO_ID_5295129561821934626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;This is the chart which showing the results of the poll question. Hundred percents (100%) of the respondents thinks that the public have neglect the legal issue in internet. The results shows how serious of this issue around us.&lt;br /&gt;&lt;br /&gt;Ya everyone of us knew the importance of the legal issue, yet people would do anything for free stuff! The public not even care about all these legal issues when they download songs, movie, copy people&#39;s work from the internet, It&#39;s free! who don&#39;t want?&lt;br /&gt;&lt;br /&gt;More over, some of them thinks that the original discs or books are too expensive for them especially for the students．Therefore, clicking a link and download the latest, hottest stuff from the website which is not cost them became the &quot;must&quot; action for them when they start surfing the net.&lt;br /&gt;&lt;br /&gt;This is too bad because it&#39;s violating the original work of the authors or the composers. It will make their sales decrease badly as everyone is relying on the net and it&#39;s make the country&#39;s economy drop as well! Am I too serious? No, It&#39;s not an exaggeration. For my opinion, the government need to do something to prevent this issue gone to worse and to protect the authors. Hopefully someday someone who invent a &quot;detecter&quot; which can stop people from downloading the original work, or every of the laptop/pc install a system which will automatically delete the items after 24 hours of the download. I think this is much more effective than what the government do? Am I right? =)</description><link>http://legalissue-dmc.blogspot.com/2009/01/analysis-of-poll-1-results.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://3.bp.blogspot.com/_g5HsCABehl8/SXwUSBwQ9CI/AAAAAAAAANk/H_rsJDAPmGo/s72-c/Presentation1.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>