Identity Theft: A crime too personal

Written by Chris N Fernando


Continued from page 1

Other type of Identity Theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.

How does it happen? As I said earlier, it’s not at all necessary forrepparttar criminal to be present near you to steal your personal information. In public places, for example, criminals may engage in shoulder surfing—watching you from a nearby location as you punch in your telephone calling card number or credit card number or listen in on your conversation if you give your credit-card number overrepparttar 118472 telephone to a hotel or rental car company. Shoulder surfing might also allow people to view your email message, in case you happen to be surfingrepparttar 118473 Net in a public place. Evenrepparttar 118474 area near your home or office may not be secure. Some criminals might just go through your garbage cans or trash bin, to obtain copies of your checks, credit card or bank statements that you might have just "thrown" intorepparttar 118475 garbage can.

Just one wrong mouse click, while you are hooked up torepparttar 118476 Net, might also land you in trouble. The criminal might just spam you with unsolicited email that contains an attachment - perhaps Pamela Anderson's picture. You might just click overrepparttar 118477 attachment in excitement and then nothing happens onrepparttar 118478 screen. You deleterepparttar 118479 mail thinking thatrepparttar 118480 file must have been corrupted. But little did you realize thatrepparttar 118481 "picture" was actually a key logger or a Trojan in disguise. A key logger is a simple program that runs inrepparttar 118482 background, recording every keystroke of yours and then makes it accessible torepparttar 118483 criminal, when you log ontorepparttar 118484 Internet. A Trojan onrepparttar 118485 other hand does more - it might just allowrepparttar 118486 criminal to take over your PC remotely, allowingrepparttar 118487 criminal to scan through your hard drives for personal information.

Other ways might include false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges - whichrepparttar 118488 criminal might be denied if he were to use his real name.

So how do you prevent your identity from being stolen? Watch this space for more soon…

* This article first appeared in www.TheCheers.org

Chris N. Fernando is a Sr. Staff Writer with Magazine 360 - an IT magazine published by ITNation, Mumbai (India). He has also worked as Technical Editor with Peer Technical Services and as Reporter for PCQuest and Living Digital magazines. He also writes for www.TheCheers.org.

Get more of him at: www.chrisfernando.tk Contact him at: chris.n.fernando@gmail.com


How to re-record other video files

Written by ScreenRecorderSoftware.com


Continued from page 1
Apple Quick Time Player Fromrepparttar menu select "Edit > Preferences > Quick Time Preferences". You will then inrepparttar 118471 "QuickTime Settings" window. Select "Video Settings" fromrepparttar 118472 list menu atrepparttar 118473 top and then click "Safe Mode (GDI Only)". Then close "QuickTime Settings". And finally, close everything completely and re-start QuickTime Player. Microsoft MediaPlayer Selectrepparttar 118474 Tools menu, then Options, clickrepparttar 118475 Performance tab and sliderepparttar 118476 Video Performance - Hardware Acceleration tab down, allrepparttar 118477 way to None. Note that this does not work for DVD playback in RealMedia RealPlayer Select Tools > Preferences > Hardware and atrepparttar 118478 bottom you will see ‘Video card compatibility’ Moverepparttar 118479 slider over to ‘Most Reliable’. That is all there is to it.

Screen Capture Expert


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use