Identity Theft: A crime too personal Written by Chris N Fernando
It might happen to you too. You get a call one fine day from a credit collection agency, demanding you to pay off all your dues amounting to huge bucks. Wait a minute; I don’t have a credit card! What hell? And then, you realize that it’s too late. Someone used your name and credentials, applied for a credit card and then splurged on thousands of dollars in shopping. And mind you, credit card misuse is just one way of what is termed as Identity Theft. There are other ways like hijacking a person’s email account, stealing passwords or personal information and misusing them and much more.So what’s identity theft all about? Identity theft in short is a crime — it might also amount to cyber crime or hacking. In this type of crime, your personal information is wrongfully obtained and used in some way, which involves fraud or deception, typically for economic gain. Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data —especially your Social Security number, your bank account or credit card number, your telephone calling card number, email account password, online shopping password and other valuable identifying data can be used, if they fall into wrong hands, to personally profit at your expense. There have been cases in past where huge amounts of money were transferred from one bank account to another account, just because person committing this crime happened to be victim’s relative and came to know about online banking password of victim. So you see, it’s not just people who don’t know you committing crimes; even your own brother would do that — if he had an urgent need for money. Types of Identity Theft Identity theft can enter into many areas of our lives. It involves any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person for whatever reason. According to a survey conducted by Federal Trade Commission, about 10 million people in United States found out they were victims of identity theft in 2002. So, if it’s 10 million in US alone, think about rest of world. Identity Theft doesn’t need criminal to be present near you all time. It might happen through Internet too. The criminal might just send you an email, that looks like a genuine message from your bank asking you to submit your credit card number, ATM card pin number, online banking password, etc. - for “security” reasons. And you might unsuspectingly enter all credentials, click on submit button and website thanks you for entering all this information. But then, did you ever think even once, before submitting your credentials - why would your bank ask for your password, when it would already be present in their records. But, then it’s too late, since criminal would now impersonate you and go on a shopping spree. He might even use your credit card number to subscribe himself to online erotica or pornographic websites. The crime he just committed is called Phishing.
| | How to re-record other video files Written by ScreenRecorderSoftware.com
Have you ever wanted to re-record movies, music videos or other stuff playing on web? Well, problem is that these players use video overlay. A video overlay is invisible to Windows capture programs because it is handled by a special video hardware. So, when you try to record you only see a solid black block. This is overlay. So, if you want to re-record what you see playing on web or in Microsoft Media Player, RealMedia RealPlayer, Apple's Quick Time Player etc. you can use video recording software and temporarily turn off overlay. Now, there are two ways to do it: 1.You can disable graphics hardware acceleration globally for all applications, or 2.You can disable graphics hardware acceleration for a particular application. We are going to concentrate on second method. And, it is very easy to do! If you want to learn first method go to URL of author company and in support questions and answers at this they will show you how.
|