Tuesday, 4 August 2015

Living Network

Living Network

The Internet has become an integral part of our lives. Many courses of computer literacy has launched. Trading network of our region - the leaders in the sale of computer equipment. What are the dangers we face, leaving the global network as a person protected by them, especially - beginners? On this day - our conversation with the visitor newspaper, coordinator of the Center of Safe Internet.
- It is difficult to imagine what part of the life of our city, including - its western most sector development has not touched a global network...
- Yes, Moscow has turned into a very long time is the city in the country. Internet penetration, arranges about economic opportunities, there is demand. By the way, internet industry has determined that the market of Moscow and St. Petersburg has already reached its saturation.
For Muscovites Internet is the main source of information. And it is linked to the fact that the perception of the Muscovites of certain events may differ from the reactions to the same event in the province, where the main source of information is television and, perhaps, the local press. "Dancing" hackers and cyber-humiliation - So what are we waiting for the danger of the Internet? How to protect yourself from them and loved, and where to go for help if anything?
- The behavior of the Internet is no different from the behavior on the street.
Always there is a person or group of persons, who, say, want one or another illegal way to improve their situation. The difference from the street - that in the virtual space - the immensity and the relative anonymity. In this regard, there is an illusion of impunity. So just need to say that the theoretical possibility of encounter with some internet threats will always exist.
No, even the most repressive measures will not be allowed to create a sterile Internet. Even in North Korea, where quite specific conditions, crime still exists. Strictly speaking, crime on the Internet has been transformed to the extent of its development. First it was the threat of software and hardware, that such "competition" hackers to each other. Then, when the Internet began to receive money came scheme "for weaning or withdrawal of money," as Bender.