The
Internet has become an integral part of our lives. Many courses of computer
literacy has launched. Trading network of our region - the leaders in the sale
of computer equipment. What are the dangers we face, leaving the global network
as a person protected by them, especially - beginners? On this day - our
conversation with the visitor newspaper, coordinator of the Center of Safe
Internet.
- It
is difficult to imagine what part of the life of our city, including - its
western most sector development has not touched a global network...
-
Yes, Moscow has turned into a very long time is the city in the country.
Internet penetration, arranges about economic opportunities, there is demand.
By the way, internet industry has determined that the market of Moscow and St.
Petersburg has already reached its saturation.
For
Muscovites Internet is the main source of information. And it is linked to the
fact that the perception of the Muscovites of certain events may differ from
the reactions to the same event in the province, where the main source of
information is television and, perhaps, the local press. "Dancing"
hackers and cyber-humiliation - So what are we waiting for the danger of the
Internet? How to protect yourself from them and loved, and where to go for help
if anything?
-
The behavior of the Internet is no different from the behavior on the street.
Always
there is a person or group of persons, who, say, want one or another illegal
way to improve their situation. The difference from the street - that in the
virtual space - the immensity and the relative anonymity. In this regard, there
is an illusion of impunity. So just need to say that the theoretical
possibility of encounter with some internet threats will always exist.
No,
even the most repressive measures will not be allowed to create a sterile
Internet. Even in North Korea, where quite specific conditions, crime still
exists. Strictly speaking, crime on the Internet has been transformed to the
extent of its development. First it was the threat of software and hardware,
that such "competition" hackers to each other. Then, when the
Internet began to receive money came scheme "for weaning or withdrawal of
money," as Bender.
