Inglese


WHAT IS A BLOG?


The term blog is the contraction of web-log, or «diary on the net. A blog / blɔg /, in Web 2.0 and in Internet jargon, is a particular type of website where the contents are displayed in an anti-chronological form (from the most recent to the furthest in time). In general, the blog is managed by one or more bloggers who publish, more or less periodically, multimedia content, in textual form or in the form of a post, a concept or similar to a newspaper article. the phenomenon began to take hold in America in 1997.The first blog was actually published on December 23rd of the same year, thanks to Jorn Barger, an American hunting enthusiast merchant, who decided to open his own personal page entitled Robot Wisdom to share the results of his research on the web regarding his hobby; he coined the word weblog to describe the list of links on your site. In the spring of 1999 instead Peter Merholz proposed the abbreviation blog on his site Peterme.com. Structural features common to blogs mainly concern the fact that they are "online journals": the texts are provided with a date and are present on the web page in an anticronological order (first the most recent messages) and most of the time they are introduced by a title. Creating a blog is very easy, just follow these three steps. 1. The first consists of the user-author registration on specific sites that automatically create the virtual space using default settings and a few configuration parameters without the need to know HTML.
2. Alternatively, the user can upload static pages (usually in HTML) directly to dedicated online spaces called hosting.

3. Or you can use a Content Management System (CMS), also hosted on a hosting. The most popular CMS is WordPress, the platform that hosts most blogs from around the world.

Blog platforms [edit | edit wikitesto]
furthermore inside a blog we can find the tag which it is a keyword or a term associated with information (an image, a geographic map, a post, a video clip ...), which describes the object making possible classification and search for information based on keywords. The tags are generally chosen based on informal criteria and personally by the authors / creators of the indexing object. However, the tags can also be used improperly, or provide indications about the opinion that someone has of a work and therefore be related to the consumer of the content and not to the content itself. From here we can see how the simple association of tags is not sufficient to give a semantic level to the network [1], although some include the mechanism of tagging in the semantic web. Finally we have the post it
and text message, with opinion or comment or intervention function, sent to a common space on the Web to be published.
These spaces can be discussion groups, forums, blogs, guest books, shoutboxes, social networks and any other type of telematic tool.




Cyberbullism


The Internet has opened up new possibilities for all of us. The other side of the coin, however, is the risks associated with improper use of this tool: among these are cyberbullying. For young people who are growing up in contact with new technologies, the distinction between online life and offline life is really minimal. The activities that the children carry out online or through the technological media therefore often have consequences also in their real life. In the same way, online lives also affect the way kids behave offline, and this element has several spillovers that need to be taken into account to fully understand cyberbullying. We can call cyberbullying the use of new technologies to intimidate, harass, embarrass, make people feel uncomfortable or excluding other people. All this can be done using different methods offered by the new media. Some of them are:
• calls
• Messages (with or without images)
• Synchronous Chat
• Social network (for example, Facebook)
• Question and answer sites
• Online game sites
• Online forums
 There are many specific ways in which boys carry out acts of cyberbullying.
 Some examples are:
• gossip spread through mobile messages, e-mails, social networks;
• posting or forwarding embarrassing information, images or videos (including false ones);
• stealing the identity and profile of others, or building fake ones, in order to embarrass or damage the reputation of the victim;
• insulting or mocking the victim through messages on the mobile phone, email, social network, blog or other media;
• making physical threats to the victim through any media. These attacks can follow bullying episodes (scholastic or more generally in places where children gather) or be behaviors only online.



Blue whale

Behind the name "Blue whale" lies the disturbing phenomenon of the moment: a Virgin race, born in Russia on the Internet, that would push young people to commit suicide. But how much is true? And what can we parents do?
It's called Blue whale, Blue Whale, but it has nothing natural and romantic, as the name might evoke. In fact, I say these two words, it hides the disturbing phenomenon of the moment, a race of viral treated on the Internet that would drive young people to suicide. The life of the macabre game already reaches 157, most in Russia, even if there will be cases in Europe, even in Italy.
The conditional is mandatory because since the media began to take place, there has been no lack of doubt: is this true or is this false news? Let's try to understand more.
Blue whale, a game born in Russia.
It all starts in February 2017, when the fame of Blue whale begins on the Internet. The most famous Russian social network Vkontakte has numerous posts and images linked by the tag #f57.
The mechanism would seem to be "simple": the user is contacted by a minister in the game, which speaks to the power of information compromised, and then builds the victory to follow in this race. Race with rules and precise passages that lead the user to take his own life.
The steps would be even 50 and the list has spread over the Internet, with photos and details. The victim, for example, has to watch psychedelic videos, make cuts near the sight, carve a whale on his arm and so on, in a growing terrain of violence to the death jump from a palace.





THE DANGERS OF THE WEB


1. Limiting and maintaining personal information to a professional level.
Potential employers or clients, do not need to know the sentimental status or address of a user. What is of interest to them regarding the scope of skills and experiences and how to get in touch with a particular person. You should not distribute to every single online stranger, millions of people, real personal information.

2. Continue to use privacy settings.
Distributors, like hackers, want to know everything about the user: both can get a lot of information from navigation and the use of social media. However, everyone can take care of their own data. As Lifehacker noted, both Web browsers and mobile operating systems have settings to protect your online privacy. The most important sites like Facebook also have settings available to increase privacy. Sometimes, the latter are (deliberately) unclear because companies want the user to enter personal information for their commercial value. Make sure you have enabled these privacy protections and keep them active.

3. Surf safely.
No one would choose to walk in a dangerous place, it is good to adopt the same choice online. Cybercriminals use content that will not go unnoticed as bait, because they know that people are attracted to arguments ambiguous and may lower their guard when they are searching certain subjects. The internet demi-monde is full of pitfalls difficult to detect and a careless click could endanger personal data or infect a user's device with malware. If you resist the temptation, you don't give hackers the opportunity to act.

4. Make sure the Internet is secure.
When someone is online in a public space, for example if you are using a public Wi-Fi connection, the magazine PCMag has stated that at that time there is a direct control on the security of the network itself. Cybersecurity corporate experts worry about "endpoints", places where a private network connects with the outside world. The vulnerable endpoint of each is the local Internet connection. Make sure your device is secure and, in case of doubt, wait for a better time (for example until you can connect to a secure Wi-Fi network) before providing information such as your bank account number.

5. Pay attention to what you download.
One of the main objectives of cybercriminals, is to lead the victim with the scam, to download malware, programs or apps carry malware or attempt to steal information. This malware can come in the form of an app: from the most downloaded games to tools that control traffic or weather conditions. As PCWorld recommends, it is good not to download apps that are ambiguous or come from an unreliable site.

6. Choose complex passwords.
Passwords are among the weakest points in the entire security structure on the Internet, but there are currently no solutions to this. The password problem is as follows: users tend to choose simple access keys to remember them (such as "password" or "123456"), which are also easy to guess for cyberladers. Choose complex passwords, so it's hard to get up to them even for cybercriminals. The Password manager software can be useful for managing multiple passwords so that the user does not forget them. A complex password is a unique and difficult to compose password, made up of at least 15 characters, various letters, numbers and special characters.

7. Shopping online from secure sites.
Every time you make online purchases, you have to provide information about your credit card or bank account, just what cybercriminals are most eager to get. Enter this information only in sites that provide secure and encrypted connections. As the Boston university has pointed out, it is possible to identify secure sites looking for addresses that start with https: (the S stands for secure) instead of looking for sites that begin simply http:.These protected sites may also be marked by the lock icon near the address bar.

8. Pay attention to what is placed.
The Internet does not have the key to the elimination, as he found the young candidate of New Hampshire: any comment or image that you post online can stay there forever, why remove the original (for example Twitter) you will not remove any copy made by others. There is no way to "go back" and delete a comment you didn't want to write, or that embarrassing selfie you made at a party. Do not put online what you would like to keep hidden from your mom or a potential employer.

9. Be careful who you meet online.
The people you meet online are not always who they claim to be, in fact, may not even be real. As InfoWorld reported, false profiles throughout social media represent a common way for hackers to approach unsuspecting users and rob them. You have to be as careful and judicious in social life on the net as you are in personal life.

10. Keep the antivirus program updated.

The internet security software cannot protect against any threat, but it will eliminate and remove most of the malware, so you should make sure it's up to date. Make sure that you are up to date with operating system updates and applications that you use, as I am a vital element for security.

Nessun commento:

Posta un commento