Skip to main content

Whaddya mean? What is Cyberbullying?

Cyberbullying is the deliberate and persistent harassment of an individual or a group of individuals using one or more Internet-based communication methods. Teenagers and pre-teens are the typical targets of cyberbullies, with the initiators often being peers. Cyberbullying can cause severe self esteem problems for their victims, sometimes leading to tragic results.

Cyberbullying can consist of spreading lies and rumors about a person, insulting and targeting a student's sexuality, physical appearance, deceiving students into revealing personal information and then publishing it, and/or posting personally identifiable information or photos without the victim's consent.

Cyberbullies employ a number of methods to threaten, and disparage their targets. They include:
  • Email messages: While this is the most common form of electronic communication, the use of this method for cyber bullying is less pervasive since most e-mail programs allow the use of filters to block offending e-mails.
  • Instant Messaging: Cyberbullies can and do use IM on computers and cell phones to send harassing and threatening messages to their targets.
  • Chat rooms: Chat rooms allow cyberbullies to anonymously enter and write anything they want, mocking and insulting their victims in a forum that potentially has a large audience.
  • Web sites: Cyberbullies create web sites or use social networking sites or blogs to mock, torment and harass the intended victims.
  • Voting / Polling booths: Some web sites offer users the opportunity to create online polling/voting booths. Cyberbullies use these to vote online for some insulting topics (e.g.: "The Ugliest , Fattest, Dumbest etc. Boy/Girl at ***** School).

By whatever means bullying is accomplished, even when purely online, it has long term effects on both victims and bullies, as well as bystanders. These effects can include emotional and academic problems, and the bullies themselves are also at increased risk of delinquency, crime and alcohol or drug abuse.

Source: CyberAngels.org

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp