A Presentation by Moses Howe - PowerPoint PPT Presentation

1 / 7
About This Presentation
Title:

A Presentation by Moses Howe

Description:

There are many different sites that I as a young person use, ... PHOTOBUCKET: 61,000,000 since launch in Feb 03. HI5: 70,000,000 in a year. Where The Risks Lie ... – PowerPoint PPT presentation

Number of Views:72
Avg rating:3.0/5.0
Slides: 8
Provided by: moses8
Category:

less

Transcript and Presenter's Notes

Title: A Presentation by Moses Howe


1
E-Safety from a Youth Point of View
  • A Presentation by Moses Howe

2
Uses Of Internet
  • There are many different sites that I as a young
    person use, most of which are networking/ forum
    based. To help determine where the risks mostly
    lie, I have gathered the approximate user numbers
    of the most popular online sites.
  • MSN 21,000 people online in the space of an
    hour
  • MYSPACE 62,837  Hits in one day
  • FACEBOOK 7,000,000 users since launch in Feb 04
  • PHOTOBUCKET 61,000,000 since launch in Feb 03
  • HI5 70,000,000 in a year

3
Where The Risks Lie
4
The Risks
  • With every technological advance, another risk is
    made. The two biggest and most difficult to
    control in my eyes are Bullying, and People
    pretending to be someone else.
  • For example, I was in a situation were one person
    was pretending to be many different people on
    MSN, and found out the answers to me and my
    friends secret question (First pet, first
    school, ect.) using this information, they reset
    my password, and used the access to my account to
    bully most of my contacts, while pretending to be
    me.
  • Such issues are happening constantly, and I have
    found myself frequently Back-hacking to help
    people I know re-obtain their accounts on almost
    all of the previously mentioned sites.

5
The Methods
  • Breaching public sector firewalls is usually a
    process that takes a matter of minutes. I have
    screenshots of a simple firewall hack at Brent
    councils children and families building here.
  • Also, allow me to demonstrate..

Super BlueTooth hack 1.06
6
But what can we do?
  • Im not sure how possible it is, but Messaging
    and social networking sites should require
    verifiable details, such as address, and a real
    name, as I have been told that if someone is
    using a web messenger on msn, or is using someone
    elses computer, they cannot be traced via the
    report abuse link because the address and name
    info they give is made up. Im not sure if this
    is true, but if it is it is rather worrying
  • Other things that might help are dynamic filter
    applications in schools and libraries, as the
    current ones can be breached in a matter of
    seconds, giving young people access to Social
    Hacks where the user can obtain access to other
    peoples social networking pages

7
Final Statement
  • You need to think outside the box!
  • Give us some credit we know who to avoid.
  • Locking us out sends us underground.
  • Try suggestions rather than rules.
Write a Comment
User Comments (0)
About PowerShow.com