logo
g Text Version
Beauty & Self
Books & Music
Career
Computers
Education
Family
Food & Wine
Health & Fitness
Hobbies & Crafts
Home & Garden
Money
News & Politics
Relationships
Religion & Spirituality
Sports
Travel & Culture
TV & Movies

dailyclick
Bored? Games!
Nutrition
Postcards
Take a Quiz
Rate My Photo

new
Bible Basics
Houseplants
Romance Movies
Creativity
Family Travel
Southwest USA
Irish Culture


dailyclick
All times in EST

Full Schedule
g
g Virus and Spam Site

BellaOnline's Virus and Spam Editor

g

Drug Addiction and Your Computer


Would you give a known drug user your personal information?
Would you open a checking or credit card account for an admitted con artist?
Would you put your full name, date of birth, home address, and social security number online for anyone to use as they wished?

Hopefully, not knowingly.

But if you use any P2P (peer-to-peer) software without taking the proper precautions, that’s exactly what you may end up doing.

In the beginning she was just like anyone else. She had a family, a job, a husband, a life. But when she was introduced to crystal meth, her entire life changed. She lost everything or more accurately, she gave up everything in pursuit of her next high. She lost her family when her husband divorced her and won full custody of the kids. She was fired from her job when she was caught stealing from her boss. When her addiction even impacted her parents’ lives, they disowned her. Alone, desperate, and addicted, she relied on her friends – also addicts – for support. It was her friends who introduced her to an easy source of illegal income – you.

Just like everything else, swindling has gone high tech. These days, one of the more common thieves are drug users, anxious to support their habit in the easiest way possible. Both clever and desperate, online con artists rely mainly on three methods to access your personal information: P2P sites, spam, and malware.

Using P2P technology, which allows users to connect to the computers of others, scammers don’t have to do much to hack into the unsuspecting user’s system, quickly accessing all sorts of personal information, including names, passwords, account numbers, and more. With this information, a scammer would be able to open checking accounts, credit cards, and even obtain bank loans.

By sending out spam, scammers hope that you will be tricked, coerced, or lured into giving out your personal information.

By installing malware on your system, scammers hope to glean the information that you would never knowingly supply to a stranger. The malware may track you or allow someone to access your PC remotely.

Rather than being a condemnation of those who are suffering from an addiction to drugs or alcohol, this article is a reality check. The truth is, you never know who is on the other side of the computer. Even a trusted source is not a 100% guarantee of safety. For that reason, caution and discretion are always a necessity for Internet users.

Drug or alcohol addiction is a painful reality for millions of people around the world. If you know anyone who needs help or support, I would recommend visiting the 12-Step Recovery site on BellaOnline.
Add Drug+Addiction+and+Your+Computer to Twitter Add Drug+Addiction+and+Your+Computer to Facebook Add Drug+Addiction+and+Your+Computer to MySpace Add Drug+Addiction+and+Your+Computer to Del.icio.us Digg Drug+Addiction+and+Your+Computer Add Drug+Addiction+and+Your+Computer to Yahoo My Web Add Drug+Addiction+and+Your+Computer to Google Bookmarks Add Drug+Addiction+and+Your+Computer to Stumbleupon Add Drug+Addiction+and+Your+Computer to Reddit




RSS | Related Articles | Editor's Picks Articles | Top Ten Articles | Previous Features | Site Map


For FREE email updates, subscribe to the Virus and Spam Newsletter


Past Issues


print
Printer Friendly
bookmark
Bookmark
tell friend
Tell a Friend
forum
Forum
email
Email Editor


Content copyright © 2014 by Rayna H. Battle. All rights reserved.
This content was written by Rayna H. Battle. If you wish to use this content in any manner, you need written permission. Contact Rayna H. Battle for details.

g


g features
Craiglist Rentals and Spam

Review Your Transaction for Hacking Prevention

Private Message From Amber Sebastian Is Spam!

Archives | Site Map

forum
Forum
email
Contact

Past Issues
memberscenter


vote
Poetry
Daily
Weekly
Monthly
Less than Monthly



BellaOnline on Facebook
g


| About BellaOnline | Privacy Policy | Advertising | Become an Editor |
Website copyright © 2014 Minerva WebWorks LLC. All rights reserved.


BellaOnline Editor