Wednesday, March 28, 2007

Blog Post 7

My research is going pretty well. I am done with it actually. I ended up having 6 sources and I may use another. I had issues at first finding sources that didn't have the same information, but I eventually got it.

Saturday, March 24, 2007

Spring Break

so spring break was really fun! I know i'm a little late to update about this but i'm procrastinating right now lol. I went to Florida with my friend and we stayed with my father. We went to Universal Studios , the beaches, and the most amazing concert I have ever been to. It was the Taste of Chaos Tour. It had a lot of bands :: The used, 30 seconds to mars, senses fail, saosin, chiodos, aiden and I can't remember the other ones. I had a brush with fame. I was like face to face with jared leto.. yes i was star struck!! He climbed up into the stands and he was right there in front of me. It was just absolutely amazing LOL. and then I got his autograph later on and it was fabulous. But all in all it was a GREAT concert. Hopefully next year I'll get to go too. so now here I am back at school.. but there's not much left to this year! Can't believe my freshman year is almost over. But anyways I have to work on paper now i suppose! Chao

Wednesday, March 7, 2007

Reading response post

Reading response 1
Vangie ‘Aurora’ Beal. “Defend Yourself Against Identity Theft.” Webopedia.com . 01 Sept. 2006. 06 March 2007.<>.

Summary: This website talks about what identity theft is and what it is on the internet. It explains the methods of internet identity theft such as Trojan horses and e-mail phising, which both put key loggers on your computer and track everything you type. This will give the thief all of your personal information and they will be able to steal identities. It also mentions that internet fraud is only a small portion of overall identity theft and the numbers seem to be decreases over the past few years. The website gives tips for protecting yourself against internet identity theft and what to do if it happens to you.
Importance: This is important because it gives some background information on primary identity theft and then what internet identity theft is.
Connections: I knew what identity theft was but I didn’t know exactly how identity theft worked on the internet.
Supporting source: I can use this article for basic information and it also gave some statistics that I can use as well.
Argumentative Source: I think there should have been more information on exactly how identity theft works so the reader would be a bit more informed and knowledgeable.

Reading Response 2
Russell Kay. “Phishing.” Computerworld.com . 19 January 2004. 06 March 2007.
Summary: This article talks about internet phishing. Phishing is a way for people to steal identification. Thieves will send out fake e-mails and try to pass them off as an email from a legitimate source such as eBay , Citibank, etc. It also gave examples of internet phishing that has been reported in the past from well known websites. It gave tips to know if the e-mails are legit or not.
Importance: This is a major scheme used by internet thieves and is important to understand how and what it is.
Connections: I had no idea what phishing was until I looked into internet identity fraud.
Supporting Source: This could be used as an example in my paper. I can use it to show ways a hacker may try to access personal information.
Argumentative Source: There should be more information in the article. It does provide facts but doesn’t go too far in depth.