3.
a. $113,995.00 ; 5; 2007
b. $1.00;43940;20044
Friday, September 28, 2007
Privacy Policies
2.
a.First and last name, email address and a password when you create your Walmart.com account. They may also ask for you to confirm your personal information when you contact our Customer Service department.
b.This will allow them to protect your confidentiality by verifying your identity.
c. They will never sell or rent your personal information to any third parties under any circumstances. We will share personal customer information and/or purchase history only with our agents, representatives, service providers and contractors for limited purposes, including but not limited to, fulfilling customer orders; offering certain products and services in connection with this Site; communicating to customers; providing customer service; storing, sharing and retrieving customers' photo images in our Photo Center; enhancing and improving customers' shopping experience; administering or facilitating surveys, contests or sweepstakes; offering targeted marketing communications to users that opted-in to receive such communications; enabling access to our partners' websites; providing a personalized shopping experience; preventing fraud; and completing payment method processing.
d.
e. yes, they can go to edit or delete.
f.yes
g.yes, to let them know when you have visited their site.
a.First and last name, email address and a password when you create your Walmart.com account. They may also ask for you to confirm your personal information when you contact our Customer Service department.
b.This will allow them to protect your confidentiality by verifying your identity.
c. They will never sell or rent your personal information to any third parties under any circumstances. We will share personal customer information and/or purchase history only with our agents, representatives, service providers and contractors for limited purposes, including but not limited to, fulfilling customer orders; offering certain products and services in connection with this Site; communicating to customers; providing customer service; storing, sharing and retrieving customers' photo images in our Photo Center; enhancing and improving customers' shopping experience; administering or facilitating surveys, contests or sweepstakes; offering targeted marketing communications to users that opted-in to receive such communications; enabling access to our partners' websites; providing a personalized shopping experience; preventing fraud; and completing payment method processing.
d.
e. yes, they can go to edit or delete.
f.yes
g.yes, to let them know when you have visited their site.
Better Buisness Bureau and Amazon
3.
a.the site usually tells you that you are using the SSL technology.
b.with a credit card.
c.go to customer service.
4.
c. The BBBOnline Reliability Seal Program is when 73% of purchasers and 82% of non-purchasers cite reliability of business as a major concern when shopping online.
d. youe have to
1.Be in business a minimum of one year (an exception can be made if a new business is a spinoff or a division of an existing business, which is known to and has a positive track record with the BBB);
2.Have a satisfactory complaint handling record with the BBB;
3.Agree to abide by the BBB Code of Online Business Practice, and to cooperate with any BBB request for modification of a website to bring it into accordance with the Code;
6.
a.within 30 days.
b.they do.
c. no.
a.the site usually tells you that you are using the SSL technology.
b.with a credit card.
c.go to customer service.
4.
c. The BBBOnline Reliability Seal Program is when 73% of purchasers and 82% of non-purchasers cite reliability of business as a major concern when shopping online.
d. youe have to
1.Be in business a minimum of one year (an exception can be made if a new business is a spinoff or a division of an existing business, which is known to and has a positive track record with the BBB);
2.Have a satisfactory complaint handling record with the BBB;
3.Agree to abide by the BBB Code of Online Business Practice, and to cooperate with any BBB request for modification of a website to bring it into accordance with the Code;
6.
a.within 30 days.
b.they do.
c. no.
10 Tips to protect personal information
http://www.truste.org/consumers/consumer_tips.php/
1.Make sure to update your virus protection software.
2.Read all instructions to fully understand how you will be protected.
3.Fix your browser so you have less unwanted pop ups and other unnecessary things.
4.Use more than one E mail address so that one is just for personal use.
5.Look for certification in order to tust companies.
6.Save important files.
7.Do not provide personal information that might be on untrusted Web sites.
8.Always change passwords.
9.Use encryption which prevents files from being intercepted.
10.Log in anonymously or use free ID Web sites.
1.Make sure to update your virus protection software.
2.Read all instructions to fully understand how you will be protected.
3.Fix your browser so you have less unwanted pop ups and other unnecessary things.
4.Use more than one E mail address so that one is just for personal use.
5.Look for certification in order to tust companies.
6.Save important files.
7.Do not provide personal information that might be on untrusted Web sites.
8.Always change passwords.
9.Use encryption which prevents files from being intercepted.
10.Log in anonymously or use free ID Web sites.
Tuesday, September 25, 2007
Hackers- who and why
1.Who are hackers? Hackers are people who break into other people's computers and controling and reading the files in that computer.
2.Why do they hack? Different people hack for different reasons. Some people hack out of just being bored, some people do it because they may be nosey, or just because they know they can. Many hackers hack to test big buisnesses security systems, they want to be able to rely on computers on the future, because everyone know that it will be bad as soon as terrorists learn how to use and hack into our computers.
3.Are hackers helpful or harmful? Hackers can be helpful and harmful, they can be harmful because they can easily steal someones identity, they can also shut down your computer causing you to have to spend lots of money to get it fixed. Hackers can also be very helpful to us (the U.S.) by helping use figure out how to avoid getting hacked into in the future. If they can hack into a big system then we know we need to find a new way to try and block them.
a. if you think you have been hacked go to the website: http://www.cybercrime.gov/reporting.htm This Department of Justice web site provides information on how to report internet-related crime.
1.What is the number for the FBI? SpringfieldFBI Springfield900 East Linton AvenueSpringfield, Illinois 62703(217) 522-9675.
b. What is IC3? What is the Internet Crime Complain Center (IC3)?is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).
Summary..
This article talks about cookies and how they are used and what they are used for. It tells us that netscape created cookies and that the internet explorer supported them. It also talks about web bugs, scripts, and what you can do tp protect yourself from them.
2.Why do they hack? Different people hack for different reasons. Some people hack out of just being bored, some people do it because they may be nosey, or just because they know they can. Many hackers hack to test big buisnesses security systems, they want to be able to rely on computers on the future, because everyone know that it will be bad as soon as terrorists learn how to use and hack into our computers.
3.Are hackers helpful or harmful? Hackers can be helpful and harmful, they can be harmful because they can easily steal someones identity, they can also shut down your computer causing you to have to spend lots of money to get it fixed. Hackers can also be very helpful to us (the U.S.) by helping use figure out how to avoid getting hacked into in the future. If they can hack into a big system then we know we need to find a new way to try and block them.
a. if you think you have been hacked go to the website: http://www.cybercrime.gov/reporting.htm This Department of Justice web site provides information on how to report internet-related crime.
1.What is the number for the FBI? SpringfieldFBI Springfield900 East Linton AvenueSpringfield, Illinois 62703(217) 522-9675.
b. What is IC3? What is the Internet Crime Complain Center (IC3)?is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).
Summary..
This article talks about cookies and how they are used and what they are used for. It tells us that netscape created cookies and that the internet explorer supported them. It also talks about web bugs, scripts, and what you can do tp protect yourself from them.
Thursday, September 20, 2007
ICANN
A. What is ICANN? ( www.icann.org )
ICANN is a website that is responsible for the global coordination of the Internet's system of unique identifiers. These include domain names (like .org, .museum and country codes like .UK), as well as the addresses used in a variety of Internet protocols. Computers use these identifiers to reach each other over the Internet. Careful management of these resources is vital to the Internet's operation, so ICANN's global stakeholders meet regularly to develop policies that ensure the Internet's ongoing security and stability.
B. What is the domain name system?
The Domain Name System (DNS) is a distributed internet directory service. DNS is used mostly to translate between domain names and IP addresses, and to control email delivery. Most internet services rely on DNS to work. If DNS fails or is too slow, web sites cannot be located and email delivery stalls.
C. What is ICANN's role?
ICANN is a website that is responsible for the global coordination of the Internet's system of unique identifiers. These include domain names (like .org, .museum and country codes like .UK), as well as the addresses used in a variety of Internet protocols. Computers use these identifiers to reach each other over the Internet. Careful management of these resources is vital to the Internet's operation, so ICANN's global stakeholders meet regularly to develop policies that ensure the Internet's ongoing security and stability.
B. What is the domain name system?
The Domain Name System (DNS) is a distributed internet directory service. DNS is used mostly to translate between domain names and IP addresses, and to control email delivery. Most internet services rely on DNS to work. If DNS fails or is too slow, web sites cannot be located and email delivery stalls.
C. What is ICANN's role?
Tuesday, September 18, 2007
IP Address
For my favorite Doamin names I choose http://www.victoriasecret.com/ -IP= 206.166.93.139, http://www.myspace.com/ -IP= 216.178.39.16, www.google.com -IP= 64.233.167.147, www.bostonproper.com -IP=129.41.16.238, www.wetseal.com -IP= 66.161.54.111 .
Subscribe to:
Posts (Atom)