Wednesday, 24 August 2011

New law to end illegal downloading of music and moves in Malaysia




This new law called the ISP Liability act, will be presented in Parliament next month in Malaysia, according to Recording Industry Association of Malaysia (RIM) chairman Norman Halim.the law will enable Internet Service Providers (ISP) to suspend or terminate the Internet accounts of  peer-to-peer users.The act makes the ISP s responsible for controlling  online piracy. The ISPs will be fined if they don’t take action against illegal down loaders. every  ISPs have well equipped with  the technology to track P2P users,.the procedure  of warning will be like this, at first time  ISP s will send two warning letters to illegal downloaders.if downloadres still persist the internet access will be suspended. However, the amount of fine has not been announced


Email spoofing

mail spoofing is one of the computer crimes.it  may occur in different forms,but all of them have a same result: a user receives email that appears to have originated from one source when it actually was sent from another source. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).
 











Digital Identity in Cyberspace


 digital signature  is an electronic signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and possibly to ensure that the original content of the message or document that has been sent is unchanged. Digital signatures can be automatically time-stamped. The ability to ensure that the original signed message arrived means that the sender cannot easily repudiate it later.
what's your idea  can digital signature  make crime  in cyber space?

copyright in cyberspace


Copyright infringement  happen  when someone other than the copyright holder copies the “expression” of a work. It means that the idea or information behind the work is not protected, but how the idea is expressed  can be  protected.
in the world of the internet copyright become one the biggest challenges in this area.any user can easily download.copy and sharing file. pictures film  and even  stolen other ideas .

Under section 102 of the Act, copyright protection extends to "original works of authorship fix in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device." 

HOW YOU CAN AVOID COPYRIGHT INFRINGEMENT OF YOUR WORK



In this part the most important things is to register your work  with the US Copyright Office.but whenever you found that you are victim of copyright infringement you can not do anything until you have registered your work 



Computer Hacking

Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent. People who hack computers are known as hackers. Hackers are usually real technology buffs who enjoy learning all they can about computers and how they work. Hackers think that what they do is like an art form. They usually have expert-level skills in one specific program. For most hackers, hacking gives them the opportunity to use their problem-solving skills and a chance to show off their abilities.


http://www.cbsnews.com/stories/2011/08/06/national/main20089042.shtml