Skip to main content

Disadvantages Of Internet

 Theft of Personal Information
http://www.buzzle.com/images/computers/internet/phishing.jpg
The use of Internet for banking, social networking, or other services, often makes our personal information vulnerable to theft. There are no fail-proof ways to securing names, account numbers, addresses, photos, and credit card numbers from being stolen or misused by thieving websites and individuals.


Unscrupulous hackers can access our sensitive information through unsecured connections by planting phishing software. Needless to say, the damage caused by having our identities misused and our accounts broken into, is often irreparable and most of all, embarrassing.
Spamming
http://www.buzzle.com/images/computers/internet/spamming.jpg
Spamming refers to sending unwanted e-mails, which serve no purpose and needlessly obstruct the computer system. Such illegal activities can be very frustrating as it makes it slower to access our email accounts and makes the entire service unreliable for consumers.

Spammers usually use bots that bombard the receiver with an endless line of advertisements. This can prove to be increasingly perplexing, as it keeps getting mixed with our more important emails. Fortunately, email service providers often have security systems in place to guard against spamming. Fortunately, it is possible to report an email as spam, so that all emails from the same email id or IP address, are blocked.
Malware Threats
http://www.buzzle.com/images/computers/internet/malware.jpg
One of the most annoying problems with the Internet is the ease with which any malware can infect our computers. Internet users are often plagued by virus attacks that harm their computers and important files. Virus programs are inconspicuous and may get activated simply by clicking a seemingly harmless link. Computers connected to the Internet are extremely prone to IP targeted virus attacks that may end up crashing the system completely.

Internet virus can be of three types. The first type of virus affects files and goes directly for a particular file or file type. The second type harms system and executable boot files. These can be particularly nasty, as they can effectively stop the computer from starting again. Lastly, there's the macro virus, which is the most common as well as the most harmless of them all. The macro virus simply keep changing things like symbols on word files. The type of virus that can replicate and spread itself is known as worms. When a virus is disguised as something else, it's known as a trojan.
Age-inappropriate Content
http://www.buzzle.com/images/computers/internet/internet-shocking.jpg
Pornography and age-inappropriate content is perhaps the biggest disadvantage of the Internet. The worst being underage porn, which is largely rampant in the deeper parts of the web. It is the lack of control over the distribution and unrestricted access of pornographic material, that is detrimental to children. All that parents can do, is lock harmful sites and monitor the sites viewed by their children.

Pornography is not just frowned upon by most societies, it's also banned by some. The Internet makes uploading shocking content so easy, that we end up coming across inappropriate words and images, despite not wanting to.
Social Isolation, Obesity, and Depression
http://www.buzzle.com/images/computers/internet/social-disconnect.jpg
The biggest problem with having the Internet is, its ability to create rifts between the real and virtual world. The virtual world can often seem so alluring that once hooked, going back to real life seems daunting.

There is an addiction for everything that pertains to the web and that includes excessive surfing, online gambling, social networking, and gaming addiction. There are now psychiatric clinics and doctors that specifically cater to resolving the problems created by the Internet. These addictions create both physical as well as mental issues that can lead to health complications if left unattended. It is ironic that, while it is easy to find plenty of online support for agoraphobia, the Internet itself can be a big cause or trigger for it.

The link between obesity and the Internet is rather easy to understand. The more one sits in front of the computer, the lesser one exercises. At the end of the longish list of physical and emotional maladies, is depression. Since all problems are so deeply linked with one another and with the Internet, it isn't uncommon for people to be afflicted with multiple issues. Recent studies and research have gone deep enough to actually differentiate between compulsive Internet use and excessive Internet use. Furthermore, thanks to smartphones, holding a simple face-to-face conversation seems out of the ordinary as compared to chatting online.

Thus, even though the Internet has the potential to make our lives simple and convenient, it also holds the power to wreak havoc. Its influence on us is mostly dictated by the choices we make while being online. With prudent use, we can manage to harness its unlimited potential and steer clear of its adverse effects.

Comments

Popular posts from this blog

The First Generation of Computer

The history of computing hardware covers the developments from simple devices to aid calculation, to mechanical calculators, punched card data processing and on to modern stored-program computers . Before the 20th century, most calculations were done by humans. Early mechanical tools to help humans with digital calculations were called "calculating machines", by proprietary names, or even as they are now, calculators . The machine operator was called the computer. The first aids to computation were purely mechanical devices which required the operator to set up the initial values of an elementary arithmetic operation, then manipulate the device to obtain the result. The slide rule and, later, analog computers represented numbers in a continuous form, for instance distance along a scale, rotation of a shaft, or a voltage. Numbers could also be represented in the form of digits, automatically manipulated by a mechanical mechanism. Although this approach generall...

About Write Only Memory

In information technology, a write-only memory ( WOM ) is a memory location or register that can be written to but not read. In addition to its literal meaning, the term may be applied to a situation when the data written by one circuit can be read only by other circuitry. The most common occurrence of the latter situation is when a processor writes data to a write-only register of hardware the processor is controlling. The hardware can read the instruction but the processor cannot. This can lead to problems in producing device drivers for the hardware. Write-only memories also find applications in security and cryptography as a means of preventing data being intercepted as it is being decrypted. Hardware uses In 1972, WOM, an antithesis of read-only memory (ROM), was introduced as an inside practical joke perpetrated by Signetics. [ 1 ] However it was soon recognized that this concept actually describes certain functionalities in microprocessor systems. [ 2 ] The...

Make Software With Notepad

Do You Want To Make Software ?? But For This You have to Know Computer Programming Language  In this post i will guide you How to make a software without any programming skills , just from Notepad . Ever Wanted To Make A software through Notepad Then Follow This Steps- 1. Open Notepad . 2. Copy and paste the below mentioned code : Dim msg, sapi msg=InputBox("Enter your text for conversion–www.sonuandtechnology.blogspot.com","Sonuandtechnology Text-To-Audio Converter") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg 3. Save this file with any name with .vbs as extension. For eg. Text-To-Audio.vbs It will look like this  Then Open It by double clicking it What To Do With The Software?? You Can Convert Text To Audio With This Software Whatever you write in the text box , system will change that into a audio So enjoy the post and subscribe to be updated.....