Phishing

Phishing is pronounced the same as gfishingh but spelled with a gphh to mean a sophisticated kind of fishing.It is derived from the use of email and other elaborate bait to fish for victims.Recently, spear phishing of small numbers of targeted victims is increasing.

Header information

The top portion (header) of an email records various information that the sender specified or that the computer added from the time the email was sent to the time it is received. This is called header information.
Header information other than that specified by the sender, such as from, to, and cc, are not shown for most email software and webmail, but by using gshow sourceh options, you can gather the information you need to determine the email is fraudulent.

Online dating sites

The official legal name for online dating sites is ginternet opposite sex introduction services,h as defined by the Law Regarding Regulation of Acts that Attract Children Using Internet Opposite Sex Introduction Services, or the gOnline Dating Site Regulation Act.h
The purpose of these sites is for men and women to meet each other, and they only include sites in which participants solicit a relationship using an open space such as a bulletin board and interested users respond with one-on-one email or instant messaging.

SSL

SSL (Secure Socket Layerjis a protocol for safe transmissions over the internet.It runs between a transport layer protocol like TCP and an application layer protocol like HTTP (Hyper Text Protocol).SSL is a protocol that was originally developed by Netscape and improved upon as TLS (Transport Layer Security). TSL is now standard, but is often generically called SSL.
It is used widely not only for HTTP web access but also for POP e-mail.In addition to encrypting functions, SSL uses PKI (Public Key Infrastructure) to authenticate parties to a transmission. A website can be issued an SSL server certificate by a trusted certification authority and be included on a server so that users of the site can confirm its authenticity.

Passwords

Passwords are used to check if a user is the owner of the password or is someone with the authority to use it.At the same time, anyone can take on your identity if they get hold of your password, so passwords are very important.
For bank cash cards, we say gsecurity code.hgAuthenticationh means to check if you are you.
Some bank ATMs may use biometric authentication to check identity using fingerprints or iris patterns, so that you do not have to worry about forgetting your password or having someone pretend to be you.

Upgrades and updates

For example, upgrading from Windows XP to Windows Vista is an gupgradeh (major update), and daily automatic version updates by Windows Update are gupdatesh or gsecurity fixes.h