Documente Academic
Documente Profesional
Documente Cultură
A social networking service is an online service, platform, or site that focuses on building and
reflecting of social networks or social relations among people, who, for example, share interests
and/or activities. A social network service essentially consists of a representation of each user
(often a profile), his/her social links, and a variety of additional services. Most social network
services are web based and provide means for users to interact over the Internet, such as e-mail
and instant messaging. Online community services are sometimes considered as a social network
service, though in a broader sense, social network service usually means an individual-centered
service whereas online community services are group-centered. Social networking sites allow
users to share ideas, activities, events, and interests within their individual networks.[citation needed]
The main types of social networking services are those which contain category, means to connect
with friends and a recommendation system linked to trust. Popular methods now combine many
of these, with Facebook and Twitter widely used worldwide, Nexopia (mostly in Canada);Bebo,
VKontakte, Hi5, Hyves , Draugiem.lv (mostly in Latvia), StudiVZ (mostly in Germany), iWiW
(mostly in Hungary), Tuenti (mostly in Spain), Nasza-Klasa (mostly in Poland), Decayenne,
Tagged, XING, Badoo and Skyrock in parts of Europe; Orkut and Hi5 in South America and
Central America;and Friendster, Mixi, Multiply, Orkut, Wretch, renren and Cyworld in Asia and
the Pacific Islands and LinkedIn and Orkut are very popular in India.
Symbol of networking service:
Social impacts
Web based social networking services make it possible to connect people who share interests and
activities across political, economic, and geographic borders. Through e-mail and instant
messaging, online communities are created where a gift economy and reciprocal altruism are
encouraged through cooperation. Information is particularly suited to gift economy, as
information is a non rival good and can be gifted at practically no cost.
Facebook and other social networking tools are increasingly the object of scholarly research.
Scholars in many fields have begun to investigate the impact of social networking sites,
investigating how such sites may play into issues of identity, privacy,social capital, youth
culture, and education.
Several websites are beginning to tap into the power of the social networking model for
philanthropy. Such models provide a means for connecting otherwise fragmented industries and
small organizations without the resources to reach a broader audience with interested
users.Social networks are providing a different way for individuals to communicate digitally.
These communities of hypertexts allow for the sharing of information and ideas, an old concept
placed in a digital environment.
In 2011, HCL Technologies conducted research which showed that 50% of British employers had
banned the use of social networking sites/services during office hours.
Different Types Of Social networking
Blogs.Microblogs.Photosharing sites.Video sharing sites. I know personally that trying to
understand all of these different types of social media and how they work together can feel
like trying to understand Einsteins Theory of Relativity.
Im gonna try and keep things simple for us here, by focusing on the different kinds of social
media rather than all the different ways to integrate social media into your organization. Thats
really not something you can learn in a single blog post.
So clear your mind and throw all your baggage in the trunk. Were gettin ready to head down the
next stretch of the road on our social media road trip as we take a look at different kinds of social
media.
Social networking Facebook, Twitter, LinkedIn
Social networking sites allow users to add friends, send messages and share content. People on
social networking sites group in communities of like-minded interest. IMPORTANT: 1) The
other types of social media outlined here also allow for networking, though theyre typically
more focused on content sharing. 2) Dont assume your audience isnt participating in social
networking. The growth of Facebook for example is phenomenal. The rate at which it is growing
with men and women in their 60s even is staggering.
Educational applications
The National School Boards Association reports that almost 60 percent of students who use
social networking talk about education topics online and, surprisingly, more than 50 percent talk
specifically about schoolwork. Yet the vast majority of school districts have stringent rules
against nearly all forms of social networking during the school day even though students and
parents report few problem behaviors online.
Social networks focused on supporting relationships between teachers and their students are now
used for learning, educator professional development, and content sharing. Ning for teachers,
Learn Central, TeachStreet and other sites are being built to foster relationships that include
educational blogs, eportfolios, formal and ad hoc communities, as well as communication such
as chats, discussion threads, and synchronous forums. These sites also have content sharing and
rating features.
Social networks are also emerging as online yearbooks, both public and private. One such
service is MyYearbook which allows anyone from the general public to register and connect. A
new trend emerging are private label yearbooks only accessible by students, parents and teachers
of a particular school similar to Facebook beginning within Harvard.
Finance applications
The use of virtual currency systems inside social networks create new opportunities for global
finance. Hub Culture operates a virtual currency Ven used for global transactions among
members, product sales and financial trades in commodities and carbon credits. In May 2010,
Carbon pricing contracts were introduced to the weighted basket of currencies and commodities
that determine the floating exchange value of Ven. The introduction of carbon to the calculation
price of the currency made Ven the first and only currency that is linked to the environment.
Medical applications
this word. These students called themselves hackers because they were able to take programs and
have them perform actions not intended for that program. The term was developed on the basis
of a practical joke and feeling of excitement because the team member would hack away at the
keyboard hours at a time.
Hacking developed alongside phone phreaking, a term referred to exploration of the phone
network without authorization, and there has often been overlap between both technology and
participate. One of the first hacks was accomplished by Joe Engressia also known as The
Whistler. Engressia is known as the grandfather of phreaking. His hacking technique was that he
could perfectly whistle a tone into a phone and make a free call.Bruce Sterling traces part of the
roots of the computer underground to the Yippies, a 1960s counterculture movement which
published the Technological Assistance Program (TAP) newsOther sources of early 1970s hacker
culture can be traced towards more beneficial forms of hacking, including MIT labs and
the Homebrew Computer Club, which later resulted in such things as early personal computers
and the open source movement.
Vulnerability scanner
A vulnerability scanner is a tool used to quickly check computers on a network for known
weaknesses. Hackers also commonly use port scanners. These check to see which ports on a
specified computer are open or available to access the computer, and sometimes will detect
what program or service is listening on that port, and its version number.
Password cracking is the process of recovering passwords from data that has been stored in or
transmitted by a computer system. A common approach is to repeatedly try guesses.
Orkut hacking
Ever wondered how to hack Orkut account? Well, here are some of the ways through which you
can gain access to Orkutaccount.Google uses a 4 Level Orkut login feature which makes it
difficult to hack it using brute force attack. Hence, it is almost impossible to use the brute
forceapproach to gain access to Orkut account. Before we discuss on how to hack Orkut, let
us take a look at the 4 level secure login features.
First Level - Security-SSL or 128 bit secured connection
Second Level - Orkut account checks for the presence cookie in the users system
Third Level - Orkut provides a redirection to the entered User information
Fourth Level - Orkut doesnt use conventional php/aspx/asp coding. So, it is impossible to hack
Orkut using input validation attack!!!
So, it is not an easy task to hack Orkut by breaking this security! However, there are some people
who still manage to gain access to others Orkut accounts. The question concerned is how they
do it?Many of them just use simple tricks that fool users by making them to leak out their
password by themselves. Read on to discover the tricks used by hackers to hack Orkut account.
It can be a nightmare if someone else takes control of your Google Account because all your
Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even
Google Checkout are tied to the same account.
Here are some options suggested by Google Support when your forget the Gmail password or if
someone else takes ownership of your Google Account and changes the password:
1. Reset Your Google Account Password:Type the email address associated with your Google
Account or Gmail user name atGmail Forgot Password Link you will receive an email at
your secondary email address with a link to reset your Google Account Password.
2. For Google Accounts Associated with Gmail:If you have problems while logging into your
Gmail account, you can consider contacting Google by filling this form. It however requires you
to remember the exact date when you created that Gmail account.
3. For Hijacked Google Accounts Not Linked to Gmail:If your Google Account doesnt use a
Gmail address, contact Google by filling this form. This approach may help bring back your
Google Account if you religiously preserve all your old emails. You will be required to know the
exact creation date of your Google Account plus a copy of that original Google Email
Verification message.
Wondering to know how to hack Facebook password? Well, before you can do that, it is very
much necessary to understand the real ways of hacking that actually work and also those that are
simply scam and do not work. So in this post, well look at some of the possible ways to hack
Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their
spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are
even willing to pay for the service. However, I strongly deny any such requests since I do
not provide any paid hacking service. But anyhow, I have decided to write down this post so that
you can learn the tricks for yourself and implement everything at your own risk, 7 years in the
field of ethical hacking and security, all I can tell you is that there are only two ways to
successfully hack Facebook password.
Possible Ways to Hack Facebook Password
1. Keylogging The Easiest Way!
Keylogging refers to simply recording each and every keystroke that is typed on a specific
computers keyboard. This is possible with the use of a small computer program called keylogger
(also known as spy software). Once installed, this program will automatically load from the startup, runs in the invisible mode and start capturing each and every keystroke that was typed on the
computer.
Some keyloggers with advanced features can also capture screenshots and monitor every activity
of the computer. One doesnt need to have any special knowledge in order to install and use a
keylogger. That means, anyone with a basic knowledge of computer can install and use this
software with ease. Hence for a novice computer user this method is the easiest way to hack
Facebook password. I recommend the following keylogger as the best for gaining access to
Facebook account.
3.-Never-Get-Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need
not have the fear of being traced or getting caught.
4.-Remote-Installation-Feature
With the Remote Install feature, it is possible to install it even on computers for which you do
not have physical access. However, it can also be installed on a local computer.
5.-Extremely-Easy-to-Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
6.compeletly safe to use:
This software is 100% safe to use since it does not collect any personal information from your
computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy
for its users.
7.works-on-both-windows-and-mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.So what are you waiting for? If you
are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and
expose the truth!
Hackers and identity thieves are constantly on the prowl, looking for vulnerable computer
systems to break into. The worst thing you can do is to simply assume that your computer is safe.
Implement basic tips and precautions to help protect your computer from hackers.
Difficulty
Instructions
Things Youll Need
First and foremost, download and install an anti-virus application. A few of the free anti-virus
applications include Microsoft Security Essentials
(microsoft.com/security_essentials/default.aspx),
Keep your operating system up-to-date with the latest security patches.
Run virus scans on a fairly frequent basis. Pick a time when youre not using the computer
because running a virus scan will slow your computer down significantly. Scan your hard drive a
minimum of once a week, but two to three times a week is ideal.
It may be tempting to shoot the UFO out of the sky or other types of things