Sunday, March 29, 2020

12 Crucial Tips to Protect Yourself from Cyberstalking

12 Crucial Tips to Protect Yourself from Cyberstalking If the idea of cyberstalking scares you, thats good. That discomfort is a reminder that you need to be alert and aware on the internet. Staying vigilant offline is important too. Your cell phone, Blackberry, your home call display all of these things can be manipulated by technology. Awareness is one step; action is another. Here are 12 tips that can prevent you from becoming a victim of cyberstalking. They may take a few hours to implement, but the payoff is protection from the hundreds of hours it takes to undo the damage of a cyberstalker. The 12 Tips Never reveal your home address. This rule is especially important for women who are business professionals and very visible. You can use your work address or rent a private mailbox. Just dont have your home address readily available.Password protect all accounts including cell phones, land lines, e-mails, banking and credit cards with a secure password that would be difficult for anyone to guess. Change it every year. Your secret questions should not be easily answered either. Former VP candidate Sarah Palins secret reminder questions were so easy to answer that a cyberstalker was easily able to gain access to her email accounts.Conduct an internet search using your name and phone number.  Be sure that there is nothing out there that you are not aware of. A cyberstalker may have created a craigslist account, web page or blog about you. Only you can stay on top of how your name is being used online.Be suspicious of any incoming emails, telephone calls or texts that ask you for your identifying information. The Caller ID Spoof can mimic your banks caller ID. It is very easy for a cyberstalker posing as a banking representative, utility, credit card representative or your cell phone provider to obtain your personal private information. If you are suspicious,  hang up and call the institution directly to be sure that you were not a target of a cyberstalker. Never give out your Social Security Number unless you are absolutely sure of who is asking for it and why. With your social as they call it in the business, a cyberstalker now has access to every part of your life.Utilize stat counters or other free registry counters that will record all incoming traffic to your blogs and websites. With a stat counter, you can identify who is viewing your site or blog easily because the registry records the IP address, date, time, city, state, and internet service provider. It is useful for marketing and it also provides a very valuable safeguard in the event that your website or blog is targeted.Check your credit report status regularly, especially if youre a business professional or individual who is in the public eye. Do this at least two times per year, especially if you feel that you may have a reason to be concerned. You can request a free copy of your credit once a year directly from the credit bureaus. It is worth the additional cost to pay f or it the second time. Go directly to each bureau; you will not damage your credit rating if you obtain a copy directly from the bureaus. Avoid paying third parties to obtain copies of the report because often the third parties charge more than what the credit bureaus charge and youll end up on another mailing list. If you are leaving a partner, spouse or boyfriend or girlfriend – especially if they are abusive, troubled, angry or difficult – reset every single password on all of your accounts to something they cannot guess. Inform your bank and credit companies that this person is not allowed to make any changes to your accounts no matter what the reason. Even if you are reasonably certain that your former partner is okay, this is a good practice for moving forward on your own. It is also a good idea to get a new cell phone and credit card that the ex doesnt know about. Make these changes before you leave if you can.If you encounter something suspicious – a weird phone call or an emptied account that cant be explained by your bank – it could be a cyberstalker so act accordingly. Change all your accounts, and ideally change banks. Check your credit report. Note anything else that appears strange. If you have more than one or two strange incidents per month, its possib le you are a target.If you think youre a target, have your PC checked by a professional. If you are already experiencing cyberstalking incidents, your computer may already be compromised. Have someone in the know check it for spyware and other viruses. If you think you have a cyberstalker, move fast. Lots of people dont take action because they think theyre crazy or imagining things. Record incidents – time, place, event. Victims of repeated attacks tend to become paralyzed with fear. Meanwhile, cyberstalkers often get such a rush off the first attack that it encourages them to keep going. The faster you take action and block their ability to hurt or harass you, the sooner they lose interest in their project.Get lots of emotional support to handle the cyberstalking period and to deal with the aftermath. It is normal to feel high levels of distrust and paranoia after a cyberstalking encounter. A lot of people will not want to deal with someone with a cyberstalker; it puts them at risk. You may feel isolated and alone. The best thing I did was learn to keep reaching out until I found the brave people who helped me put my life back together. Having support was what got me through but I had to fight for every bit of it. It may seem  backward  that we cant do more to protect ourselves from cyberstalkers. Lawmakers in the US need to grasp the urgency of the situation and pick up the pace if were ever going fight cybercrime with real legislative tools. While we work toward getting laws caught up with the speed of technology, for now, you are a pioneer. Like the Wild West, it’s every man, woman, and  child for themselves when it comes to cyberstalking. So take care of yourselves out there.

Saturday, March 7, 2020

Orbital Space Debris

Orbital Space Debris Free Online Research Papers Orbital Space Debris The sun rose blindingly over the crest of the earth. The astronaut moved outside the Space Shuttle Discovery’s cargo bay in his Manned Maneuvering Unit (MMU). Held by the shuttle’s robotic arm, a damaged satellite hung about 800 kilometers above the earth and a few meters below the astronaut. As the space walker hovered closer to the satellite, he looked down to see clouds covering parts of America, including his home state of Nebraska. The satellite was damaged badly. Sporting only one solar panel, it had a broken metal arm that made merely a stub on the other side. The day earlier, they had intercepted the missing solar panel, burned and smashed beyond repair. Upon inspection of the damages, both in space and back on earth where the satellite was taken, it was confirmed that a small piece of foreign space debris was responsible for knocking out this civilian communications satellite. While in the vastness of space, an accident like this seems only realistic in a Hollywood movie, but this fictional description is more real than what people realize. It has been fifty years since the launch of the first satellite, Russia’s Sputnik. Since then, as is the case with rapidly advancing technology, satellites have only proliferated and become more entrenched in society’s existence. This has created an incredible amount of crowding in the earth’s orbit that will only get worse as time progresses. The current space debris is tracked by both the US Space Surveillance Network and US Strategic Command. They keep a data base of all objects in Low Earth Orbit (LEO) larger than 5 centimeters in diameter and all object in geosynchronous orbit (GEO) larger than one meter in diameter. There are currently 12 000 catalogued objects, of which only 850 are active satellites. Several thousand more cannot be catalogued because their origin is unknown. Several events in recent history have complicated the situation in the skies, however. The main source of orbital debris for the last half century was in fact the ordinary breakup of satellites in orbit, the wear-and-tear of constant use. In the 1980’s, the US and Soviets tested anti-satellite (ASAT) weaponry, leaving much shattered satellite debris. One US test was conducted in September 1985 and the last piece of catalogued debris decayed from orbit only three years ago. However, both the Soviets and the Chinese have resumed their ASAT testing programs earlier this year. In January of 2007, the Chinese used a kinetic-energy ASAT weapon to destroy their dysfunctional Feng Yun-1C, increasing its percentage of the total orbital debris to 20%. The next month Russia exploded a Briz-M rocket booster stage, raising its total percentage to 40%. The implications of this newly created space jam are numerous. While today, satellites are rarely damaged like the fictional account described earlier, orbital collisions are becoming more frequent. Through the nineties and into the current decade, collisions occurred about every five to eight years. Catastrophic collisions, involving total destruction of the objects that collided, were estimated to occur only every nineteen years. For different orbital radii, there are different risk levels. The most crowed highway around the globe is the 800 km elevation. Not only is the most debris concentrated at this altitude, but it is the most common orbital height for civilian satellites. Now, the countless remains of Feng Yun-1C and the Briz-M booster are circumnavigating Earth at that radius as well. The SSN predicts that because of the many small, un-chartable remains of those two satellites, the collision risk would nearly double. Collisions would occur every three to four years and catastrophes would fall in the five to ten year range. However, a majority of these particles, as previously stated, are very small. Therefore, it would seem that the danger posed by these objects is very low and almost negligible. Basic kinetic energy theorems would disprove this notion. These objects orbit with speeds around 10 km/s. Consider most of these to be around one gram. Taking kinetic energy to be the kinetic energy of one of these particles would equal 50 000 Joules. In comparison, a 100 kg mass traveling at 100 km/hr has only 38 580 Joules. Therefore, these collisions are extremely dangerous for orbiting satellites. NASA has implemented ordinances to prevent the spread of orbital debris. Also, in 2002, the Inter-Agency Space Debris Coordination Committee set guidelines in place covering the production of such debris. The Orbital Debris Program Office issued a study in 2006 (before the Chinese and Russian ASAT tests) that some areas of space had already reached a super critical debris density. Therefore, these guidelines are of the utmost importance. However, there is no law passed to limit orbital breakup. The United Nations patterned guidelines after the IADC, and were seeming to be effective for some time. While there was a steady increase in orbital debris up through the mid nineties, it began to taper off into the new millennium. Unfortunately, the Russian and Chinese ASAT tests have caused a tremendous backslide in the effort to clear up the skies. While it may seem minor and insignificant now, the problem of orbital debris will only deteriorate as time progresses unless action is taken soon to mitigate the situation. The more debris placed into space, the more regions will become super critical in status. The future of safe space travel depends on the control and containment of our orbital junk. Wright, David. â€Å"Space Debris.† Physics Today. 60.10 (October 2007): 35-40 NASA Orbital Debris Program Office. 2007. 8 December 2007. . Research Papers on Orbital Space DebrisBook Review on The Autobiography of Malcolm XInfluences of Socio-Economic Status of Married MalesHarry Potter and the Deathly Hallows EssayAnalysis of Ebay Expanding into AsiaBionic Assembly System: A New Concept of SelfOpen Architechture a white paperHip-Hop is ArtTwilight of the UAWWhere Wild and West MeetThe Relationship Between Delinquency and Drug Use