Preface [Intro Internet] IUH 2009-12, 2ND Ed, R513A

Author Notes: Reference Copy, links to Oringnal Copy removed due to the Age of the Content. See the top Blog Menu for Copyright Concerns, Some Content Removed.

Dr. Don, Founder ICFO

Preface [Intro Internet] IUH 2009-12, 2ND Ed, R513A

Introduction Internet

UCLA professor Leonard Kleinrock said: “‘It’s the 40th year since the infant Internet first spoke. “The fridge-sized computer that sent the first email 40 years ago (1969) … But crashed after just two letters were received. Kleinrock, who led the team that first got two computers to communicate online via a network called ARPANET, added:

“‘The Internet is a democratizing element; everyone has an equivalent voice. There is no way back at this point. We can’t turn it off. The Internet Age is here” The computer expert could never have imagined that the fledgling Internet one day would give rise to Facebook, Twitter, and YouTube. He referred to spam emails, online scams, and malicious software spread by crooks as an unexpected dark side of the Internet. ‘The net is penetrating every aspect of our lives,’ Kleinrock told an audience of about 200 people in Los Angeles. The World Wide Web, www, or the Internet as we know it today was released in 1991. Zakon Timeline

Professor Kleinrock went on to say ‘As a teenager, the Internet is behaving badly, the dark side has emerged. When it grows into a young adult, will it get over this period of misbehaving? Daily News Los Angeles

This handbook, first published in 2009; started to address the dark side of the Internet as it impacts every online user; the student young or old whether online for socializing, gaming, research, shopping, studies, or all of the above. Every business online from an individual start-up to the world’s largest corporations faces the risk of online security threats, spam, scams, or fraud. Even Government bodies and organizations cannot avoid the increasing dark side of the Internet. Countries can hack into almost every system or network if not all, for internal spying. The dark side has always been around, but as the Internet user base grows, so does Internet Crime in the form of Security Threats and Scams and Fraud primarily through social networks. Are your employees online during working hours for personal affairs?


The rise and popularity of Social Networking sites aided by the tremendous growth of mobile device access to the Internet has helped accelerate the growth and reach of Internet Crime. Your devices and those owned by your spouse, sons and daughters, your business, agencies, and even your government are at risk. As the Internet continues to multiply its user base, awareness of these various risks also grows. Groups, websites, blogs,s and Articles attempt to spread the word. Some focus on a particular type of scam, i.e. Nigerian Letters, PTC Investigations, MLM, Email fraud, Identity theft, etc. As they try to make us aware; many have taken up the difficult task of maintaining lists of banned sites.

Until the Internet Users Handbook was first published, in 2009 as a support guide for the Internet Scams Anonymous (ISA) Groups. No one book, group, company, organization or website has addressed the bigger problem that is anyone who has an email address and logs onto the Internet is or may be exposed to any to the various online scams, and/or malicious viruses. That email from an old friend that has not heard from in years opens with nothing but a dangerous link. That connection can either steal your keystrokes, passwords, and/or identity; or it may simply disable your device or network.


Educate yourself about Internet risk and risk avoidance. Learn to recognize the signs that may appear in the email headlines from an unknown source, the mysterious free download, the fake bank emails rather than simply pass them to someone’s outdated lists. Offline, the scammers usually spread their scam one-on-one with their potential victims; however, the Internet with a rate of growth nearing 50% per year of new users or Newbies, the scammers have found a haven for Internet crime. One scam or virus can reach thousands, if not hundreds of thousands of users or devices.


Sons and daughters say age 8 and above can meet their classmates on Facebook by using their parents’ information or by falsifying their birthdate. Unless we watch over them, they are able to befriend a predator. Everything about the predator can be falsified, a man pretending to be a teenage girl, pictures and all.

A recent Facebook malware disguised as a message allowed the member to operate a “Dislike Button” to go along with the “like button”. Activating this option then sends all of the member’s online activity, passwords, account information to the malware author. Your child could have activated this without out your knowledge leaving your computer and activities exposed. It spread virally. Sophos Naked Security

Perhaps the children, even adults play games online. Other than the fact that the scammers are always looking for information and your credit card information, the next Free Game may contain a virus to shut down your computer or network. Children are exposed to inappropriate material.

Most recently, the death of Whitney Houston popular to young and old alike created another virus. “Warning: Whitney Houston autopsy video links on Facebook are not what they seem and led to a virus download of a fake Adobe Flash update from a bogus page”. Sophos Naked Security

While we cannot learn how many different user or newbies are here for socializing, games or both, we do know that when the world economy turns down, Internet crime goes up. As individuals turn to the Internet for a quick fix to their financial woes, the unemployed as well as the senior citizens that seek to increase their retirement income.

Scammers are excellent salesmen; they anticipate your problems, answer your questions, and stand ready to take your last dollar with false promises of overnight cures. Check your email. Even if you were not looking for such, the email headlines will entice some to open and read and take that chance of earning a quick dollar. If a single web expert can set up 15 authentic new websites per day, how many sites can several scammers set up in a day? Multiply that by the unknown numbers of scammers! It is easy to see the value of knowledge over that of list services and reviews.

Legitimate offline businesses are turning to the Internet to globalize their business. Many of them may be startups operating out of their garages or kitchens – often, we cannot see without some research. Larger companies often do have Internet policies for matters of email usage, socializing during working hours. Still, research indicates that few have risk management policies that address Internet crime and spam. An investigation of your local schools, universities or alumni will show the same result


  • Can overload your networks Spread Internet crimes
  • Spread viruses and threats that expose your systems and data Can disable your devices and networks
  • Spam Blockers can suspend your email, and articles just for using a single word such as adult in the headline or text.


  • Although covered in some minor detail along with Spam in the 2nd Edition; the handbook grew to over 500 pages
  • This fascinating and complex issue needs a minimum of standalone volume Make it easy and user-friendly for understanding


  • New and improved readability standalone volume


  • A standalone publication covering the newbie getting started online to companies starting or growing their business online
  • We help educate and train the newbies’ startup businesses, as well as more seasoned professional that is seeking to establish or expand their online businesses through personal development and analysis, and business planning

Thank for Reading – Preface [Intro Internet] IUH 2009-12, 2ND Ed, R513A

Dr Don, Founder, ICFO

Tags: , , , ,
Previous Post
m.wbusinees online
Cryptocurrency Dr Don ICFO Business Finance-Invest

Coindesk – Crypto News, Pricing

Next Post
Dr. Don, Founder ICFO
Dr Don ICFO Website Design IUH 2009-12, 2ND Ed, R513A Marketing Content Marketing Finance-Invest Email Marketing Affiliate Marketing ICFO CyberSecurity-CyberCrime Business

TOC IUH 2009-12, 2ND Ed, R513A

Leave a Reply