☀️ JOIN SPN MOBILE
Forums
New posts
Guru Granth Sahib
Composition, Arrangement & Layout
ਜਪੁ | Jup
ਸੋ ਦਰੁ | So Dar
ਸੋਹਿਲਾ | Sohilaa
ਰਾਗੁ ਸਿਰੀਰਾਗੁ | Raag Siree-Raag
Gurbani (14-53)
Ashtpadiyan (53-71)
Gurbani (71-74)
Pahre (74-78)
Chhant (78-81)
Vanjara (81-82)
Vaar Siri Raag (83-91)
Bhagat Bani (91-93)
ਰਾਗੁ ਮਾਝ | Raag Maajh
Gurbani (94-109)
Ashtpadi (109)
Ashtpadiyan (110-129)
Ashtpadi (129-130)
Ashtpadiyan (130-133)
Bara Maha (133-136)
Din Raen (136-137)
Vaar Maajh Ki (137-150)
ਰਾਗੁ ਗਉੜੀ | Raag Gauree
Gurbani (151-185)
Quartets/Couplets (185-220)
Ashtpadiyan (220-234)
Karhalei (234-235)
Ashtpadiyan (235-242)
Chhant (242-249)
Baavan Akhari (250-262)
Sukhmani (262-296)
Thittee (296-300)
Gauree kii Vaar (300-323)
Gurbani (323-330)
Ashtpadiyan (330-340)
Baavan Akhari (340-343)
Thintteen (343-344)
Vaar Kabir (344-345)
Bhagat Bani (345-346)
ਰਾਗੁ ਆਸਾ | Raag Aasaa
Gurbani (347-348)
Chaupaday (348-364)
Panchpadde (364-365)
Kaafee (365-409)
Aasaavaree (409-411)
Ashtpadiyan (411-432)
Patee (432-435)
Chhant (435-462)
Vaar Aasaa (462-475)
Bhagat Bani (475-488)
ਰਾਗੁ ਗੂਜਰੀ | Raag Goojaree
Gurbani (489-503)
Ashtpadiyan (503-508)
Vaar Gujari (508-517)
Vaar Gujari (517-526)
ਰਾਗੁ ਦੇਵਗੰਧਾਰੀ | Raag Dayv-Gandhaaree
Gurbani (527-536)
ਰਾਗੁ ਬਿਹਾਗੜਾ | Raag Bihaagraa
Gurbani (537-556)
Chhant (538-548)
Vaar Bihaagraa (548-556)
ਰਾਗੁ ਵਡਹੰਸ | Raag Wadhans
Gurbani (557-564)
Ashtpadiyan (564-565)
Chhant (565-575)
Ghoriaan (575-578)
Alaahaniiaa (578-582)
Vaar Wadhans (582-594)
ਰਾਗੁ ਸੋਰਠਿ | Raag Sorath
Gurbani (595-634)
Asatpadhiya (634-642)
Vaar Sorath (642-659)
ਰਾਗੁ ਧਨਾਸਰੀ | Raag Dhanasaree
Gurbani (660-685)
Astpadhiya (685-687)
Chhant (687-691)
Bhagat Bani (691-695)
ਰਾਗੁ ਜੈਤਸਰੀ | Raag Jaitsree
Gurbani (696-703)
Chhant (703-705)
Vaar Jaitsaree (705-710)
Bhagat Bani (710)
ਰਾਗੁ ਟੋਡੀ | Raag Todee
ਰਾਗੁ ਬੈਰਾੜੀ | Raag Bairaaree
ਰਾਗੁ ਤਿਲੰਗ | Raag Tilang
Gurbani (721-727)
Bhagat Bani (727)
ਰਾਗੁ ਸੂਹੀ | Raag Suhi
Gurbani (728-750)
Ashtpadiyan (750-761)
Kaafee (761-762)
Suchajee (762)
Gunvantee (763)
Chhant (763-785)
Vaar Soohee (785-792)
Bhagat Bani (792-794)
ਰਾਗੁ ਬਿਲਾਵਲੁ | Raag Bilaaval
Gurbani (795-831)
Ashtpadiyan (831-838)
Thitteen (838-840)
Vaar Sat (841-843)
Chhant (843-848)
Vaar Bilaaval (849-855)
Bhagat Bani (855-858)
ਰਾਗੁ ਗੋਂਡ | Raag Gond
Gurbani (859-869)
Ashtpadiyan (869)
Bhagat Bani (870-875)
ਰਾਗੁ ਰਾਮਕਲੀ | Raag Ramkalee
Ashtpadiyan (902-916)
Gurbani (876-902)
Anand (917-922)
Sadd (923-924)
Chhant (924-929)
Dakhnee (929-938)
Sidh Gosat (938-946)
Vaar Ramkalee (947-968)
ਰਾਗੁ ਨਟ ਨਾਰਾਇਨ | Raag Nat Narayan
Gurbani (975-980)
Ashtpadiyan (980-983)
ਰਾਗੁ ਮਾਲੀ ਗਉੜਾ | Raag Maalee Gauraa
Gurbani (984-988)
Bhagat Bani (988)
ਰਾਗੁ ਮਾਰੂ | Raag Maaroo
Gurbani (889-1008)
Ashtpadiyan (1008-1014)
Kaafee (1014-1016)
Ashtpadiyan (1016-1019)
Anjulian (1019-1020)
Solhe (1020-1033)
Dakhni (1033-1043)
ਰਾਗੁ ਤੁਖਾਰੀ | Raag Tukhaari
Bara Maha (1107-1110)
Chhant (1110-1117)
ਰਾਗੁ ਕੇਦਾਰਾ | Raag Kedara
Gurbani (1118-1123)
Bhagat Bani (1123-1124)
ਰਾਗੁ ਭੈਰਉ | Raag Bhairo
Gurbani (1125-1152)
Partaal (1153)
Ashtpadiyan (1153-1167)
ਰਾਗੁ ਬਸੰਤੁ | Raag Basant
Gurbani (1168-1187)
Ashtpadiyan (1187-1193)
Vaar Basant (1193-1196)
ਰਾਗੁ ਸਾਰਗ | Raag Saarag
Gurbani (1197-1200)
Partaal (1200-1231)
Ashtpadiyan (1232-1236)
Chhant (1236-1237)
Vaar Saarang (1237-1253)
ਰਾਗੁ ਮਲਾਰ | Raag Malaar
Gurbani (1254-1293)
Partaal (1265-1273)
Ashtpadiyan (1273-1278)
Chhant (1278)
Vaar Malaar (1278-91)
Bhagat Bani (1292-93)
ਰਾਗੁ ਕਾਨੜਾ | Raag Kaanraa
Gurbani (1294-96)
Partaal (1296-1318)
Ashtpadiyan (1308-1312)
Chhant (1312)
Vaar Kaanraa
Bhagat Bani (1318)
ਰਾਗੁ ਕਲਿਆਨ | Raag Kalyaan
Gurbani (1319-23)
Ashtpadiyan (1323-26)
ਰਾਗੁ ਪ੍ਰਭਾਤੀ | Raag Prabhaatee
Gurbani (1327-1341)
Ashtpadiyan (1342-51)
ਰਾਗੁ ਜੈਜਾਵੰਤੀ | Raag Jaijaiwanti
Gurbani (1352-53)
Salok | Gatha | Phunahe | Chaubole | Swayiye
Sehskritee Mahala 1
Sehskritee Mahala 5
Gaathaa Mahala 5
Phunhay Mahala 5
Chaubolae Mahala 5
Shaloks Bhagat Kabir
Shaloks Sheikh Farid
Swaiyyae Mahala 5
Swaiyyae in Praise of Gurus
Shaloks in Addition To Vaars
Shalok Ninth Mehl
Mundavanee Mehl 5
ਰਾਗ ਮਾਲਾ, Raag Maalaa
What's new
New posts
New media
New media comments
New resources
Latest activity
Videos
New media
New comments
Library
Latest reviews
Donate
Log in
Register
What's new
New posts
Menu
Log in
Register
Install the app
Install
Welcome to all New Sikh Philosophy Network Forums!
Explore Sikh Sikhi Sikhism...
Sign up
Log in
Discussions
Hard Talk
Beware Of Identity Thieves
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Archived_Member16" data-source="post: 23877" data-attributes="member: 884"><p><a href="http://technology.sympatico.msn.ca/Tech_Life/ContentPosting.aspx?newsitemid=4dc0e12f-21fc-450c-9c07-d567a158f41e&feedname=DELL_FEATURES&show=True&number=6&showbyline=True&subtitle=&detect=&abc=abc" target="_blank">http://technology.sympatico.msn.ca/Tech_Life/ContentPosting.aspx?newsitemid=4dc0e12f-21fc-450c-9c07-d567a158f41e&feedname=DELL_FEATURES&show=True&number=6&showbyline=True&subtitle=&detect=&abc=abc</a><span style="color: darkblue"><strong>Beware of identity thieves </strong></span></p><p><span style="color: darkblue">29/03/2006 3:19:00 PM </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue"><strong><u>Could it happen to you?</u></strong> </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">Identity theft is the unauthorised collection and use of a person's, or even a business's, information. Identity thieves steal key pieces of personal information and use them to impersonate a person to commit crimes in his name. </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue"><strong>What do identity thieves look for?</strong> </span></p><p><span style="color: darkblue">In addition to names, addresses and telephone numbers, identity thieves also look for: </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">- date of birth </span></p><p><span style="color: darkblue">- social insurance numbers (SIN) </span></p><p><span style="color: darkblue">- driver license numbers </span></p><p><span style="color: darkblue">- credit card and bank card numbers </span></p><p><span style="color: darkblue">- bank account numbers </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">With a name, address, date of birth, SIN, and mother´s maiden name this information, identity thieves can easily invade our personal and financial lives; they can open bank accounts, apply for credit cards or loans, redirect mail, rent vehicles and much more. </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue"><strong>How do they collect personal information on the web?</strong> </span></p><p><span style="color: darkblue">Many websites collect personal information; while some do it upfront, others are less obvious about it. </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">Certain websites request users to register prior to granting them access. Registration can be as simple as providing a username, password and email address; or they can require more detailed personal information such as your address or date of birth, questions about personal interests and hobbies, household income and even a password reminder question along the lines of "What is your mother´s maiden name?". </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">Some websites use cookies to collect information. The cookies are commonly used to identify users when they return to a site; this way the site can be tailored to the user based on his history or preferences and the user doesn't need to re-enter certain details each time he visits the site. </span></p><p><span style="color: darkblue">Cookies can also be used by a website to create a profile of a user based on his activity and browsing patterns that can then be used for advertising purposes. Once all the data is collected, it can be shared with advertisers or media networks or worse and can be abused if it gets in the wrong hands. </span></p><p><span style="color: darkblue">Some websites will attach spyware to its freeware. The spyware can monitor and report your activities, and even what you type, and can also install more spyware. </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">Email is a great and quick way to communicate; however, it is not a secure form of communication. An email is just about as private as a postcard. It can easily be shared, printed, forwarded, posted in a forum or newsgroup or even intercepted; exposing all of it's content for the world to see. </span></p><p><span style="color: darkblue">By opening SPAM mail or clicking on any links (possibly "unsubscribe" links too) found within unsolicited emails you may be confirming to the spammer that your email is valid and opening yourself to more SPAM. </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue"><strong>How to lower your risks when using the Internet?</strong> </span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">- Avoid clicking on an unknown link or website or unfamiliar e-mail. The link may take you to a fraudulent site. </span></p><p><span style="color: darkblue">- Familiarise yourself with a website's privacy policy before entering any information or subscribing to any services or electronic newsletters. </span></p><p><span style="color: darkblue">- Be wary of computer start-up software that asks for registration information. </span></p><p><span style="color: darkblue">- Password protect your PC. </span></p><p><span style="color: darkblue">- Never share your passwords and don't use the same password for everything. </span></p><p><span style="color: darkblue">- Don't use e-mail to send personal information. </span></p><p><span style="color: darkblue">- Consider using webmail or "disposable" e-mail addresses for online registrations or purchases, in order to help keep your personal email address private and spam free. </span></p><p><span style="color: darkblue">- Beware of Internet promotions that ask for personal information. </span></p><p><span style="color: darkblue">- After completing any sort of financial transaction online, properly sign out of the website and clear your internet file/cache. Check your browser´s help menu to find instructions. </span></p><p><span style="color: darkblue">- Don't give a credit card number or other information to a company that doesn't provide their name, business address, telephone number and e-mail address or to a company you aren´t already familiar with. </span></p><p><span style="color: darkblue">- Before giving your credit card number or other financial information to a business, make sure that their website is protected and secured. Look for a yellow padlock located on your browser's window and make sure the URL begins with "https://". </span></p><p><span style="color: darkblue">- Keep your identity confidential in chat rooms, forums, instant messaging, and newsgroups. Choose usernames/aliases that do not identify you, and keep in mind that any information you exchange is not private. </span></p><p><span style="color: darkblue">= Look into encryption, firewalls and virus protection for your computer. </span></p><p><span style="color: darkblue">Enforce the above practices within your family </span></p><p> <span style="color: darkblue"></span></p><p> <span style="color: darkblue"></span></p><p><span style="color: darkblue">Internet use and web transactions are on the rise. More people are transmitting valuable personal information across cyberspace on a regular basis causing an increase of identify theft, fraud and privacy concerns. Use the convenience of the Internet, just use it wisely at all times. Think before you click.</span> </p><p> </p><p>© 2006 Bell Canada, Microsoft Corporation and/or their contributors. All rights reserved.</p></blockquote><p></p>
[QUOTE="Archived_Member16, post: 23877, member: 884"] [URL="http://technology.sympatico.msn.ca/Tech_Life/ContentPosting.aspx?newsitemid=4dc0e12f-21fc-450c-9c07-d567a158f41e&feedname=DELL_FEATURES&show=True&number=6&showbyline=True&subtitle=&detect=&abc=abc"][/URL][COLOR=darkblue][B]Beware of identity thieves [/B] 29/03/2006 3:19:00 PM [B][U]Could it happen to you?[/U][/B] Identity theft is the unauthorised collection and use of a person's, or even a business's, information. Identity thieves steal key pieces of personal information and use them to impersonate a person to commit crimes in his name. [B]What do identity thieves look for?[/B] In addition to names, addresses and telephone numbers, identity thieves also look for: - date of birth - social insurance numbers (SIN) - driver license numbers - credit card and bank card numbers - bank account numbers With a name, address, date of birth, SIN, and mother´s maiden name this information, identity thieves can easily invade our personal and financial lives; they can open bank accounts, apply for credit cards or loans, redirect mail, rent vehicles and much more. [B]How do they collect personal information on the web?[/B] Many websites collect personal information; while some do it upfront, others are less obvious about it. Certain websites request users to register prior to granting them access. Registration can be as simple as providing a username, password and email address; or they can require more detailed personal information such as your address or date of birth, questions about personal interests and hobbies, household income and even a password reminder question along the lines of "What is your mother´s maiden name?". Some websites use cookies to collect information. The cookies are commonly used to identify users when they return to a site; this way the site can be tailored to the user based on his history or preferences and the user doesn't need to re-enter certain details each time he visits the site. Cookies can also be used by a website to create a profile of a user based on his activity and browsing patterns that can then be used for advertising purposes. Once all the data is collected, it can be shared with advertisers or media networks or worse and can be abused if it gets in the wrong hands. Some websites will attach spyware to its freeware. The spyware can monitor and report your activities, and even what you type, and can also install more spyware. Email is a great and quick way to communicate; however, it is not a secure form of communication. An email is just about as private as a postcard. It can easily be shared, printed, forwarded, posted in a forum or newsgroup or even intercepted; exposing all of it's content for the world to see. By opening SPAM mail or clicking on any links (possibly "unsubscribe" links too) found within unsolicited emails you may be confirming to the spammer that your email is valid and opening yourself to more SPAM. [B]How to lower your risks when using the Internet?[/B] - Avoid clicking on an unknown link or website or unfamiliar e-mail. The link may take you to a fraudulent site. - Familiarise yourself with a website's privacy policy before entering any information or subscribing to any services or electronic newsletters. - Be wary of computer start-up software that asks for registration information. - Password protect your PC. - Never share your passwords and don't use the same password for everything. - Don't use e-mail to send personal information. - Consider using webmail or "disposable" e-mail addresses for online registrations or purchases, in order to help keep your personal email address private and spam free. - Beware of Internet promotions that ask for personal information. - After completing any sort of financial transaction online, properly sign out of the website and clear your internet file/cache. Check your browser´s help menu to find instructions. - Don't give a credit card number or other information to a company that doesn't provide their name, business address, telephone number and e-mail address or to a company you aren´t already familiar with. - Before giving your credit card number or other financial information to a business, make sure that their website is protected and secured. Look for a yellow padlock located on your browser's window and make sure the URL begins with "https://". - Keep your identity confidential in chat rooms, forums, instant messaging, and newsgroups. Choose usernames/aliases that do not identify you, and keep in mind that any information you exchange is not private. = Look into encryption, firewalls and virus protection for your computer. Enforce the above practices within your family Internet use and web transactions are on the rise. More people are transmitting valuable personal information across cyberspace on a regular basis causing an increase of identify theft, fraud and privacy concerns. Use the convenience of the Internet, just use it wisely at all times. Think before you click.[/COLOR] © 2006 Bell Canada, Microsoft Corporation and/or their contributors. All rights reserved. [/QUOTE]
Insert quotes…
Verification
Post reply
Discussions
Hard Talk
Beware Of Identity Thieves
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top