Saturday, February 20, 2010

Podcast II: Avoid Phishing to Violate Your Privacy (预防网络钓鱼危害您的隐私)


Welcome to Online Privacy Zone. Here is the second Chinese podcast. It tells how to avoid phishing violate your privacy. Thanks for your support.



Title: 预防网络钓鱼危害您的隐私
Duration: 2 minutes and 42 seconds (2:42)

Translation Script:

Hello everyone. Did you hear the previous podcast? Yes, the topic I am going to discuss is related to phishing too. First, I would like to briefly explain what is phishing. Phishing is a technique used by hackers or fraudsters to obtain victim's personal information which included credit card numbers, account password and others. Then, they hack into the victim's account such as online banking to cheat money. Usually, fraudsters obtain victim's personal information through E-mail and they control the attached link which is located inside the E-mail. Phishing is very dangerous, you have to be alert to identify the bait the fraudsters used easily which is the fake E-mail and the web site URL.

Since you have way to identify the phishing E-mail, obviously you would not be cheated or tricked. You also have to strengthen protection on your personal information. The effective way is set up proxy inside your web browsers. Web browser's proxy setting is similar to the firewall within your computer. They have the same function either proxy or firewall which is monitor your online activities and the usage. Moreover, they could filter the files whether do contain threats like spy ware or malware and other viruses before they transmit to your computer. Proxy could protect your computer by blocking these harmful viruses intrude your computer. Proxy could effectively stop phishing because it could identify and filter the harmful content of the web site and stop the suspicious web site link to be sent to you. If your browsers already set proxy, then proxy would not visit those blacklisted web site which included the exposed phishing web sites. Furthermore, when you use Internet, proxy would stop the unauthorized Internet users hack and interrupt your online activities especially while handling online transaction. These unauthorized Internet users who hack into your online activities are called 'hackers'. They could interfere your online transaction to get benefits. Firewall and proxy could stop suspicious files, harmful viruses to intrude your computer. Remember to set up the proxy inside your web browsers to protect your online privacy. Wish everyone surf Internet happily. I am Cindy, thanks for tune in Online Privacy Blog's podcast.



Glossary:
  1. Podcast- 播客
  2. Phishing- 网络钓鱼
  3. Hackers- 骇客
  4. Fraudsters- 网络行骗者
  5. Attached link- 连接的网址
  6. E-mail- 电子邮件
  7. Web site URL- 网址
  8. Proxy- 代理主机
  9. Browser- 浏览器
  10. Firewall- 防火墙
  11. Spy ware- 间谍程序
  12. Maleware- 恶意软件
  13. Viruses- 病毒
  14. Internet- 互联网

2 comments:

Siem Qing said...

Hey, nice and clear podcast, keep it on! =)

Cindy said...

Thank you, Siem Qing. We appreciate your comment.

Post a Comment

Highlighter

Now you could highlight the content easily by clicking the below yellow highlighter then select and drag the content that you want to highlight inside this blog. markkit
 
back to top