logo To Foot
© J R Stockton, ≥ 2010-03-03

General Links; Abuse of the Net.

No-Frame * Framed Index * Frame This
Links within this site :-

General Links

General PC links, including "The Timing FAQ" and others by Kris Heidenstrom, are in PC Links Reference.

Copyright

The Universal Copyright Convention requires "©", name, date. But UK/EU law is stronger, applying in any case - UK Copyright, Designs and Patents Act, 1988 and EU Council Directive 93/98/EEC, 1993-10-29.

Copyright of published material, and putting on the Net is publication, is automatic. In the EU, from copyright harmonisation 1996-01-01, it lasts for 70 years after the death of the author, with other terms for anonymous work.

I read that in the USA, almost anything originated privately after 1989-01-01 is protected whether or not it has a notice.

The copyright holder has the right to control or set conditions for any form of copying in excess of short extracts.

Copyright and This Site

See on my index page.

Abuse of the Net

Abuse of the Internet Itself

I may report annoying cases of Internet abuse to the relevant authorities. Service providers with an appropriate Acceptable Usage Policy will terminate the accounts of abusers, and where the facilities of a University or an employer are used, even stronger action may be taken. The IRS likes to hear about fraudulent schemes.

The following is a non-exhaustive list of Abuses :-

I want concise and complete definitions of the terms, including UBE, UCE, ECP, EMP, Spam, Velveeta, Jello, Troll, MLM, Pyramid, UDP, Breidbart Index - attempt follows :-

Mostly derived from the "Net Abuse FAQ", usenet/spam-faq, and from postings by CHL :-

For terms relating to financial groups, see S R Hinsley.

Web Site Abuse

Frequent robotic access to a Web site of limited bandwidth is an abuse of resources; many personal sites, including this one, are limited.

Newsgroup Abuse

The kill-rule is one defence against some forms of newsgroup abuse; a shorthand for its application to an author is *plonk*.

It can be useful to accept only :- (i) from all two-letter TLDs (e.g.*.uk, but not *.com), (ii) threads marked for interesting subject, (iii) trusted authors in the group.

Internet Abuse Information URLs

Self-Protection

To protect oneself against having viruses, trojans, and other malware, get and use a good virus scanner, regularly and frequently updated.

To protect oneself against receiving attacks :-

Mail-List Removal

Many items of UCE say "to be removed from the list, mail remove@...". It is widely believed that this is used as a source of known-valid E-mail addresses, and that it is usually best not to respond (except by robotic rejection).

Piracy

Home Page
Mail: no HTML
© Dr J R Stockton, near London, UK.
All Rights Reserved.
These pages are tested mainly with Firefox 3.0 and W3's Tidy.
This site, http://www.merlyn.demon.co.uk/, is maintained by me.
Head.