Monday, September 26, 2022

My view on system software

        System software is designed to provide a platform for other software. Examples of system software include operating systems such as macOS, Linux, Android, and Microsoft Windows, computing science software, game engines, industrial automation, and software as a service application.

        Many operating systems come pre-packaged with basic application software. Examples of such software include games and simple editing tools provided with Microsoft Windows or software development toolchains provided with many Linux distributions. If this type of software is uninstalled without affecting the functions of other software, it is not considered system software. Some gray areas between systems and application software are web browsers deeply integrated into the operating system, such as Internet Explorer in some versions of Microsoft Windows or Chrome OS and Firefox OS. 

        Cloud-based software is another example of system software. That provides a service to a software client (typically a web browser or running JavaScript application) rather than directly to the user. It is developed using systems programming methods and systems programming languages.

Monday, September 19, 2022

Discussed in LabSim Chapter 1.4.7 Internet Safety and Security (A Brief Talk on Internet Shopping Fraud)

        The application of the Internet has become an indispensable part of our life. Whether it's a dinner with colleagues, online shopping, a family trip, etc. Most of us rely on the Internet to find the information we need. Yet the Internet is only minimally regulated. In other words, the online information is not 100% accurate or reliable. Even the security of some data cannot be guaranteed. Network fraud is very prevalent in the current network environment. Network fraud refers to the purpose of illegal possession, the use of the Internet to fabricate facts or conceal the truth of the method, and swindling a more enormous amount of public and private property behavior. It has a variety of tricks, and it cheats with each passing day. Commonly used means are fake friends, phishing, online banking upgrade fraud, the main characteristics of space virtualization, behavior concealment, etc. I will share with you a few common examples to raise awareness.

(1) Online shopping fraud.

        Criminals set up fake shopping websites or Amazon stores. Once the owner has placed an order, they say the system is down and needs to be reactivated. Then, through mobile phone SMS to send false activation website fraud.

(2) Low price shopping fraud.

        Criminals release transfer information such as second-hand cars, second-hand computers, and goods confiscated by customs through the Internet and mobile phone messages. Once the owner contacts them, they cheat them out of money by "paying the deposit" and "transaction tax commission."

(3) brush network (online shop) evaluation reputation fraud.

        Criminals claim that they want to open online shops and need to quickly refresh the trading volume, online praise, and reputation. They promised to return shopping fees and extra commission after the transaction. Then the victims must shop or buy in the designated online shop at a high price. 

        There are many similar cases and examples. So this requires us to access the Internet simultaneously and master some ability to distinguish between true and false information. Of course, all this takes time and experience. As long as we keep our greed, lust, and curiosity in check, it's easy to get around wire fraud. 

Monday, September 12, 2022

Digital Payment-Alipay

        In the booming economy and modern technological society, the significance and value of spending money to improve people's quality of life have become increasingly important. It is well known that the life of money-making is undertaken under compulsion since wealth is not the good we seek and is merely useful for the sake of something else. However, people have different ways and habits of spending their money. Some people claim that cash is the king. They always prepare a few cash and put them in their wallet. Some others believe that credit cards would be a better payment method to avoid carrying a lot of cash. According to Juro Osawa, more than 1.2 billion people in China use the third method to spend their money daily, which is digital payment-Alipay. It is pretty common these days for people in China to purchase or sell products with Alipay. Alipay is able to help people complete their transactions within a few seconds. The only thing people have to do is scan their barcodes with their smartphones. In addition, employers of companies or governments take Alipay as their mainstream way to deposit their employees' paychecks. Alipay has become more popular than the original methods recently in China. Because there are three essential and important reasons, which include improvements in hardware development on Alipay's platform, valuable support from China state banks, and intense popular demands in the fast-paced people.

        Alipay has achieved a dominant position in payment patterns in China since it has that massive support with advantaged and unique conditions. According to a recent study, a global survey has found that most people can't live without their mobiles, never leave home without them, and, if given a choice, would rather lose their wallet. To some extent, people know that a trend has significant traction when young people are all over it. I believe that digital payments will be more acceptable and more popular shortly.

Work Cited

Osawa, Juro. "Alipay Wallet Hits 190 Million Active Users; Alibaba Group Holding's Financial Services Affiliate Says Alipay Wallet is China's no. 1 Mobile Payment Tool." Wall Street Journal (Online), Oct 15, 2014. ProQuest, http://ezproxy.library.csn.edu/login?url=https://search-proquest-com.ezproxy.library.csn.edu/docview/1612041636?accountid=27953.

Wednesday, September 7, 2022

A Brief Introduction to Phishing

"Phishing" was first mentioned and recognized in 1996. It is a form of sending an email to defraud the victim. Victims may disclose personal or confidential information. Scammers can use this information illegally. You could be giving away both your personal and financial information with a click of the mouse. People may inadvertently download viruses or malware, making themselves targets for scammers. Mrs. Clinton's campaign suffered from this. Phishing emails are a scam designed and orchestrated by fraudsters. Experts have used psychology to understand why people fall in love with phishing emails. Phishing can make it easy for us to fall for it by pandering to people's prejudices and emotions.
Webmail is usually used by banks, the INTERNAL Revenue Service, the government, and other agencies to gain people's trust. Because of the fact that people are more likely to follow orders from authority figures. Of course, webmail can also trick people into giving them confidential information in the form of coupons. More than 70 percent of people between the ages of 18 and 89 have clicked on a phishing email at least once. People over the age of 62, in particular, are more susceptible. The study also found that different age groups responded differently to additional scam emails. By looking at people from other occupations and levels of education, the researchers found significant differences in email content and fraud rates. Higher cognitive ability and cultural background also had different effects on the rate of deception. One of the study's conclusions is that protecting people from cyber-attacks requires psychological measures as well as the traditional technical means of relying on cyber security experts. Although from the point of view of human evolution, it is not so fast and straightforward to change how people think.
First of all, phishing emails bring a lot of inconvenience to people's lives and work. Many people have lost money and privacy. These are indisputable facts. Many of us have had the experience of clicking and opening a phishing app. Secondly, phishing software is hateful, but fraudsters often capture people's psychological weaknesses. For example, greed, selfishness, luck, love to take slight advantage, and so on. While promoting anti-fraud education, people should learn to find reasons for themselves instead of always making excuses and blaming others. Finally, preventing phishing emails cannot rely on technology and network technology alone. It does have a lot to do with both Eastern and Western cultures and the environment in which everyone grows up. People should also learn to change their way of thinking.