• الصفحة الرئيسيةخريطة الموقعRSS
  • الصفحة الرئيسية
  • سجل الزوار
  • وثيقة الموقع
  • اتصل بنا
English Alukah شبكة الألوكة شبكة إسلامية وفكرية وثقافية شاملة تحت إشراف الدكتور سعد بن عبد الله الحميد
 
الدكتور سعد بن عبد الله الحميد  إشراف  الدكتور خالد بن عبد الرحمن الجريسي
  • الصفحة الرئيسية
  • موقع آفاق الشريعة
  • موقع ثقافة ومعرفة
  • موقع مجتمع وإصلاح
  • موقع حضارة الكلمة
  • موقع الاستشارات
  • موقع المسلمون في العالم
  • موقع المواقع الشخصية
  • موقع مكتبة الألوكة
  • موقع المكتبة الناطقة
  • موقع الإصدارات والمسابقات
  • موقع المترجمات
 كل الأقسام | مقالات   بحوث ودراسات   إبهاج المسلم بشرح صحيح مسلم   الدر الثمين   سلسلة 10 أحكام مختصرة   فوائد شرح الأربعين   كتب   صوتيات   مواد مترجمة  
اضغط على زر آخر الإضافات لغلق أو فتح النافذة اضغط على زر آخر الإضافات لغلق أو فتح النافذة
  •  
    10 مسائل مهمة ومختصرة في: شهر الله المحرم
    الشيخ د. عبدالله بن حمود الفريح
  •  
    10 مسائل مهمة ومختصرة في الأضحية (PDF)
    الشيخ د. عبدالله بن حمود الفريح
  •  
    10 مسائل مهمة ومختصرة في 10 ذي الحجة (PDF)
    الشيخ د. عبدالله بن حمود الفريح
  •  
    الدعاء لمن أتى بصدقة
    الشيخ د. عبدالله بن حمود الفريح
  •  
    حديث: صدقة لم يأكل منها
    الشيخ د. عبدالله بن حمود الفريح
  •  
    حديث: هو لها صدقة، ولنا هدية
    الشيخ د. عبدالله بن حمود الفريح
  •  
    باب: (ترك استعمال آل النبي على الصدقة)
    الشيخ د. عبدالله بن حمود الفريح
  •  
    حديث: «كخ كخ، ارم بها، أما علمت أنا لا نأكل ...
    الشيخ د. عبدالله بن حمود الفريح
  •  
    شرح حديث: سيخرج في آخر الزمان قوم أحداث الأسنان ...
    الشيخ د. عبدالله بن حمود الفريح
  •  
    التعريف بالخوارج وصفاتهم
    الشيخ د. عبدالله بن حمود الفريح
  •  
    حديث: ألا تأمنوني؟ وأنا أمين من في السماء
    الشيخ د. عبدالله بن حمود الفريح
  •  
    إعطاء المؤلفة قلوبهم على الإسلام وتصبر من قوي ...
    الشيخ د. عبدالله بن حمود الفريح
  •  
    إعطاء المؤلفة قلوبهم على الإسلام وتصبر من قوي ...
    الشيخ د. عبدالله بن حمود الفريح
  •  
    إعطاء المؤلفة قلوبهم من الزكاة
    الشيخ د. عبدالله بن حمود الفريح
  •  
    باب: (إعطاء من سأل بفحش وغلظة) (2)
    الشيخ د. عبدالله بن حمود الفريح
  •  
    باب: (إعطاء من سأل بفحش وغلظة) (1)
    الشيخ د. عبدالله بن حمود الفريح
شبكة الألوكة / المواقع الشخصية / مواقع المشايخ والعلماء / د. زيد بن محمد الرماني / تحقيقات وحوارات صحفية
علامة باركود

How do we protect our computers and our children from piracy?

How do we protect our computers and our children from piracy?
د. زيد بن محمد الرماني

مقالات متعلقة

تاريخ الإضافة: 11/10/2020 ميلادي - 23/2/1442 هجري

الزيارات: 7674

 حفظ بصيغة PDFنسخة ملائمة للطباعة أرسل إلى صديق تعليقات الزوارأضف تعليقكمتابعة التعليقات
النص الكامل  تكبير الخط الحجم الأصلي تصغير الخط
شارك وانشر

How do we protect our computers and our children from piracy?


The phenomenon of the electronic mafia is spreading, and the damage caused by the theft of information and privacy, and the material and psychological losses caused by this phenomenon, technical and informatics, are increasing.


Each time, the world devises a way and mechanisms to address it. The phenomenon is active and artful in its methods, means and tools. This has made it seem even more perplexing about how to address it.


This investigation attempts to examine the mechanisms of confrontation and means of response. and battle weapons.


At first, Dr. Zeid bin Mohammed al-Rummani, economic advisor, and faculty member of Imam Mohammed Bin Saud Islamic University, spoke about the danger of the electronic mafia by saying: "Smoking is harmful to health", a sentence engraved on cigarette cans, read by the smoker without attention, and one day when the producing companies stop putting this sentence, the smoker will feel that something has been lost from it.


Computer dealers experience a similar paradox today, when they see you on the computer screen with the operation of most of the software a warning message from the lack of copying and distribution of software, because it is protected by copyright, copyright and international agreements, and the violator will be subject to civil and criminal prosecution.


Those dealing with computers today experience a similar paradox, when they see you on a computer screen with most programs running a warning message against the consequences of copying and distributing software; for being protected by copyright, copying and printing rights and international agreements, the violator will be subject to civil and criminal prosecution.


Dr. Hassan Abdel Aziz says in a book entitled "The Future of the Digital Revolution", everyone is now talking intently about intellectual piracy, particularly software piracy, an expression of software theft through illegal copying.


However, why is there such a big fuss about software piracy or what is more generally known as cybercrime?

First, it is difficult to obtain an accurate identification of the intent of cybercrime, the multiplicity of patterns and the emergence of new forms of modern forms.


However, some actors have defined cybercrime as an illegal act, including the use of any electronic device or private or public information network such as the Internet.


Forms of cybercrime:

He added: It is no secret that the forms of cybercrime are many and varied, such as those in which the information system is the subject of crime, such as in the case of the suspension, disruption, destruction, obstruction of access to the service, hacking or destroying websites or hacking e-mail.


There are also offences in which the information system is a tool for committing the crime and a means of carrying it out, such as in the case of the exploitation of computers or the information network to seize funds, defame others, defamation or attack on intellectual property rights.


The facts indicate that software theft is constantly increasing, coinciding with the continued spread and prosperity of the computer industry.


Unfortunately, the markets have invaded forged intellectual goods that have led the world to confront the traffickers of intellectual counterfeiting and many countries have applied severe sanctions , as a result, to the trade of intellectual forgery, by prosecuting the perpetrators of intellectual forgery, and even to raid the condition and their dens to seize and confiscate counterfeit goods, often destroyed in plain sight.


Legitimate facts:

He said: We should point out some of the legal facts in this area, including:

Attacking private life and spying on the communications and correspondence of those who are dealing with the information network is forbidden by law, to say: "Don't spy" [Al- hujrat: 12]. Because this is a follow-up to the iws and uncovering the hidden.


Those who harm believers and believers other than what they have gained have endured our insults and slander ." And those who annoy believing men and women undeservedly, bear (on themselves)a calummy and a glaring sin .( Al- Ahzab :58).


It is noted recently, unfortunately, that there are others who are keen on some electronic crimes, such as improper access to other people's devices, or explaining how to spread hostile or vice-deprecating websites; this is a clear violation of the system, according to Dr. Abdullah Abdul-Aziz Al-Ajlan, who adds that one of the most important features of information technology is the ease of sharing and circulation of information, and this feature, like other features of technology, is used by some people to spread their destructive ideas and practice their hobbies harmful to others.


Nevertheless, the issuance of a system to combat cybercrime is expected, God willing, to contribute to improving the regular environment for information technology uses, maintaining security and supporting the national economy.


Obsession and questions:

Dr. Al-Rommany added: Software security remains a concern that always worries companies, and this issue raises a number of questions: Who has the right to software? Is he the person who wrote the software or wrote the software right to copy the software for the benefit of other companies?


These and other questions have been the focus of a debate that has sometimes resulted in consensus and sometimes disagreement. However, it was agreed that the software would be the right of the employer if the programmer held a job with the employer, and when the consultant governed the job of the programmer, the agreement between the two parties determined the form of the use of the software.


Finally, opinions are conflicting and voices rise in contrasting tones, but everyone agrees that a moral awakening is the key to breaking out of the crisis of so-called software piracy.


Indeed, this moral awakening is required to save all the technological achievements of the century from its enemies and from itself first, especially when it is characterized by selfishness, impulsiveness and the pursuit of both cognitive and economic monopoly.


Hacking theft:

Dr. Abdelkader Al-Fantouk also mentioned the mechanism for tackling the electronic mafia at home: piracy is simply theft. The sooner your children realize this, the better. As you probably know, sometimes it's not enough to simply tell the child that this is wrong. This may help to discuss with the child the consequences of this.


Here are some of the penalty fines that you or your children can face if they download music illegally:

• According to U.S. copyright law, you may be fined up to $30,000 (this fine may change by country).


• Your home computer and related files and disks can be confiscated.


• Your children may put your computer at risk of viruses.


• Your children may put your computer at risk of spyware or other unwanted software.


As for monitoring children's activities on the computer, the doctor said that once you explain the dangers of piracy to your children, you should continue to monitor their activities.


Two important tips:

Here are two tips that can be useful:

• Place the computer in a central room within the house. Select specific times for your computer to use and not use by children and make sure they understand acceptable and unacceptable activities.


A web service that allows you to track children's online activities can help you monitor what they do online, even though it is not intended as an alternative to parental intervention. If you subscribe to MSN Premium, you can use parent controls that allow you to block certain sites from your children, and you can report weekly about the sites they visit on the Web.


He also urged the child to be given a limited-rights user account by saying that it allows Windows XP to create multiple user accounts on your computer. Each user can sign in independently and have a unique profile as well as a "desktop" and that user's Documents folder. As a parent, you can give yourself an administrator account, which allows you to take full control of your computer, and give your children limited-rights user accounts, which include restricted control stake that helps, keep children out of trouble.


Forms of piracy:

Dr. Khalid bin Sulaiman Al-Ghoutabar also spoke about the penetration of information by saying: Hacking is another type of attack on websites; it depends on access to a computer without permission or exceeding the permissible limits and the most common objectives of hacking internet sites are:

Distortion of websites this is the most common target in attacking web sites. Attackers change or modify the pages of the site by placing their message. The purpose of the attack is to attract attention to a particular issue or problem or to show those offensive experiences and capabilities.


Espionage is another purpose of online piracy by spying on visitors or website owners and obtaining important information.


Theft by accessing information that is not available to the public is another purpose of penetration. There may be confidential information that is kept on the website and accessed by specific persons and through penetration; the attackers can access that information.


Exploiting devices, cyber-attacks are often carried out using intermediary devices that were hacked earlier in the attack. The attacker first hacked into these devices and installed some software that could be activated later to launch a remote-target attack. These exploited devices are not the target of attack per se, but are used as a medium to start attacking other actual targets.


Common techniques:

He then spoke about common hacking techniques: there are many common hacking techniques used to attack web applications, and take advantage of the vulnerabilities found in those systems. Examples include information leaks, database injections, lack of protection, when transferring data over the Internet, system fingerprinting, malicious code codes, errors in web or system design that are the cause of the possible penetration by database injection, malicious code codes, split-up of the script language response and administrative errors are the cause of information leakage, lack of protection when transferring data over the Internet and system fingerprint.


He also said that one of the proposed solutions to protect websites in the event of a crisis is that one of the safest ways to protect devices from hacker attacks is to disconnect them from the network. However, unfortunately this method cannot be done for web servers because websites have to be available at all times.


Proposed solutions:

Here are some of the solutions that need to be applied to prevent attacks on websites, especially in times of crisis:

Continuous update: Nothing is complete, this is the case with software, and often-new errors are found in software products and need to be modified immediately otherwise these loopholes can be exploited by attackers and hacked computers that use those programs. Therefore, programmers try to fill these gaps and download modifications on a regular basis after any error appears or detects what is called patching. Having such a sound policy helps eliminate many of the vulnerabilities discovered making the web serversafer.

Penetration test: A set of activities used to test the security of a system or organization by trying to access the system without using legitimate access methods. It is a test that detects vulnerabilities and is a very good way to know the security situation through which remedial measures can be taken against vulnerabilities, if any.


With web hosting experience:

He added: Another solution is good hosting: there are two web-hosting options, one for internal hosting and the other for external hosting. If the organization chooses to host internally, the organization will have direct control of its website, but many organizations lack sufficient hosting experience and will make greater administrative effort.


If the location data is not confidential and not of great value, it is best to outsource the hosting because it is likely to be better qualified and equipped and require less administrative effort. On the other hand, location control will be less, and the strength of the site will be as a hosting service provider. In this case, it is very important to select a host of the site who is interested in security aspects and to have a contract that requires the hosting service provider to constantly update and fill in the gaps. In addition, it is preferable to have a separate server for the site and stay away from hosting with the server.


Secure programming: One of the most important things that software developers can do to help secure systems is to write programs that can withstand attacks and it is necessary to adopt secure methods of programming from the beginning, because many vulnerabilities can be easily avoided if we consider them from the beginning of the software development. In addition, understanding common security vulnerabilities in programs allows software developers to make safer decisions and enables them to come up with other strategies to make weak errands more powerful.


Safe settings:

The power of a system is said to depend on the power of its weakest rings, so even if the system is securely programmed, it can still be attacked if it is not properly set up.


Organizations must therefore have sound policies and procedures to properly prepare their systems, such as closing unused ports and limiting the use of non-core software, because many attacks on websites occur only because of insecure settings and provide attackers with an opportunity to exploit the vulnerability of the system.

 





 حفظ بصيغة PDFنسخة ملائمة للطباعة أرسل إلى صديق تعليقات الزوارأضف تعليقكمتابعة التعليقات
شارك وانشر

مقالات ذات صلة

  • Computers and the Internet are economical techniques
  • Computer economics

مختارات من الشبكة

  • How do we calculate the last portion of the night?(مقالة - موقع الشيخ خالد بن عبدالمنعم الرفاعي)
  • Islam's Teachings and How They Solve Past and Current Problems (PDF)(كتاب - مكتبة الألوكة)
  • Islam's Teachings and How They Solve Past and Current Problems (WORD)(كتاب - مكتبة الألوكة)
  • How to Calculate Zakat of Gold of Different Carats [طريقة احتساب زكاة الذهب من عيارات مختلفة](مقالة - آفاق الشريعة)
  • (How to call people to Islam (5(مادة مرئية - موقع د. ناجي بن إبراهيم العرفج)
  • (How to call people to Islam (4(مادة مرئية - موقع د. ناجي بن إبراهيم العرفج)
  • (How to call people to Islam (3(مادة مرئية - موقع د. ناجي بن إبراهيم العرفج)
  • (How to call people to Islam (2(مادة مرئية - موقع د. ناجي بن إبراهيم العرفج)
  • (How to call people to Islam (1(مادة مرئية - موقع د. ناجي بن إبراهيم العرفج)
  • How should I deal with my son who uses chat?(مقالة - موقع الشيخ خالد بن عبدالمنعم الرفاعي)

 


تعليقات الزوار
1- Thank you very much Dr
محمد الشيخلي - iraq 11-10-2020 09:15 PM

We need several steps to confront pirates:
1- Preaching: It is the job of scholars and preachers to God Almighty, as they must explain the prohibition of espionage and exposure to the privacy of individuals and the public.
2- Establishing the borders: It is the task of the state and the judicial authorities, so if one of these pirates is arrested and punished with penalties of the least of which are reinforcement, this will be a deterrent to the rest.
3- Be careful when using the Internet and take caution and be careful not to enter suspicious websites, as well as not respond to requests, offers and promotions, as they may be ambushes and traps for hackers.

1 

أضف تعليقك:
الاسم  
البريد الإلكتروني (لن يتم عرضه للزوار)
الدولة
عنوان التعليق
نص التعليق

رجاء، اكتب كلمة : تعليق في المربع التالي

مرحباً بالضيف
الألوكة تقترب منك أكثر!
سجل الآن في شبكة الألوكة للتمتع بخدمات مميزة.
*

*

نسيت كلمة المرور؟
 
تعرّف أكثر على مزايا العضوية وتذكر أن جميع خدماتنا المميزة مجانية! سجل الآن.
شارك معنا
في نشر مشاركتك
في نشر الألوكة
سجل بريدك
  • بنر
  • بنر
كُتَّاب الألوكة
  • الدورة الخامسة من برنامج "القيادة الشبابية" لتأهيل مستقبل الغد في البوسنة
  • "نور العلم" تجمع شباب تتارستان في مسابقة للمعرفة الإسلامية
  • أكثر من 60 مسجدا يشاركون في حملة خيرية وإنسانية في مقاطعة يوركشاير
  • مؤتمرا طبيا إسلاميا بارزا يرسخ رسالة الإيمان والعطاء في أستراليا
  • تكريم أوائل المسابقة الثانية عشرة للتربية الإسلامية في البوسنة والهرسك
  • ماليزيا تطلق المسابقة الوطنية للقرآن بمشاركة 109 متسابقين في كانجار
  • تكريم 500 مسلم أكملوا دراسة علوم القرآن عن بعد في قازان
  • مدينة موستار تحتفي بإعادة افتتاح رمز إسلامي عريق بمنطقة برانكوفاتش

  • بنر
  • بنر

تابعونا على
 
حقوق النشر محفوظة © 1446هـ / 2025م لموقع الألوكة
آخر تحديث للشبكة بتاريخ : 9/11/1446هـ - الساعة: 17:29
أضف محرك بحث الألوكة إلى متصفح الويب