Write Articles A community of people who love to write

The easiest domain name (Note the .ORG) - Absolutely Free!
  

Home | Submit Articles | Login   
 
ALL Categories HEALTH EDUCATION FINANCE TECH WOMEN ENTERTAINMENT TRAVEL
 

Most Common Methods Used By People To Scam Others

BY: JoJustin | Category: Technology and Computers | Post Date: 2010-02-19
 



•    Read Comments

•    Print This Article



   JoJustin
Help others find this article:

ADD TO StumbleUpon ADD TO DEL.ICIO.US ADD TO DIGG Share with FACEBOOK
Show All Social Bookmarks


Online scams have been on the rise over the past few years. The reason for this has been the increased use of computers in various online activities. There are many people who have been using the various programs online to make money. This has made the various scamsters to use these methods for their own gain. So each and every method that has been used by real people to make money online in an honest way has been infiltrated by the people who are scamsters to make profit for them at the expense of the gullible and nave internet users.

Some of the methods that are used by people to scam others and make money are as follows:

1. E mail:


E mails are the simplest methods of trying to scam others. The reason for this is the fact that e mails are free and each person can have many accounts. This method of scamming people is very simple. The first step is to collect the e mail addresses of genuine people from various sites like social networks and other places. Once this is done, the next step that is done by these people is to send mails to these addresses asking for help to transfer a huge amount of money from their country to the mail recipients country. They also ask for certain e mail addresses of the people and also various other details. If these details are given, especially the bank account numbers, the money that is in the account of the person is siphoned off.

2. Websites:

The ease with which web sites can be created has also been an important reason for the increase in the number of scams that occur online. There are many people who have their own sites as money making places. These people advertise saying that they can make others to make a huge sum of money. This makes other people to enter the site. This causes virus to attack the system or even the programs from the site can siphon out the various details from the computer of the person directly. This is another method that is used to scam others and make money. In fact there are many sites that are dedicated only to make money from others by cheating them.

3. Phishing:

There are also various online sites and programs that invite you to download certain free programs from the internet. These downloadable programs are in the form of either games, music or video downloads. All these downloads are usually free because the web master of the scam site wants more people to download their program. It will be found that as the person downloads the program, along with the program, the phishing program can also get downloaded and all the sensitive information from the computer are all stolen that includes passwords and also bank account numbers that may be stored in the computer.

These are the various methods by which those who scam using the internet and computer operate.

Article Source: http://www.saching.com



About Author / Additional Info:

Additional Articles:
* Love between the Bollywood actors and actresses
* The advantages of a good credit score
* The Computer - Man's New Best Friend ?
* Who are the Maoists in India and what do they want?
* UNDERSTANDING INTERNET

Does this article violate or infringe on your copyright ?
It is a violation of our terms for authors to submit content which they did not write and claim it as their own. If this article infringes on your copyrights, then use our Contact us form with the detailed proof of infringement along with the offending article's title, URL and writer name. If you do not hear back from us then contact us again in another 10 days. Thank you.




Comments on this article: (0 comments so far)

* Additional comments are now closed for this article *
Comment Comment By Comment Date



Article Views: 4141

Page copy protected against web site content infringement by Copyscape
Copyright 2010 saching.com - Do not copy articles from this website.


Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.


| Home | Disclaimer | Xhtml |