Web Hosting Security

  Home arrow Web Hosting Security arrow Tech Temptations to Avoid
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING SECURITY

Tech Temptations to Avoid
By: wubayou
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating:  stars stars stars stars stars / 0
    2011-12-12

    Table of Contents:

    Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement
    On its own, the tech world is full of items that show off the talents of innovative individuals. While the internet and electronic devices give you access to a whole new world of productivity, entertainment, and more, many of us have the desire to go beyond what is given to us. Whether it’s online content, restrictions on devices we buy, or ethics in the virtual social world, there are many temptations in front of us that give us the urge to break the rules. Here are some of those tech temptations that you should avoid to keep free of any negative consequences.

    Rooting Your Android Smartphone

    We do not live in a perfect world, so there exists a chance that your newly purchased Android smartphone is lacking when it comes to the latest and greatest Android OS.  Many believe that once they purchase a device that they should be free to transform it however they wish.  There’s really nothing wrong with this notion, and it has plenty of merit.  Manufacturers, however, will likely have a different opinion.

    The process of rooting an Android smartphone or other device gives the owner root access.  This is essentially privileged control over the device that can be used to tweak and overcome certain restrictions or limitations placed upon the devices when they are put on the market.  Think of it as jailbreaking, but Android style.

    Rooting your Android device obviously offers advantages, otherwise nobody would go through the trouble of doing it.  As mentioned, you can get a more advanced OS, or clean up the bloated features that you have zero use for, plus much more.  The process is not the simplest around, and you will have to do things such as obtain a compatible Android ROM or build for your device, then follow instructions offered by pros on the subject.  Like everything, there is risk and reward in rooting, so while you may get better performance and features, you could brick your device.  Also, if you need to send it in for repair, the fact that you tampered with it will affect your warranty, so proceed with caution.

    Jailbreaking Your iPhone

    As with rooting your Android device, jailbreaking your iPhone to expand its possibilities and take further control can result in negative consequences.  Apple surely does not want you to jailbreak your iPhone and is constantly coming up with ways to combat such action.  Jailbreaking does open up the door for a ton of new apps and lessens carrier restrictions, but you could end up with an expensive iPhone that lacks a valid warranty in the end.

    Hijacking or Imitating Social Networking Accounts

    If you’ve spent some time on social networking sites like Twitter or Facebook, you know there is no shortage of phony profiles.  There are plenty of people out there who want to trick you into believing they are actual celebrities, as well as others with stolen pictures looking to dupe you into buying subscriptions to sites.  As tempting as it may be, you should avoid impersonating public figures.  This is rather obvious, but many people do it thinking it is harmless.  That all depends on the person you are imitating, as some may just brush it off.  Others, however, could slap you with a lawsuit for defamation or trademark violation.  Unless you have a big bank account stored away for potential lawsuits, you are better off fighting your impersonation tempations.

    The same holds true for hacking social networking accounts.  You may have an enemy you wish to spy on, or maybe you are wondering what your ex or current partner is up to.  Either way, hacking accounts, no matter how you do it, is a no-no.  Not only is it unethical (yeah right, who cares?), but it also violates terms of service.  Hacking an account could lead to civil lawsuits over defamation as well.

    Snooping Over Text Messages

    Similar to stalking someone on a social network, spying on text messages is just as bad.  It is warranted if your kids just got smartphone and you want to keep tabs on them with a program such as Mobile Spy, but it should be avoided in other instances.  For instance, Ezor noted that monitoring your spouse’s text messages without their consent, a warrant, or judicial permission is illegal.  Resist the urge to do so to protect your bank account.  Besides, you probably don’t want to know what is being said behind your back.

    Downloading YouTube Videos to Your Hard Drive

    Here is one action that appears to be harmless, but does break the rules.  YouTube is a great site to waste time thanks to its immense ever-growing catalog of videos.  While the site is great for streaming, there are probably some special videos that you would like to keep on your hard drive for frequent viewing.  There are programs out there that can help you achieve this type of YouTube downloading, such as KeepVid.  Once downloaded, the file becomes transferrable so you can watch it on other portable devices. 

    The convenience of such programs is hard to deny, but you are essentially breaking YouTube’s rules.  Specifically, the site prohibits viewing content “through any technology or means other than the video playback pages of the Service itself [or] the Embeddable Player.”  In other words, your little file conversion operating is taboo.  You break the rules even further if you plan on sharing the downloaded videos with others, as that brings the actual content owner’s copyright issues into play.

    As you can see, many of the items in this list are not exactly on par with murder, but they do break the rules.  As tempting as some of them may be, try to refrain from engaging in these tasks, as the consequences in the end may have you regretting the past.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    More Web Hosting Security Articles
    More By wubayou

    WEB HOSTING SECURITY ARTICLES

    - For Online Security, Invest in People
    - World`s Third-Largest Botnet Bites the Dust
    - Yahoo Security Breach Highlights Poor Practi...
    - How to Prevent Mobile Malware
    - FBI Issues Internet Security for Travelers a...
    - More of the Top Internet Scams
    - How to Stop Phishing Scams
    - Social Networking Safety Tips
    - How to Avoid Financial Fraud Online
    - Android`s Most Notorious Trojans and Viruses
    - GFI Report Details Top 10 Threat Detections ...
    - Sophos Releases Security Threat Report 2012
    - Facebook Safety Tips for 2012
    - Email Scam Hits Apple Users
    - Tips for Mobile Security

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap