Professional Documents
Culture Documents
Peer
Peer
crucial to be 100% supportive, make it clear that it is not their fault and that you are
there to help and protect them no matter what
2. Locate the offending IP address. Read the firewall or server log to determine the IP address
and time stamp.
3. Determine who is responsible for the IP address. Go to http://whois.arin.net and enter the
offending IP address into the ARIN WHOISRWA search box. Most organizations have abuse
contact information listed under the Point of Contact section.
4. Send the evidence to the organization responsible for the IP address. If the offending IP
address belongs to Charter, report the incident to abuse@charter.net. If the offending IP doesnt
belong to Charter, report the incident to the owner of the IP address. Be sure to include in the
complaint the complete firewall or server log.
Note: Charter cannot process an abuse complaint unless it includes a complete firewall or
server log that contains the evidence of abuse.
What should I do if I am threatened over the Internet (via email, chat, or other
form of online communication)?
If you are threatened over the Internet:
Do not delete the offensive or dangerous email. Instead, turn off the monitor and contact
local law enforcement.
Report the incident to your local law enforcement agency, as you would any other crime
committed against you.
back to top
How To Respond
What should I do if I am threatened over the Internet (via email, chat, or other
form of online communication)?
If you are threatened over the Internet:
Do not delete the offensive or dangerous email. Instead, turn off the monitor and contact
local law enforcement.
Report the incident to your local law enforcement agency, as you would any other crime
committed against you.
6. If you discover that your credit card was used to pay another Charter customer's bill
without your permission, or if you believe you were otherwise the victim of identity theft
regarding your Charter account, please visit www.charter.com/idtheft for more
information.
back to top
Email
What is an email header?
Complaints cannot be processed unless you send us a sample that includes full email header. An
email message consists of two major sections:
1. Body: The message itself, sometimes containing a signature block at the end.
2. Headers: Contains the sender (From:), receiver (To:), summary (Subject:), and other
information about the email.
From: Contains the email address of the sender of the message. Just beware the From:
line can be easily forged.
To: Contains the email address of the receiver of the message. The "To" header in the
message is not necessarily related to the addresses to which the email is delivered. The
actual delivery list is supplied in the SMTP protocol, not extracted from the header
content. The "To" header is similar to the greeting at the top of a conventional letter that
is delivered according to the address on the outer envelope.
Date: Contains the local time and date when the message was originally sent.
Cc: Carbon copy works like an old fashion carbon paper that's use to make duplicate
copies of a typed letter.
Received: Tracking information generated by mail servers that have handled a message.
Content-Type: Information about how the message is displayed, usually a MIME type.
Note: Most organizations have a dedicated machine to handle mail, called a "mail server". This
machine acts like a hub for email messages. When a user sends mail, the message travels to the
ISP's mail server. The mail server delivers the message to its destination which is another mail
server. It then sits on that second mail server until the recipient retrieves the mail.
2. Windows Mail
3. Microsoft Outlook
4. Outlook Express
5. Apple Mail
Select Customize Headers and drag the Show Headers icon into your toolbar.
6. Microsoft Entourage
Click Internet Headers and use your mouse to pull down on the line below the header so
that the entire header is visible.
but before we go into the matter, let us give you some context. Recently, actress and TV
presenter Shruti Seth was harassed on Twitter for expressing her opinion about the PM's
#selfiewithdaughter campaign. Soon after that, activist Kavita Krishnan was mercilessly trolled
on social media for calling Modi a #lameduckPM.
Cut to present day, and actress Neha Dhupia is being literally stalked on Twitter for this tweet she
put up yesterday:
Neha duphia: One rain n the city comes to a standstill. Good governance is not
about selfies n makin us do yoga ,it's making sure ur citizens r safe.
People are saying things like: Neha Dhupia is trending for funny reasons. I would have
liked her to trend for her role in "Raat Gayi Baat Gayi?"
And this: st Shruti Seth & now Neha Dhupia. Apart from criticising Modi, can't all Cgrade actresses find some other way 2claim Few-Hours-Fame on net
Before you trolls begin your good work here too, here is some information you may want to read
about:
According to the Washington Post,
The men most likely to harass women online are the men most likely to have their own
problems.
Researchers Michael Kasumovic and Jeffrey Kuznekoff, from the University of New South
Wales and Miami University, respectively, conducted a test among a bunch of men and
women playing the popular videogame Halo 3.
Halo Chart
How can this be connected to what we're talking about, you ask?
According to Kasumovic, Halo 3 actually "makes incredible proxies for studying real-life
behavior."
...Kasumovic suggests, a recent influx of female participants has disrupted a pre-existing social
hierarchy. Thats okay for the guys at the top but for the guys at the bottom, who stand to lose
more status, thats very threatening. (Its also in keeping with the evolutionary framework on
anti-lady hostility, which suggests sexism is a kind of Neanderthal defense mechanism for
low-status, non-dominant men trying to maintain a shaky grip on their particular caves
supply of women.)
(emphasis ours)
As men often rely on aggression to maintain their dominant social status, Kasumovic writes,
the increase in hostility towards a woman by lower-status males may be an attempt to disregard
a females performance and suppress her disturbance on the hierarchy to retain their social
rank.
1. Social Exclusion
Social exclusion might be one of the mildest forms of cyberbullying, but it can cause serious
distress: it's the online equivalent of leaving someone out of a group to which they should expect
automatic membership. This could include an entire class not accepting a friend request from a
particular classmate.
Tip: Focus on developing real-life relationships rather than depending on virtual relationships
for social connection. If you or your child is being excluded online, this is probably an indication
of a more serious social problem in real life. Talk to your parents, teachers, or a counselor if
you're being socially excluded at school. Joining online or real-life groups based on your
interests, hobbies, or activities is also helpful.
2. Tagging Without Permission
Tagging is a way of attaching a person's name to an online image so that her name appears on the
image, or so that images of a particular person can be identified by searching for tagged images
using her name. Tagging someone's name against an embarrassing, defaming, or manipulated
imageparticularly without her permissionis a form of internet abuse, especially when the
intention is to cause that person distress or ridicule.
Tip: Limit and censor images that you post of yourself, and that others post of you. Go into the
privacy settings of the website you are using and adjust them so that tagged images of you
cannot be seen by others. You may also be able to block specific people from accessing any
information about you. If your image has been posted on a website, contact the website
administrator and request that it be taken down. If the image is pornographic, you may be able to
report the abuse to the police, although some teens have found themselves in trouble for others'
posting sext images of them online.
3. Flaming
Flaming is the practice of posting derogatory comments about another person. It can include
outing another person by revealing that he is gay when he hasn't come out himself; character
assassination by berating someone's character throught exaggerating her perceived faults in an
unbalanced way; or posting up untrue information about someone in order to damage her image
or reputation.
Tip: Although abuse is never the fault of the victim, you can reduce the likelihood that it will
happen to you by conducting yourself appropriately online, avoiding provoking negative
reactions in others by comments you make, and treating yourself and others with respect. At the
very least, any flaming that does happen will be unsubstantiated and unconvincing. And if it does
happen, report abuse to the owner of the website; webmasters are increasingly aware of internet
abuse and have moderators who can remove offensive material.
4. Sext Re-Posting
Sexting is a risky activity, but when you are in a relationship, you can be drawn into sexting a
picture of yourself to your loved one without thinking about the potential future risk of its being
used against you.
Younger internet users, especially teenage girls, can also be flattered into sexting images of
themselves, or flashing on a webcam, by predators, pedophiles, and pornographers who can use
these images for cybersex. This is known as coercion, and is a form of internet abuse. While you
may feel embarrassed by such images of you being made public, it is not your fault. Ask them to
take the image down, and if they do not, report it to the website as being posted without your
consent. If they continue to leave it online, and especially if they are harassing you in any other
way, report it to the police.
5. Impersonation and Identity Theft
Impersonation is pretending to be someone else, and can range from obvious mockery to actually
borrowing or stealing someone's identitysuch as their name, image, or identifying information
to carry out actions which are attributed to the victim.
Tip: For superficial impersonations, such as someone posting up a silly comment online using
your name, simply adding a comment below stating that it was not made by you might be
enough. For more serious impersonationscomments which indicate controversial views you do
not agree with, for exampleyou can contact the webmaster and ask to have it removed. And if
your personal information is used to commit theft or another crime, you should either confront
the culprit to correct the matter, or report it to the police.
These days Googling and Facebooking are as common daily activities as shaving and sleeping,
and all over the world, the amount of time that college students devote to the Web is increasing.