peperonity Mobile Community
Welcome, guest. You are not logged in.
Log in or join for free!
 
New to peperonity.com?
Your username allows you to login later. Please choose a name with 3-20 alphabetic characters or digits (no special characters).

IMPORTANT: Choose your name WISELY as you cannot change it later on! This is due to the fact that we will submit your pages to major search engines so that they can be found properly. 
Please enter your own and correct e-mail address and be sure to spell it correctly. The e-mail adress will not be shown to any other user. 
This password protects your account. To avoid typos it must be entered twice. Please enter 5-20 alphabetic characters or digits (no special characters). Choose a password that is not easy to guess! Never disclose your password to anyone. 
This password protects your account. To avoid typos it must be entered twice. Please enter 5-20 alphabetic characters or digits (no special characters). Choose a password that is not easy to guess! Never disclose your password to anyone. 
Stay logged in
Enter your username and password to log in. Forgot login details?

Username 
CAUTION: Do not disclose your password to anybody! Only enter it at the official login of peperonity.com. We will never ask for your password in a message! 
Login
Stay logged in

Share photos, videos & audio files
Create your own WAP site for free
Get a blog
Invite your friends and meet people from all over the world
All this from your mobile phone!
For free!
Get started!

You can easily invite all your friends to peperonity.com. When you log in or register with us, you can tell your friends about exciting content on peperonity.com! The messaging costs are on us.
Meet our team member Marzus and learn how to create your own mobile site!

CybEr Cr!mE? - quick.help



CybEr Cr!mE?
.
.
=TracE my IP & Proxy=
(http://tracemyip.org)
============-============
... IRC Crime ...
----------------
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.

... Phishing ...
---------------
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the userâ€(tm)s information.. By spamming large groups of people, the “phisherâ€� counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately. Phishing, also referred to as brand spoofing or carding, is a variation on “fishing,â€� the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.

Cyber Stalking
----------------
Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.

Child Pornography
---------------------
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. Itâ€(tm)s explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
The easy access to the pornographic contents readily and freely available over the internet lower the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet.

=======================================
What is an IP address?
-======================-
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.

Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).


This page:





Help/FAQ | Terms | Imprint
Home People Pictures Videos Sites Blogs Chat
Top