Categories for E-mail

Cyberstalking Case Study Paper Essay

Cyberstalking Case Study Paper Essay

In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public.

Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions.

Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well. Mr. Bronk utilized various online email service providers such as Gmail, Hotmail, and Yahoo. The victims each had respective accounts with these email service providers which were overtaken by Mr.

Bronk, using the methods described above.

Mr. Bronk also used Microsoft Office Outlook in the commission of his crimes. Besides the cyberstalking, investigators also found evidence of extortion and pornography on Mr. Bronk’s computer hard disk storage drives. Along with these counts, Mr. Bronk is also charged with the possession of child pornography. The defendant used a computer and access to the Internet to gain unauthorized access to an online chatting forum in which blackmailed a victim into sending him nude photographs and videos of herself.

Mr. Bronk also had on his computer storage devices child pornographic materials such as photographs and videos. The defendant gained access to this material with the use of his computer and a connection to the Internet. Investigators were notified when a victim reported that her email and Facebook accounts had been hijacked and inappropriate messages sent to her entire contact list, in Connecticut.

When an Ex-parte motion was filed for the IP address of the computer device that was used to target the victim in Connecticut, it was found that the IP address subscriber information came back to a California address. This is when a large scale investigation was started and multiple victims were discovered. Upon further investigation the details of how the defendant carried out the crimes and other crimes unrelated to cyberstalking, such as extortion and possession of child pornography were committed by the defendant.

Virtual Private Network Essay

Virtual Private Network Essay

VPN Defined:

So what is a good definition of Virtual Private Networking?

Simply defined, a VPN is a “virtual” network that is kept private by “tunneling” private data through the underlying infrastructure of a public Internet. VPN technology provides a way of using public network infrastructures, such as the Internet, to provide private, secure access to applications and company resources to employees in remote or home offices, to business partners, and even to customers. A VPN is one or more WAN links over a shared public network, typically over the Internet or an IP backbone from a Network Service Provider (NSP) that simulates the behavior of dedicated WAN links over leased lines.

VPN technology uses a combination of tunneling, encryption, authentication, and access control mechanisms and services used to carry traffic over the Internet, a managed IP network or a service provider’s backbone.

VPN allows the data to be shared between the client and a server, between two servers, or between networks or routers via a public network but it works just like a point-to-point private line.

VPN network architecture uses the remote PC (installed with a client software) that makes use of the present telecommunication infrastructure technology like for example phone lines, broadband services, dedicated internet link etc. and a tunneling protocol (incorporated with other authenticated and encrypted protocols) to access the corporate resources like files, emails etc through a VPN server which sits at the perimeter of the corporate network. The diagram that is seen below shows the simple VPN structure between a client and a server:

VPN is a private network that is layered over the public networks for example Internet to connect to the remote sites and remote users with the privacy, security, quality of services with always on connectivity with well manageability features like the leased networks have. A typical VPN structure with remote offices business partner’s mobile users of the organization connected to the main office through the network services providers point of presence (Pops), looks like the one below shown in the diagram: