#also I don't mean to steal anyone else's post and I apologize if it's similar to other's!
Explore tagged Tumblr posts
Text
leaving this here just bc I've seen a LOT of awesome takes lately (im looking directly at all of my mutuals while saying this btw🙏) but can we all admit the whole 'mike "confessing" to will that he's not the heart but will is' thing was like. . . completely wrong?
no offense, but every character has a role in every story, and will's role is NOT the heart, it's mike no matter what you think. has will ever been in a position of leadership like that?? no, right? he hasn't. not to say he isn't important, he very much is! but throughout the seasons, we've literally been SHOWN how the party thrives under mike's leadership I mean come on.
s1: mike getting everyone together to find will in the first place, coming up with plans, making mistakes but ultimately still being the lead, not giving up and doing his best to protect who he can even though he's literally still a kid
s2: once again, making plans to save will, getting everyone together and pulling their heads out of their asses, paying attention to will and lending an ear, maintaining that role of someone 'steady' even though he himself is very much suffering. once again, he makes mistakes, and unfair assumptions, but that's bc he's human, and obviously we all have biases (and he's also barely even a teen like... come on)
s3: now we get to where things start getting rocky, but STILL even after everything he still manages to pull himself together (also bc of will calling him out in the garage yessir) and even with el being a big focus, he's still shown to lead and direct the party (while once again making mistakes, and yes that still doesn't mean he isn't a good leader)
s4: this is the season where he's unfortunately removed a lot from the action (coincidence? I think not) but it's still obvious in certain scenes, how he steps up after the whole thing with el, etc.
anyways, small note too, but it would also go against will's character to feed into mike's insecurities btw. like.. can u imagine that kid looking at mike after mike says he's not the heart/ the leader, and will going "yes ur so right king!!" haha. . . no. will constantly and consistently builds mike back up and stands with him, so why would he agree with something like that??
basically what I'm trying to say is that no matter what changes, mike IS the heart of the party, even though he does fuck up and make mistakes, he is undoubtedly in that role 100% and everyone knows it. as I said before, every character has their role in the story, so if not the heart or the leader, what would mike's role be? genuinely asking bc honestly I can't see anything else, but let me know if I'm wrong or got something wrong ig🤷♂️
#mike wheeler#byler#< intended audience#I've seen other ppl say this kinda stuff but I wanted to make a post about it bc I've seen one too many fanon byler posts recently#the party stranger things#and if anyone wants to argue I have several instances in the show where this is directly shown on the tip of my tongue btw#I just hate seeing ppl take away other characters traits and shove them onto another#it's#very boring and hard to watch happen#anyways im grumpy today can anyone tell#also I don't mean to steal anyone else's post and I apologize if it's similar to other's!#these r kinda just my thoughts on the matter in my own words + agreeing with others opinions
165 notes
·
View notes
Text
What is online safety?
Is the knowledge of maximizing the user's personal safety and security and security risk to private information, and self-protection from computer crime in general.
10 SAFETY TIPS
1. Know the Scams
Learn about diferrent kinds of scams and what you can do to avoid them.
2. Think before you click
Think twice, thrice and a zillion time before click any link or buttons.
3. Safety Peruse
These sites may have an Address that's very similar tp legitimate site, but the page can have misspelling, Bad Grammar, or low resolution Images.
4. Shop Safety
Don't shop on a site unless it has "https" and a padlock icon on the left or right or the URL.
5. Kick-butt Passwords
Use an Extremely uncrackable password One likw 9&4yiw2pxwys#"
6. Protect you Info's
Keep your guard up. Back up all your data on your computer, smartphone and tablet, theft or a cash.
7. Watch your Wi-Fi Connectivity
Protect your network by changing your router's setting and making sure that you have connection password-protected.
8. Install a Firewall
A firewall is a gate line of defense against cyber attracts.
9. Keep up to date
• The best security updates automatically to protect your computer.
• Use the manufacturer's latest security patches to make regular updates and make that you have the software set to do routine scam.
10. Use your Noggin
Use your common sense while surfing the web.
COMMON ISSUES AND CRIMES IN THE INTERNET
CYBERBULLYING
HACKING
IDENTITY THEFT
PLAGIARISM
COPYRIGHT ISSUES
CYBERBULLYING
Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying
Cyberbullying is when someone, typically teens, bully or harass others on the internet, particularly on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e. hate speech).
The Anti-Bullying Act of 2013
(RA 10627)
(Sec. 2, RA 10627) These acts are collectively called “cyber bullying” when committed online. (Sec. 2-D, RA 10627) This covers social bullying aiming to belittle another individual or group or gender-based bullying that humiliates another on the basis of perceived or actual sexual orientation and gender identity. (Sec. 3, B-1, RA 10627, Implementing Rules).
The Revised Penal Code and the Cybercrime Prevention Act
One who publicly or maliciously imputes to another a crime, vice, defect, real or imaginary, or any act, omission, condition, status or circumstance tending to cause the dishonor, discredit or contempt of a natural or juridical person, or blacken the memory of one who is dead may be liable for libel under this Code. (Art. 353, RPC) These acts are more severely punished when done online in addition to the civil action for damages which may be brought by the offended party. (Sec. 4(c-4), RA 10175) Cyberlibel holds liable only the original author of the post (Sec. 5(3), Implementing Rules of RA 10175). Likers or sharers of a post cannot be held liable under this law.
Slander may also be applicable to one who, in heat of anger, utters statements that are highly defamatory in character. (Art. 358, RPC) Intriguing Against Honour may also find applicability when the principal purpose is to blemish the honour or reputation of a person. (Art. 364, RPC) However, the requirement is that the post be directed to a specific person. Hence, a blind item is not as actionable as a named-post in social media.
HACKING
Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.
Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.
IDENTITY THEFT
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.
Types and examples of identity theft
True-name identity theft means the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service or open a new checking account in order to obtain blank checks.
Account-takeover identity theft means the imposter uses personal information to gain access to the person's existing accounts.
PLAGIARISM
Plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward.
The following are considered plagiarism
turning in someone else's work as your own
copying words or ideas from someone else without giving credit
failing to put a quotation in quotation marks
giving incorrect information about the source of a quotation
changing words but copying the sentence structure of a source without giving credit
copying so many words or ideas from a source that it makes up the majority of your work, whether you give credit or not (see our section on "fair use" rules)
Copyright Issues
Republic Act No. 8293 [An Act Prescribing the Intellectual Property Code and Establishing the Intellectual Property Office, Providing for Its Powers and Functions, and for Other Purposes]otherwise known as the Intellectual Property Code of the Philippines.
Intellectual property rights under the I. P. Code: The intellectual property rights under the Intellectual Property Code are as follows:
1. Copyright and related rights;
2. Trademarks and service marks;
3. Geographic indications;
4. Industrial designs;
5. Patents;
6. Layout designs [topographies] of integrated circuits; and
7. Protection of undisclosed information.
The scheme of penalties for infringement has also been changed. From the previous fine of Php200 to Php2,000 and/or imprisonment of 1 year, the current range of penalties are as follows:
For first offenders - fine of PhP50,000 to PhP150,000 and/or imprisonment of 1 to 3 years
For second offenders - fine of PhP150,000 to PhP500,000 and/or imprisonment of 3 to 6 years
For third and subsequent offenders - fine of PhP500,000 to PhP1.5 Million and/or imprisonment of 6 to 9 years.
In case of insolvency, the offender shall furthermore suffer subsidiary imprisonment.
NETIQUETTE
Is a combination of the word net and etiquette.
It focuses on the acceptable behavior of a person while using the internet resource.
The Core Rules of Netiquette
Rule 1. Remember the human.
Never forget that the person reading yourj mail or posting is, indeed, a person, with feelings that can be hurt.
Corollary 1 to Rule #1: It's not nice to hurt other people's feelings.
Corollary 2: Never mail or post anything you wouldn't say to your reader's face.
Corollary 3: Notify your readers when flaming.
Rule 2. Adhere to the same standards of behavior online that you follow in real life.
Corollary 1: Be ethical.
Corollary 2: Breaking the law is bad Netiquette.
Rule 3. Know where you are in cyberspace.
Corollary 1: Netiquette varies from domain to domain.
Corollary 2: Lurk before you leap.
Rule 4. Respect other people's time and bandwidth.
Corollary 1: It's OK to think that what you're doing at the moment is the most important thing in the universe, but don't expect anyone else to agree with you.
Corollary 2: Post messages to the appropriate discussion group.
Corollary 3: Try not to ask stupid questions on discussion groups.
Corollary 4: Read the FAQ (Frequently Asked Questions) document.
Corollary 5: When appropriate, use private email instead of posting to the group.
Corollary 6: Don't post subscribe, unsubscribe, or FAQ requests.
Corollary 7: Don't waste expert readers' time by posting basic information.
Corollary 8: If you disagree with the premise of a discussion group, don't waste the time and bandwidth of the members by telling them how stupid they are. Just stay away.
Corollary 9: Conserve bandwidth when you retrieve information from a host or server.
Rule 5. Make yourself look good online.
Corollary 1: Check grammar and spelling before you post.
Corollary 2: Know what you're talking about and make sense.
Corollary 3: Don't post flame-bait.
Rule 6. Share expert knowledge.
Corollary 1: Offer answers and help to people who ask questions on discussion groups.
Corollary 2: If you've received email answers to a posted question, summarize them and post the summary to the discussion group.
Rule 7. Help keep flame wars under control.
Corollary 1: Don't respond to flame-bait.
Corollary 2: Don't post spelling or grammar flames.
Corollary 3: If you've posted flame-bait or perpetuated a flame war, apologize.
Rule 8. Respect other people's privacy.
Don't read other people's private email.
Rule 9. Don't abuse your power.
The more power you have, the more important it is that you use it well.
Rule 10. Be forgiving of other people's mistakes.
0 notes