Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Twitter Used For Social Good And To Incite Disorder

Sep 25, 2011 | ITNews.com

Twitter and other social media sites are sparking an international debate over whether the forums serve the public good or make it easier to incite disorder.

There are examples of both in recent months.

-- In Mexico, before the police or news reporters had even arrived at an underpass outside Veracruz where gunmen held up traffic and dumped 35 bodies at rush hour last week, Twitter users were warning others to avoid the area, reports The New York Times. The warnings on Twitter about the bodies arrived on the same day that Veracruz's State Assembly made it a crime to use Twitter and other social networks to undermine public order.

-- In China, Sina.com is warning micro-bloggers that it will penalize them for spreading false rumors on Weibo, which is Sina's Twitter-like social media service that has 200 million registered users, reports CNN.

-- In England, British police threatened to bring charges against those who used social media to incite the looting and violence that began after the police shooting of 29-year-old Mark Duggan in North London last month.

-- Reflecting social media's use in influencing political and societal change, in the United States police arrested scores of protesters Saturday in New York's Financial District while onlookers uploaded video and commentary to a variety of social media sites almost instantly. And last month San Francisco's Bay Area Rapid Transit came under fire for shutting down cellular service to hinder protesters from communicating and using social media to organize.

-- Twitter has probably been most famously used to organize political change in the Middle East, so much so that Google launched a "voice-to-Twitter" service specifically to assist Egyptian Twitter users in February when Internet service was blocked.

While governments increasingly acknowledge the power of social networks to influence citizen behavior, their attempts to control how people use them can at times seem somewhat ridiculous. Sites like Twitter, Facebook and YouTube are public, free and open. For an outside entity to proclaim what can and cannot be done on them is like trying to discipline someone else's unruly kid.

That said, the spreading of false rumors or the encouragement of looting is undeniably troublesome for everybody.

What are your thoughts? Is there a place for some amount of government regulation when it comes to social media? Should the dissemination of harmful or incorrect information be punishable?

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/