Types of abuse



Copyrights:
Complaints about sharing copyrighted files in contravention of the different international agreements established to protect these copyrights. Guilty users are liable to expensive legal proceedings by the copyright owners. This type of complaint is generally lodged by companies responsible for this protection, such as the BSA (Business Software Association), the DMCA (Digital Millennium Copyright Act), etc.

Open Proxy:
Unprotected computers whose TCP/IP communication ports are open to any external intrusion. Such computers can therefore serve as a gateway for spam, viruses or any attempts at computer hacking.

Phishing:
Phishing is an online fraud technique that aims to obtain a person's personal information in order to steal their identity.

Pedophilia or child pornography:
In general, pedophilia means sexual touching, activity or solicitation involving an adult and a child or a preadolescent. Child pornography - the photographic, filmed or video representation of children under 18 years of age engaged in sexual activity or for a sexual purpose - is illegal in Canada and must be reported. Pedophile sites and those showing child pornography can be blocked by Internet service providers.

Scan, Probe or DoS:
All attempts to intrude a TCP or UDP communication port are also usually detected by firewall software. It could also include ICMP requests. This information is usually registered in a log-file ("log") by your firewall software.

Spam (Email, News, IRC):
Spam is unwanted, unsolicited e-mail, usually for advertising purposes, as a provocation or just completely irrelevant and useless which is mass-distributed to large groups of recipients (e-mail), newsletters, (newsgroups) or chat rooms (IRC), and which really pollutes networks.

Virus or Trojan horse:
A virus can be spread in many ways. It could be a worm-like virus that automatically infects other unprotected computers on the network. This type of virus is usually detected by firewall software when trying to connect to any TCP port. It could also be an e-mail virus that sends itself automatically to the other recipients in the address book of the infected computer. The virus can easily forge the shipping address, so it is important, when making such a complaint, to send the complete heading of the message, which contains the IP address of the sender of the virus.

Other:
All other types of complaints not corresponding to the aforementioned definitions.