<P> However, the recent spread of low - cost Internet access in developing countries has made genuine international person - to - person philanthropy increasingly feasible . In 2009, the US - based nonprofit Zidisha tapped into this trend to offer the first person - to - person microfinance platform to link lenders and borrowers across international borders without intermediaries . Members can fund loans for as little as a dollar, which the borrowers then use to develop business activities that improve their families' incomes while repaying loans to the members with interest . Borrowers access the Internet via public cybercafes, donated laptops in village schools, and even smart phones, then create their own profile pages through which they share photos and information about themselves and their businesses . As they repay their loans, borrowers continue to share updates and dialogue with lenders via their profile pages . This direct web - based connection allows members themselves to take on many of the communication and recording tasks traditionally performed by local organizations, bypassing geographic barriers and dramatically reducing the cost of microfinance services to the entrepreneurs . </P> <P> Internet resources, hardware, and software components are the target of criminal or malicious attempts to gain unauthorized control to cause interruptions, commit fraud, engage in blackmail or access private information . </P> <P> Malicious software used and spread on the Internet includes computer viruses which copy with the help of humans, computer worms which copy themselves automatically, software for denial of service attacks, ransomware, botnets, and spyware that reports on the activity and typing of users . Usually, these activities constitute cybercrime . Defense theorists have also speculated about the possibilities of cyber warfare using similar methods on a large scale . </P> <P> The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet . In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc .) are required to be available for unimpeded real - time monitoring by Federal law enforcement agencies . Packet capture is the monitoring of data traffic on a computer network . Computers communicate over the Internet by breaking up messages (emails, images, videos, web pages, files, etc .) into small chunks called "packets", which are routed through a network of computers, until they reach their destination, where they are assembled back into a complete "message" again . Packet Capture Appliance intercepts these packets as they are traveling through the network, in order to examine their contents using other programs . A packet capture is an information gathering tool, but not an analysis tool . That is it gathers "messages" but it does not analyze them and figure out what they mean . Other programs are needed to perform traffic analysis and sift through intercepted data looking for important / useful information . Under the Communications Assistance For Law Enforcement Act all U.S. telecommunications providers are required to install packet sniffing technology to allow Federal law enforcement and intelligence agencies to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic . </P>

What is internet write the some uses of internet in human life