When you surf the web it is possible to learn information about you even when you don't want to advertise who you are. This is true even if your system contains no virus or malware software. Specifically information that is easily available online includes your IP address, your country (and often more location information based on IP address), what computer system you are on, what browser you use, your browser history, and other information. It gets worse. People can get your computer's name and even find out your name if your machine supports programs like finger or identd. Also, cookies can track your habits as you move from machine to machine.
How do people get this basic information about you?
When you visit another web site, information about you can be retrieved. Basically, information is intercepted and used by others to track your Internet activities.
How do you stop this from happening?
First of all, it is possible to serf the web anonymously and thereby stop leaving a trail for others to find. Note that this is not fool-proof, but it makes it much harder for people to know who you are. There are products called anonymous proxy servers that help protect you. The anonymous proxy server replaces your Internet address for its own. This has the effect of hiding your IP address and making it much harder for people to track you.
How do I get an anonymous proxy server?
There are many vendors who sell anonymous proxy servers. There are also free proxy servers available to you. Two such products are ShadowSurf and Guardster. Guardster (http://www.guardster.com/) offers various services for anonymous and secure access to the web, some paid as well as a free service. ShadowSurf (http://www.shadowsurf.com/) ShadowSurf provides anonymous surfing at their site for free. Go to it and you will find a box to enter a URL that you want no one to track. There are many others, but here are two that are frequently used.
Another interesting product, given the recent news about the Google search engine filtering its findings for the Chinese government, is Anonymizer (http://www.anonymizer.com). This company, among others, recently (Feb 1st, 2006) pressed that it "is developing a new anti-censorship solution that will enable Chinese citizens to safely access the entire Internet filter-free" (http://www.anonymizer.com/consumer/media/press_releases/02012006.html).
Does an anonymous proxy server make you 100% safe?
No. Still, you are much better off if you use such technology.
What other things should I be concerned about when trying to keep my private information private?
Three other items come to mind when trying to keep your information private. First, you can use an encrypted connection to hide your surfing. This article does not go into detail on this, but search the web and you will find a lot of information on this. Secondly, delete cookies after each session. Third, you can configure your browser to remove JavaScript, Java, and active content. This actually leads to limitations, so you need to think about the cost/benefit of this course of action.
Anything else?
Wishing you happy and safe surfing!
Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts
Tuesday, August 26, 2008
Wednesday, August 20, 2008
Phishing For Your Identity
Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.
Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.
It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.
Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.
Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.
Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.
It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.
Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.
Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.
Labels:
email,
information,
internet,
Internet Security,
phishing,
privacy,
protection,
scam
Wednesday, August 1, 2007
Tools to Protect your Internet Privacy
Did you know that pictures, banners and images from websites you visit could be downloaded on your PC without your knowledge? If you want to use the internet for your business especially online business, it will be a good idea to get some sort of protection. You will be using your internet all the time for payments, transactions, and online banking and you will obviously have passwords for all of these. This is where internet eraser software is much needed. Basically, internet eraser software helps to delete all the information that is stored in hidden files on your computer which is very easy for hackers to get hold of.
Using internet eraser software will make sure that no one can get into your system to steal your passwords, user names, account details, and credit card numbers. Internet eraser software has advanced features that erase your internet browser history, your address bar history, your internet browser cache, your cookies and junk files and your internet search history. You can delete your cookies one by one, so that you can choose which ones are important and necessary to keep.
The internet eraser software ensures that every part of your computer is safe from unwanted visitors. It is possible for people to secretly place unwanted items like banners and pictures on to your computer when you have been downloading something like music or video or any other program from some websites. To delete such unwanted files from your computer, the internet eraser software also includes a Media Player history eraser, a real Player history eraser, and porn tracks eraser and it deletes the unwanted files permanently.
The internet eraser software also has Google search history, Yahoo search history, and MSN search history eraser, and supports almost all major web browsers such as Internet Explorer, Opera, Netscape, and Firefox. If you do most of your work and financial transactions online, it is a good idea to take all precautions and purchase internet eraser software. Your computer can also be safer from viruses that are frequently downloaded from unsafe sites you might have visited. Now you can delete all of this information permanently from your PC.
Internet eraser software is cost effective and will ensure that your office or home office is safe from hackers, viruses and other invasions. This is also great for offices, as you can not be sure what your employees get up to all the time. They could download something potentially dangerous and even though they have deleted the original files, the hidden files downloaded in the computer can infect your PC. We all need to face facts, that today’s world is not safe and there are vicious people out there just waiting to take advantage of someone else’s lifestyle, so get your internet eraser software now to protect your family and your future.
Source By: IC
Using internet eraser software will make sure that no one can get into your system to steal your passwords, user names, account details, and credit card numbers. Internet eraser software has advanced features that erase your internet browser history, your address bar history, your internet browser cache, your cookies and junk files and your internet search history. You can delete your cookies one by one, so that you can choose which ones are important and necessary to keep.
The internet eraser software ensures that every part of your computer is safe from unwanted visitors. It is possible for people to secretly place unwanted items like banners and pictures on to your computer when you have been downloading something like music or video or any other program from some websites. To delete such unwanted files from your computer, the internet eraser software also includes a Media Player history eraser, a real Player history eraser, and porn tracks eraser and it deletes the unwanted files permanently.
The internet eraser software also has Google search history, Yahoo search history, and MSN search history eraser, and supports almost all major web browsers such as Internet Explorer, Opera, Netscape, and Firefox. If you do most of your work and financial transactions online, it is a good idea to take all precautions and purchase internet eraser software. Your computer can also be safer from viruses that are frequently downloaded from unsafe sites you might have visited. Now you can delete all of this information permanently from your PC.
Internet eraser software is cost effective and will ensure that your office or home office is safe from hackers, viruses and other invasions. This is also great for offices, as you can not be sure what your employees get up to all the time. They could download something potentially dangerous and even though they have deleted the original files, the hidden files downloaded in the computer can infect your PC. We all need to face facts, that today’s world is not safe and there are vicious people out there just waiting to take advantage of someone else’s lifestyle, so get your internet eraser software now to protect your family and your future.
Source By: IC
Labels:
computer tools,
hacker,
internet,
PC,
privacy,
protection,
security,
virus
Subscribe to:
Posts (Atom)