Afrikaans Afrikaans Albanian Albanian Amharic Amharic Arabic Arabic Armenian Armenian Azerbaijani Azerbaijani Basque Basque Belarusian Belarusian Bengali Bengali Bosnian Bosnian Bulgarian Bulgarian Catalan Catalan Cebuano Cebuano Chichewa Chichewa Chinese (Simplified) Chinese (Simplified) Chinese (Traditional) Chinese (Traditional) Corsican Corsican Croatian Croatian Czech Czech Danish Danish Dutch Dutch English English Esperanto Esperanto Estonian Estonian Filipino Filipino Finnish Finnish French French Frisian Frisian Galician Galician Georgian Georgian German German Greek Greek Gujarati Gujarati Haitian Creole Haitian Creole Hausa Hausa Hawaiian Hawaiian Hebrew Hebrew Hindi Hindi Hmong Hmong Hungarian Hungarian Icelandic Icelandic Igbo Igbo Indonesian Indonesian Irish Irish Italian Italian Japanese Japanese Javanese Javanese Kannada Kannada Kazakh Kazakh Khmer Khmer Korean Korean Kurdish (Kurmanji) Kurdish (Kurmanji) Kyrgyz Kyrgyz Lao Lao Latin Latin Latvian Latvian Lithuanian Lithuanian Luxembourgish Luxembourgish Macedonian Macedonian Malagasy Malagasy Malay Malay Malayalam Malayalam Maltese Maltese Maori Maori Marathi Marathi Mongolian Mongolian Myanmar (Burmese) Myanmar (Burmese) Nepali Nepali Norwegian Norwegian Pashto Pashto Persian Persian Polish Polish Portuguese Portuguese Punjabi Punjabi Romanian Romanian Russian Russian Samoan Samoan Scottish Gaelic Scottish Gaelic Serbian Serbian Sesotho Sesotho Shona Shona Sindhi Sindhi Sinhala Sinhala Slovak Slovak Slovenian Slovenian Somali Somali Spanish Spanish Sundanese Sundanese Swahili Swahili Swedish Swedish Tajik Tajik Tamil Tamil Telugu Telugu Thai Thai Turkish Turkish Ukrainian Ukrainian Urdu Urdu Uzbek Uzbek Vietnamese Vietnamese Welsh Welsh Xhosa Xhosa Yiddish Yiddish Yoruba Yoruba Zulu Zulu

 

 

Article Navigation

Back To Main Page


 

Click Here for more articles

Google
Are They Watching You Online?
by: Jim Edwards
When surfing the Internet you probably take your anonymity
for granted, most of us do.

Tapping phones, listening to confidential conversations,
reading others' e-mail messages seems like something that
only happens in spy movies to "other" people.

However, you probably don't realize just how much
information about yourself has the potential to get
transmitted across the Internet every time you go online.

Every computer connected to the Internet has "ports" that
allow it to connect. A "port" doesn't mean you have a
physical hole or opening in your computer's case or
hardware, but it does mean you have openings through which
information passes back and forth between your computer and
the Internet.

Depending on the type of connection (dial up, LAN, cable,
DSL), you may have several openings for potential mischief
by hackers, malicious code or viruses.

Computers with dedicated connections rate the most at risk.
If someone or something gets into one of these ports and
into your computer, they can potentially watch everything
you do and see all the data you enter, including social
security numbers and credit card information.

The easiest way to defeat this problem involves using a
firewall. Firewalls, simple and inexpensive software
available at virtually any office supply or computer store,
block the most common ports hackers use to enter your
computer.

Firewalls also help you detect and block unauthorized
transmission of information from your computer to the
Internet. This adds a significant measure of protection if
you get infected with a Trojan Horse virus that tries to
"phone home" to the hacker with your sensitive information.

If you'd like to test your connection for vulnerability to
attack, log on to http://security1.norton.com and run the
various diagnostics. I would strongly advise anyone
connected to the Internet through DSL or cable to get and
use a firewall to protect against unauthorized access.

Infected with "Spyware?"

Previously we talked about unauthorized access to your
computer. But a growing problem online with people watching
you and your activities involves using programs you
willingly place on your computer.

Commonly called "Spyware," this refers to any program that
transmits information about you to someone else without you
knowing exactly what gets sent. The main purpose of Spyware
involves tracking your surfing habits so advertisers know
which targeted ads to send you.

Most Spyware basically comes onto your computer bundled
with other software applications, as a standalone program,
or as modification to the HTML on a web page.

Regardless of how you get it, you need to understand
exactly what information gets transmitted about you so you
can decide whether to keep or uninstall the software. Plain
and simple, these Spyware programs can potentially reveal
extremely sensitive information about you and your online
habits.

If you have concerns about Spyware and whether or not your
computer currently carries any, log on to www.lavasoft.de
and check out the free PC software that will scan your
system for known Spyware.


About the author:

Jim Edwards is a syndicated newspaper columnist and the co-
author of an amazing new ebook that will teach you how to
use free articles to quickly drive thousands of targeted
visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> "Turn Words Into
Traffic"



Circulated by Article Emporium

 



©2005 - All Rights Reserved

Total Views stat / Page Views stat

Advertise Here

web page counter