|
|
Get Familiar With MSDOS.SYS
---------------------------------------------------------- Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are...
Is That PC Still Worth Keeping?
Computers... We love 'em and love to hate 'em. But before you trash that old PC and buy a new one, you may only need some tweaks, fixes or upgrades. If you are in the Parker, Colorado area, I can help you. If you're outside that area, please feel...
Podcasting Trend
Podcasting has all the ingredients to become a major technology trend. Podcasting has started with little fanfare but has the potential to become a giant wave due to a number of factors going for it. The word Podcast might have been roughly derived...
The Metaphors of the Net - Part III
3. The Internet as a Collective Nervous System Drawing a comparison from the development of a human infant - the human race has just commenced to develop its neural system. The Internet fulfils all the functions of the Nervous System in the body...
WiFi Range: What are the Limits?
Because of the fact that the WiFi networking standard uses very
high frequency (2.4 GHz) radio signals to transmit data, its
access range is usually quite limited. How limited, of course,
depends on the type of WiFi hardware being used.
A...
|
|
|
|
|
|
|
|
Carnivore
There have been a number of stories in the press lately about a system called Carnivore (what a great name). This is a hardware/software system designed by the FBI to intercept emails at an ISP so they can be used in a criminal investigation.
Before going any further, it may be useful to explain how email works. By it's very nature, email is completely insecure. Any number of people can read that personal note you have written, and it's very possible that your private messages to that other woman could wind up in the newspaper.
Perhaps the best analogy is to compare email to postcards. When you send a postcard, you write your message on one side and put the address on the other. The message can be read by anyone who cares to pick up the postcard.
The path an email takes to get to it's destination is very interesting. First, of course, you compose a message in your email program. Regardless of whether it is Eudora, Outlook, Outlook Express or any number of other packages, the email will almost certainly be saved in a temporary folder. Some mail programs delete the temporary copy of the message after it is sent and some do not. In any event, it is entirely possible that a copy of the email is sitting on your hard drive for anyone to look at.
Of course a copy is kept in your sent items folder, unless you've deleted it. And even then, a copy might be kept in your deleted items folder. If you are using Microsoft Exchange as your email engine, then it might even save a copy even if you delete the message permanently, just in case.
Okay, once you send the email it goes out to the internet. It's possible for a very good hacker to grab it directly off the wire (although highly unlikely as this is not easy). The message will get routed to your ISP's email server, which means it will reside on one or more computer systems for a brief time. Of course it could be intercepted at any of these.
Once the message reaches your ISP's SMTP (email) server, it will get stored there for a time, until the SMTP server can figure out how to send it onward to it's destination. The message will get sent here and there, as indicated by various systems, until it reaches the destination POP (post office) server, where it will wait to be read. Of course, once it is read by someone on the other end, they could store it, delete it, forward it and reply to it, further increasing the chances that someone else will see what you've written.
The point of all of this is to
demonstrate how easy it is for your email to be seen by any number of people at any number of computers throughout the world. An email message is by no means private (unless, of course, it is encrypted, which means it is saved in a form that cannot be read except by the receiver).
How does carnivore operate? Well, if the FBI needed to perform an investigation, they would get a court order to install Carnivore on an ISP's email server. This program will monitor all emails that are sent to and received from the ISP's system. It is looking for anything related to the investigation, and reportedly it can be very finely tuned to look for extremely specific patterns.
In the words of the FBI, "The Carnivore device provides the FBI with a "surgical" ability to intercept and collect the communications which are the subject of the lawful order while ignoring those communications which they are not authorized to intercept. This type of tool is necessary to meet the stringent requirements of the federal wiretapping statutes."
The FBI requires very specific authorization to perform it's surveillance, as stated on the official web site: "Applications for electronic surveillance must demonstrate probable cause and state with particularity and specificity: the offense(s) being committed, the telecommunications facility or place from which the subject's communications are to be intercepted, a description of the types of conversations to be intercepted, and the identities of the persons committing the offenses that are anticipated to be intercepted. Thus, criminal electronic surveillance laws focus on gathering hard evidence -- not intelligence."
The issue is whether or not the FBI can be trusted to only look at information which it has authorization to examine. On one hand, should we trust agencies such as the FBI? Will they abuse this tool? On the other hand, why deny critical information to the FBI which might help them convict real criminals? Why allow criminals and terrorists a way to send information without threat of surveillance? Hackers and other people already have the ability to intercept emails at will - why not allow our law enforcement agencies do the same?
Interesting choice, isn't it?
About the Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at http://www.internet-tips.net - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |
|