|
|
Endangered Kids – Is Computing safe for Kids?
Kids computing is like "electronically sugar-coated 'learning' that may spoil children's appetite for the main course." Encouraging children to "learn" by flitting about in a colorful multimedia world is a recipe for a disorganized and undisciplined...
Forex Trading Software
If you are looking to get started trading the Forex, you will
find that there are numerous software programs available (both
web based and desktop based) for you to use in your trading. In
fact, most brokers offer clients a software package for...
Interview with EXPERTS - PART 2
Interview with EXPERTS - PART 2 by Gary Durkin (c) 2004 - All Rights Reserved Worldwide. Following on the PART 1, where I outlined the basis and reasons for doing a project like this, here is a list of 12 questions which you could use when...
Sales Versus Customer Oriented Websites
Customer oriented websites designed and created with the customer in mind will always outperform sales oriented websites, which often considers the customer as a secondary motivator. Find out what differentiates these websites.
Should...
VOIP QUESTIONS AND ANSWERS
Voice over Internet Protocol, or VoIP, has grown in popularity recently and with that rise in popularity has come a number of common misconceptions and confusion. Global Value Conncet ( http://globalvalueconnect.com ) has complied this simple...
|
|
|
|
|
|
|
|
How To Protect Your On-line Privacy
Travelling the highways and byways of the Internet can expose you to harmful exploitation. Nick Pullen, a master cybernaught, suggests you enhance your personal security and peace-of-mind by following the "Rules of the Road."
The Internet is a wonderful facilitator. We use it to communicate, do business, access information, news and services, and to shop. But the Internet and the technology which makes it possible also has a darker side. It enables investigators, fraudsters, marketers, stalkers, hackers, lunatics and just plain nosy people, armed with the right equipment and know-how, to appropriate sensitive data and confidential information about you, your personal, financial and professional affairs, whether you are on or off-line.
This sensitive material can be sold to criminal or commercial buyers. Or it can be used to damage you and your personal or commercial interests. It could be used to blackmail or defraud you. It could be used by someone wanting to commit crimes in your name. It could be used to harass you. It can be added to any dossier being discreetly compiled about you by just about anybody for just about any purpose. The Internet could be used by a lunatic or someone with a grudge trying to track you down.
"New viruses are released into the public domain all the time."
Fact is, personal data and sensitive information about your activities and who you are is probably floating around Cyberspace right now - completely open to access. Sending emails, posting to news groups, shopping, and surfing on- line can undermine your personal, financial and professional privacy unless you take precautions.
I am not saying that Cyberspace is riddled with demented hackers or bulging at the seams with criminal types waiting to target you. But there is an undesirable element out there. If you’ve taken steps to protect yourself, you can be certain of not falling foul of them.
Use the following techniques to ensure peace-of-mind on- line.
Preparation For On-line Activity
Restrict the flow of sensitive personal data. Your browser can literally shed information about you. Unless you take precautions to prevent it, without you knowing, your browser will simply distribute your email address and other contact information whilst you are on-line. Protect your main email address: In your browser's Set-up, Options or Preferences menus don’t enter your main email address. Instead set up an alternative email address free of charge (at http://www.hotmail.com or http://www.yahoo.com or any of the other on-line email services offering free accounts). Enter that address instead. In the same way you must protect your real identity. In the same browser menus enter a pseudonym instead of your real name.
Ideally, to protect your main (non-Internet) systems and files against on-line privacy threats, use a second computer solely for Internet access and activity.
If you have a personal web page on the Internet don’t post personal information on it. Why give passing fraudsters, psychopaths or pranksters your home address, telephone number, or any other personal details?
Essential Ongoing Maintenance
Use virus protection software and use it regularly to sweep files attached to emails and files you download from the Internet. Use Norton Anti-Virus which can be obtained from http://www.symantec.com. Alternatively, use a free virus scanner such as AVG, available from http://www.grisoft.com . Make sure your virus detection software is up-to-date. New viruses are released into the public domain all the time. If your software only deals with viruses up to a certain date it is not providing adequate protection.
"Many spammers are outright con artists."
A badly configured or maintained computer can reveal sensitive information about your Internet activity even when you are off-line. Windows contains a file called History which acts as a log of your Internet movements, keeping a record of all the Internet pages you have visited. This history file can last for months unless you configure your browser to prevent this. Go to Tools/Internet Options and set the days to keep pages in history option to zero days. Also ensure you regularly clear the Temp folder and Temporary Internet Files folder which will be found in Windows. Periodically open those folders, select their contents and delete.
Strengthen Your Email Security
The three best pieces of advice I can give you about preserving and protecting your on-line privacy are as follows. 1: Use encryption. 2: Use encryption. 3: Always, always use encryption. Why? Encryption is the most effective defence there is against really determined hackers, stalkers, and fraudsters who capture sensitive data by intercepting unencrypted email and Internet messages. Too many people still send unencrypted emails containing all manner of sensitive personal, financial, and commercial data. Fact: Sending unencrypted email through cyberspace is like sending a postcard through the mail system; anybody and everybody can read it. Use encryption. Which encryption system? PGP encryption is the best around. Download it free of charge from http://www.pgp.com.
If you ever want to send an email without the recipient knowing who you are or your email address, use the Anonymizer remailing service. Send your email to the remailer which strips your actual name and email address from the email header and sends it on anonymously on your behalf. Check this service out at http://www.anonymizer.com.
Ignore any unsolicited emails you receive. These are sent by spammers. Never purchase anything from or send any money or information to a spammer. Many spammers are outright con artists. If you send money to them don’t expect to see it again, and don’t expect to be supplied with the promised product or service. Don’t even reply to spammers who manage to get hold of or buy your email address. Many spammers ask you
to send a message back if you want to be removed from their mailing lists. Don’t do this. A return message will confirm that your email address is in use. This enhances the value of your address to the spammer. He might well remove you from his mailing list but he will sell your details to many other spammers who are sure to target you.
Posting To News Groups/Chat Groups
Don’t reveal personal details to strangers or new friends you meet on-line. You don’t know who you’re talking to in a chat room. For the sake of security don’t give out your real name, where you live, where you work, your phone number or any other personal details which might be used against you or to track you down.
Messages you post on the Internet or on mailing lists reveal your email address. This is easily discovered and either targeted or used by just about anybody. Services such as Deja News also keeps a record of every posting ever made by an individual. It is a simple matter for someone to search Deja News to find out details of postings made from your email address, which news groups you post to and why. To counter this, have more than one email address. Set up a free web-based email service. Use this for posting to news groups, mailing lists, chat and public rooms. Tip: If no-one knows that this extra email address belongs to you, no-one can link you to it or any posting you make from it. In this way you can post regularly to alt.sheep.fanciers. without any fear of being identified by snoops! Use a further clean email address for small members-only mailing lists and for communications with known, trusted individuals.
Safe Surfing Techniques
Many free sites require you to register personal details before you can get access. Just because a site asks for personal data, it doesn’t mean you have to provide it. You have options. Provide a phoney name, address, preferences etc. There is no law against this. Such details are never checked. They are collected for marketing purposes only. Note: If you purchase something you must provide real billing information to avoid claims of fraud.
Beware of sites offering rewards or prizes in exchange for contact details and other sensitive data. You’re unlikely to win a prize and any data obtained in this manner is sold often to multiple direct marketers. Pretty soon you’ll be deluged with unsolicited email, post and telephone calls. Protect your children too. Set clear rules for them. Make sure they know not to reveal personal information when they visit sites unless you okay it.
Web sites store bits of data, Cookies, on your computer’s hard drive. Cookies contain your user IDs and passwords to sites. However, Cookies can also be used to trawl for data, tracking your surfing, recording what links and pages you click on, how long you spend on specific pages. This data is used to create a profile about you for marketers. Remember that sensitive information about your Internet preferences, interests and actions could come back to haunt you. For protection turn on cookie notices in your browser. How? Open your Internet browser. Go to Tools/Options/Security. Press the Custom Level button. Select prompt for the Cookie options. Now each time a Web site attempts to place a cookie on your hard drive you’ll receive a warning and information about the cookie. Decide whether or not to accept. Only accept cookies from trusted sites. Decline cookies which are not temporary or which provide information to sites other than the one you want to load.
Be anonymous when you surf. How? Use the Anonymizer, a specialised service which disguises your identity and on- line movements. Check out: http://www.anonymizer.com . Alternative anonymising services you might try: http://www.in.tum.de/~pircher/anonymouse/ ; http://www.spaceproxy.com ; http://i-security.addr.com
Safe On-line Shopping
Never send credit card details over the Internet without ensuring that your connection is secure (encrypted). How to tell? Look for a locked padlock icon at the bottom right hand corner of your screen. Or see that the security button on your browser bar is highlighted. If the connection is not secure take your business elsewhere. A company that is careless with your information and money does not deserve your trade.
Before doing business with any site, in case of problems, satisfy yourself that the site operator provides off-line contact information including a postal address and telephone number. Before ordering, try the phone number to ascertain that it works . Keep a note of these details.
If the connection is not secure take your business elsewhere.
Check to see if the site has a privacy policy. Read it. Does it provide protection for the data you may submit? If it doesn’t, don’t release the data.
Many sites display seals or certificates awarded by watchdog organisations which testify to the trustworthiness of the site. But there can be problems. You can’t rely on taking seals at face value. The reason being that con artists fake the seals or fraudulently post them on their sites. The solution? Before entering into agreement, contract, or making any payments on-line, check with the seal-issuing body that the site’s seal is authentic.
Do the necessary due diligence: Read terms and conditions before you pay for anything or enter into an agreement. Make sure you know what you’re getting into. Be aware of auto- rebilling scams and hidden fees.
Always print out the order form you use on-line and keep any confirmation of the sale, payment details and delivery dates you may be emailed.
About the Author
Find this article of interest? Visit The Freebooter website at http://www.freebooter.com or contact Henry Morgan at mailto:henrymorgan@freebooter.com and take advantage of pointers, tips and articles to help you to remain free. Get his free newsletter with even more privacy tips, at mailto:admin@freebooter.com
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|