When surfing the Internet you probably take your anonymity for granted, most of us do.
Tapping phones, listening to confidential conversations, reading others' e-mail messages seems like something that only happens in spy movies to "other" people.
However, you probably don't realize just how much information about yourself has the potential to get transmitted across the Internet every time you go online.
Every computer connected to the Internet has "ports" that allow it to connect. A "port" doesn't mean you have a physical hole or opening in your computer's case or hardware, but it does mean you have openings through which information passes back and forth between your computer and the Internet.
Depending on the type of connection (dial up, LAN, cable, DSL), you may have several openings for potential mischief by hackers, malicious code or viruses.
Computers with dedicated connections rate the most at risk. If someone or something gets into one of these ports and into your computer, they can potentially watch everything you do and see all the data you enter, including social security numbers and credit card information.
The easiest way to defeat this problem involves using a firewall. Firewalls, simple and inexpensive software available at virtually any office supply or computer store, block the most common ports hackers use to enter your computer.
Firewalls also help you detect and block unauthorized transmission of information from your computer to the Internet. This adds a significant measure of protection if you get infected with a Trojan Horse virus that tries to "phone home" to the hacker with your sensitive information.
If you'd like to test your connection for vulnerability to attack, log on to http://security1.norton.com and run the various diagnostics. I would strongly advise anyone connected to the Internet through DSL or cable to get and use a firewall to protect against unauthorized access.
Infected with "Spyware?"
Previously we talked about unauthorized access to your computer. But a growing problem online with people watching you and your activities involves using programs you willingly place on your computer.
Commonly called "Spyware," this refers to any program that transmits information about you to someone else without you knowing exactly what gets sent. The main purpose of Spyware involves tracking your surfing habits so advertisers know which targeted ads to send you.
Most Spyware basically comes onto your computer bundled with other software applications, as a standalone program, or as modification to the HTML on a web page.
Regardless of how you get it, you need to understand exactly what information gets transmitted about you so you can decide whether to keep or uninstall the software. Plain and simple, these Spyware programs can potentially reveal extremely sensitive information about you and your online habits.
If you have concerns about Spyware and whether or not your computer currently carries any, log on to www.lavasoft.de and check out the free PC software that will scan your system for known Spyware.
Jim Edwards is a syndicated newspaper columnist and the co- author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"
Threats we ordinary Web users face online leave us no... Read More
If you use the internet, you have probably been infected... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Someone recently told me, "You would have to be a... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
The words Corporate Security may conjure up images of a... Read More
Do you sometimes notice your computer running slower. Is your... Read More
The average computer is packed with hidden software that can... Read More
Security leaks can be a big problem for any site... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
This is the second in a series of articles highlighting... Read More
If you have used a Windows machine for a while,... Read More
First I would like to stress I am condoning the... Read More
Internet scams and frauds are on the rise! The quantity... Read More
So called phishers try to catch the information about the... Read More
Long gone are the days that we could feel secure... Read More
Huge number of spyware software applications are available in the... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Fishing on the Internet has come a long way. However,... Read More
As soon as almost all computer users already got used... Read More
When surfing the Internet you probably take your anonymity for... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
The Threat10 years ago you could probably have run no... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
Have been an Internet user for more than 9 years,... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Having a good Spyware eliminator on your computer is vital... Read More
With the Internet entering our lives in such an explosive... Read More
Since its birth, the Internet has grown and expanded to... Read More
In 1997, I decided after 15 years as a practicing... Read More
Do you really have to know how feeds work? Not... Read More
Credit card fraud is a growing problem for online businesses... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
A couple of years back, I paid my dues the... Read More
You can detect spyware online using free spyware cleaners and... Read More
When we think of adware, what comes to mind are... Read More
Did you know...? 1 in 5 children who use computer... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
While clicking from site to site on the internet you... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Have you ever had to call Symantec or McAfee to... Read More
Let us take the example of scrambling an egg. First,... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
The top five online scams on the Internet hit nearly... Read More
As soon as almost all computer users already got used... Read More
So called phishers try to catch the information about the... Read More
If you use the internet, you have probably been infected... Read More
This is the second in a series of articles highlighting... Read More
When the Internet first came about, it was realized it... Read More
File sharing on p2p is soaring despite the music and... Read More
Fishing on the Internet has come a long way. However,... Read More
It's late. You've been scouring the web for that perfect... Read More
Someone recently told me, "You would have to be a... Read More
Huge number of spyware software applications are available in the... Read More
Shopping for horse gifts or other gift items on the... Read More
History and BackgroundThe virus was one of the first ever... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
This really chapped my lips...I recently bought a new computer.... Read More
So you want to know who your kids are chatting... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
You'd better learn news from media, not from emails, security... Read More
My first experience with a spyware BHO based infection was... Read More
Internet Security |