When surfing the Internet you probably take your anonymity for granted, most of us do.
Tapping phones, listening to confidential conversations, reading others' e-mail messages seems like something that only happens in spy movies to "other" people.
However, you probably don't realize just how much information about yourself has the potential to get transmitted across the Internet every time you go online.
Every computer connected to the Internet has "ports" that allow it to connect. A "port" doesn't mean you have a physical hole or opening in your computer's case or hardware, but it does mean you have openings through which information passes back and forth between your computer and the Internet.
Depending on the type of connection (dial up, LAN, cable, DSL), you may have several openings for potential mischief by hackers, malicious code or viruses.
Computers with dedicated connections rate the most at risk. If someone or something gets into one of these ports and into your computer, they can potentially watch everything you do and see all the data you enter, including social security numbers and credit card information.
The easiest way to defeat this problem involves using a firewall. Firewalls, simple and inexpensive software available at virtually any office supply or computer store, block the most common ports hackers use to enter your computer.
Firewalls also help you detect and block unauthorized transmission of information from your computer to the Internet. This adds a significant measure of protection if you get infected with a Trojan Horse virus that tries to "phone home" to the hacker with your sensitive information.
If you'd like to test your connection for vulnerability to attack, log on to http://security1.norton.com and run the various diagnostics. I would strongly advise anyone connected to the Internet through DSL or cable to get and use a firewall to protect against unauthorized access.
Infected with "Spyware?"
Previously we talked about unauthorized access to your computer. But a growing problem online with people watching you and your activities involves using programs you willingly place on your computer.
Commonly called "Spyware," this refers to any program that transmits information about you to someone else without you knowing exactly what gets sent. The main purpose of Spyware involves tracking your surfing habits so advertisers know which targeted ads to send you.
Most Spyware basically comes onto your computer bundled with other software applications, as a standalone program, or as modification to the HTML on a web page.
Regardless of how you get it, you need to understand exactly what information gets transmitted about you so you can decide whether to keep or uninstall the software. Plain and simple, these Spyware programs can potentially reveal extremely sensitive information about you and your online habits.
If you have concerns about Spyware and whether or not your computer currently carries any, log on to www.lavasoft.de and check out the free PC software that will scan your system for known Spyware.
Jim Edwards is a syndicated newspaper columnist and the co- author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"
![]() |
|
![]() |
|
![]() |
|
![]() |
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
History and BackgroundThe virus was one of the first ever... Read More
There are several basic concepts to keep in mind when... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Afraid that someone is monitoring your PC or installed a... Read More
As the number of people using the Internet as an... Read More
A new variation of the Nigerian Scam theme ... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
In the past I've never really paid much attention to... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Shopping for horse gifts or other gift items on the... Read More
If you run any type of Internet business, Adware and... Read More
As you know, this time the virus under the name... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
You and I are a lot alike. We are both... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Paypal is a great site and is used by many... Read More
If you know what is the 'Fishing' then it's very... Read More
Can you protect your computer from all possible viruses and... Read More
Imagine my surprise when I received a phone call from... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
During the release of a new software product specialized to... Read More
This is the second in a series of articles highlighting... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Did you know...? 1 in 5 children who use computer... Read More
Someone recently told me, "You would have to be a... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
In recent days, I was one of the unfortunate persons... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Well, if that would have been said to me by... Read More
As you know, this time the virus under the name... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
If you use the internet, you have probably been infected... Read More
It has been said that with the wealth of information,... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
If you have used a Windows machine for a while,... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
A week or so ago, I received an inquiry from... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
History and BackgroundThe virus was one of the first ever... Read More
This is the second in a series of articles highlighting... Read More
Threats we ordinary Web users face online leave us no... Read More
Some months ago, before there was much publicity regarding phishing... Read More
I am the victim of an internet scam. It is... Read More
Ok, you've got a computer, and you get online. You... Read More
There has not been a time in the history of... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Do you really have to know how feeds work? Not... Read More
If you are a parent, as am I, I think... Read More
Computer infections can be broken up into 4 main categories... Read More
Phishing is a relatively new form of online fraud that... Read More
Sooner or later everyone with an email account will receive... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Huge number of spyware software applications are available in the... Read More
First, let's do a little recap'. As I stated in... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The trash folder in my main inbox hit 4000 today.... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
If you use emails actively in your communication, you must... Read More
Internet Security |