ColourTree 5' x 50' Fence Screen Privacy Screen Green - Commercial Grade 170 GSM - Heavy Duty - 3 Years Warranty CUSTOM SIZE AVAILABLE (1).
- Cookie 5 6 3 – Protect Your Online Privacy Fence Panels
- Cookie 5 6 3 – Protect Your Online Privacy Fence Slats
- Cookie 5 6 3 – Protect Your Online Privacy Fence Gates
- Cookie 5 6 3 – Protect Your Online Privacy Fences
Posted: May 17 2012 | Revised: Jun 07 2018
- A versatile application that delivers active privacy protection and forensics for your personal files, blocking rogue and spyware attempts from accessing your data.
- You will receive an email shortly at: Here at Walmart.com, we are committed to protecting your privacy. Your email address will never be sold or distributed to a third party for any reason.
- Keeper uses a proprietary zero-knowledge security architecture and is the most audited and certified product on the market. Keeper protects your business and client data with the privacy, security and confidentiality requirements of your industry.
- Here are seven ways you can protect your personal information and privacy online. Here are seven ways you can protect your personal information and privacy online. Blocking Cookies.
1. Introduction
2. Your Operating System
3. Your Internet Browser
4. Your Software
5. Anti-virus and Anti-malware Programs
6. Firewalls
7. Tips for Using Your Computer Safely
8. Resources
2. Your Operating System
3. Your Internet Browser
4. Your Software
5. Anti-virus and Anti-malware Programs
6. Firewalls
7. Tips for Using Your Computer Safely
8. Resources
1. Introduction
Please note that the mention of any specific products does not constitute an endorsement by PRC.
Computer security is the process of preventing and detecting unauthorized use of your computer. Unfortunately, maintaining the security of your computer can be challenging task. Hackers often seem to be one step ahead of computer users, even those who are following the best security practices. However, securing your computer is essential to protecting your privacy, reducing the risk of identity theft, and preventing hackers from taking over your computer.
The best computer security practices require you to take a multi-pronged approach. They involve protecting your sensitive information by preventing, detecting, and responding to a wide variety of attacks.
2. Your Operating System
Your computer's operating system is the main program on your computer. It performs a variety of functions, including determining what types of software you can install, coordinating the applications running on the computer at any given time, and allowing your software applications (web browsers, word processors, and email clients) to operate. When you buy a computer, you are usually also choosing a specific operating system.
Manufacturers typically ship computers with a particular operating system. Most PCs ship with the latest version of the Windows operating system. The current Windows operating system is Windows 10. Apple computers use the Mac operating system (currently macOS High Sierra). Apple will release its newest version, macOS Mojave, later this year.
Windows operating systems traditionally have been targeted with malware more often than other operating systems. This may be due to the larger base of Windows installations, which makes it a more attractive target. However, Apple's Mac operating system is definitely not immune to security flaws. In fact, as more consumers purchase Apple products, malware makers have begun to target the Mac operating system.
Some computer security professionals consider Linux and other lesser known operating systems to be the most secure, primarily because they tend not to be targeted. For those interested in trying out the Linux operating system, many recommend Ubuntu, a free, open-source Linux distribution.
No matter which operating system you use, it's important that you update it regularly. Windows operating systems are typically updated at least monthly, typically on so-called 'Patch Tuesday.' Other operating systems may not be updated quite as frequently or on a regular schedule. It's best to set your operating system to update automatically. The method for doing so will vary depending upon your particular operating system.
If your computer uses Windows XP or Vista as the operating system, it's very important to be aware that Microsoft support for Windows XP ended on April 8, 2014 and support for Vista ended on April 11, 2017. This means that you will no longer receive software updates from Windows Update, including security updates that can help protect your computer from harmful viruses and malware.
3. Your Internet Browser
Many privacy advocates regard the Mozilla Firefox browser as superior to other browsers. One advantage of Firefox is that it is an “open source” program. This allows security professionals to become involved in fixing bugs and building stronger security features. Another important advantage of Firefox is its so-called extensions, which can be used to strengthen Firefox’s built-in security and privacy features. Three Firefox extensions that we recommend are NoScript, Disconnect, and HTTPS Everywhere.
NoScript. When you install NoScript, executable contents or 'scripts' such as JavaScript, Java, Flash, and others, are blocked by default. You can allow these scripts to run on a site that you trust (for example, your bank) through a simple mouse click. You can 'whitelist' or authorize scripts for a particular session or permanently if you trust a website.
NoScript helps protect against so-called “drive-by downloads” where simply visiting a particular website can cause malware to be downloaded and executed on your computer. Hackers can use programming flaws in browsers to get malware onto your computer via a “drive-by download” without you ever noticing. For example, this can occur when visiting a legitimate site that happens to unwittingly host an advertisement containing malware.
Disconnect. The Disconnect extension can help to block the otherwise invisible websites that track your search and browsing history. It blocks over 2000 tracking sites.
HTTPS Everywhere. The browser extension HTTPS Everywhere ensures that you are connecting to a site through an encrypted connection whenever possible. Without HTTPS, your online activities are vulnerable to eavesdropping and your accounts are vulnerable to hijacking. HTTPS Everywhere makes it easier for you to keep your user names, passwords, and browsing histories private. Sites that encrypt the connection between themselves and your browser are generally identified with an “https” prefix and a lock icon in the address bar.
No matter which browser you use, it's important that you update it as newer versions come out which address security vulnerabilities. The Firefox browser will automatically deliver updates on a fairly frequent schedule, typically every few weeks.
4. Your Software
In the past, computer security experts regarded operating systems as the “Achilles’ heel” of computer security. More recently, some experts have come to regard commonly installed software programs as the greater threat to security.
Be cautious when downloading software. Unwanted software may infect your computer if you don't take care when downloading a new program. Be sure to obtain software from legitimate sources and watch for 'bundling' of additional unwanted programs with legitimate software.
Java. If your computer has Java installed, the Department of Homeland Security has recommended that you disable it. It's unlikely that a typical computer user will ever need to use Java. Java has been responsible for a large number of malware attacks on the computers of unsuspecting users. You can disable Java easily.
Adobe Flash Player. Many computers have Adobe’s Flash Player installed. Users are running an older version of Flash Player that may contain numerous security vulnerabilities. Be sure that you set your Flash Player to update automatically. Flash has largely been replaced by HTML5, which is generally regarded as a safer. Some browsers will automatically block Flash content as a security precaution.
PDF (portable document) readers. Most people use Adobe Reader to read and print portable documents (.pdf files), such as forms and publications. Like Internet Explorer, the Adobe Reader is extremely popular, so it has become a target for hackers. Adobe tends to be slow in patching security vulnerabilities. Many security experts believe that you are safer using alternative document readers.
Update your software regularly. Utilize automatic software updates when available. Personal Software Inspector is a security scanner which identifies programs that are insecure and need updating.
5. Anti-virus and Anti-malware Programs
The term malware is short for malicious software. The more common types of malware include viruses, worms, Trojans, spyware, and adware. The damage inflicted by malware may range from minor annoyances to more serious problems including stealing confidential information, destroying data, and disabling your computer. It’s not really necessary for you to understand the technical differences between these threats. There are literally dozens of different varieties.
Anti-virus programs. A virus is simply a computer program. It can do anything that any other program you run on your computer can do. A computer virus is a program that spreads by first infecting files or the system areas of a computer and then making copies of itself. While some viruses are harmless, others may damage data files, some may destroy files, and others may just spread to other computers.
Detailed reviews of anti-virus software are available from AV Comparatives, an independent anti-virus software testing organization.
Anti-malware programs. Malware is a broad category of computer threats including spyware and other unwanted programs that may be installed without your knowledge or consent. Spyware can secretly gather your information through your Internet connection without your knowledge. Once spyware is installed, it may deploy numerous files onto your system. Some of these files are so well hidden that they are difficult to find and remove.
Spyware programs may be included with other software you want. When you consent to download a program, such as a music sharing program, you may also be consenting to download spyware. You might not be aware that you agreed to the spyware installation because your consent is buried in an end-user-license agreement (EULA).
Be cautious about clicking on pop-up boxes. Spyware programs may create a pop-up box where you can click “yes” or “no” to a particular question. If you click on either choice your browser may be tricked into thinking you initiated a download of spyware.
Anti-virus and anti-malware programs are important elements to protecting your information. However, they are not guaranteed to protect you from an attack. Combining these technologies with good security habits is the best way to reduce your risk. Some anti-virus programs also contain anti-malware capability. However, given the increasing sophistication of malware programs, it’s best to use two different anti-malware programs in addition to an anti-virus program. Each one looks for slightly different sets of threats, and used together they may offer increased security.
According to a Consumer Reports (CR)article, free programs should adequately protect most computer users from malware. Consider paying for software mostly for convenience and some extra features. The best free package in CR's security software ratings was Avast! Free Antivirus.
Security software will only protect you against the newest threats if it is kept up-to-date. That's why it is critical to set your security software to update automatically.
6. Firewalls
Any computer that’s online will find its ports being scanned from other computers looking for vulnerabilities. It’s therefore important to have a firewall. A firewall helps to prevent data from entering or leaving your computer without your permission. It helps make you invisible on the internet and blocks communications from unauthorized sources.
Every computer that is connected to the internet should run a firewall at all times. There are two types of firewalls—software and hardware. You can run both simultaneously. In fact, it is a good idea to use both a software and hardware firewall. But never run two software firewalls simultaneously.
Some operating systems have built-in software firewalls. An example of a software firewall is the one built into most Windows operating systems. You should leave the Windows firewall turned on unless you replace it with third-party firewall software. Other software firewalls are supplied by outside vendors, or may be part of a commercial security suite. A software firewall must be properly configured in order to be effective.
Hardware firewalls can be purchased as stand-alone products or may be found in broadband routers having firewall features. A router sits between your modem and your computer or your network. It is hard to hack your computer or a network when it is hidden behind a hardware firewall box. However, it is important to properly configure your router, particularly by changing the default password to one that is difficult to crack. To ensure that your hardware firewall is properly configured, consult the product documentation.
7. Tips for Using Your Computer Safely
Beware of email attachments from unknown people. Don’t open unexpected email attachments from unknown persons. Just because an email message looks like it came from someone doesn't mean that it actually did. Scammers can 'spoof' the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it's legitimate before opening any attachments. To open an attachment, first save it to your computer and then scan the file with your antivirus software.
Don’t click on links embedded in email messages. It’s usually safer to go to the company’s website directly from your browser than by clicking on a link in an email message, unless you are absolutely certain that the email was actually sent by the person or company claiming to have sent the message. This will help you avoid becoming a victim of “phishing”. Phishing is the fraudulent process of attempting to acquire sensitive information by masquerading as a trustworthy entity. Phishing is typically carried out by email and often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
Spear phishing is a type of phishing attack that appears to be from a colleague, employer or friend and includes a link or something to download. Spear phishing often targets senior executives at organizations that may have valuable information stored on their computers. These messages may be personalized with publicly available information about the recipient to make them look genuine. They are therefore more difficult to detect than ordinary phishing. The links or downloads included in such a message can be malicious, and might include viruses or fake websites that solicit personal information.
No matter how official an email message looks, never access a financial account by clicking on an embedded link. If the email is fraudulent, a scammer could use the account number and password you enter to steal your identity and empty your account. One way to protect against this is to use an incorrect password on the first try. A phishing site will accept an incorrect password, while a legitimate site won't. You should also avoid calling any telephone number in an unsolicited email unless you have confirmed that it is a legitimate number.
Passwords. Passwords are frequently the only thing protecting our private information from prying eyes. Be sure to use a strong password computer's user account and your router or modem. Never use the default password that comes with a router or modem.
In addition, many websites that store your personal information (for example web mail, photo or document storage sites, and money management sites) require a password for protection. However, password-protected websites are becoming more vulnerable because often people use the same passwords on numerous sites. Strong passwords can help individuals protect themselves against hackers, identity theft and other privacy invasions.
Whenever you have an opportunity to create and use a password to protect your information, make sure that you use a strong password. In most instances, it's safe to ignore admonitions to regularly change your passwords. While once considered a security 'best practice', changing your passwords regularly ranks relatively low as a means of protecting your accounts. Of course, if you believe that your password has been breached or compromised, it is essential to change it immediately.
Password recovery methods are frequently the 'weakest link', enabling a hacker to reset your password and lock you out of your account. Make sure your security questions aren't easily answerable. It's also a good idea to have your password resets go to a separate email account designed for resets only.
Unfortunately, experts warn that the security of passwords has never been weaker. New hardware and techniques have contributed to a sharp rise in password cracking by hackers. Our Online Privacy guide contains a list of password 'dos' and 'don'ts'.
Account privileges. Do not log into a computer with administrator rights unless you must do so to perform a specific computer maintenance task. Running your computer as an administrator may leave your computer vulnerable to security risks.
Keep your software up-to-date. Computer hackers are always finding new ways to penetrate the defenses of your software programs. Software vendors respond with patches that close newly found security holes. To stay protected, you need to download and install patches for both your operating system and your software applications whenever they become available. Software patches or updates often address a problem or vulnerability within a program.
Sometimes, vendors will release an upgraded version of their software, although they may refer to the upgrade as a patch. It is important to install a patch as soon as possible to protect your computer from attackers who would take advantage of the vulnerability. Attackers may target vulnerabilities for months or even years after patches are available. Some software will automatically check for updates. If automatic updates are not available, check your software vendors' websites periodically for updates.
Shut it down. Shut it down, lock, log off, or put your computer to sleep before leaving it unattended. Make sure that your computer requires a secure password to start up.
Protect sensitive information. Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email. Don't send sensitive information over the internet before checking a website's security.
Avoid social engineering attacks. Social engineering can be defined as the process of obtaining information from other people through the application of social skills. The objective of social engineering is to deceive the computer user into compromising his/her system and revealing sensitive information.
Social engineering ploys take advantage of human nature by tricking people into installing malware or revealing personal information. The user is tempted to carry out a necessary activity that damages their computer. This occurs when the user receives a message directing him/her to open a file or web page or watch a video. Often, these ploys relate to celebrities, natural disasters, or popular events.
One common trick includes showing a fake virus scan that indicates your computer is infected and encourages you to download a tool to remove the infection. Another ploy offers to display a video, but only after you install a plug-in that is “required” to view the content.
Back up all your data. While your computer may be an expensive asset, it is replaceable. However, the data and personal records on your computer may be difficult or impossible to replace. Whether or not you take steps to protect yourself, there is always the possibility that something will happen to destroy your data. One important risk to your data is ransomware. Ransomware can prevent you from accessing your data by locking your computer's screen or locking your computer files unless you pay a ransom. Ransomware can be downloaded onto your computer if you visit a malicious website or open a malicious email attachment.
There are many hardware and software alternatives for backing up your data including USB flash drives and external hard drives (hardware) as well as archiving and disk imaging programs (software). Each method has its own advantages and disadvantages. For a simple solution, important files can be saved to an encrypted USB flash drive. It’s a good idea to keep your backup media in a locked and secure location.
Encrypt files on your computer, laptop or portable device. Encryption is a way to enhance the security of a file or folder by scrambling the contents so that it can be read only by someone who has the appropriate encryption key to unscramble it.
Computers are lost, stolen or hacked every day. As a result, your personal information can become available to anyone and may lead to privacy invasion and identity theft. Many computers and other devices contain sensitive files such as financial records, tax returns, medical histories, and other personal files.
Many computer users rely on laptops and other portable devices because they are small and easily transported. But while these characteristics make them convenient, they also make them an attractive target for thieves. Make sure to secure your portable devices to protect both the machine and the information it contains. It’s important to encrypt any sensitive data on such devices.
USB flash drives pose security risks for similar reasons. Use them cautiously. Some flash drives offer built-in encryption features.
Unencrypted files on your computer can be read by anyone even if your computer is password protected. There are methods by which a person who has physical access to your computer can read unencrypted files without entering your password. So it’s important to encrypt sensitive files even if they are on a password-protected computer.
How to Encrypt All Your Data provides seven tips for encrypting the data you store and share across your devices and the internet. Are Your Online Messages Safe? focuses on messaging apps that use end-to-end encryption.
8. Resources
Privacy Rights Clearinghouse Consumer Guides:
Baby workout 1 1. · Online Privacy: Using the Internet Safely
· Online Shopping Tips: E-Commerce and You
· Social Networking Privacy: How to be Safe, Secure and Social
U.S. Government Resources:
The U.S. Computer Emergency Readiness Team (U.S. CERT) offers numerous computer security resources. It's Tips Page is especially useful.
The Federal Trade Commission's Start with Security: A Guide for Business describes 10 practical lessons businesses can learn from the FTC's data security settlements.
Other Useful Resources:
Krebs on Security provides many useful resources including Tools for a Safer PCandKrebs’s 3 Basic Rules for Online Safety
California Attorney General, Cybersecurity in the Golden State: How California Businesses Can Protect Against and Respond to Malware, Data Breaches and Other Cyberincidents (February 2014)
April 2002
by Stanton McCandlish, EFF Technology Director
Vers. 2.0 - Apr. 10, 2002
Note: Mention of specific product, service or company names does
not constitute EFF endorsement or recommendation. Examples and links
are provided as starting points for readers, who must make up their
own minds about how much security they need and whether particular
offerings will suit their needs.
not constitute EFF endorsement or recommendation. Examples and links
are provided as starting points for readers, who must make up their
own minds about how much security they need and whether particular
offerings will suit their needs.
For information about the law and technology of government surveillance in the United States, check out EFF's Surveillance Self-Defense project.
1) Do not reveal personal information inadvertently.
You may be 'shedding' personal details, including e-mail addresses
and other contact information, without even knowing it unless you
properly configure your Web browser. In your browser's 'Setup',
'Options' or 'Preferences' menus, you may wish to use a pseudonym instead of your real name, and
not enter an e-mail address, nor provide other personally identifiable
information that you don't wish to share. When visiting a site you
trust you can choose to give them your info, in forms on their site;
there is no need for your browser to potentially make this information
available to all comers. Also be on the lookout for system-wide
'Internet defaults' programs on your computer (some examples include
Window's Internet Control Panel, and MacOS's Configuration Manager,
and the third-party Mac utility named Internet Config). While they are useful
for various things, like keeping multiple Web browers and other
Internet tools consistent in how the treat downloaded files and such,
they should probably also be anonymized just like your browser itself,
if they contain any fields for personal information. Households with
children may have an additional 'security problem' - have you set
clear rules for your kids, so that they know not to reveal personal
information unless you OK it on a site-by-site basis?
and other contact information, without even knowing it unless you
properly configure your Web browser. In your browser's 'Setup',
'Options' or 'Preferences' menus, you may wish to use a pseudonym instead of your real name, and
not enter an e-mail address, nor provide other personally identifiable
information that you don't wish to share. When visiting a site you
trust you can choose to give them your info, in forms on their site;
there is no need for your browser to potentially make this information
available to all comers. Also be on the lookout for system-wide
'Internet defaults' programs on your computer (some examples include
Window's Internet Control Panel, and MacOS's Configuration Manager,
and the third-party Mac utility named Internet Config). While they are useful
for various things, like keeping multiple Web browers and other
Internet tools consistent in how the treat downloaded files and such,
they should probably also be anonymized just like your browser itself,
if they contain any fields for personal information. Households with
children may have an additional 'security problem' - have you set
clear rules for your kids, so that they know not to reveal personal
information unless you OK it on a site-by-site basis?
2) Turn on cookie notices in your Web browser, and/or use cookie management software or infomediaries.
'Cookies' are tidbits of information that Web sites store on your
computer, temporarily or more-or-less permanently. In many cases
cookies are useful and inocuous. They may be passwords and user IDs,
so that you do not have to keep retyping them every time you load a
new page at the site that issued the cookie. Other cookies however, can be used for 'data
mining' purposes, to track your motions through a Web site, the time
you spend there, what links you click on and other details that the
company wants to record, usually for marketing purposes. Most cookies
can only be read by the party that created them. However, some companies
that manage online banner advertising are, in essence, cookie sharing rings. They
can track which pages you load, which ads you click on, etc., and share this information
with all of their client Web sites (who may number in the hundreds, even thousands.) Some
examples of these cookie sharing rings are DoubleClick, AdCast
and LinkExchange. For a demonstration of how they work, see:
http://privacy.net/track/
computer, temporarily or more-or-less permanently. In many cases
cookies are useful and inocuous. They may be passwords and user IDs,
so that you do not have to keep retyping them every time you load a
new page at the site that issued the cookie. Other cookies however, can be used for 'data
mining' purposes, to track your motions through a Web site, the time
you spend there, what links you click on and other details that the
company wants to record, usually for marketing purposes. Most cookies
can only be read by the party that created them. However, some companies
that manage online banner advertising are, in essence, cookie sharing rings. They
can track which pages you load, which ads you click on, etc., and share this information
with all of their client Web sites (who may number in the hundreds, even thousands.) Some
examples of these cookie sharing rings are DoubleClick, AdCast
and LinkExchange. For a demonstration of how they work, see:
http://privacy.net/track/
Browsers are starting
to allow user control over cookies. Netscape, for example, allows you
to see a notice when a site tries to write a cookie file to your hard
drive, and gives you some information about it, allowing you to decide
whether or not to accept it. (Be on the lookout for cookies the
function of which is not apparent, which go to other sites than the one you are trying to load, or which
are not temporary). It also allows you to automatically block all
cookies that are being sent to third parties (or to block all cookies,
entirely, but this will make some sites inoperable). Internet
Explorer has a cookie management interface in addition to
Netscape-like features, allowing you to selectively enable or disable
cookies on a site-by-site basis, even to allow cookies for a site
generally, but delete a specific cookie you are suspicious about. With
Internet Explorer you can also turn on cookies for a site temporarily
then disable them when you no longer need them (e.g., at an online
bookstore that requires cookies to process an order, but whom you
don't want to track what books you are looking at, what links you are
following, etc., the rest of the time.) Turning on cookie warnings
will cause alert boxes to pop up, but after some practice you may learn
to hit 'Decline' so fast that you hardly notice them any more. The
idea is to only enable cookies on sites that require them AND whom you
trust.
to allow user control over cookies. Netscape, for example, allows you
to see a notice when a site tries to write a cookie file to your hard
drive, and gives you some information about it, allowing you to decide
whether or not to accept it. (Be on the lookout for cookies the
function of which is not apparent, which go to other sites than the one you are trying to load, or which
are not temporary). It also allows you to automatically block all
cookies that are being sent to third parties (or to block all cookies,
entirely, but this will make some sites inoperable). Internet
Explorer has a cookie management interface in addition to
Netscape-like features, allowing you to selectively enable or disable
cookies on a site-by-site basis, even to allow cookies for a site
generally, but delete a specific cookie you are suspicious about. With
Internet Explorer you can also turn on cookies for a site temporarily
then disable them when you no longer need them (e.g., at an online
bookstore that requires cookies to process an order, but whom you
don't want to track what books you are looking at, what links you are
following, etc., the rest of the time.) Turning on cookie warnings
will cause alert boxes to pop up, but after some practice you may learn
to hit 'Decline' so fast that you hardly notice them any more. The
idea is to only enable cookies on sites that require them AND whom you
trust.
You may also wish to try out 'alternative' browsers like
Mozilla (Windows, Mac, Linux), Opera (Windows, Mac, Linux), Konqueror (Linux),
and iCab (Mac), which may offer better cookie management.
Mozilla (Windows, Mac, Linux), Opera (Windows, Mac, Linux), Konqueror (Linux),
and iCab (Mac), which may offer better cookie management.
You can also use cookie management software and services. One example is
the Internet Junkbuster Proxy ( http://www.junkbusters.com/ht/en/ijb.html ).
It runs on Win95/98/NT and
the Internet Junkbuster Proxy ( http://www.junkbusters.com/ht/en/ijb.html ).
It runs on Win95/98/NT and
Unix/Linux
(no Mac version), and can selectively
block cookies for you (and banner ads, to boot). interMute ( http://www.intermute.com/ )
block cookies for you (and banner ads, to boot). interMute ( http://www.intermute.com/ )
does likewise (and more - blocks popup windows, etc.; only runs under Windows).
Another Windows-only
solution is AdSubtract ( http://www.adsubtract.com/ )
A comparable product (Linux, Solaris, Windows) is GuideScope ( http://www.guidescope.com/home/ )
solution is AdSubtract ( http://www.adsubtract.com/ )
A comparable product (Linux, Solaris, Windows) is GuideScope ( http://www.guidescope.com/home/ )
A Java-based solution called Muffin ( http://muffin.doit.org/ ) is also available. While it will run
on Mac, Windows and Unix systems, it is definitely for 'power users', as it is complicated
to set up and operate effectively.
on Mac, Windows and Unix systems, it is definitely for 'power users', as it is complicated
to set up and operate effectively.
Another recent option (Linux, Mac, Windows) is the
Cookie 5 6 3 – Protect Your Online Privacy Fence Panels
( http://www.webwasher.com/ ), which has advanced cookie filtering capabilities,
especially with the Seclude-It and Secretmaker plug-ins available at the same site.
One more (Windows) is CookiePal ( http://www.kburra.com/cpal.html ),
and yet another (Windows) is ( http://www.thelimitsoft.com/cookie.html ).
especially with the Seclude-It and Secretmaker plug-ins available at the same site.
One more (Windows) is CookiePal ( http://www.kburra.com/cpal.html ),
and yet another (Windows) is ( http://www.thelimitsoft.com/cookie.html ).
There are also numerous 'cookie eater' applications,
some which run on a schedule or in the background, that delete cookie files for you. As with turning off
cookies entirely, you may have trouble accessing sites that require certain cookies (though
in most cases the worst that will happen is that you'll have to re-enter a login ID and password
you thought were saved.) 'Eating' the cookies periodically still permits sites to track what
you're doing for a short time (i.e., the time between successive deletion of your cookie file),
but thwarts attempts to discern and record your actions over time.
some which run on a schedule or in the background, that delete cookie files for you. As with turning off
cookies entirely, you may have trouble accessing sites that require certain cookies (though
in most cases the worst that will happen is that you'll have to re-enter a login ID and password
you thought were saved.) 'Eating' the cookies periodically still permits sites to track what
you're doing for a short time (i.e., the time between successive deletion of your cookie file),
but thwarts attempts to discern and record your actions over time.
Yet another option is to use an 'infomediary' (some are home-use software products, others may be network-based services),
such as SeigeSoft's
SiegeSurfer ( http://www.siegesoft.com/_html/tutorial.asp ),
Zero Knowledge Systems' Freedom
such as SeigeSoft's
SiegeSurfer ( http://www.siegesoft.com/_html/tutorial.asp ),
Zero Knowledge Systems' Freedom
( http://www.freedom.net ), among others. These products/services act as a proxy or
shield between you and sites you visit, and can completely disguise to Web sites where you are coming from
and who you are (and intercept all cookies). Most are Windows-only at this point, though
Orangatango ( http://www.orangatango.com/ ), and SafeWeb
shield between you and sites you visit, and can completely disguise to Web sites where you are coming from
and who you are (and intercept all cookies). Most are Windows-only at this point, though
Orangatango ( http://www.orangatango.com/ ), and SafeWeb
and ( http://www.safeweb.com ) also offer
such services that are Web-based and not platform-dependent.
such services that are Web-based and not platform-dependent.
WARNING: Do not confuse honest infomediaries
with 'identity managmenet services' like Microsoft's Passport service or Novell's DigitalMe. While you may gain some
temporary convenience at sites that support them, you'll lose essential privacy, because these services are not
there to serve you but to serve marketing purposes by collecting a vast array of information about you and selling it.
with 'identity managmenet services' like Microsoft's Passport service or Novell's DigitalMe. While you may gain some
temporary convenience at sites that support them, you'll lose essential privacy, because these services are not
there to serve you but to serve marketing purposes by collecting a vast array of information about you and selling it.
The best solution doesn't exist yet: Full cookie management abilities built
into the browsers themselves. Only increased user pressure on Microsoft, Netscape
and other browser makers can make this happen. Users should ultimately be able
to reject cookies on a whole-domain basis, reject all third-party cookies by default, reject all cookies that are not essential
for the transaction at hand, receive notice of exactly what a cookie is intended for,
and be able to set default behaviors and permissions rather than have to interact with cookies on a page-by-page
basis. This just isn't possible yet. You may wish to contact the company that makes your browser software and
demand these essential features in the next version.
into the browsers themselves. Only increased user pressure on Microsoft, Netscape
and other browser makers can make this happen. Users should ultimately be able
to reject cookies on a whole-domain basis, reject all third-party cookies by default, reject all cookies that are not essential
for the transaction at hand, receive notice of exactly what a cookie is intended for,
and be able to set default behaviors and permissions rather than have to interact with cookies on a page-by-page
basis. This just isn't possible yet. You may wish to contact the company that makes your browser software and
demand these essential features in the next version.
3) Keep a 'clean' e-mail address.
When mailing to unknown parties; posting to newsgroups, mailing
lists, chat rooms and other public spaces on the Net; or publishing a
Web page that mentions your e-mail address, it is best to do this from
a 'side' account, some pseudonymous or simply alternate address, and
to use your main or preferred address only on small, members-only
lists and with known, trusted individuals. Addresses that are posted
(even as part of message headers) in public spaces can be easily
discovered by spammers (online junk mailers) and added to their list of
targets. If your public 'throw away' address gets spammed enough to become
annoying, you can simply kill it off, and start a new one. Your
friends, boss, etc., will still know your 'real' address. You can use
a free (advertising-supported) e-mail service provider like Yahoo Mail
or Hotmail for such 'side' accounts. It is best to use a 'real'
Internet service provider for your main account, and to examine their
privacy policies and terms of service, as some 'freemail' services may have
poor privacy track records. You may find it works best to use an
e-mail package that allows mulitiple user IDs and addresses (a.k.a.
'personalities', 'aliases') so that you do not have to switch between multiple
programs to manange and use more than one e-mail address
lists, chat rooms and other public spaces on the Net; or publishing a
Web page that mentions your e-mail address, it is best to do this from
a 'side' account, some pseudonymous or simply alternate address, and
to use your main or preferred address only on small, members-only
lists and with known, trusted individuals. Addresses that are posted
(even as part of message headers) in public spaces can be easily
discovered by spammers (online junk mailers) and added to their list of
targets. If your public 'throw away' address gets spammed enough to become
annoying, you can simply kill it off, and start a new one. Your
friends, boss, etc., will still know your 'real' address. You can use
a free (advertising-supported) e-mail service provider like Yahoo Mail
or Hotmail for such 'side' accounts. It is best to use a 'real'
Internet service provider for your main account, and to examine their
privacy policies and terms of service, as some 'freemail' services may have
poor privacy track records. You may find it works best to use an
e-mail package that allows mulitiple user IDs and addresses (a.k.a.
'personalities', 'aliases') so that you do not have to switch between multiple
programs to manange and use more than one e-mail address
(though you may
have to use a Web browser rather than an e-mail program to read your
mail in your 'throw away' accounts - many freemail providers do not
allow POP or IMAP connections). If you are 'required'
to give an e-mail address to use a site (but will not be required to
check your mail for some kind of access code they send you), you can
use '[email protected]' (example.com is a non-existent site,
set up by the Internet standards to be used as an example that will
never accidentally coincide with anyone's real e-mail address, which
is always a danger if you just make up one off the top of your head.)
have to use a Web browser rather than an e-mail program to read your
mail in your 'throw away' accounts - many freemail providers do not
allow POP or IMAP connections). If you are 'required'
to give an e-mail address to use a site (but will not be required to
check your mail for some kind of access code they send you), you can
use '[email protected]' (example.com is a non-existent site,
set up by the Internet standards to be used as an example that will
never accidentally coincide with anyone's real e-mail address, which
is always a danger if you just make up one off the top of your head.)
4) Don't reveal personal details to strangers or just-met
'friends'.
The speed of Internet communication is often
mirrored
in rapid online
acquaintanceships and friendships. But it is important to realize that
you don't really know who these people are or what they are like in
real life. A thousand miles away, you don't have friends-of-friends
or other references about this person. Be also wary of face-to-face
meetings. If you and your new e-friend wish to meet in person, do it
in a public place. Bringing a friend along can also be a good idea.
One needn't be paranoid, but one should not be an easy mark, either.
Some personal information you might wish to withhold until you know
someone much better would include your full name, place of employment,
phone number, and street address (among more obvious things like
credit card numbers, etc.) Needless to say, such information should
not be put on personal home pages. (If you have a work home page, it
may well have work contact information on it, but you needn't reveal
this page to everyone you meet in a chat room.) For this and other
reasons, many people maintain two personal home pages, a work-related
one, and an 'off duty' version. In the commercial sector, too, beware
'fast-met friends'. A common
acquaintanceships and friendships. But it is important to realize that
you don't really know who these people are or what they are like in
real life. A thousand miles away, you don't have friends-of-friends
or other references about this person. Be also wary of face-to-face
meetings. If you and your new e-friend wish to meet in person, do it
in a public place. Bringing a friend along can also be a good idea.
One needn't be paranoid, but one should not be an easy mark, either.
Some personal information you might wish to withhold until you know
someone much better would include your full name, place of employment,
phone number, and street address (among more obvious things like
credit card numbers, etc.) Needless to say, such information should
not be put on personal home pages. (If you have a work home page, it
may well have work contact information on it, but you needn't reveal
this page to everyone you meet in a chat room.) For this and other
reasons, many people maintain two personal home pages, a work-related
one, and an 'off duty' version. In the commercial sector, too, beware
'fast-met friends'. A common
'social engineering'
form
of industrial espionage is to befriend someone online just long
enough to get them to reveal insider information.
of industrial espionage is to befriend someone online just long
enough to get them to reveal insider information.
5) Realize you may be monitored at work, avoid sending highly
personal e-mail to mailing lists, and keep sensitive files on your
home computer.
In most US states and many if not most countries, employees have little if any privacy protection
from monitoring by employers. When discussing sensitive matters in
e-mail or other online media, be certain
from monitoring by employers. When discussing sensitive matters in
e-mail or other online media, be certain
with whom you are communicating
. If
you replied to a mailing list post, check the headers - is your reply
going to the person you think it is, or to the whole list? Also be
aware that an increasing number of employers are monitoring and
recording employee Web usage, as well as e-mail. This could compromise
home banking passwords and other sensitive information. Keep private
data and private Net usage
you replied to a mailing list post, check the headers - is your reply
going to the person you think it is, or to the whole list? Also be
aware that an increasing number of employers are monitoring and
recording employee Web usage, as well as e-mail. This could compromise
home banking passwords and other sensitive information. Keep private
data and private Net usage
private
, at home.
See this CNN/IDG article on 'snoopware' (which may not be limited to your office..):
6) Beware sites that offer some sort of reward or prize in
exchange for your
contact information or other personal details
.
There's a very high probability that they are gathering this
information for direct marketing purposes. In many cases your name and
address are worth much more to them because they can sell it to other
marketers (who can do the same in turn..) than what
you are (supposedly) getting from them. Be especially wary of
sweepstakes and contests. You probably won't win, but the marketer
sure will if you give them your information.
information for direct marketing purposes. In many cases your name and
address are worth much more to them because they can sell it to other
marketers (who can do the same in turn..) than what
you are (supposedly) getting from them. Be especially wary of
sweepstakes and contests. You probably won't win, but the marketer
sure will if you give them your information.
7) Do not reply to spammers, for any reason.
'Spam', or unsolicited bulk e-mail, is something you are probably
already familiar with (and tired of). If you get a spammed
advertisment, certainly don't take the sender up on whatever offer
they are making, but also don't bother replying with 'REMOVE' in the
subject line, or whatever (probably bogus) unsubscribe instructions
you've been given). This simply confirms that your address is being
read by a real person, and you'll find yourself on dozens more
spammers' lists in no time. If you open the message, watch your
outgoing mail queue to make sure that a 'return receipt' message was
not generated to be sent back to the spammer automatically. (It is
best to queue your mail and send manually, rather than send
immediately, so that you can see what's about to go out before it's
actually sent. You should also turn off your mailer's automatic
honoring of return receipt requests, if any.) If you have a good
Internet service provider, you may
be able to forward copies of spam e-mail to the system administrators
who can route a complaint to the ISP of the spammer (or if you know a
lot about mail headers and DNS tools, you can probably contact these
ISPs yourself to complain about the spammer.) If you are getting
spammed a lot, there are a variety of filters and anti-spam
services available, including:
already familiar with (and tired of). If you get a spammed
advertisment, certainly don't take the sender up on whatever offer
they are making, but also don't bother replying with 'REMOVE' in the
subject line, or whatever (probably bogus) unsubscribe instructions
you've been given). This simply confirms that your address is being
read by a real person, and you'll find yourself on dozens more
spammers' lists in no time. If you open the message, watch your
outgoing mail queue to make sure that a 'return receipt' message was
not generated to be sent back to the spammer automatically. (It is
best to queue your mail and send manually, rather than send
immediately, so that you can see what's about to go out before it's
actually sent. You should also turn off your mailer's automatic
honoring of return receipt requests, if any.) If you have a good
Internet service provider, you may
be able to forward copies of spam e-mail to the system administrators
who can route a complaint to the ISP of the spammer (or if you know a
lot about mail headers and DNS tools, you can probably contact these
ISPs yourself to complain about the spammer.) If you are getting
spammed a lot, there are a variety of filters and anti-spam
services available, including:
Cookie 5 6 3 – Protect Your Online Privacy Fence Slats
Spam Hater ( http://www.cix.co.uk/~net-services/spam/spam_hater.htm ) for Windows users;
TAG ( http://alcor.concordia.ca/topics/email/auto/procmail/spam ) for experienced Unix users;
SpamBouncer ( http://www.spambouncer.org ) for experienced Unix users (works well with TAG);
BrightMail ( http://www.brightmail.com/ ) for ISPs;
SpamCop ( http://spamcop.net/ ) for anyone;
More information on fighting spam is available at:
Elsop's Anti-Spam Page ( http://www.elsop.com/wrc/nospam.htm );
MaximumDownforce's Info-n-Links Page( http://www.maximumdownforce.com/hotlinks.html );
Whew's Anti-Spam Campaign ( http://www.whew.com/Spammers/ ).
Cookie 5 6 3 – Protect Your Online Privacy Fence Gates
Many of these are difficult to use for novices, and some require Unix
expertise. Others are services that deal with ISPs only, not end users.
expertise. Others are services that deal with ISPs only, not end users.
8) Be conscious of Web security.
Never submit a credit card number or other highly sensitive
personal information without first making sure your connection is
secure (encrypted). In Netscape, look for an closed lock (Windows) or unbroken key (Mac) icon at the
bottom of the browser window. In Internet Explorer, look for a closed
lock icon at the bottom (Windows) or near the top (Mac) of the browser window.
In any browser, look at
the URL (Web address) line - a secure connection will begin 'https://'
intead of 'http://'. If you are at page that asks for such information
but shows 'http://' try adding the 's' yourself and hitting enter to
reload the page (for Netscape or IE; in another browser, use whatever method is required
by your browser to reload the page at the new URL). If you get an
error message that the page or site does not exist, this probably
means that the company is so clueless - and careless with your
information and your money - that they don't even have Web security.
Take your business elsewhere.
personal information without first making sure your connection is
secure (encrypted). In Netscape, look for an closed lock (Windows) or unbroken key (Mac) icon at the
bottom of the browser window. In Internet Explorer, look for a closed
lock icon at the bottom (Windows) or near the top (Mac) of the browser window.
In any browser, look at
the URL (Web address) line - a secure connection will begin 'https://'
intead of 'http://'. If you are at page that asks for such information
but shows 'http://' try adding the 's' yourself and hitting enter to
reload the page (for Netscape or IE; in another browser, use whatever method is required
by your browser to reload the page at the new URL). If you get an
error message that the page or site does not exist, this probably
means that the company is so clueless - and careless with your
information and your money - that they don't even have Web security.
Take your business elsewhere.
Your browser itself gives away information about you, if your IP address
can be tied to your identity (this is most commonly true of DSL and broadband
users, rather than modem users, who are a dwindling minority). For a demo
of how much detail is automatically given out about your system by your
browser, see: http://privacy.net/analyze/ .
can be tied to your identity (this is most commonly true of DSL and broadband
users, rather than modem users, who are a dwindling minority). For a demo
of how much detail is automatically given out about your system by your
browser, see: http://privacy.net/analyze/ .
Also be on the lookout for 'spyware' - software that may be included
with applications you install (games, utilities, whatever), the
purpose of which is to silently spy on your online habits and other
details and report it back to the company whose product you are using.
One MS Windows solution for disabling spyware is the Ad-aware program
(shareware, from http://www.lavasoft.de/ ),
which can remove spyware from your computer; it is based on a large
collaboratively maintained database of information about spyware.
Linux and Mac products of this sort are likely to appear soon.
with applications you install (games, utilities, whatever), the
purpose of which is to silently spy on your online habits and other
details and report it back to the company whose product you are using.
One MS Windows solution for disabling spyware is the Ad-aware program
(shareware, from http://www.lavasoft.de/ ),
which can remove spyware from your computer; it is based on a large
collaboratively maintained database of information about spyware.
Linux and Mac products of this sort are likely to appear soon.
Java, Javascript and ActiveX can also be used for spyware purposes.
Support for these scripting languages can be disabled in your
browser's configuration options (a.k.a. preferences, settings,
or properties). It is safest to surf with them turned off,
and only turn them on when a site you trust and want to use
requires them. If you don't know if your browser supports these
languages or don't know if they are turned on you can use BrowserSpy
to find out (along with a lot of other information about your Web
browsing software): http://gemal.dk/browserspy/
Support for these scripting languages can be disabled in your
browser's configuration options (a.k.a. preferences, settings,
or properties). It is safest to surf with them turned off,
and only turn them on when a site you trust and want to use
requires them. If you don't know if your browser supports these
languages or don't know if they are turned on you can use BrowserSpy
to find out (along with a lot of other information about your Web
browsing software): http://gemal.dk/browserspy/
Another form of spyware consists of 'webbugs', which typically
manifest themselves as invisible or nearly invisible image files
tied to cookies and javascripts that track your Web usage.
See http://www.google.com/search?hl=en&q=webbugs+%22web+bugs%22
for more information on webbugs. See also this webbug FAQ, http://www.nthelp.com/OEtest/web_bug_faq.htm for more details.
Dealing with webbugs when they are embedded in an otherwise legitimate page
is thorny, as there isn't a surefire way to distinguish between webbugs and
run-of-the-mill image files. But see the Privacy Foundation's
Bugnosis webbug detector ( http://www.bugnosis.org/ - Windows MSIE only).
When webbugs are loaded into popup pages, the solution is to close the popups
(usually a small page with an ad, though some of them are 'micropages'
that you can barely see. A few may even use javascript tricks to keep
you from closing them. If this happens, close all other browser windows,
then you should be able to close the bug window). Another tip for defeating
webbugs is to reject any cookies from Doubleclick, AdCast, LinkExchange and other
'ad exchange networks' (cookie sharing rings), and any other cookies that
are not from the site you are currently visiting (most third-party cookies
are basically webbugs). Lastly on this topic, be aware that HTML-capable
e-mail programs and Usenet newsreaders make webbugs work in your e-mail
and newsgroups. If your mailer or newsreader has an option to turn off
cookie support, you should certainly do so. There is hardly any imaginable
legitimate use for a cookie in an email or a newsgroup posting.
manifest themselves as invisible or nearly invisible image files
tied to cookies and javascripts that track your Web usage.
See http://www.google.com/search?hl=en&q=webbugs+%22web+bugs%22
for more information on webbugs. See also this webbug FAQ, http://www.nthelp.com/OEtest/web_bug_faq.htm for more details.
Dealing with webbugs when they are embedded in an otherwise legitimate page
is thorny, as there isn't a surefire way to distinguish between webbugs and
run-of-the-mill image files. But see the Privacy Foundation's
Bugnosis webbug detector ( http://www.bugnosis.org/ - Windows MSIE only).
When webbugs are loaded into popup pages, the solution is to close the popups
(usually a small page with an ad, though some of them are 'micropages'
that you can barely see. A few may even use javascript tricks to keep
you from closing them. If this happens, close all other browser windows,
then you should be able to close the bug window). Another tip for defeating
webbugs is to reject any cookies from Doubleclick, AdCast, LinkExchange and other
'ad exchange networks' (cookie sharing rings), and any other cookies that
are not from the site you are currently visiting (most third-party cookies
are basically webbugs). Lastly on this topic, be aware that HTML-capable
e-mail programs and Usenet newsreaders make webbugs work in your e-mail
and newsgroups. If your mailer or newsreader has an option to turn off
cookie support, you should certainly do so. There is hardly any imaginable
legitimate use for a cookie in an email or a newsgroup posting.
9) Be conscious of home computer security.
On the other side of the coin, your own computer may be a trouble
spot for Internet security.
spot for Internet security.
If you have a DSL line, broadband cable modem or other connection
to the Internet that is up and running 24 hours (including T1 at the office without a firewall
or NAT),
to the Internet that is up and running 24 hours (including T1 at the office without a firewall
or NAT),
unlike a modem-and-phone-line connection, be sure to turn your computer off
when you are not using it. Most home PCs have pitifully poor security
compared to the Unix workstations that power most commercial Web
sites. System crackers search for vulnerable, unattended DSL-connected
home computers, and can invade them with surprising ease, rifiling
through files looking for credit card numbers or other sensitive data,
or even 'taking over' the computer and quietly using it for their own
purposes, such as lauching attacks on other computers elsewhere -
attacks you could initially be blamed for. Firewall hardware and software is
another option that can protect you from these kinds of attacks (available
at any computer store; freeware and shareware implementations may be
available at sites like http://www.shareware.com
or http://www.download.com.
when you are not using it. Most home PCs have pitifully poor security
compared to the Unix workstations that power most commercial Web
sites. System crackers search for vulnerable, unattended DSL-connected
home computers, and can invade them with surprising ease, rifiling
through files looking for credit card numbers or other sensitive data,
or even 'taking over' the computer and quietly using it for their own
purposes, such as lauching attacks on other computers elsewhere -
attacks you could initially be blamed for. Firewall hardware and software is
another option that can protect you from these kinds of attacks (available
at any computer store; freeware and shareware implementations may be
available at sites like http://www.shareware.com
or http://www.download.com.
10) Examine privacy policies and seals.
When you are considering whether or not to do business with a Web
site, there are other factors than a secure connection you have to consider that are equally
important to Web security. Does the site provide offline contact
information, including a postal address? Does the site have a
prominently-posted privacy policy? If so, what does it say? (Just
because they call it a 'privacy policy' doesn't mean it will protect
you - read it for yourself. Many are little more than disclaimers
saying that you have no privacy! So read them carefully.) If the
policy sounds OK to you, do you have a reason to believe it? Have you
ever heard of this company? What is their reputation? And are they
backing up their privacy statement with a seal program such as TRUSTe
http://www.truste.org/ or
BBBonline http://www.bbbonline.org/? (While imperfect, such
programs hold Web sites to at least some minimal baseline standards, and may revoke, with much fanfare, the
approval-seal licenses of bad-acting companies that do not
keep their word.) If you see a seal, is it real? Check with the
seal-issuing site to make sure the seal isn't a fake. And examine
terms carefully, especially if you are subscribing to a service rather
than buying a product. Look out for auto-rebilling scams and hidden
fees.
site, there are other factors than a secure connection you have to consider that are equally
important to Web security. Does the site provide offline contact
information, including a postal address? Does the site have a
prominently-posted privacy policy? If so, what does it say? (Just
because they call it a 'privacy policy' doesn't mean it will protect
you - read it for yourself. Many are little more than disclaimers
saying that you have no privacy! So read them carefully.) If the
policy sounds OK to you, do you have a reason to believe it? Have you
ever heard of this company? What is their reputation? And are they
backing up their privacy statement with a seal program such as TRUSTe
http://www.truste.org/ or
BBBonline http://www.bbbonline.org/? (While imperfect, such
programs hold Web sites to at least some minimal baseline standards, and may revoke, with much fanfare, the
approval-seal licenses of bad-acting companies that do not
keep their word.) If you see a seal, is it real? Check with the
seal-issuing site to make sure the seal isn't a fake. And examine
terms carefully, especially if you are subscribing to a service rather
than buying a product. Look out for auto-rebilling scams and hidden
fees.
11) Remember that YOU decide what information about yourself to
reveal, when, why, and to whom.
Don't give out personally-identifiable information too easily. Just as
you might think twice about giving some clerk at the mall your home
address and phone number, keep in mind that simply because a site asks
for or demands personal information from you does not mean you have to
give it. You do have to give accurate billing information if you are
buying something, of course, but if you are registering with a free
site that is a little too nosy for you, there is no law (in most places) against
providing them with pseudonymous information. (However, it would
probably be polite to use obviously fake addresses, such as '123 No
Such Street, Nowhere, DC 01010'. If they are generating mailings based
on this information - presumably in accordance with the terms of their
privacy policy - they can probably weed such addresses out and not
waste the postage on them. Definitely do NOT use someone else's real
address!)
you might think twice about giving some clerk at the mall your home
address and phone number, keep in mind that simply because a site asks
for or demands personal information from you does not mean you have to
give it. You do have to give accurate billing information if you are
buying something, of course, but if you are registering with a free
site that is a little too nosy for you, there is no law (in most places) against
providing them with pseudonymous information. (However, it would
probably be polite to use obviously fake addresses, such as '123 No
Such Street, Nowhere, DC 01010'. If they are generating mailings based
on this information - presumably in accordance with the terms of their
privacy policy - they can probably weed such addresses out and not
waste the postage on them. Definitely do NOT use someone else's real
address!)
However, if you are required to agree to
terms of service before using the free service, be sure those terms
do not include a requirement that you provide correct information,
unless the penalty is simply not being allowed to use the service
any more, and you're willing to pay that price if they figure out
you are not providing them with your actual personally-identifiable
information.
terms of service before using the free service, be sure those terms
do not include a requirement that you provide correct information,
unless the penalty is simply not being allowed to use the service
any more, and you're willing to pay that price if they figure out
you are not providing them with your actual personally-identifiable
information.
12) Use encryption!
Last but certainly not least, there are other privacy threats
besides abusive marketers, nosy bosses, spammers and scammers. Some
of the threats include industrial espionage, government surveillance,
identity theft, disgruntled former associates, and system crackers.
Relatively easy-to-use e-mail and file encryption software is
available for free, such as Pretty Good Privacy (PGP, available at: http://www.pgpi.org/), which runs on
almost all computers and even integrates seamlessly with most major
e-mail software. Good encryption uses very robust secret codes, that
are difficult if not impossible to crack, to protect your data. You
can also use specialized services (some free, some pay)
that go beyond infomediary services, including running all connections
through a securely encrypted 'tunnel', anonymous dialup, even anonymous
Web publishing. Another type of product is SSH tunnelling (port forwarding) packages, such as FSecure SSH ( http://www.fsecure.com/products/ssh/ ),
and SecureCRT ( http://www.vandyke.com/products/securecrt/ ).
besides abusive marketers, nosy bosses, spammers and scammers. Some
of the threats include industrial espionage, government surveillance,
identity theft, disgruntled former associates, and system crackers.
Relatively easy-to-use e-mail and file encryption software is
available for free, such as Pretty Good Privacy (PGP, available at: http://www.pgpi.org/), which runs on
almost all computers and even integrates seamlessly with most major
e-mail software. Good encryption uses very robust secret codes, that
are difficult if not impossible to crack, to protect your data. You
can also use specialized services (some free, some pay)
that go beyond infomediary services, including running all connections
through a securely encrypted 'tunnel', anonymous dialup, even anonymous
Web publishing. Another type of product is SSH tunnelling (port forwarding) packages, such as FSecure SSH ( http://www.fsecure.com/products/ssh/ ),
and SecureCRT ( http://www.vandyke.com/products/securecrt/ ).
Cookie 5 6 3 – Protect Your Online Privacy Fences
Hopefully some day soon, good encryption and computer security will simply
be included in all ISP services and operating systems, but for now you have to actively
seek out good service providers and add-on products.
be included in all ISP services and operating systems, but for now you have to actively
seek out good service providers and add-on products.
For more information on protecting your online privacy:
- EFF Privacy Archive - http://www.eff.org/Privacy/
- 'Protecting Yourself Online' Book -
- TRUSTe's 'Protecting Your Privacy Online' FAQ - http://truste.org/consumers/users_faqs.html
- Privacy Rights Clearinghouse - http://www.privacyrights.org/
- Privacy International - http://www.privacyinternational.org/