"8 Key Actions for Protecting Your Privacy Online"

Written by Doug Partridge


Continued from page 1

4. Never provide personal or financial information to a non-secure website. A "secure" website is indicated by "HTTPS" inrepparttar address bar, and a small padlock icon inrepparttar 118478 lower right-hand corner of your browser window. http://www.verisign.com/advisor/check.html is a free place to check your browser's security capabilities.

5. Never provide confidential or financial information in response to an email request. Legitimate companies will never ask for personal or financial information over an insecure medium like email. Attempts to trick people into revealing personal and financial information through impersonated email messages is known as "Phishing." Some of these messages look very official and may come what appears to be a bona fide bank or company. Beware! When unsure if an email message is genuine it's best to telephonerepparttar 118479 company in question. Phishing email messages may be reported to http://www.antiphishing.org/.

6. Readrepparttar 118480 fine print before typing in private personal information. Always readrepparttar 118481 privacy policy of a website to understand how they will use your information. Will they share or sell it? Be suspicious if no privacy policy is visible.

7. Never download or accept any file or program from an un-trusted source. Adware and Spyware are frequently bundled with "free" programs. You may download one program and find that your computer becomes infected with a Spyware programs.

8. Be wary and virus check all email attachments. Never open an unexpected email attachment, even from known friends or business senders. Their computers may be infected. Self-spreading worms can infect a computer and then send an infected email-attachment to everyone inrepparttar 118482 owner's address book.

Malicious Internet threats are clearly a formidable enemy; however,repparttar 118483 good news is that tools and information are readily available so that you can enjoyrepparttar 118484 Internet without putting your computer and confidential information at risk.

Doug Partridge is co-author of a new eBook, "How to Secure Your Computer Using Free Tools and Smart Strategies." Get all the tools and information you need to thoroughly secure your Windows computer and private information from malicious threats on the Internet. Get Secure Now => http://www.SecureYourComputer.Net


Passwords or Pass Phrase? Protecting your Intellectual Property

Written by John Savageau


Continued from page 1

PassPhrases are a concept that will help us create more secure, easy to remember safeguards for our computer and network resource protection. A passphrase is a selection of words and/or numbers that are 15 characters or more in length, and are easy for us to remember. A couple examples of a good pass phrases are:

•igotodalaieejdaily •shehasbeautifulhair •surfinginhawaiiisgreat

According to Mark Minasi, a noted security consultant, a 15 character pass phrase will require a cracking programrepparttar following number of computations to try and break a 15 character pass phrase:

•15 lowercase letters = 1,677,259,342,285,725,925,376 possibilities •Try a million a second, it’ll take 531,855 centuries/years to breakrepparttar 118477 code

As you can see, this is a pretty good level of security for your resource.

Another concern with passwords is if you forget or loserepparttar 118478 password, and are using a utility like Microsoft’s Encrypting File System (EFS), you runrepparttar 118479 risk of losing all access to your important files if you require a hardware reset of your password. All EFS encrypted files are linked to your login profile, meaning if you encrypt a directory or file with EFS, and you do a hardware reset on your computer, those files and directories are lost FOREVER.

For Microsoft Windows users you can now also use spaces within your pass phrase, however we would not recommend embedding spaces in your pass phrase, as that actually does allow a cracker better access to getting your code – it may help them crack it in 100,000 years rather than 250,000!

(About the Author – John Savageau is a managing director at CRG-West, responsible for managing operations and architecture for several of the largest telecommunications interconnect facilities in the US, including One Wilshire in Los Angeles savageau@pacific-tier.com/www.pacific-tier.com)


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use