Tools for Online Tracking

Written by S. Housley

Continued from page 1

PubSub - PubSub matches your requests against new information as it appears real time. Searches can be categorized to search, blog entries, SEC/EDGAR Filings, press releases, news group posts or flight delays.

Ego Alerts - Google news search turned into an RSS feed.

Ebay Alerts - Ebay Alerts monitoring will create an RSS feed to monitor Ebay auctions for specific keywords or phrases. When a new item that contains those keywords is added to Ebay you will receive notification via your RSS feed!

Amazon Alerts - Generate a URL which you can use to automatically search with your favorite RSS news reader. It will automatically update you when new items meet your search criteria. I personally use it to look for new books on topics I'm interested in, and I haverepparttar defaults set to dorepparttar 118473 same, but you can adjust it to search any of Amazon's stores. You can also adjustrepparttar 118474 search order and what kind of items you wish to search.

Internet Seer - InternetSeer remotely monitors your website to insure that your site is available 24/7. If InternetSeer is unable to reach your site, we will send you an immediate e-mail alert that your site is unreachable.

NetNewsTracker - NetNews Tracker is a clipping service for Usenet newsgroups. Newstracker searches newsgroups twice daily for any specified words or phrases and delivers alerts via e-mail. Newstracker can be used to monitor newsgroups for names, company names, products, URLs, or any other topic of interest.

Other Suggested Resources - Monitoring Tools - Monitoring Tools is a directory of online monitoring tools and applications

Monitoring Software - Monitoring Software is a collection of downloadable monitoring software solutions.

Sharon Housley manages marketing for NotePage, Inc. and FeedForAll .

Identity Theft: A crime too personal

Written by Chris N Fernando

Continued from page 1

Other type of Identity Theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.

How does it happen? As I said earlier, it’s not at all necessary forrepparttar criminal to be present near you to steal your personal information. In public places, for example, criminals may engage in shoulder surfing—watching you from a nearby location as you punch in your telephone calling card number or credit card number or listen in on your conversation if you give your credit-card number overrepparttar 118472 telephone to a hotel or rental car company. Shoulder surfing might also allow people to view your email message, in case you happen to be surfingrepparttar 118473 Net in a public place. Evenrepparttar 118474 area near your home or office may not be secure. Some criminals might just go through your garbage cans or trash bin, to obtain copies of your checks, credit card or bank statements that you might have just "thrown" intorepparttar 118475 garbage can.

Just one wrong mouse click, while you are hooked up torepparttar 118476 Net, might also land you in trouble. The criminal might just spam you with unsolicited email that contains an attachment - perhaps Pamela Anderson's picture. You might just click overrepparttar 118477 attachment in excitement and then nothing happens onrepparttar 118478 screen. You deleterepparttar 118479 mail thinking thatrepparttar 118480 file must have been corrupted. But little did you realize thatrepparttar 118481 "picture" was actually a key logger or a Trojan in disguise. A key logger is a simple program that runs inrepparttar 118482 background, recording every keystroke of yours and then makes it accessible torepparttar 118483 criminal, when you log ontorepparttar 118484 Internet. A Trojan onrepparttar 118485 other hand does more - it might just allowrepparttar 118486 criminal to take over your PC remotely, allowingrepparttar 118487 criminal to scan through your hard drives for personal information.

Other ways might include false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges - whichrepparttar 118488 criminal might be denied if he were to use his real name.

So how do you prevent your identity from being stolen? Watch this space for more soon…

* This article first appeared in

Chris N. Fernando is a Sr. Staff Writer with Magazine 360 - an IT magazine published by ITNation, Mumbai (India). He has also worked as Technical Editor with Peer Technical Services and as Reporter for PCQuest and Living Digital magazines. He also writes for

Get more of him at: Contact him at:

    <Back to Page 1 © 2005
Terms of Use