"8 Key Actions for Protecting Your Privacy Online"

Written by Doug Partridge


8 Key Actions for Protecting Your Privacy Online © Doug Partridge - All Rights Reserved

Are you at risk of losing your privacy? Answerrepparttar following three simple questions:

Do you shop or bank online? Do you use an "always on" high-speed Internet connection? Do you connect torepparttar 118478 Internet from your home computer?

If you answered "yes" to any of these questions and you have a Windows computer – then you are at risk. Your computer needs to haverepparttar 118479 appropriate protections and you must take extra steps to secure your computer and protect your privacy.

Why is this so critical?

A recent study on Internet security sponsored by America Online andrepparttar 118480 National Security Alliance found that while most people thought their computers were secure upwards of 80% contained monitoring software known as "Spyware."

Spyware allows companies to download information from your computer without you even knowing it. Spyware represents a direct threat to online privacy and security.

But you can put a stop to it.

Here are 8 key actions for protecting online privacy:

1. Use a Personal Firewall. In addition to using an Anti-Virus program, a personal firewall is mandatory as it will block unwanted connection attempts. Sygate's Personal Firewall is a top-quality firewall and it's free for personal use. http://smb.sygate.com/products/spf_standard.htm

2. Use a Spyware removal program. You can't rely on your Anti-Virus program to find and remove all instances of Spyware. Ad-Aware from Lavasoft is free for personal use. Recommendation: run a full scan at least once a week. http://www.lavasoft.de/

3. Change to a More Secure Internet Browser. Due torepparttar 118481 numerous security exploits targeted specifically at Internet Explorer, consider using another web browser. An excellent free alternative is "Firefox" from Mozilla. Not only is it more secure, you get a built-in pop-up blocker and Google search tool. http://www.mozilla.org/products/firefox/

Passwords or Pass Phrase? Protecting your Intellectual Property

Written by John Savageau


Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said onrepparttar theory of password protection for files, computer login, and other network access. Inrepparttar 118477 past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. A new theory on passwords is emerging that may help us remember our access codes, be more secure, and generally keep hackers and thieves out of our networks.

A password is a combination of words, letters, and special characters that onlyrepparttar 118478 user knows, allowing access to a computer or other information resources. As humans we have a large number of codes and numbers we need to remember every day – such asrepparttar 118479 key lock on our apartment entries, national identification numbers, automobile license or tag numbers, telephone numbers – it is a large and confusing suite of items we need to memorize.

When selecting a new password or pass code for access to a computer system, most of us understand how difficult it is to remember complex codes, and thus we select something already know n to us, such as names, birthdays, national identifiers, or other known items, and then place a number or character in front ofrepparttar 118480 name or number thinking it is secure. This is easy to understand, as most of us simply do not have an ability to instantly recall large numbers of complex codes.

In a worst case we simply write downrepparttar 118481 complex code on a piece of paper, and leave it in a desk, our pocketbook, or in many cases taped torepparttar 118482 front of our computer monitor.

However, to a hacker this makes access to your network or computer much easier, at they generally only have to learn a couple things about you, and add a few numbers torepparttar 118483 front or ending of your personal data – you would be surprised how often this grants access to computers and networks. Ad some good “cracking utilities” torepparttar 118484 hacker’s suite of tools, and you can understandrepparttar 118485 threat.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use