How To Give Away Your Personal Information

Written by Erich Heintz


Identity Theft and Your Personal Information -------------------------------------------- Identity theft is apparentlyrepparttar “in thing” these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Inrepparttar 138495 past few months, one company after another is being forced to admit customer data has been lost or stolen.

In many cases, they have then come forth repeatedly overrepparttar 138496 next few weeks, or even months revisingrepparttar 138497 estimated number of impacted customers. To date, I don’t think any have ever lowered those numbers.

Identity Theft and Respected Companies -------------------------------------- Generally speaking, these aren’t fly-by-night organizations. These are respected companies who we’ve come to trust. In many instances,repparttar 138498 loss wasn’t evenrepparttar 138499 work of a “malicious hacker” or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information fromrepparttar 138500 forces of evil.

You and Your Personal Information --------------------------------- What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents wererepparttar 138501 result of a trivial mistake that could have happened to anyone, including you.

Let’s consider two events that didn’t makerepparttar 138502 front page of C|Net or CNN.

The Keys To The Castle ---------------------- I consult for a client who doesn’t trust me. It’s nothing personal, they don’t trust anyone. Whenever I visit this site, I am forced to contactrepparttar 138503 client throughoutrepparttar 138504 visit to have them type a credential, or password, to grant access to a server or router. It’s really annoying.

I really respect this client.

They don’t really know me; I’m “the consultant”. They’re takingrepparttar 138505 proper steps when dealing with a consultant, providingrepparttar 138506 absolute minimum amount of information required. They would never give me unsupervised access to repparttar 138507 network, and certainly wouldn’t consider giving me passwords to their servers or routers. Not on purpose anyway.

Then there wasrepparttar 138508 day I was working alongsiderepparttar 138509 client and needed to reconfigure a router to complete a task. It’s a long walk torepparttar 138510 client’s office to getrepparttar 138511 password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Convenientlyrepparttar 138512 client does keep a password protected file on a USB key that containedrepparttar 138513 needed information. The client was completely appropriate and even asked permission before using my laptop to fetchrepparttar 138514 file. I consented, and even maderepparttar 138515 gesture of turning away while he unlockedrepparttar 138516 file and retrievedrepparttar 138517 required password.

Have you ever used Google Desktop Search? It’s a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It’ll even cache repparttar 138518 contents of files so if you move it off your hard drive, you’ll still be able to seerepparttar 138519 contents of what was once there. Normally it does all this inrepparttar 138520 background when you computer is sitting idle. It also does it anytime you open a file.

Your Personal Information Is The Prize -------------------------------------- You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.

What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.

FireWire is your friend

Written by Jakob Jelling


FireWire is an external device used to transfer high amounts of data. This device was invented by Apple and is also known asrepparttar IEEE 1394 since it isrepparttar 138481 standard to which it belongs. This way, we could say that FireWire isrepparttar 138482 Apple version ofrepparttar 138483 IEEE 1394 andrepparttar 138484 most known one as well, in such a way that usually those terms are used as synonymous.

Although FireWire isrepparttar 138485 most usual denomination under which this device is known, there also are some other names sometimes given to it. Amongrepparttar 138486 other names by which FireWire might be referred to there is not onlyrepparttar 138487 IEEE 1394 but also High Performance Serial Bus. This way, any of these three denominations refer to this same device, and using any of them would be correct.

A FireWire can not only transmit data at a speed of a minimum of 400 megabits per second but also can be connected to more than 60 other devices. This way, a FireWire can manage a high amount of different tasks and complete them all very fast and efficiently. Amongrepparttar 138488 many different types of data it would be able to transmit, an example would be DV digital video, which is usually transmitted from camcorders into PCS or Macs withrepparttar 138489 help of a FireWire, a task which would not be able to be achieved without this help.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use