How To Protect Your On-line Privacy

Written by Nick Pullen and Henry Morgan


Travellingrepparttar highways and byways ofrepparttar 118994 Internet can expose you to harmful exploitation. Nick Pullen, a master cybernaught, suggests you enhance your personal security and peace-of-mind by followingrepparttar 118995 "Rules ofrepparttar 118996 Road."

The Internet is a wonderful facilitator. We use it to communicate, do business, access information, news and services, and to shop. Butrepparttar 118997 Internet andrepparttar 118998 technology which makes it possible also has a darker side. It enables investigators, fraudsters, marketers, stalkers, hackers, lunatics and just plain nosy people, armed withrepparttar 118999 right equipment and know-how, to appropriate sensitive data and confidential information about you, your personal, financial and professional affairs, whether you are on or off-line.

This sensitive material can be sold to criminal or commercial buyers. Or it can be used to damage you and your personal or commercial interests. It could be used to blackmail or defraud you. It could be used by someone wanting to commit crimes in your name. It could be used to harass you. It can be added to any dossier being discreetly compiled about you by just about anybody for just about any purpose. The Internet could be used by a lunatic or someone with a grudge trying to track you down.

"New viruses are released intorepparttar 119000 public domain allrepparttar 119001 time."

Fact is, personal data and sensitive information about your activities and who you are is probably floating around Cyberspace right now - completely open to access. Sending emails, posting to news groups, shopping, and surfing on- line can undermine your personal, financial and professional privacy unless you take precautions.

I am not saying that Cyberspace is riddled with demented hackers or bulging atrepparttar 119002 seams with criminal types waiting to target you. But there is an undesirable element out there. If you’ve taken steps to protect yourself, you can be certain of not falling foul of them.

Userepparttar 119003 following techniques to ensure peace-of-mind on- line.

Preparation For On-line Activity

Restrictrepparttar 119004 flow of sensitive personal data. Your browser can literally shed information about you. Unless you take precautions to prevent it, without you knowing, your browser will simply distribute your email address and other contact information whilst you are on-line. Protect your main email address: In your browser's Set-up, Options or Preferences menus don’t enter your main email address. Instead set up an alternative email address free of charge (at http://www.hotmail.com or http://www.yahoo.com or any ofrepparttar 119005 other on-line email services offering free accounts). Enter that address instead. Inrepparttar 119006 same way you must protect your real identity. Inrepparttar 119007 same browser menus enter a pseudonym instead of your real name.

Ideally, to protect your main (non-Internet) systems and files against on-line privacy threats, use a second computer solely for Internet access and activity.

If you have a personal web page onrepparttar 119008 Internet don’t post personal information on it. Why give passing fraudsters, psychopaths or pranksters your home address, telephone number, or any other personal details?

Essential Ongoing Maintenance

Use virus protection software and use it regularly to sweep files attached to emails and files you download fromrepparttar 119009 Internet. Use Norton Anti-Virus which can be obtained from http://www.symantec.com. Alternatively, use a free virus scanner such as AVG, available from http://www.grisoft.com . Make sure your virus detection software is up-to-date. New viruses are released intorepparttar 119010 public domain allrepparttar 119011 time. If your software only deals with viruses up to a certain date it is not providing adequate protection.

"Many spammers are outright con artists."

A badly configured or maintained computer can reveal sensitive information about your Internet activity even when you are off-line. Windows contains a file called History which acts as a log of your Internet movements, keeping a record of allrepparttar 119012 Internet pages you have visited. This history file can last for months unless you configure your browser to prevent this. Go to Tools/Internet Options and setrepparttar 119013 days to keep pages in history option to zero days. Also ensure you regularly clearrepparttar 119014 Temp folder and Temporary Internet Files folder which will be found in Windows. Periodically open those folders, select their contents and delete.

Strengthen Your Email Security

The three best pieces of advice I can give you about preserving and protecting your on-line privacy are as follows. 1: Use encryption. 2: Use encryption. 3: Always, always use encryption. Why? Encryption isrepparttar 119015 most effective defence there is against really determined hackers, stalkers, and fraudsters who capture sensitive data by intercepting unencrypted email and Internet messages. Too many people still send unencrypted emails containing all manner of sensitive personal, financial, and commercial data. Fact: Sending unencrypted email through cyberspace is like sending a postcard throughrepparttar 119016 mail system; anybody and everybody can read it. Use encryption. Which encryption system? PGP encryption isrepparttar 119017 best around. Download it free of charge from http://www.pgp.com.

If you ever want to send an email withoutrepparttar 119018 recipient knowing who you are or your email address, userepparttar 119019 Anonymizer remailing service. Send your email torepparttar 119020 remailer which strips your actual name and email address fromrepparttar 119021 email header and sends it on anonymously on your behalf. Check this service out at http://www.anonymizer.com.

Ignore any unsolicited emails you receive. These are sent by spammers. Never purchase anything from or send any money or information to a spammer. Many spammers are outright con artists. If you send money to them don’t expect to see it again, and don’t expect to be supplied withrepparttar 119022 promised product or service. Don’t even reply to spammers who manage to get hold of or buy your email address. Many spammers ask you to send a message back if you want to be removed from their mailing lists. Don’t do this. A return message will confirm that your email address is in use. This enhancesrepparttar 119023 value of your address torepparttar 119024 spammer. He might well remove you from his mailing list but he will sell your details to many other spammers who are sure to target you.

INTERNET OFFERS HOLIDAY FUN FOR FAMILY, CO-WORKERS

Written by Maria Heckaman


Whether you celebrate Christmas, Chanukah, or Santa Claus,repparttar holiday season isrepparttar 118993 perfect time for having fun with family and co-workers.

Of course,repparttar 118994 Internet proves to be a great resource for gathering recipes, crafts, songs, and interesting tidbits aboutrepparttar 118995 holidays.

Santa's Net and The Kids Domain are two ofrepparttar 118996 best holiday Internet sites, both offering information for many beliefs.

Do you know what yearrepparttar 118997 British Parliament officially abolishedrepparttar 118998 celebration of Christmas? What aboutrepparttar 118999 date and location ofrepparttar 119000 first printed reference to a Christmas Tree? How do you say "Merry Christmas" in Bohemian, Yoruba, and Chinese?

Santa's Net can help you findrepparttar 119001 answers to such questions, while filling you up with many more holiday facts and myths.

On its home page, visitors can countdown to Christmas and choose from many categories to browse, including carols and songs, Christmas traditions from other countries, recipes, toys, Christmas movies, bookmarks, and more.

Keeping with its world-holiday theme,repparttar 119002 site also has posted recipes such as Amaretti from Italy, Billy Can Pudding from Australia, Christmas Lebkuchen from Egypt, and Kourabiethes from Greece.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use