Are They Watching You Online?

When surfing the Internet you probably take your anonymity for granted, most of us do.

Tapping phones, listening to confidential conversations, reading others' e-mail messages seems like something that only happens in spy movies to "other" people.

However, you probably don't realize just how much information about yourself has the potential to get transmitted across the Internet every time you go online.

Every computer connected to the Internet has "ports" that allow it to connect. A "port" doesn't mean you have a physical hole or opening in your computer's case or hardware, but it does mean you have openings through which information passes back and forth between your computer and the Internet.

Depending on the type of connection (dial up, LAN, cable, DSL), you may have several openings for potential mischief by hackers, malicious code or viruses.

Computers with dedicated connections rate the most at risk. If someone or something gets into one of these ports and into your computer, they can potentially watch everything you do and see all the data you enter, including social security numbers and credit card information.

The easiest way to defeat this problem involves using a firewall. Firewalls, simple and inexpensive software available at virtually any office supply or computer store, block the most common ports hackers use to enter your computer.

Firewalls also help you detect and block unauthorized transmission of information from your computer to the Internet. This adds a significant measure of protection if you get infected with a Trojan Horse virus that tries to "phone home" to the hacker with your sensitive information.

If you'd like to test your connection for vulnerability to attack, log on to http://security1.norton.com and run the various diagnostics. I would strongly advise anyone connected to the Internet through DSL or cable to get and use a firewall to protect against unauthorized access.

Infected with "Spyware?"

Previously we talked about unauthorized access to your computer. But a growing problem online with people watching you and your activities involves using programs you willingly place on your computer.

Commonly called "Spyware," this refers to any program that transmits information about you to someone else without you knowing exactly what gets sent. The main purpose of Spyware involves tracking your surfing habits so advertisers know which targeted ads to send you.

Most Spyware basically comes onto your computer bundled with other software applications, as a standalone program, or as modification to the HTML on a web page.

Regardless of how you get it, you need to understand exactly what information gets transmitted about you so you can decide whether to keep or uninstall the software. Plain and simple, these Spyware programs can potentially reveal extremely sensitive information about you and your online habits.

If you have concerns about Spyware and whether or not your computer currently carries any, log on to www.lavasoft.de and check out the free PC software that will scan your system for known Spyware.

Jim Edwards is a syndicated newspaper columnist and the co- author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"

In The News:


pen paper and inkwell


cat break through


Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Is The Internet Over Regulated

Today's Internet or World Wide Web is being over regulated.But,... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Why you Must Secure your Digital Product and Thank You Web Page

A couple of years back, I paid my dues the... Read More

Parental Control - Dangers To Your Child Online & Internet Child Safety Tips

Did you know...? 1 in 5 children who use computer... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Phishing and Pharming: Dangerous Scams

As soon as almost all computer users already got used... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More