Are They Watching You Online?

When surfing the Internet you probably take your anonymity for granted, most of us do.

Tapping phones, listening to confidential conversations, reading others' e-mail messages seems like something that only happens in spy movies to "other" people.

However, you probably don't realize just how much information about yourself has the potential to get transmitted across the Internet every time you go online.

Every computer connected to the Internet has "ports" that allow it to connect. A "port" doesn't mean you have a physical hole or opening in your computer's case or hardware, but it does mean you have openings through which information passes back and forth between your computer and the Internet.

Depending on the type of connection (dial up, LAN, cable, DSL), you may have several openings for potential mischief by hackers, malicious code or viruses.

Computers with dedicated connections rate the most at risk. If someone or something gets into one of these ports and into your computer, they can potentially watch everything you do and see all the data you enter, including social security numbers and credit card information.

The easiest way to defeat this problem involves using a firewall. Firewalls, simple and inexpensive software available at virtually any office supply or computer store, block the most common ports hackers use to enter your computer.

Firewalls also help you detect and block unauthorized transmission of information from your computer to the Internet. This adds a significant measure of protection if you get infected with a Trojan Horse virus that tries to "phone home" to the hacker with your sensitive information.

If you'd like to test your connection for vulnerability to attack, log on to http://security1.norton.com and run the various diagnostics. I would strongly advise anyone connected to the Internet through DSL or cable to get and use a firewall to protect against unauthorized access.

Infected with "Spyware?"

Previously we talked about unauthorized access to your computer. But a growing problem online with people watching you and your activities involves using programs you willingly place on your computer.

Commonly called "Spyware," this refers to any program that transmits information about you to someone else without you knowing exactly what gets sent. The main purpose of Spyware involves tracking your surfing habits so advertisers know which targeted ads to send you.

Most Spyware basically comes onto your computer bundled with other software applications, as a standalone program, or as modification to the HTML on a web page.

Regardless of how you get it, you need to understand exactly what information gets transmitted about you so you can decide whether to keep or uninstall the software. Plain and simple, these Spyware programs can potentially reveal extremely sensitive information about you and your online habits.

If you have concerns about Spyware and whether or not your computer currently carries any, log on to www.lavasoft.de and check out the free PC software that will scan your system for known Spyware.

Jim Edwards is a syndicated newspaper columnist and the co- author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"

In The News:


pen paper and inkwell


cat break through


File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information Identity theft is... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Online Shopping: 10 Tips For Safe Online Shopping

Have you ever bought a product or service from the... Read More

The One Critical Piece Of Free Software Thats Been Overlooked

Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

Steganography ? The Art Of Deception & Concealment

The Message Must Get Through The year is 300A.D.,... Read More

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More