When surfing the Internet you probably take your anonymity for granted, most of us do.
Tapping phones, listening to confidential conversations, reading others' e-mail messages seems like something that only happens in spy movies to "other" people.
However, you probably don't realize just how much information about yourself has the potential to get transmitted across the Internet every time you go online.
Every computer connected to the Internet has "ports" that allow it to connect. A "port" doesn't mean you have a physical hole or opening in your computer's case or hardware, but it does mean you have openings through which information passes back and forth between your computer and the Internet.
Depending on the type of connection (dial up, LAN, cable, DSL), you may have several openings for potential mischief by hackers, malicious code or viruses.
Computers with dedicated connections rate the most at risk. If someone or something gets into one of these ports and into your computer, they can potentially watch everything you do and see all the data you enter, including social security numbers and credit card information.
The easiest way to defeat this problem involves using a firewall. Firewalls, simple and inexpensive software available at virtually any office supply or computer store, block the most common ports hackers use to enter your computer.
Firewalls also help you detect and block unauthorized transmission of information from your computer to the Internet. This adds a significant measure of protection if you get infected with a Trojan Horse virus that tries to "phone home" to the hacker with your sensitive information.
If you'd like to test your connection for vulnerability to attack, log on to http://security1.norton.com and run the various diagnostics. I would strongly advise anyone connected to the Internet through DSL or cable to get and use a firewall to protect against unauthorized access.
Infected with "Spyware?"
Previously we talked about unauthorized access to your computer. But a growing problem online with people watching you and your activities involves using programs you willingly place on your computer.
Commonly called "Spyware," this refers to any program that transmits information about you to someone else without you knowing exactly what gets sent. The main purpose of Spyware involves tracking your surfing habits so advertisers know which targeted ads to send you.
Most Spyware basically comes onto your computer bundled with other software applications, as a standalone program, or as modification to the HTML on a web page.
Regardless of how you get it, you need to understand exactly what information gets transmitted about you so you can decide whether to keep or uninstall the software. Plain and simple, these Spyware programs can potentially reveal extremely sensitive information about you and your online habits.
If you have concerns about Spyware and whether or not your computer currently carries any, log on to www.lavasoft.de and check out the free PC software that will scan your system for known Spyware.
Jim Edwards is a syndicated newspaper columnist and the co- author of an amazing new ebook that will teach you how to use free articles to quickly drive thousands of targeted visitors to your website or affiliate links...
Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising! ==> "Turn Words Into Traffic"
File sharing on p2p is soaring despite the music and... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
In a word, no - an email message has always... Read More
If you constantly deal with bank or electronic accounts, it... Read More
The money being spent online is steadily growing. With billions... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
We all get the odd virus now and then, but... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Spyware is software or hardware installed on a computer without... Read More
What is computer security? Computer security is the process of... Read More
Have you ever bought a product or service from the... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Phishing is a relatively new form of online fraud that... Read More
Identity Theft is one of the most serious problems facing... Read More
Many of us have run into an annoying and time-consuming... Read More
Security leaks can be a big problem for any site... Read More
Phishing is the act of some individual sending an email... Read More
Every single time you access a website, you leave tracks.... Read More
As more people are logging onto the Internet everyday, Network... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
There is nothing more important that password security in world... Read More
Long gone are the days that we could feel secure... Read More
With the Internet entering our lives in such an explosive... Read More
The 1998 Data Protection Act was not an extension to,... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Sooner or later everyone with an email account will receive... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Sooner or later everyone with an email account will receive... Read More
A couple of days ago, I was searching for a... Read More
If you are wondering how to fight spyware for safe... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Computer security for most can be described in 2 words,... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Ebay is a great site and is used by many... Read More
Over £5 billion pounds was spent on online shopping in... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
There are several basic concepts to keep in mind when... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
The top five online scams on the Internet hit nearly... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Well, if that would have been said to me by... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Phishing is the act of some individual sending an email... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
If you are a parent, you have probably wondered at... Read More
The average computer is packed with hidden software that can... Read More
With the Internet entering our lives in such an explosive... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Security leaks can be a big problem for any site... Read More
When it comes to a secure website and passwords it... Read More
Internet Security |