登陆注册
27082000000075

第75章 Computer Security(5)

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison. Your good name and every iota of data about you are for sale. Since you’re not getting a cut of the profits (at least, most people aren’t), it’s best to keep your private information to yourself. After all, once it’s out of your hands, you have no control over who gets it and how they use it.

Protect your IPAddress

Like the number and street name of your real-world address, a computer’s IP address tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123.123.95.8). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom, from Zero-Knowledge Systems, masks your true IP address from the real world by routing you’re your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you’re less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet--a dynamic IP address you can present a moving target for the hackers. If you’re privacy conscious, ask your ISP for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn’t constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser’s cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won’t need to enter your username and password to access the site. There are two kinds of cookies: persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won’t be saved once you power off your PC.

The threat cookies present isn’t from the depth of the information they can reveal; cookies don’t permit hackers unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do It Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can’t collect enough data to profile you. That’s why some companies use Web bugs as a user-tracking backup if cookies don’t work. Here’s how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page’s background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session. Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign--a site monitoring how popular a particular page is but it isn’t always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies them, such as Double-Click, and may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn’t let you block cookies sent to advertising companies while permitting cookies from the site you’re visiting; it’s all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware Cookie Wall from Analog-X Cookie Wall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn’t seen before, a dialog box pops up to ask you what to do with cookies from this site--bandy if, say, you register to use My Yahoo and don’t want to have to enter your username every time you load the page.

Connection Protection

同类推荐
  • 课外英语-美国各州小知识(五)(双语版)

    课外英语-美国各州小知识(五)(双语版)

    全书共50册,分为美国各州的小知识,七彩缤纷的音符,优美好看的小散文,开心时分的短文,经典流传的寓言,超级高效的短句,实际有用的词汇等等在这些书中,备有单词解释,相关简介,或中文翻译,便于同学们更好的阅读和理解,真正进入文字的内涵当中,准确地和文字进行交流。本册主要介绍加州、科罗拉多州、肯塔基州和路易斯安那州的概况、州长、州鸟、州花、州旗、州歌以及相关资料,附有话里话外部分,主要介绍美国公园和美国科学家。
  • 一语多译英语

    一语多译英语

    本书内容丰富,分类明朗。内容涉及日常生活,求职工作,休闲娱乐,出门旅行,友好交际,情感表达等。表达灵活,语言地道。多种灵活的表达,易于吸引读者的学习兴趣,多种表达源于大量英文作品,避免汉语式的英语,是说一口流利、地道英语的最佳选择。形式活泼,易学易用。让读者的学习变得轻松愉快,易于接受。
  • 课外英语-美国各洲小知识(一)(双语版)

    课外英语-美国各洲小知识(一)(双语版)

    全书共50册,分为美国各州的小知识,七彩缤纷的音符,优美好看的小散文,开心时分的短文,经典流传的寓言,超级高效的短句,实际有用的词汇等等在这些书中,备有单词解释,相关简介,或中文翻译,便于同学们更好的阅读和理解,真正进入文字的内涵当中,准确地和文字进行交流。本册主要介绍加州、科罗拉多州、肯塔基州和路易斯安那州的概况、州长、州鸟、州花、州旗、州歌以及相关资料,附有话里话外部分,主要介绍美国公园和美国科学家。
  • 刀锋(双语译林)

    刀锋(双语译林)

    《刀锋》是英国作家毛姆的长篇小说代表作。书中讲述美国青年拉里因为好友在战争中猝然死亡,而开始向自己的内心展开深刻的追问:既然世间有善,为何恶亦相生?战后,拉里在故乡感受着美国建设一个“宏伟而繁荣的时代”的热潮,却难以置身其间。他执拗地要寻求心中那个让他难以割舍的疑问。他在书籍中发掘,在静思中梳理。为此,他几乎投入了自己全部的精力与热情,甚至解除了与恋人伊莎贝尔的婚约。之后远遁法国,再后,开始周游世界。在印度,他从东方的《奥义书》踏上了心灵自我完善之路。
  • 双语学习丛书-醇香母爱

    双语学习丛书-醇香母爱

    流淌心灵的隽语,记忆的箴言,在双语的世界里,感受英语学习的乐趣,体会英语学习的奥妙,提高英语学习的能力!丛书包括:爱的交融、财富精英、成长课堂、醇香母爱、父爱如山、故乡情怀、节日趣闻、快乐心语、浪漫往昔等故事。
热门推荐
  • 狩巫之魂

    狩巫之魂

    巫,一个流传千年的词,一份被历史和人类私欲歪曲的传承,一段通过挖掘巫族祭祀,巫门禁术,神兵运动等古老故事,而开启的解密之旅。(烧脑,慎入!晓木一出手,太监抖三抖!看上的朋友可养肥再杀~)附本书书友群:492723551知我者谓我心忧,不知我者谓我何求。茫茫人海知己难求,一品清友一壶老酒,你若与天斗,我必在你身后!
  • 九凰神医:傲娇太子萌萌哒

    九凰神医:傲娇太子萌萌哒

    她,是24世纪首榜特工,杀手圈的金牌悬赏人。魂穿之后成为帝京颜家幺女。他,是帝国太子,天赋强大,站在强者之巅,俯看芸芸众生。五年前,她遭人暗算,一身修为尽毁。他淡淡一眼,与他何干?一日之间,她从高高在上的天之骄女变成一个丝毫灵力都没有的废物,受尽冷眼。五年后,她再次回归,这次她孑然一身,势必要当年伤她之人,血!债!血!偿!————————————————————————————————【情景剧场】管家:殿下,颜小姐要见你。某殿下:她要见我就见,谁给惯的?管家抹汗:你猜?管家昧着良心面不改色:应该是陌世子。某殿下:就知道是他!陌世子:来来来,我两谈谈人生。刚走进门的某颜:……心疼你一秒钟。
  • 婚姻99

    婚姻99

    爱与不爱的故事,很单调,很短,大约一千多字。
  • 上班摸鱼有奖励

    上班摸鱼有奖励

    单女主神豪文,比较平淡,偶尔开车,正能量故事。
  • 鬼画卷

    鬼画卷

    传说在魔都郊外有一座鬼宅,宅子里住着妖怪之主,他是君临天下的黑暗帝王,所有的人类与妖怪,都将匍匐在他的身后。
  • 不能说出的秘密

    不能说出的秘密

    一场意外的车祸,一个神奇的贝壳,将引出什么样的惊天大秘密。四个身怀绝技的少年,为了真爱。为了正义,会做出什么样的抉择。豪门的是是非非,勾心斗角。都抵不过一句喃喃细语:嗨!那女孩我带你去看海好吗?当一切繁华落下了帷幕。当夕阳映红整个海面。能有什么不能说的秘密。
  • 致合欢

    致合欢

    相亲不成,反丢钱包。回家不成,偶遇强盗。人倒霉起来,喝水都能呛。男主宋浩二十有四,学习无果,工作不济,被老妈赶出来去相亲。在最无助的时候又偶遇“哑巴”雨诗。相遇即是缘,相爱即是恋。一个话痨男友与一个哑巴少女的故事就此展开。
  • 肆月的每一月

    肆月的每一月

    你们好,我是肆月,一名在网络文学中默默无闻的学生写手。但是在这里,在肆月的每一月,都会陪伴你。
  • 一只被迫离家的精灵的奇遇记
  • 王者荣耀之荣耀王座

    王者荣耀之荣耀王座

    杨辰意外穿越到了王者荣耀的世界里面,一场穿越到底隐藏着什么阴谋,昔日的荣耀王座能否再次出现。为了心中的那份执着和信仰,杨辰毅然踏上了自己的征途。王座不灭,荣耀永存!