登陆注册
27082000000075

第75章 Computer Security(5)

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison. Your good name and every iota of data about you are for sale. Since you’re not getting a cut of the profits (at least, most people aren’t), it’s best to keep your private information to yourself. After all, once it’s out of your hands, you have no control over who gets it and how they use it.

Protect your IPAddress

Like the number and street name of your real-world address, a computer’s IP address tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123.123.95.8). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom, from Zero-Knowledge Systems, masks your true IP address from the real world by routing you’re your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you’re less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet--a dynamic IP address you can present a moving target for the hackers. If you’re privacy conscious, ask your ISP for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn’t constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser’s cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won’t need to enter your username and password to access the site. There are two kinds of cookies: persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won’t be saved once you power off your PC.

The threat cookies present isn’t from the depth of the information they can reveal; cookies don’t permit hackers unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do It Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can’t collect enough data to profile you. That’s why some companies use Web bugs as a user-tracking backup if cookies don’t work. Here’s how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page’s background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session. Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign--a site monitoring how popular a particular page is but it isn’t always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies them, such as Double-Click, and may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn’t let you block cookies sent to advertising companies while permitting cookies from the site you’re visiting; it’s all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware Cookie Wall from Analog-X Cookie Wall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn’t seen before, a dialog box pops up to ask you what to do with cookies from this site--bandy if, say, you register to use My Yahoo and don’t want to have to enter your username every time you load the page.

Connection Protection

同类推荐
  • CraftworksofChina

    CraftworksofChina

    ThefolkhandicraftartsofChinaareanimportantpartofancientChinesecultureandarts.Theyarecharacterizedbylonghistory,wide-rangingelements,manyvarieties,anduniquestyles.
  • 职场英语,说不好被炒

    职场英语,说不好被炒

    《职场英语,说不好被炒》涵盖了简历、面试、信函、电话、会议等职场的方方面面。书中的对话和句子皆可拿来就用,让你行话连篇说英语职场英语,不怕你“学”而不用,就怕你“不学”却必须用!你是否知道:职场英语,说不好被炒?对职场英语,你是否:想说却不敢说?敢说却不会说?《职场英语,说不好被炒》将帮你解答这些疑问,让你摆脱被炒的命运,轻轻松松加薪、升职!
  • 饭店英语对答如流

    饭店英语对答如流

    内容鲜活,并且深入饭店组织,分别从前台部、客房部、餐饮部、商务部、商场部、康乐部展现各种英语对话情景,能满足国内饭店行业员工学习英语日常对话及接待外宾的基本需要,也能提高国内各大饭店的整体形象和员工的素质。
  • 计算机英语

    计算机英语

    本书共九章,包括:计算机的发展及总体介绍,计算机硬件,计算机操作系统,数据库系统,软件工程,计算机网络和因特网,办公自动化系统,多媒体技术以及计算机安全。每个章节都配有正文的参考译文,帮助读者更加方便地学习和理解。每章的后面配有练习题并附参考答案,以利于对本单元内容进行巩固。课后的附录包含了单词表,词组表,计算机英语语法及科技英语写作要点,全方位地给读者提供丰富的相关知识。
  • 这个词是怎么来的:英语单词起源趣谈

    这个词是怎么来的:英语单词起源趣谈

    本书集知识性、趣味性、实用性为一体,适合各层次的英语学习和热爱者。如果你是小学生或中学生,不要怕,就当故事书来读吧,词源故事一定会为你以后的单词学习铺平道路;如果你要参加诸如四、六级或雅思托福之类的英语考试的话,不要满足于词源故事,后面的词汇扩展将是你突破考试词汇的一把利剑;如果你没有考试的压力,本书也是一本不错的休闲读物。
热门推荐
  • 来到新世界的开始

    来到新世界的开始

    男主来到一个和地球不一样的世界……
  • 晓哥别闹

    晓哥别闹

    2100年,一颗直径仅有两米的陨石悄然无息地落在了地球的南部海上。这颗陨石在落地之后立刻释放出巨大的能量射线,这种能量射线目前人类文明无法解析出来,虽然这种射线干扰到了地球上的一些研究所,但并没有引发任何异变,因此即使收到了部分研究人员的汇报,政府也并没有特别注意这件事。这种能量射线让地球上的一些人获取了超乎常理的力量,同时也带来了另一个星际文明的入侵。三十年过去,异能分为六大系,元素系,力量系,治愈系,空间系,召唤系,具现系。具现系虽为六大系之一,但在大众看来却是一个废柴的系别。我们故事的主角苏晓,觉醒的正是具现系异能,在他的手里,具现系的异能却让人们不断刷新着对其的认知.......
  • 别告诉他:我爱他

    别告诉他:我爱他

    遇见你,是我一生之幸。你爱我,是我的小幸运。你陪我,我没有遗憾过。爱过你,从不曾后悔过。那些年,你经历过或没有经历过的事,正在慢慢浮现当年青春热血的时代。
  • 大箭师传奇

    大箭师传奇

    华夏守护神兽为何会出现在异界大陆?教廷圣女为何会成为每个国家公主的梦魇?中华田园犬又为何会叫灵灵兽?人类弓箭手到底又能厉害到何种程度?一切尽在《大箭师传奇》本书将回归本源,没有一拳打爆山,也没有一击捅破天……有的只是兄弟、热血和战场,当然,也有套路打怪升级掉宝和美女……《大箭师传奇》期待您的阅读、收藏和投票。
  • 恐怖倒数

    恐怖倒数

    末日危机,腹黑阴谋,都市特工,王小草的女人有危险!......
  • 我的阵法能通天

    我的阵法能通天

    落魄少年林峰偶然获得阵仙传承,人生从此逆袭而起。灵气不足?灵药年份不够?寿命不够用?“我有纳灵阵,续阳阵,完颜阵,寻灵阵……”
  • 误入三国

    误入三国

    一个从21世纪穿越到三国的现代人,居然偶遇何进将军,得到了独孤九剑和天功秘籍,用手枪打死了神箭手,然后和刘,关,张大战吕布,一人大败周瑜,和关羽一起过五关斩六将,和赵云在数万军中临危不惧,来去自如,在赤壁之战,又单挑曹操,和当年第一高手西方不败华佗,如今的他又要面对小日本的侵略,屡屡打退日本所谓的忍者高手。最后他会不会和自己心爱的女人雪儿和小乔一起回到21世纪还是。。。。。。。
  • 逝去的烟火

    逝去的烟火

    她只不过是想在周末睡个懒觉,结果正与周公约会,门铃就不断的响起,想要假装听不见,可是这个该死的家伙却不肯停止他那按门铃的猪蹄,忍无可忍冲出门外想要发飙,却发现这货厚脸皮的就这样私闯民宅,她还完全搞不清楚状况,接到老妈的电话得知这厮居然是来跟她相亲的,还有这么不靠谱的相亲吗?叫她情何以堪?
  • 娱乐圈大明星

    娱乐圈大明星

    本故事是将一个英俊有背景的美少年'意外死亡'重生到一个英俊的穷逼身上.你说是靠脸吃饭呢?还是靠脸吃饭?【QAQ助手:小鲜肉,你觉得你有才华这玩意儿么?】颜风摇摇头耸耸肩,表示木有,但是我有另外一个世界的浓缩精华!
  • 向南飞的无脚鸟

    向南飞的无脚鸟

    如果说林胜寒是天之骄子,那么顾清影就是空气中的一粒尘埃。顾清影曾经觉得他们两人永远不会有交集,可命运总是难以捉摸。“林胜寒,我就像是一只横冲直撞的无脚鸟,知道遇见你才明白什么叫做一眼万年,情有独钟。”这是十六岁的顾清影。“高处不胜寒,起舞弄清影,何似在人间。你亦是我的可遇不可求。”这是十七岁的林胜寒。世人都知道顾清影喜欢林胜寒,却没人知道顾清影是林胜寒生命里唯一的光。