登陆注册
23770800000075

第75章 Computer Security(5)

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison. Your good name and every iota of data about you are for sale. Since you’re not getting a cut of the profits (at least, most people aren’t), it’s best to keep your private information to yourself. After all, once it’s out of your hands, you have no control over who gets it and how they use it.

Protect your IPAddress

Like the number and street name of your real-world address, a computer’s IP address tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123.123.95.8). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom, from Zero-Knowledge Systems, masks your true IP address from the real world by routing you’re your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you’re less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet--a dynamic IP address you can present a moving target for the hackers. If you’re privacy conscious, ask your ISP for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn’t constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser’s cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won’t need to enter your username and password to access the site. There are two kinds of cookies: persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won’t be saved once you power off your PC.

The threat cookies present isn’t from the depth of the information they can reveal; cookies don’t permit hackers unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do It Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can’t collect enough data to profile you. That’s why some companies use Web bugs as a user-tracking backup if cookies don’t work. Here’s how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page’s background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session. Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign--a site monitoring how popular a particular page is but it isn’t always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies them, such as Double-Click, and may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn’t let you block cookies sent to advertising companies while permitting cookies from the site you’re visiting; it’s all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware Cookie Wall from Analog-X Cookie Wall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn’t seen before, a dialog box pops up to ask you what to do with cookies from this site--bandy if, say, you register to use My Yahoo and don’t want to have to enter your username every time you load the page.

Connection Protection

同类推荐
  • Stories by English Authors in London

    Stories by English Authors in London

    Frequently I have to ask myself in the street for the name of the man I bowed to just now, and then, before I can answer, the wind of the first corner blows him from my memory.
  • 从あいうえお到脱口秀:日语发音、单词、口语速成

    从あいうえお到脱口秀:日语发音、单词、口语速成

    本书包含了五十音图,单词,会话,语法,敬语等多个环节,内容涵盖了各种生活场景的实用会话,从易到难,仔细阅读完这本书,你就会发现,原本对于日语一窍不通的自己,已慢慢拥有了最基本的日语交际能力;原本看似很难的语法,现在也能头头是道的讲解出来,融会贯通了。
  • 带本英语书游世界

    带本英语书游世界

    本书章节分为Chapter1万事俱备Chapter2快乐出发Chapter3平安到达Chapter4享受美食Chapter5遨游世界Chapter6疯狂购物每个章节详细描写了相关旅游出行的细节,词汇补给、旅游应急句、实用情景对话帮助读者轻松出行。
  • 英译漫谈及“花儿”译赏

    英译漫谈及“花儿”译赏

    本书对英汉两种语言的特点进行了比较,就英译汉常用方法与技巧、不同文体的翻译进行了漫谈。有汉译英诗歌(34首)的对照赏析,更有西部民歌“花儿”的(130首)的翻译欣赏。
  • 魅力英文2:给幸福留一扇门

    魅力英文2:给幸福留一扇门

    本书收录了百于则经典哲理美文,其内容涉及青春、爱情、理想等方面,从不同的视角阐释了人生的种种道理。
热门推荐
  • 校花的超级英雄

    校花的超级英雄

    护花使者?不!不!不!我要做她的超级英雄!
  • 英雄联盟之争锋再现

    英雄联盟之争锋再现

    简介:你知道LM么?一个电竞战队?不,那是一个时代。余洛晟创造了一个传奇,却没有人能够续写神话。时过五年,当LM王朝濒临覆灭,是谁站在前方,为众人导航?故事要从2020年,第八届LPL春季常规赛说起。【本故事纯属虚构,原创作品】
  • 人鱼座眼泪

    人鱼座眼泪

    是变成泡沫,还是成为幸福的新娘?既定的童话还有没有别的结局?艾薇从来都没想过那么多,褪去金色鱼尾,换上白色长裙,她是为了救父王才来到明珠学院的。寻找鲛珠困难重重,而人鱼身边总有【王子】出现—苏亦宸是月光王子,疏离淡漠之下饱含着不顾一切的信任与爱恋;纪夜潼是冰山王子,阴暗强势的个性注定他不会轻易放手。还有【坏女巫】喻晚晴总是嫉妒陷害人鱼,而平凡善良的苏亦轩和夏芝雅也不是不同的【路人甲】。可艾薇不是软弱的小女生,不管王子会是谁,她就是艾薇,独一无二的人鱼小公主,要捕获最佳恋人,只为幸福而流泪........
  • 古尸泪:醉者丑颜

    古尸泪:醉者丑颜

    异世大陆上的土儿,无能力无容颜无奋斗的霉运土儿。一朝被病弱缠身的高凉公子所见,在看到事事连个普通人都不如,霉运缠身,亲情缘薄,小人逼近,想早死却活的比谁都活的久的土儿,怒了!想他高冷十足的高凉公子福缘深厚,家人欢喜,能人靠近,想久活而不得志时,心里是不甘的。其实是心疼了,见不得她弱弱的活在他的眼皮底下,见不得她的良善渐渐被黑暗吞噬,见不得她甘愿弱小等待死亡,拖着拽着给了她精彩的人生。土儿终于从尘埃变成了那明珠,手中捧着的是曾经的人生,再没有了欢喜。
  • 毛诗多识

    毛诗多识

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 复仇公主与冰山王子

    复仇公主与冰山王子

    儿时的记忆,是她心中最深的痛,为了复仇,她经历的所有的苦难。没有说痛,她早已不是那曾经想哭就哭,想笑就笑的女孩了。她所失去的,正一点。。。一点的找回来。亲情,她早已失去;友情,她已拥有;但爱情。。。一个手上沾满了无数鲜血的杀手,一个早已失去为温暖的冷血之人,又是否会让她曾不屑的、嘲笑的所谓的爱情,住进她的心?当冷血的她,遇见了冰冷的他,又会发生怎样的变化?复仇之路,开始。。。。
  • 闪婚厚爱

    闪婚厚爱

    他是她咖啡店里的常客,一开始,她并没有特别注意他,只是因为店里的女生经常提起他,所以有些微了解,接连两次,她都拉着他做挡箭盾牌,他们都是大龄青年,都被家人逼着频繁相亲,而且他们相亲的最终目的都是为了结婚,因此,他们一拍即合,闪婚了。
  • 独家专访:BOSS老婆,别闹

    独家专访:BOSS老婆,别闹

    两帮明争暗斗之间,上官凝雪寻找梦中的“宇”。然而帅气校草偶遇失忆逗比青梅,新转来的她一夜之间成了校花。“喂,韩宇锋,你知道怎么回事吗?”“嗯,哦,这个啊,我弄的。”“学生会副主席是怎么回事?”“我弄的。”“啊~韩宇锋,未婚妻是怎么回事!”“我弄的,反正上官凝雪你也逃不掉。”本文是宠文,女主不弱不包不会怂,会卖萌会撩人,十足的逗比。
  • 零界所

    零界所

    5000年前上古战争中狼烟四起,战争中的亡魂四处飘散无家可归。战争平息迎来本是和平相处,不料战败的灵魂不甘败落,四处聚集冤魂鬼泣侵扰百姓。大帝轩辕为平息冤魂怒气用尽自己天圣名宿开辟阴界领域,收留四处漂泊的孤魂野鬼,借此平息恶魂。为保证现世和阴界平衡建立阴界之门,只可入不可出。所有邪恶的气息都被封印在阴界,长年累月形成强大的暗黑法术。一些心术不正的人妄求权势,偷偷研发控鬼之术想要开启阴界之门获取强大的能量。为保证现世的平安,一群自称为无界之人为保阴界之门和心术不正的术士进行来上千年的战斗。
  • 别让习惯毁了你

    别让习惯毁了你

    本书阐述了好习惯会成就一个人,即使你没有超乎常人的资质和实力;而坏习惯会毁了一个人,它会在不知不觉之间吞食你的生存优势。