登陆注册
3765300000075

第75章 Computer Security(5)

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison. Your good name and every iota of data about you are for sale. Since you’re not getting a cut of the profits (at least, most people aren’t), it’s best to keep your private information to yourself. After all, once it’s out of your hands, you have no control over who gets it and how they use it.

Protect your IPAddress

Like the number and street name of your real-world address, a computer’s IP address tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123.123.95.8). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom, from Zero-Knowledge Systems, masks your true IP address from the real world by routing you’re your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you’re less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet--a dynamic IP address you can present a moving target for the hackers. If you’re privacy conscious, ask your ISP for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn’t constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser’s cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won’t need to enter your username and password to access the site. There are two kinds of cookies: persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won’t be saved once you power off your PC.

The threat cookies present isn’t from the depth of the information they can reveal; cookies don’t permit hackers unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do It Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can’t collect enough data to profile you. That’s why some companies use Web bugs as a user-tracking backup if cookies don’t work. Here’s how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page’s background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session. Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign--a site monitoring how popular a particular page is but it isn’t always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies them, such as Double-Click, and may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn’t let you block cookies sent to advertising companies while permitting cookies from the site you’re visiting; it’s all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware Cookie Wall from Analog-X Cookie Wall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn’t seen before, a dialog box pops up to ask you what to do with cookies from this site--bandy if, say, you register to use My Yahoo and don’t want to have to enter your username every time you load the page.

Connection Protection

同类推荐
  • 爱玛(纯爱·英文馆)

    爱玛(纯爱·英文馆)

    主人公爱玛是个美丽、聪慧而富有的姑娘,同时也是一位不折不扣的幻想家。她热心关注身边的浪漫故事,却又固执地认为自己永远不会陷入其中。她自作主张为孤女哈丽埃特导演了一次又一次的恋爱。当哈丽埃特误以为自己爱上了地方官奈特利先生时,爱玛才惊觉原来自己也在爱着奈特利先生。这虽与她一开始就宣布的终身不嫁的誓言有悖,但坠入情网的她不得不放弃自己天真的誓言。
  • 加州之旅(Aunt Jane's Nieces on the Ranch)

    加州之旅(Aunt Jane's Nieces on the Ranch)

    莱曼.弗兰克.鲍姆(pgsk.com Baum,1856—1919)是美国知名儿童文学作家。本书讲述的是约翰叔叔和两个侄女在加州露易丝的农场度假时,发生在农场里一所老房子的奇特故事。农场的原主人私藏了属于米尔德里德的财富,于是她以保姆之名来到农场寻找自己的财富,而其过程并不顺利。
  • 翻开就能用 商务外贸英语

    翻开就能用 商务外贸英语

    本书收录了10个与本单元密切相关的单词。汇集了20个与对话相关的短语,包含上一部分的单词。经典、贴切、鲜活的两段对话。网罗了10到20个使用频率最高的句子,分门别类,增加读者的句式储备量。在英语学习的同时,增加一些与话题相关的小知识。活跃学习气氛。
  • 福克纳短篇小说精选·英文版(上下册)

    福克纳短篇小说精选·英文版(上下册)

    威廉·福克纳,长篇小说巨匠,也是优秀的短篇小说家。《福克纳短篇小说精选》收录的43篇短篇小说均为福克纳短篇小说中的杰出之作,代表了福克纳短篇小说的文学风格和主要成就。无论在题材内容或手法技巧方面,福克纳的短篇小说跟其长篇小说基本上是一脉相承,大部分还是以约克纳帕塔法县为背景,描述的还是那个王国的沧海桑田和世态人情,探讨其中的家族、妇女、种族、阶级等问题,表现“人类的内心冲突”。本版《福克纳短篇小说精选》为精校英文版,32开本口袋装,便于随身阅读。
  • 傲慢与偏见(纯爱英文馆)

    傲慢与偏见(纯爱英文馆)

    《傲慢与偏见》是简·奥斯汀的代表作。小说讲述了乡绅之女伊丽莎白·班内特的爱情故事。这部作品以日常生活为素材,以反当时社会上流行的感伤小说的内容和矫揉造作的写作方法,生动地反映了18世纪末到19世纪初处于保守和闭塞状态下的英国乡镇生活和世态人情。
热门推荐
  • 隐婚蜜爱:宠妻99次

    隐婚蜜爱:宠妻99次

    起初,安凝只能一个人孤独的面对着空荡荡的大床,之后,江邵寒让她夜夜下不来床,她开始怀念起初的寂静了……“江太太,你喜欢江总什么?”“又帅又强大!”“江太太,你不喜欢江总什么?”“太帅太强大!”“江总,你喜欢江太太什么?”“她说我很帅很强大!”江邵寒发现,自从遇见安凝之后,他除了宠她,完全不知道还能为她做什么。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 作弊的三好学生

    作弊的三好学生

    故事会编辑部编著的《作弊的三好学生》是“中国当代故事文学读本”系列丛书之一。本书为“社会写真系列”。《作弊的三好学生》共分,时代·生存篇、诱惑·万象篇、真情·灵魂篇、人生·启示篇等四个模块,其中包括《不合格的应酬替身》、《看看你在做什么》、《作弊的三好学生》、《说不清与查得明》等文章。
  • 知雄守雌

    知雄守雌

    “老爷,夫人上树了!”“逮下来。”“老爷,夫人爬墙了!”“抓回来。”“老爷……”“这次又怎么了?”“夫人请了位唱戏的戏子回来。”“宋思雨,你信不信我打断你腿儿!”
  • 柔牙(上)

    柔牙(上)

    明晃晃的猎叉柴刀横七竖八架上肩头的那一瞬,年轻的香料商珀西·兰波才意识到这一点:之前的艰难险阻不过是开胃小菜而已,正餐已经摆在面前了——荆棘遍布的黑暗之旅现在才刚刚开始。置身于二三十名剽悍山民的包围中,兰波转头看向此行的同伴,他的好友卡尔洛·所罗门,对方显然也还没有从惊愕中回过神来。传说中龙之子民过于“热情”的待客之道,让这两名刚刚踏上大清帝国神秘土地的欧洲旅人实在难以消受。仔细想想,这趟行程从一开始就拥有相当诡异的起点——切还要从兰波和所罗门的旧识赛门神甫说起。
  • 追妻无门:女boss不好惹

    追妻无门:女boss不好惹

    青涩蜕变,如今她是能独当一面的女boss,爱了冷泽聿七年,也同样花了七年时间去忘记他。以为是陌路,他突然向他表白,扬言要娶她,她只当他是脑子抽风,他的殷勤她也全都无视。他帮她查她父母的死因,赶走身边情敌,解释当初拒绝她的告别,和故意对她冷漠都是无奈之举。突然爆出她父母的死居然和冷家有丝毫联系,还莫名跳出个公爵未婚夫,扬言要与她履行婚约。峰回路转,破镜还能重圆吗? PS:我又开新文了,每逢假期必书荒,新文《有你的世界遇到爱》,喜欢我的文的朋友可以来看看,这是重生类现言,对这个题材感兴趣的一定要收藏起来。
  • 都市禁武

    都市禁武

    这是一个灵气复苏,大道重置的武者世界。世人皆习武,唯我独修仙。清纯校花,高冷总裁,千金小姐……纷纷接踵而至,千方百计地想把我扑倒。武道宗师,地方大佬,一国总统……纷纷做跟屁虫,绞尽脑汁地想拜我为师。一代英雄一江湖。一袭青衫一把剑。他却誓要这世间再无武者,誓要世间国泰民安!
  • 恶霸总裁:小小吃一口

    恶霸总裁:小小吃一口

    池小小恨不得抽自己,怎么就那么嘴贱呢,嘴贱就嘴贱,怎么背后不长眼呢?!每次碰到同事谈他的话题就忍不住来个点睛之笔,还偏偏都被他逮到。真是背到令人发指!迟劲从不经意地与池小小有交集到刻意接触,再到耍手段把人弄到自己身边近水楼台。谁知这看似软糯好捏的小丫头竟然屡次在他背后黑他,让他直接变成锅底脸!这是一个软糯萌妹子(?)与冷酷大总裁的故事,妹子不傻,总裁不花!池小小:你对我的第一印象是什么?迟劲:一个疯子。池小小噘嘴,又没让他说实话!迟劲:一个软软得让人想推倒的小疯子~PS:1V1,双处,霸道总裁,甜宠那是必须滴已完结文《夜夜宠妻:梨的极致诱惑》求包养求收藏
  • 凰医帝临七神

    凰医帝临七神

    (原名《焚尽七神:狂傲女帝》)前世,她贵为巅峰女帝,一夕之间局势逆转,沦为废材之质。魂灵双修,医毒无双,血脉觉醒,一御万兽。天现异象,凰命之女,自此归来,天下乱之。这一次,所有欺她辱她之人必杀之!他自上界而来,怀有目的,却因她动摇内心深处坚定的道义。“你曾说,你向仰我,你想像我一样,步入光明,是我对不起你,又让你重新回到黑暗。”“你都不在了,你让我一个人,怎么像向仰你?!”爱与不爱,从来都是我们自己的事,与他人无关。带走了所有的光明与信仰。
  • 条约中的近代中国

    条约中的近代中国

    该书从对外关系史的角度,以中国近现代历史上的不平等条约为主线,讲述近现代历史。该书主要分为三个部分,分别以“妥协”“崩溃”和“沉沦”命名。第一部分是康雍乾三朝与俄罗斯的外交史实,以《尼布楚条约》《恰克图条约》为例。第二部分,以虎门销烟开始,以第二次鸦片战争结束。以《南京条约》为主线。第三部分包括了太平天国、《中法新约》、《马关条约》、义和团、以及清末新政等内容。