登陆注册
3765300000075

第75章 Computer Security(5)

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison. Your good name and every iota of data about you are for sale. Since you’re not getting a cut of the profits (at least, most people aren’t), it’s best to keep your private information to yourself. After all, once it’s out of your hands, you have no control over who gets it and how they use it.

Protect your IPAddress

Like the number and street name of your real-world address, a computer’s IP address tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123.123.95.8). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom, from Zero-Knowledge Systems, masks your true IP address from the real world by routing you’re your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you’re less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet--a dynamic IP address you can present a moving target for the hackers. If you’re privacy conscious, ask your ISP for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn’t constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser’s cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won’t need to enter your username and password to access the site. There are two kinds of cookies: persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won’t be saved once you power off your PC.

The threat cookies present isn’t from the depth of the information they can reveal; cookies don’t permit hackers unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do It Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can’t collect enough data to profile you. That’s why some companies use Web bugs as a user-tracking backup if cookies don’t work. Here’s how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page’s background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session. Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign--a site monitoring how popular a particular page is but it isn’t always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies them, such as Double-Click, and may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn’t let you block cookies sent to advertising companies while permitting cookies from the site you’re visiting; it’s all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware Cookie Wall from Analog-X Cookie Wall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn’t seen before, a dialog box pops up to ask you what to do with cookies from this site--bandy if, say, you register to use My Yahoo and don’t want to have to enter your username every time you load the page.

Connection Protection

同类推荐
  • 用耳朵听最优美的讲演

    用耳朵听最优美的讲演

    本系列图书精选的各类故事、散文、演讲、时文及名著片段,均用词精准简洁,语句流畅优美,将引领你进入趣、情、爱与理的博大世界,使你更加充满信心地去追求梦想。这里有嘻嘻哈哈的幽默故事,有体会幸福与生活的感悟故事,有帮你战胜挫折的勇气故事,有闪烁着人性光辉的美德故事,有发人深省的智慧故事,也有在成长路上给你动力的哲理故事。相信本系列图书能为你展现一个美丽新世界并使您的英语学习更上一层楼。
  • 一本书读懂消失的文明

    一本书读懂消失的文明

    《一本书读懂消失的文明(英汉对照)》主要内容包括世界上已经消失的14大古代文明,它们是古希腊文明、古罗马文明、古埃及文明、古巴比伦明、古印度文明、奥尔梅克文明、印加文明、玛雅文明、阿兹特克文明、吴哥文明、波斯波利斯文明、蒲甘文明、楼兰古国文明。曾经的它们抑或奇特璀璨,抑或神奇飘渺,抑或深蕴着乡土文化,抑或笼罩着城市风采,这些早已逝去的文明却留下了醉人的印记,带领着我们走进古老神秘的文明探索之旅。
  • 看古希腊神话故事学英语

    看古希腊神话故事学英语

    神话是远古人类思想与生活的反映,是原始信仰的产物。希腊神话故事经历了丰富的时代变迁和历史风云,几乎成为希腊乃至欧洲一切文学和艺术活动的基本素材。马克思曾说:“希腊神话不只是希腊艺术的宝库,而且是它的土壤”。希腊神话也是欧美文艺取之不尽的艺术源泉。希腊神话具有无穷的认识价值和永久的审美魅力。希腊神话还为现代奥林匹克运动会的形成奠定了基础。在古希腊这个神话王国中,优美动人的神话故事和曲折离奇的民间传说为古奥运会的起源蒙上一层神秘的色彩。那些经久不衰的神话故事让我们着迷,那些如雷贯耳的名字至今仍被我们尊为“大师”。时隔千年,希腊神话还对我们产生影响。
  • 谜语绕口令英语

    谜语绕口令英语

    谜语和绕口令是英语文学中两种比较独特的语言艺术形式。前者既饶有情趣,又可以启发心智,增进思考和想像能力;后者结构巧妙,诙谐风趣,富有音乐性,最适合口头背诵,深受广大英语读者的喜爱。
  • 冬日里的莲花:双语(泰戈尔经典诗选Ⅲ)

    冬日里的莲花:双语(泰戈尔经典诗选Ⅲ)

    《冬日里的莲花:泰戈尔经典诗选3(双语彩绘典藏版)》是双语诗歌系列中的一本,收录了泰戈尔的《采果集》和《流萤集》。诗句有的情感喷薄欲出,有的语言清新意味隽永,有的将抒情和哲思完美结合,给人以无尽美感和启迪。
热门推荐
  • 佛说婆罗门子命终爱念不离经

    佛说婆罗门子命终爱念不离经

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。
  • 这种事不必向老板请示

    这种事不必向老板请示

    优秀的员工,肯定善于处理和老板的关系。优秀的员工懂得“不必请示”的精髓。对于优秀员工来说,“不必请示”是一种理念,一种和老板形成最佳关系的理念。“不必请示”的关键在于员工要积极主动,在于员工要读懂老板,知道怎么管理老板。
  • 帝国有点莽

    帝国有点莽

    奇幻瑰丽的世界,君权神授的腐朽统治已迎来最后的辉煌。云波诡秘,群雄并起,谁布棋盘?谁是棋子?穿越党什么最重要,唯帅与演技不可被辜负巫术or魔法?不,我选巨剑重铠。“大公的孙子有点凶。”“谁说的,是超凶的,第一天来帝都就锤爆了皇家巫师团的大人”
  • 九境棋局

    九境棋局

    何谓生,何谓死,何谓轮回又转世?何谓神,何谓魔,何谓今昔难堪破?我为天,我为地,我为世间红尘曲!去者来,来者去,笑饮此月斩棋局!她失去了之前二十多年的记忆,来到了这个让她无比陌生的地方。缘起缘灭,杀人或被杀,信任或背叛,相爱或相妒。数以万年,也看不出有什么改变。她的剑出染血,身旁是无尽杀戮,一步一步爬上顶端,是为了寻回那些失去的记忆,也是为了揭开这个世界的真相。所谓轮回,是否真的存在?神魔到底是正是邪?我是谁?那一句“天道可有情?”又到底是得到了什么样的答复?走到最后,或许是在那众人仰望的最高处,是否又还有昔日容颜能陪在身侧?这究竟是怎样的一场棋局,竟是无有棋手,天地万物,皆为棋子?
  • 中国古代文化知识(语文知识小丛书)

    中国古代文化知识(语文知识小丛书)

    《语文知识小丛书:中国古代文化知识》以国家正式颁布的语言文字规范为依据,以中学课本经典文章为实例,对常见的语文现象进行明晰透彻的辨析。从字、词、句、段、文,循序渐进、深入浅出地讲析,包含了语文常识的方方面面。是酎亍各业不同年龄、不同层次读者的好帮手,特别有助于学生提高正确使用语言文字的能力。
  • 时空穿梭无痕

    时空穿梭无痕

    无痕是未来的顶尖守护者,会穿梭于各个世界维护和平。有一天,神秘势力——空裂。诞生于未来世界,他们穿梭于各个世界打乱秩序,捕捉稀有物种进行排名,无痕能与伙伴解决掉这个势力维护和平吗?
  • 我为一世魔主

    我为一世魔主

    小的时候,爷爷说,人死之后,便会化成天上的星星。长大以后,父亲说,人在死前死后,都会化成天上的星星,因为,我们本来就是由天所生,从天而降的!是天的臣子!后来的后来...任无休忽然明白,人这一生,谁都不是谁的臣子,每个人都是皇...属于自己的皇!...简体版:这是一个曾有着十三颗太阳,亿万星辰的世界,每个人代表着的,都是天上的一颗星辰,意味着乃是从天而降的天臣!任无休,亿万颗星辰中的一颗。然后有一天,他梦到一个女人...他再不愿为臣!——(黎明,在黑夜里成就永生。)
  • The Moon Pool

    The Moon Pool

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。汇聚授权电子版权。
  • 倒霉的奥多

    倒霉的奥多

    如果一个人,每隔一段时间醒来,就会出现在不同的地方,变成不同的身体,这样的人,是该说幸运呢,还是倒霉呢?奥多,一个年轻的特技飞行员,就发生这种令人难以置信的事情。因为一场约会,他不幸被闪电击中丧生。当再次醒来时,他发现自己来到了澳大利亚,不过身体却不是原先的自己。他不敢相信眼前的事实,就在思考怎么办时,不料却被一只袋鼠打晕了过去。之后的每隔一段时间,有时是几天,有时是几个星期,有时又是几个月,他都会从不同的地方醒来,变成不同的男人…甚至有次还变成了一条流浪狗…就是这样一个无法控制时间,无法控制自己,可以是任何人,却又唯独不能是自己的男人,他该如何面对不停变化的生活?又该如何抓住他的爱情呢?
  • 捡到一个异界

    捡到一个异界

    时值灵气复苏五年。慕长安的杂货铺里出现了一条通往异界的路,那里灵气枯竭,那些曾经被他们视为珍宝的灵器、灵草、丹药、功法武技一夜之间变为垃圾。你捡到一把残刀。你捡到一柄锈剑。你捡到一株枯萎的灵草。你捡到一本残缺的阵法卷轴。你捡到一个打不开的储物袋。你捡到一名不知名门派并且丧失修为的圣女。你捡到一位听说很厉害但却已经灭亡的宗门宗主。慕长安大手一挥:通通捡回去卖掉!群:781298923