Welcome to my blog, hope you enjoy reading :)
RSS

Monday, January 25, 2010

COMPUTER PRIVACY

Computer privacy



Nowadays we use computers and the Internet everywhere - we do our banking, read books, find different kinds of information, plan holidays and more. The list is endless. But on the other side Internet is full of potential risk to our privacy and security. It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address. Everyone has an IP address to communicate on the Internet, IP address is like a telephone number or mailing address. Using your IP it is possible to know your country, city, internet provider and even physical address.
While surfing the Internet browsers keep tracks of our Internet activity in order to provide a more pleasant computer and surfing experience. But these history tracks can compromise our privacy and provide an easy way for others to see what web sites you visited, what you have been searching, downloading, viewing, etc.
Windows and different applications we use keep tracks about your computer activity in order to provide a more pleasant computer experience. But those history tracks can also compromise our privacy and show what you have been doing, searching, downloading, running, saving, what documents and files you have just opened etc.
So while there are lots of things that we have gained from the computer revolution there is a price we have to pay. And the price is our computer privacy. Of course there is no simple solution for this problem. But inactivity is also impossible. There are some simple steps everyone could do. There are different tools available to help us maintain our privacy - anonymous surfing tools, encryption software, clear history software. When your PC is equipped with privacy software, it has the greatest chance of surviving privacy or security attacks.


Source:SOURCE:www.merchantcircle.com/blogs/Bambi.Faivre.Walters.PC.757-253-5729/2008/12/Cyber-Law-or-Internet-Law-Terminology/153022 -

THE PRIVACY PROTECTION

Privacy protection

Free market versus consumer protection approaches

Approaches to privacy can, broadly, be divided into two categories: free market, and consumer protection In a free market approach, commercial entities are largely allowed to do what they wish, with the expectation that consumers will choose to do business with corporations that respect their privacy to a desired degree. If some companies are not sufficiently respectful of privacy, they will lose market share. Such an approach may be limited by lack of competition in a market, by enterprises not offering privacy options favorable to the user, or by lack of information about actual privacy practices. Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.



SOURCE: www.firewallguide.com/privacy.htm

PRIVACY LAW

Privacy law

Privacy law is the area of law concerning the protecting and preserving of privacy rights of individuals. While there is no universally accepted privacy law among all countries, some organizations promote certain concepts be enforced by individual countries. For example, the Universal Declaration of Human Rights, article 12, states:

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.


SOURCE: www.firewallguide.com/privacy.htm

PRIVACY

Privacy (from Latin privatus 'separated from the rest, deprived of sth, esp. office, participation in the government', from privo 'to deprive') is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.

Source:www.merchantcircle.com/blogs/Bambi.Faivre.Walters.PC.757-253-5729/2008/12/Cyber-Law-or-Internet-Law-Terminology/153022 -

Monday, January 18, 2010

Who_are COMPUTER CRIMINAL AND THER OBJECTIVES

there so many students specifically in college students who use a computer. , have university degrees and appear to be pillars of their communities. No single profile captures the characteristics of a typical computer criminal and many who fit the profile are not criminals at all.

What would i say or do??

I will talk to my manager and co_worker that it was all accident. then also we need to check IT security if it is correct and new, then will change my security system

Zero Day Attack

A zero day attack takes place before the security community or software develop knows about a vulnerability or has been able to repair it.A zero day attack also will occurs before the first day the vulnerability is known

Zero Day Attack

Takes place before the security community or software develop knows about a vulnerability or has been able to repair.
.A zero-day attack is a virus or other exploit that is used to take advantage of a vulnerability in a computer application.