![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
|||||||||||||||||||||||||||
SAFE SURFING TIPS | |||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
Internet Cookies A cookie is a single line of data that an Internet server has asked the Web browser on your computer to keep track of. The cookie has the name of that line of data, plus the data itself. The server also tells your browser who can see the cookie, and how long it should remember the data. Cookies make Web surfing more convenient by storing your pertinent information, but they also raise privacy concerns. They can track your movements around the Web, and leave you open to the possibility of someone from the outside gaining access to your hard drive. Norton Privacy ControlTM gives you more privacy by allowing you to specify exactly which Web sites can record information about your activities. You can opt never to accept a cookie, to be warned of cookies or to always accept cookies. Intruders If you are accessing the Internet without proper security installed on your computer, practically any hacker or "cracker" can get into your computer illegally, and even without your knowledge. Broadband makes hacking even easier because although the connection is faster, the permanent DNS (Domain Name System) address means that your connection is always on and that there is a path that is always available to your PC. Hackers can scan for your IP address, and try as many passwords as it takes to get into your system. More malicious hackers can steal or destroy your files by tunneling through your broadband connection straight to your hard drive using mobile code. Downloading Another way to unknowingly let malicious code onto your computer is by downloading infected software programs or files by clicking on a Web page or HTML-enabled email. Whether it's ActiveX, MP3, mobile code or other downloadable formats, viruses and worms are more likely than ever to be hiding away. You should download only from reputable sources, and scan all downloads before opening them with Norton AntiVirusTM. Since new viruses are created daily, always remember to update your virus definitions frequently. Mobile Code ActiveX controls (see below) and Java applets can be used to create and serve platform-independent applications over the Web. Once downloaded onto your system, the code gives hackers an open pipeline to transmit data such as account numbers and personal files from your computer without you knowing. Sophisticated hackers can even record keystrokes to capture passwords or credit card information. ActiveX, and Active Scripting ActiveX controls are not fundamentally bad things. Originally created by Microsoft, they are often used by software developers to create "back doors" that can be "left open" to allow macros to take control of a user's PC and help solve problems. However, those back doors can be manipulated to hurt users as well, and are, therefore, also viewed as security holes. These security holes allow attackers to write script that can do anything on a user's computer such as creating malicious Web pages and email messages to run programs, or steal private information from your PC when using certain Web browsers or email programs. One example is Microsoft's Office Assistant known as Clippy (because of its paper clip persona). Clippy actually hides a great deal of power, and is essentially a back door for Microsoft to allow macros to help users when needed. Unfortunately, Clippy also turned out to be a security hole. Microsoft did release a downloadable patch to fix the problem, but we still recommend simply turning Clippy off. MP3 MP3 (MPEG-1 Audio Layer-3) is a standard technology for compressing a sound sequence into a very small file while still preserving the original level of sound quality. MP3 files are available for downloading from different Web sites. However, not much copyrighted material is available except as an illegal download, so the sneakiest MP3 distributors are sending files from fake or hacked IP addresses that can't be traced. Unfortunately these files can also be infected. |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
Viruses Any software you download from the Internet could contain a virus. An email message could carry an attachment file, which contains a virus. Make sure you have an up to date virus checker installed in your computer, and make sure that it checks email attachments. New viruses are created all the time, so it is really worth keeping your copy updated as often as possible - even daily with downloadable updates. As new viruses are developed and discovered, new protections have to be designed. Unless you update, you won't have full protection. Norton Internet SecurityTM comes with a full version of Norton AntiVirusTM to help protect you against Internet threats each time you're online. You can also refer to the Symantec Virus Hoax Page on Symantec.com for the latest information. Email Privacy No email is private unless it's encrypted. You should never put anything in an email that you wouldn't put on a postcard. It is illegal for someone to intercept your email during transmission, but it happens. It can also be misdirected or misaddressed and wind up in the wrong hands. Instant Messaging Instant messaging works similarly to a client/server model. You connect to a central "server" that verifies your identity and registers you as being online, then when other users connect, they will know that you are logged on. By default most instant messaging programs show your IP address with your details, and you run the risk of being exposed to inappropriate activities of other users tapping into your IP address. Shopping Shopping on the Internet is very convenient, but not all e-commerce sites use secure transactions to handle your financial details. Check individual sites for their security policy, order tracking method, and refund and privacy policies. Be cautious if you're asked to supply personal information, such as your Social Security number or bank account information. Some e-commerce sites ask you to create an account with a password. Never use the same password you use for other accounts. And don't reveal your password in response to unsolicited emails, even if they claim to be from your ISP (Internet Service Provider). Also, pay attention to the URL (Uniform Resource Locator) of the merchant's site to ensure you are dealing with the right company. Dealing with Strangers Online The Internet is a great way to meet new people and learn new things. However a degree of caution is recommended. Here are some tips: Until you really get to know a new online acquaintance, restrict contact to email, chat, or public postings. Don't take anyone at their word as to their name, gender, occupation, location or other information. Statistics have shown that most online chat participants are rarely who they claim to be. Be careful about how much and what sort of personal information you give out to those you don't know. Don't sign every Web site guest book you see; this will only increase your load of spam. If you post in public message systems, consider using a different ID for your personal email. These tips on staying safe while surfing are kindly provided by Symantec - makers of Norton anti virus and computer protection software. Check your computers vulnerability or scan for viruses free on line at http://www.symantec.com/securitycheck/ |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
Check up on the latest Virus & Hoax information here |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
![]() |
|||||||||||||||||||||||||||
[SITE INDEX] [GRAPHICS] [GRAPHICS LINKS] [HELP FILES] [HELP LINKS] [ARTISTS] [CAUSES] [MEMBERSHIPS] [POETRY] [AWARDS] |
|||||||||||||||||||||||||||
![]() |