ARTICLES

urplus Computers and Discount Computers Are New...

  After the best sourced advice relating to...

 Digital Cameras Are Fun

 You may have found the best assistance with ref...

 COMPUTER BACKUPS

 Computer Accessories We All Want For Our New Co...

 Computer Hardware Preventive Maintenance Softwa...

 Advice about the best sourced advice relating t...

 Computer Rental: Worth Your Money?

 What is a refurbished computer?

  Advice about the most informative opinion...

 Computer Rentals: The Best Classroom Computer T...

 Are you in search of the most up-to-date assist...

 Have you been looking for the most up-to-date a...

 Finding Cheap Computer Deals to Upgrade Your Co...

 Looking for the latest opinion regarding comput...

  You may have found the latest advice pert...

 When To Rent A Laptop Computer

  If you are chasing the latest help in re...

  You may have found the best sourced opini...

 What You Should Know Before Buying Computer Equ...

 Seeking the most informative advice pertaining ...

  Seeking the best assistance in relation t...

  Looking for the best sourced help regardi...

 What Is Adware?

 Advice about the latest and accurate help conce...

 A Guide To Basic Computer Terminology

 Choosing the best computer model

 You may have found the latest and accurate help...

 Buying a computer

 Top 10 Ways To Protect Yourself From Computer V...

 Building Cheap Computers in 3 Easy Steps

  Have you been looking for the best assist...

 Why Do I Need Anti Virus Software For My Computer?

 Buying a Personal Computer

 Why You Need To Clean Your Windows Registry?

 3 Simple Ways To Save A Bunch Of Money When Buy...

 What are Rackmount Computers? -

 Searching for the latest and accurate help rela...

 Decide On A PC Monitor Before You Buy Your New ...

 Computer Components for Idiots

 5 Sure-Fire Tips for Buying a New Computer

 Advice about the most up-to-date advice with re...

 Three Things You Can Do to Keep Your Computer R...

 The Need for Rackmount Computer Cases -

 A Basic Introduction To Spyware

 Zone Labs vs. Windows XP Service Pack 2 Firewall

 Barebones Systems: Alternatives to Buying Disco...

 Hateful and annoying spywares. Have they infect...

 PC Maintenance and Improving Performance

 Rackmount Computer Keyboards -

 Use A Spyware Remover Now

 Computer Security - What Exactly Is It?

 Three Basic Types Of Computer Mouse

 How to Increase Your Computer Speed Fast

 So You've Never Used A Computer Mouse Before?

 Do The Media Spread Computer Viruses?

 Tips for Buying a First Computer

 The Difference Between Spyware and Viruses

 Do You Know How To Remove Spyware From Your Com...

 Keeping it Clean: Virus Removal Basics

 Notebook or Desktop Computer -- Which Should Yo...

 You Need a Spyware Remover!

 3 Summer Computer Tips

 Ever Used A Computer Mouse Before?

 Computers Are Not Scary

 Build Your Own Computer or Buy?

 Data-Recovery: What You Need

 Advancement in Computer Technology

 Network Security 101

Traditional Antivirus Programs Useless Against ...

 Computer Learning Center for Kids is Committed ...

 Looking after your Computer

 The ABCs Of Computer Memory

 Spyware Programs Are Out To Get You

 Access Your PC From The Road

 What kind of processor do you need on your new ...

 Registry Cleaners: Why do you need one?

 Are They Watching You Online?

 Crash Course In Getting A #1 Google Ranking

 Understanding the Components of a Home Network

 Eliminate computer viruses forever!

 Is Spyware Slowing Your Computer Down To A Crawl?

 Computer Network Installation

 Protect Your Computer And Your Personal Informa...

 Spyware and Adware – Are You Protected?

 How to Avoid Getting Ripped-Off Online

 Getting The Most Out Of A Tablet PC

 How To Remove Winfixer 2005 Plus Unwanted Spywa...

 Guide to buying the perfect PC

 Internet Security Basics 101

 Why Hide Your IP Address?

 Wireless Networks: How Do They Work?

 How Spyware Blaster Can Protect Your Computer F...

 All About Computer Viruses

 Do you need computer training?

 Malware Quiz


Are They Watching You Online?
by: Jim Edwards
When surfing the Internet you probably take your anonymity
for granted, most of us do.

Tapping phones, listening to confidential conversations,
reading others' e-mail messages seems like something that
only happens in spy movies to "other" people.

However, you probably don't realize just how much
information about yourself has the potential to get
transmitted across the Internet every time you go online.

Every computer connected to the Internet has "ports" that
allow it to connect. A "port" doesn't mean you have a
physical hole or opening in your computer's case or
hardware, but it does mean you have openings through which
information passes back and forth between your computer and
the Internet.

Depending on the type of connection (dial up, LAN, cable,
DSL), you may have several openings for potential mischief
by hackers, malicious code or viruses.

Computers with dedicated connections rate the most at risk.
If someone or something gets into one of these ports and
into your computer, they can potentially watch everything
you do and see all the data you enter, including social
security numbers and credit card information.

The easiest way to defeat this problem involves using a
firewall. Firewalls, simple and inexpensive software
available at virtually any office supply or computer store,
block the most common ports hackers use to enter your
computer.

Firewalls also help you detect and block unauthorized
transmission of information from your computer to the
Internet. This adds a significant measure of protection if
you get infected with a Trojan Horse virus that tries to
"phone home" to the hacker with your sensitive information.

If you'd like to test your connection for vulnerability to
attack, log on to http://security1.norton.com and run the
various diagnostics. I would strongly advise anyone
connected to the Internet through DSL or cable to get and
use a firewall to protect against unauthorized access.

Infected with "Spyware?"

Previously we talked about unauthorized access to your
computer. But a growing problem online with people watching
you and your activities involves using programs you
willingly place on your computer.

Commonly called "Spyware," this refers to any program that
transmits information about you to someone else without you
knowing exactly what gets sent. The main purpose of Spyware
involves tracking your surfing habits so advertisers know
which targeted ads to send you.

Most Spyware basically comes onto your computer bundled
with other software applications, as a standalone program,
or as modification to the HTML on a web page.

Regardless of how you get it, you need to understand
exactly what information gets transmitted about you so you
can decide whether to keep or uninstall the software. Plain
and simple, these Spyware programs can potentially reveal
extremely sensitive information about you and your online
habits.

If you have concerns about Spyware and whether or not your
computer currently carries any, log on to www.lavasoft.de
and check out the free PC software that will scan your
system for known Spyware.


About the author:

Jim Edwards is a syndicated newspaper columnist and the co-
author of an amazing new ebook that will teach you how to
use free articles to quickly drive thousands of targeted
visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to
your website for weeks, even months... without spending a
dime on advertising! ==> "Turn Words Into
Traffic"



Circulated by Article Emporium

 

Google

DISCLAIMER: The content of the site is not produced be me. These are articles i have got from the internet from the various websites. These articles are under GPL license. So I have used these articles without modification

. However, I am NOT responsible for any damages arising due to use of information from this website.
In case you find some incorrect information, then please report that immediately at pctipsntricks@gmail.com