Protect Yourself From Internet Snoopers

Protect Yourself From Internet Snoopers
Duy Anh-VASC According to the Seattle Times Most users think that the data transmitted from their computer is protected and can travel around the Internet without being blocked by someone. But this is actually a misconception. This article will help you assess the dangers and safeguard your computer. The combination of compromised computers and vulnerabilities in wireless networks has dramatically increased the ability to infiltrate your flow of information. Although Mac systems are still less prone to virus attacks, Windows and Unix systems may pose a potential danger within a previously secure system, which could spread the virus. The ability to send data to remote crackers. Information when leaving your computer is generally not protected. Another computer on the same network with your computer can get any information transmitted through. Wireless networks using Apple Airport or unprotected IEEE 802.11b devices: Data is sent out of four walls, and 802.11b encryption was removed in August. present. Moreover, this encryption is rarely activated, and has never even been used in public wireless networks, such as those at Sea-Tac International Airport or at stations. Starbucks radio. Because in most of the data we send and receive, in addition to the images there are texts, so when these data are blocked, the private messages and Web sites we view will be ignored. know. Most e-commerce transactions are very sophisticated. For years, Web servers have used SSL security to encrypt and protect online traffic. But your e-mail name and password are sent in plain text every time you log in to your inbox. And some Web services set the default login mode unprotected. If a person gets your password, he or she can ruin your reputation or steal your e-mail. Most of us have nothing to lose apart from our privacy. If you use the Internet for personal reasons, you do not use a wireless connection that connects via a home dial-up modem, digital subscriber line, or cable service. However, if that is not the case, or if you often have to spend a lot of time browsing the Internet, you may want to try one of the four most important ways to protect your most important data on the road. transfer. These four methods will be presented in the second part of this article, invite you to watch. If you are always interested in information security, we would like to introduce you to four methods to protect important data on the computer, away from the look of hackers. Four methods to protect your important data: 1. Encrypt your documents. Documents and e-mails can be encrypted with high security, and encryption is also very easy to use by using the PGP program when sending them. PGP allows you to encrypt messages so that only recipients can read them as long as the recipient is also using the PGP program. (If you want to get free PGP software you can go to www.pgp.com/products/freeware/agreement-mac.asp to register). 2. Encrypt e-mail on the transmission line. The SSL encryption method no longer only serves e-commerce; This method has been used in many areas, including sending and receiving e-mails. Eudora 5.1 for Mac and the upcoming version of Microsoft Entourage all support SSL. Ask your service providers if they can support SSL; In addition to protecting e-mail content, the e-mail service uses SSL technology to protect your login and password when signing in without requiring recipients to run any encryption software. . Run a virtual private network (VNP). Virtual private networks create a private channel encrypted between your computer and the VNP server, and usually inside a corporate firewall. More and more products are available for small businesses, including servers located in network ports or routers. Virtual private networks require special client software. Virtual private networks are designed to protect you against snoopers who want to steal messages across the network so that compromised computers can remain an issue. Use Secure Tunneling via SSH (Secure Shell). SSH tunnels work just like virtual private networks, but you do not need to set up your own server. For example, Anonymizer.com offers SSH tunneling for $ 10 a month or $ 200 a year, including the F-Secure SSH Client software. (www.anonymizer.com/services/ssh2.html). After configuring your system, all data in the e-mail, Web, FTP, and other data streams is completely encrypted as these data leave your computer and your network. Protecting your Mac is a safe bet, but it's actually a risk assessment. However, encryption can allow you to keep your secrets safe.