Monday, January 25, 2010

PRIVACY PROTECTION AND THE LAW

Approaches to privacy can, broadly, be divided into two categories: free market and consumer protection. In a free market approach, commercial entities are largely allowed to do what they wished, with the expectation that the consumers will choose to do the business with the corporations that respect the privacy to a desired degree. If some companies are not sufficiently respectful of privacy, they will lose market share. Such an approach may be limited by lack of competition in the market, by enterprises not offering privacy options favorable to the user, or by lack of information about actual privacy practices. Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.

In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. This approach advocates greater government definition and enforcement of privacy standards.greater government definition and enforcement of privacy standards.

WHAT IS COMPUTER PRIVACY?

Nowadays we use computers and the Internet everywhere - we do our banking, read books, find different kinds of information, plan holidays and more. The list is endless. But on the other side Internet is full of potential risk to our privacy and security. It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address. Everyone has an IP address to communicate on the Internet, IP address is like a telephone number or mailing address. Using your IP it is possible to know your country, city, internet provider and even physical address.
While surfing the Internet browsers keep tracks of our Internet activity in order to provide a more pleasant computer and surfing experience. But these history tracks can compromise our privacy and provide an easy way for others to see what web sites you visited, what you have been searching, downloading, viewing, etc.
Windows and different applications we use keep tracks about your computer activity in order to provide a more pleasant computer experience. But those history tracks can also compromise our privacy and show what you have been doing, searching, downloading, running, saving, what documents and files you have just opened etc.
So while there are lots of things that we have gained from the computer revolution there is a price we have to pay. And the price is our computer privacy. Of course there is no simple solution for this problem. But inactivity is also impossible. There are some simple steps everyone could do. There are different tools available to help us maintain our privacy - anonymous surfing tools, encryption software, clear history software. When your PC is equipped with privacy software, it has the greatest chance of surviving privacy or security attacks.

Monday, January 11, 2010

computer criminals and their objective

Some computer criminals are mean and sinister types. But many more wear business suits, have university degrees, and appear to be pillars of their communities. Some are high school or university students. Others are middle-aged business executives. Some are mentally deranged, overtly hostile, or extremely committed to a cause, and they attack computers as a symbol. Others are ordinary people tempted by personal profit, revenge, challenge, advancement, or job security. No single profile captures the characteristics of a "typical" computer criminal, and many who fit the profile are not criminals at all. Whatever their characteristics and motivations, computer criminals have access to enormous amounts of hardware, software, and data; they have the potential to cripple much of effective business and government throughout the world.
OBJECTIVES:

Computer criminals have different objectives. An underground network of hackers helps pass along secrets of success; as with a jigsaw puzzle, a few isolated pieces joined together may produce a large effect. Others attack for curiosity, personal gain, or self-satisfaction. And still others enjoy causing chaos, loss, or harm. Criminals seldom change fields from arson, murder, or auto theft to computing; more often, criminals begin as computer professionals who engage in computer crime, finding the prospects and payoff good. Electronic spies and information brokers have begun to recognize that trading in companies' or individuals' secrets can be lucrative. A hacker wants a score, bragging rights. Organized crime wants a resource; they want to stay and extract profit from the system over time.

zero day attack

zero day attack,also known as zero hour attack,takes advantages of computer vulnerabilities that do not currently have a solution.typically a software company will discover a bug or problem with a piece of software after it has been released and then offer a patch of software meant to fix the original issue.
a zero day attack will take advantage of that problem before the patch has been created.
it is name zero day because it occurs before the first day the vulnerability is known.

Monday, January 4, 2010

what whould you do

1.)first ill fixed the hacking problem.ill make sure..that i install a perfect firewall to protect our software.then ill consult to my friend or to the specialist of that same kind of company for help what should i do to resolved that negative impact of that headlines.
2.)when my friend told me that he has developed a worm to attack the administrative systems at my college..i will tell here.nice friend you can now developed a worm.but don't send or attack the admin of my school..even though its harmless.but it can cause panic in the admin.