TELECOM Digest OnLine - Sorted: Tracking Techniques


Tracking Techniques


Lisa Minter (lisa_minter2001@yahoo.com)
Tue, 28 Dec 2004 12:34:21 EST

Michael Fitzgerald - ExtremeTech

The classic techniques include things such as sniffing, which captures
all of the data coming from a connection and then analyzes
it. Sniffers originally were used to diagnose network performance. But
since they capture all of the data coming through a network, these
tools can be useful for mischief.

Sniffers might be a concern if you spend a lot of time surfing the Web
at your office, where your company has a right to track what you do
online.

But from home, you probably have little to fear from it. It would
require either dropping software undetected into a home computer, or
breaking into an ISP and do the same.

And even then, with encryption and Secure Sockets Layer-type
protections built into most Web sites that handle transactions,
there's a good deal of data that sniffers can't see, says Chris
Wysopal, director of development at Symantec Corporation.

He warns that it's far simpler for malicious cyber-types to write and
distribute spyware, or phishing, which involves building sites that
mimic a bank or retail site and then sending out mass e-mails alerting
people to an "emergency" such as the closing of their account if they
don't go to the site and give their personal information. These are
his top two concerns for privacy violations online.

While there are tools for battling spyware, both schemes are best
fought through avoidance. Don't download toolbars for your Web site or
other such packages unless you know the vendor is a legitimate one
(not always clear in the case of spyware, since adware can look like
spyware to some, and legitimate business use to others). And don't
believe any company that claims it needs your credit card number or
other personal information in order to preserve your account. It isn't
true.

NOTE: For more telecom/internet/networking/computer news from the daily
media, check out our feature 'Telecom Digest Extra' each day at
http://telecom-digest.org/td-extra . New articles daily.

*** FAIR USE NOTICE. This message contains copyrighted material the
use of which has not been specifically authorized by the copyright
owner. This Internet discussion group is making it available without
profit to group members who have expressed a prior interest in
receiving the included information in their efforts to advance the
understanding of literary, educational, political, and economic
issues, for non-profit research and educational purposes only. I
believe that this constitutes a 'fair use' of the copyrighted material
as provided for in section 107 of the U.S. Copyright Law. If you wish
to use this copyrighted material for purposes of your own that go
beyond 'fair use,' you must obtain permission from the copyright
owner, in this instance, ExtremeTech and Michael Fitzgerald.

For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml

Post Followup Article Use your browser's quoting feature to quote article into reply
Go to Next message: Lisa Minter: "Keeping E-Mail Private"
Go to Previous message: Lisa Minter: "Surfing in Secret"
TELECOM Digest: Home Page