Mini Spy

Loading...

Latest Threads

Loading...
 
  1. Warning Welcome to MalwareTips.com, a free community where people like yourself come together to discuss and learn about PC security and computers.
    As a guest, you can browse and view the various discussions in the forums, but you can not create new threads or reply to an existing one unless you are a registered member. By joining our free community you will have access to post threads, start private conversations with other members, respond to polls, upload content and access many other special features.
    Registration is fast, simple and absolutely free, so please join us today!
  2. Emsisoft  Mobile Security GiveawayEXCLUSIVE MalwareTips.com: Emsisoft Mobile Security Giveaway

    Get a free license key for Emsisoft Mobile Security to protect your Android smartphone. We are giving away Emsisoft Mobile Security license keys for our awesome members!

    Get an Emsisoft Mobile Security license key!

  3. Zemana AntiLogger Unlimited GiveawayEXCLUSIVE: Zemana AntiLogger Giveaway

    Get a free license key for Zemana AntiLogger. We are giving away 300 Zemana AntiLogger license keys for our awesome members!

    Get a Zemana AntiLogger license key!

  4.  NoVirusThanks EXE GiveawayEXCLUSIVE MalwareTips.com : NoVirusThanks EXE Radar Pro Giveaway

    Get a free license key for NoVirusThanks EXE Radar Pro. We are giving away NoVirusThanks EXE Radar Pro license keys for our awesome members!

    Get a NoVirusThanks EXE Radar Pro license key!

  5. ZoneAlarm 2015 Extreme Security GiveawayEXCLUSIVE MalwareTips.com:ZoneAlarm 2015 Extreme Security Giveaway

    Get a free license key for ZoneAlarm 2015 Extreme Security. We are giving away ZoneAlarm 2015 Extreme Security license keys for our awesome members!

    Get a ZoneAlarm 2015 Extreme Security license key!

  6. Tip of the Day Many people think that 'formatting' a hard drive will wipe out all the data so it cannot be recovered
    Not so. To prevent the possibility of future recovery, use a third-party, low-level hard drive formatting tool, such as Killdisk (downloadable at no charge from www.killdisk.com) to overwrite data on the hard drive with a random sequence of 1's and 0's.

How Anonymous Are You?

Discussion in 'Safe Online Practices' started by Jack, Feb 15, 2011.

  1. Jack

    Jack Administrator Staff Member

    Joined:
    Jan 24, 2011
    Messages:
    6,769
    Likes Received:
    681
    Trophy Points:
    323
    What information is collected?

    When you visit a website, a certain amount of information is automatically sent to the site. This information may include the following:

    • IP address - Each computer on the internet is assigned a specific, unique IP (internet protocol) address. Your computer may have a static IP address or a dynamic IP address. If you have a static IP address, it never changes. However, some ISPs own a block of addresses and assign an open one each time you connect to the internet—this is a dynamic IP address. You can determine your computer's IP address at any given time by visiting www.showmyip.com.
    • Domain name - The internet is divided into domains, and every user's account is associated with one of those domains. You can identify the domain by looking at the end of URL; for example, .edu indicates an educational institution, .gov indicates a US government agency, .org refers to organization, and .com is for commercial use. Many countries also have specific domain names. The list of active domain names is available from the Internet Assigned Numbers Authority (IANA).
      software details - It may be possible for an organization to determine which browser, including the version, that you used to access its site. The organization may also be able to determine what operating system your computer is running.
    • Page visits - Information about which pages you visited, how long you stayed on a given page, and whether you came to the site from a search engine is often available to the organization operating the website.
      If a website uses cookies, the organization may be able to collect even more information, such as your browsing patterns, which include other sites you've visited. If the site you're visiting is malicious, files on your computer, as well as passwords stored in the temporary memory, may be at risk.

    How is this information used?

    Generally, organizations use the information that is gathered automatically for legitimate purposes, such as generating statistics about their sites. By analyzing the statistics, the organizations can better understand the popularity of the site and which areas of content are being accessed the most. They may be able to use this information to modify the site to better support the behavior of the people visiting it.

    Another way to apply information gathered about users is marketing. If the site uses cookies to determine other sites or pages you have visited, it may use this information to advertise certain products. The products may be on the same site or may be offered by partner sites.

    However, some sites may collect your information for malicious purposes. If attackers are able to access files, passwords, or personal information on your computer, they may be able to use this data to their advantage. The attackers may be able to steal your identity, using and abusing your personal information for financial gain. A common practice is for attackers to use this type of information once or twice, then sell or trade it to other people. The attackers profit from the sale or trade, and increasing the number of transactions makes it more difficult to trace any activity back to them. The attackers may also alter the security settings on your computer so that they can access and use your computer for other malicious activity.

    Are you exposing any other personal information?

    While using cookies may be one method for gathering information, the easiest way for attackers to get access to personal information is to ask for it. By representing a malicious site as a legitimate one, attackers may be able to convince you to give them your address, credit card information, social security number, or other personal data (see Avoiding Social Engineering and Phishing Attacks for more information).

    How can you limit the amount of information collected about you?

    Be careful supplying personal information - Unless you trust a site, don't give your address, password, or credit card information. Look for indications that the site uses SSL to encrypt your information (see Protecting Your Privacy for more information). Although some sites require you to supply your social security number (e.g., sites associated with financial transactions such as loans or credit cards), be especially wary of providing this information online.

    • Limit cookies - If an attacker can access your computer, he or she may be able to find personal data stored in cookies. You may not realize the extent of the information stored on your computer until it is too late. However, you can limit the use of cookies.
    • Browse safely - Be careful which websites you visit; if it seems suspicious, leave the site. Also make sure to take precautions by increasing your security settings , keeping your virus definitions up to date, and scanning your computer for spyware.

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads: Anonymous
Forum Title Date
Safe Online Practices The ultimate guide to staying anonymous and protecting your privacy online Friday at 10:11 PM
News Section Israeli hacker hijacks webcams to unmask Anonymous OpIsrael hackers Apr 17, 2014
Backup, Cloud Storage and Social Sharing Search of a free email service, also Anonymous. Feb 19, 2014
How-To Articles, Tips and Guides How to download from the Internet anonymously (comparing of 4 FREE ways) Feb 11, 2014
News Archive Man fined $183k after joining Anonymous DDoS of Koch Industries for one minute Dec 13, 2013

MalwareTips.com is an independent website.All trademarks mentioned on this page are the property of their respective owners.