Ebook Privacy protection and computer forensics (Second edition): Part 2

Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15 biometrics: privacy versus nonrepudiation, chapter 16 legal issues. | CHAPTER 8 Contents Practical Measures for Online Computer Activities Netscape Navigator Communicator Microsoft Internet All Web browsers in their default settings engage in the Explorer annoying practice of volunteering to each and every Web site Desirable e-mail software visited the following information configuration and modifications 1. The type and version number of the browser being used via Secure e-mail conduct the http_user_agent environmental variable. This is a bad online idea because it makes it that much easier for a malicious E-mail forensics and remote Web site to know exactly how to exploit one s traces the anonymity that browser s unique security weaknesses. Also some Web sites isn t make a marketing statement by refusing to deal with this or that Web browser. 2. The referring page that is the Web site visited just prior to the current one being visited. Additionally a Web browser has to send the user s current IP address as well which remote sites record. This is a partly necessary evil because the remote site has to know where to send the information asked for. The partly qualifier alludes to the fact that one can use a proxy see Section . In addition Web browsers have a long history of many security bugs that allow hostile remote Web sites to take full control of one s computer from afar depending on how a user has set the Web browser up. The following in specific suggestions applicable to all brows- ers and e-mail software 1. Download install and use JunkBuster from http www. freeware . You can then set it up to show that your Web browser is say Gameboy64 and that the last Web site you visited was http or some such. 127 128 Practical Measures for Online Computer Activities 2. Disable all autocomplete features such as autocompletion of Web addresses and especially of passwords. 3. If you use Web browsers for e-mail or Usenet reading disable HTML-enabled e-mail and Usenet message .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.