Be Careful what You Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
Internet Information Concerns Privacy Security Bandwidth Content Public Access Commercialization
Internet Privacy Laws “ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
Balancing Act on Privacy
Basic Issues The Children's Online Privacy Protection Act (COPPA) Gender and Electronic Privacy USA PATRIOT Act Terrorist Information Awareness Cookies Spam Software Spyware
“ You have zero privacy  [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
Public Interest In Protecting Individual Privacy
The Children's Online Privacy Protection Act (COPPA) The Children's Online Privacy Protection Act ("COPPA") specifically protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users. Main requirements of the Act The Act was passed in response to a growing awareness of Internet marketing techniques that targeted children and collected their personal information from websites without any parental notification.
The Children's Online Privacy Protection Act (COPPA) In the 1990s, children began to access the Web more and more.  Marketers would track information kids gave out in chat rooms or while playing games (such as addresses, full names, ages, etc.) and would retain this data in order to sell to third parties.  It became very easy for anyone to simply send money to one of these companies and receive lists of children’s addresses and personal information.
The Children's Online Privacy Protection Act (COPPA) COPPA applies to any website directed specifically at children, any general site which has a children’s section, and any foreign websites aimed at U.S. children On each website, there must be an easily accessible privacy policy A web operator must obtain parental permission via credit card, digital signature, or a signed and faxed consent form.  The operator must also make available any information collected about the child to the guardians of the child.
Gender and Electronic Privacy Pretexting and Cyberstalking : *Pretexting is the practice of collecting information about a person using false pretenses.  *Cyberstalking-- Coincidence Design , Amy Boyer case Video voyeurism and webcams
Case of Amy Boyer Twenty-year-old Amy Boyer lived at home with her parents in Nashua, New Hampshire, was employed at a local dentist’s office, and had a boyfriend. In early October of 1999, she logged onto the Web with her mother to check out travel rates for a trip she was planning.  On October 15, Amy, ambushed outside the dentist’s office as she got in her car, was shot and killed. Her killer then committed suicide.  Then when police confiscated the killer’s computer, they found the connection—two Web sites devoted to Amy Boyer, created by Liam Youens, 21, who had been carrying a torch for her ever since junior high school. But he did not know Amy and Amy never knew Liam. He’d seen her in the hallway one day, became infatuated, and his “love” grew from there.  As he saw Amy with a new boyfriend, his love became anger, then hate, fueled by two Web sites he created, one on Tripod, the other on Geocities.  A cyberstalking victim? Yes. But like a dangerous intersection that doesn’t get a stop light until someone dies, Amy died before anyone took cyberstalking seriously.   
USA PATRIOT Act “ U niting and  S trengthening  A merica by  P roviding  A ppropriate  T ools  R equired to  I ntercept and  O bstruct  T errorism Act of 2001” Authorizes the installation of devices to record all computer routing, addressing, and signaling information. Governs government access to stored email and other electronic communications.  Creates a new exception, permitting government interception of the "communications of a computer trespasser" if the owner or operator of a "protected computer" authorizes the interception. The new exception has broad implications, given that a "protected computer" includes any "which is used in interstate or foreign commerce or communication" (which, with the Internet, includes effectively any computer).
Terrorist Information Awareness USA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts.  Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations.  Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more.  Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is "relevant" to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation.  This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
Cookies A cookie is a mechanism that allows a web site to record your comings and goings, usually without your knowledge or consent.  Cookies do provide outside sources with personal information, but only information that you give while on the website.  Yes, it does violate personal privacy to a degree, but cookies can be turned off or restricted to specific websites.
Cookies A server cannot set a cookie for a domain that it isn't a member of. How does a cookie work? Doubleclick This usage of cookies is the most controversial, and has led to the polarized opinions on cookies, privacy, and the Internet.
Cookie Concerns Snooping Virus carrier Hacking User profiling Fixing browser  bugs eliminated cookie concerns EXCEPT for User Profiling > Briefly < And now … Super Cookies
Have you been spammed?
Have you been spammed? Junk mail  … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who  would not otherwise  choose to receive it.
Spam Spam is unsolicited commercial e-mail.  Spammers get e-mail addresses in three ways:  *by scavenging, the practice of automatically collecting  e-mail  addresses listed or posted on web pages and electronic bulletin boards * by guessing, where the spammer uses dictionary terms or randomly- generated strings to develop e-mail addresses *and by purchasing e-mail addresses through list brokers.  Currently, there is no federal legislation regulating the transmission of spam.  &quot;Remove me&quot; options
Spambots are looking for you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
Spam mail – printer toner #  From    Date    Subject 1  [email_address] 20-JUN-1999  copier & laser printer supplies 2  cc123@boardermail.com  27-JUN-1999  copier & laser printer supplies 3  hunt25@boardermail.com  12-JUL-1999  copier & laser printer supplies 4  art123@ureach.com  23-AUG-1999  laser printer toner advertisement 5  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 6  art1234@ureach.com  30-AUG-1999  laser printer toner advertisement 7  art123@techpointer.com  26-SEP-1999  laser printer toner advertisement 8  art222@techpointer.com  3-OCT-1999  laser printer toner advertisement 9  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 10  art1235@visto.com  19-OCT-1999  laser printer toner advertisement 11  art123@visto.com  20-OCT-1999  laser printer toner advertisement 12  [email_address] 27-NOV-1999  laser printer toner advertisement 13  [email_address] 27-NOV-1999  laser printer toner advertisement 14  bmark@atlantaoffice. com 28-NOV-1999  laser printer toner advertisement 15  bmark@guestbooks.net  13-DEC-1999  laser printer toner advertisement 16  bmark@crosswinds.net  28-FEB-2000  laser printer toner advertisement 17  bmark1@crosswinds.net  28-FEB-2000  laser printer toner advertisement 18  bps@buffymail.com  28-MAR-2000  laser printer toner cartridges 19  r2d2@ureach.com  28-MAR-2000  laser printer toner advertisement 20  bps@buffymail.com  20-JUN-2000  laser printer toner cartridges
Spam Case study:  One person, six years
Software Excel WORD PowerPoint Contained (GUID) Globally Unique Identifier [Called a Microsoft System ID (MSID) by MS that included the NIC ethernet address] All searches  (Yahoo…) routed through Microsoft Internet Explorer V5.0 (search feature)   Windows Media Player ( super cookie )   Reports media use to Microsoft Contains unique ID serial number accessible by web http://www.computerbytesman.com/privacy/supercookiedemo.htm
Spyware More than 800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
Web Browsers Every time you visit a site  on the Internet you provide  information about yourself.
Verifications Publication renewals have requested: Birth day Birth month Birth year Birth state Birth city Color of eyes Mother’s maiden name
Web Bugs Do you see the web bug?
What is a Web Bug? Graphic Usually transparent Usually 1-by-1 pixel size Represented as HTML IMG tag Retrieved from source other than message Found in web site or e-mail
Why a Web Bug? Monitor web site access Collect reader browser info No cookie needed When is e-mail read E-mail forwarding record Other readers Find anonymous e-mail source Check spam list for active e-mail addresses
Specialized Privacy Probes Wiretap Web Bug + JAVA code Retrieve e-mail comments Retrieve mailing list Computer Triangulation Pinpoint physical location Country and City (90% accuracy) ZIP code (possible)
Advertisement Competition A browser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners  Free, advertising supported application for filling in forms
Hijackware Hidden application could turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital.  http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
What can Librarians Do? Educate yourself so you can inform the patrons of the library
Software Install system/application security patches Upgrade Windows Media Player Change default (turn off Super Cookie) UNCHECK
Anonymous web surfing Internet Explorer plug-in FREE – cannot visit secure sites Blocks IP address Blocks cookies http://www.anonymizer.com/
Encrypted e-mail P retty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
P3P Platform for Privacy Preferences Industry Standard ( 16 April 2002 ) Specify web site privacy policy Compare with user/browser privacy preference http://www.w3.org/P3P/
P3P Tool Privacy Bird  automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
Non-secure site
Secure site
Cookies are optional Netscape v3 Options/Network Preferences/Protocols v4 Edit/Preferences/Advanced Internet Explorer v3 Internet Options/Advanced v4 View/Internet Options/Advanced v5 Tools/Internet Options/Security
Cookie Rejection  Default Preferred
Check the cookie jar http://www.karenware.com/powertools/ptcookie.html
Manage the Cookie Jar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
Cookie Cop Plus http://www.pcmag.com/print_article/0,3048,a=7719,00.asp
What to do about spam Ignore Delete Block Filter Change e-mail address
What  NOT  to do about spam Do NOT forward Do NOT reply Do NOT send REMOVE request Verified e-mail address Verify messages read Show lack of anti-spam knowledge RESULTS – MORE SPAM
Avoiding web spambots Use a graphic Use a graphic @ symbol Use TABLE Spell out address hintz AT ifas.ufl.edu hintz AT ifas DOT ufl DOT edu hintz@ifasNOJUNK.ufl.edu (remove NOJUNK) Do not use “ mailto: ” TAG unless encoded –  mailto&#58;hintz&#64;ufl&#46;edu [email_address]
Pop-Up Delete Pop-Up and Pop-Under windows that don’t have a close box can only be removed by using < A l t >  -  < F 4 >
Specialized Privacy Probes Disable JAVA Script In  E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
Firewall Tiny Personal Firewall 2.0 http://www.tinysoftware.com/
Firewall http://www.agnitum.com/products/outpost/ Open Architecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
Spyware Firewall http://www.zonealarm.com/ Check both INCOMING and OUTGOING requests
Anti-Spyware http://www.lavasoft.de/
Universal Web Filter Proxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
PC Cleaner http://www.bmesite.com/ Internet Sweeper
Where is the source? http://www.neoworx.com/products/ntx/default.asp
Provide accurate  personal information  ONLY  if appropriate for the services requested. Would you give personal  information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
How to protect your privacy Web browsing Use only sites with privacy policy Use only secure on-line forms Reject unnecessary cookies Limit personal information entry Provide bogus info when appropriate Opt-out of 3 rd  party info sharing Use anonymizers Clear cache after browsing
Conclusion: Remember, the Internet is a public network If you are connected, protect yourself
ANY QUESTIONS? Thank you very much for listening!

OLC Presentation Jipson

  • 1.
    Be Careful whatYou Post: The Myth of Internet Privacy Dr. Art Jipson University of Dayton Criminal Justice Studies Program Sociology, Anthropology, and Social Work
  • 2.
    Internet Information ConcernsPrivacy Security Bandwidth Content Public Access Commercialization
  • 3.
    Internet Privacy Laws“ Enjoying the right to privacy means having control over your own personal data and the ability to grant or deny access to others.”
  • 4.
  • 5.
    Basic Issues TheChildren's Online Privacy Protection Act (COPPA) Gender and Electronic Privacy USA PATRIOT Act Terrorist Information Awareness Cookies Spam Software Spyware
  • 6.
    “ You havezero privacy [on the Internet] anyway. Get over it.” Scott McNealy, 1999 CEO, SUN Microsystems
  • 7.
    Public Interest InProtecting Individual Privacy
  • 8.
    The Children's OnlinePrivacy Protection Act (COPPA) The Children's Online Privacy Protection Act (&quot;COPPA&quot;) specifically protects the privacy of children under the age of 13 by requesting parental consent for the collection or use of any personal information of the users. Main requirements of the Act The Act was passed in response to a growing awareness of Internet marketing techniques that targeted children and collected their personal information from websites without any parental notification.
  • 9.
    The Children's OnlinePrivacy Protection Act (COPPA) In the 1990s, children began to access the Web more and more. Marketers would track information kids gave out in chat rooms or while playing games (such as addresses, full names, ages, etc.) and would retain this data in order to sell to third parties. It became very easy for anyone to simply send money to one of these companies and receive lists of children’s addresses and personal information.
  • 10.
    The Children's OnlinePrivacy Protection Act (COPPA) COPPA applies to any website directed specifically at children, any general site which has a children’s section, and any foreign websites aimed at U.S. children On each website, there must be an easily accessible privacy policy A web operator must obtain parental permission via credit card, digital signature, or a signed and faxed consent form. The operator must also make available any information collected about the child to the guardians of the child.
  • 11.
    Gender and ElectronicPrivacy Pretexting and Cyberstalking : *Pretexting is the practice of collecting information about a person using false pretenses. *Cyberstalking-- Coincidence Design , Amy Boyer case Video voyeurism and webcams
  • 12.
    Case of AmyBoyer Twenty-year-old Amy Boyer lived at home with her parents in Nashua, New Hampshire, was employed at a local dentist’s office, and had a boyfriend. In early October of 1999, she logged onto the Web with her mother to check out travel rates for a trip she was planning. On October 15, Amy, ambushed outside the dentist’s office as she got in her car, was shot and killed. Her killer then committed suicide. Then when police confiscated the killer’s computer, they found the connection—two Web sites devoted to Amy Boyer, created by Liam Youens, 21, who had been carrying a torch for her ever since junior high school. But he did not know Amy and Amy never knew Liam. He’d seen her in the hallway one day, became infatuated, and his “love” grew from there. As he saw Amy with a new boyfriend, his love became anger, then hate, fueled by two Web sites he created, one on Tripod, the other on Geocities. A cyberstalking victim? Yes. But like a dangerous intersection that doesn’t get a stop light until someone dies, Amy died before anyone took cyberstalking seriously.  
  • 13.
    USA PATRIOT Act“ U niting and S trengthening A merica by P roviding A ppropriate T ools R equired to I ntercept and O bstruct T errorism Act of 2001” Authorizes the installation of devices to record all computer routing, addressing, and signaling information. Governs government access to stored email and other electronic communications. Creates a new exception, permitting government interception of the &quot;communications of a computer trespasser&quot; if the owner or operator of a &quot;protected computer&quot; authorizes the interception. The new exception has broad implications, given that a &quot;protected computer&quot; includes any &quot;which is used in interstate or foreign commerce or communication&quot; (which, with the Internet, includes effectively any computer).
  • 14.
    Terrorist Information AwarenessUSA PATRIOT ACT TIA Objective Surveillance of communications is an essential tool to pursue and stop terrorists.    This new law will allow surveillance of all communications used by terrorists, including e-mails, the Internet, and cell phones. To revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts. Strategy Law enforcement agencies have to get a new warrant for each new district they investigate, even when they're after the same suspect.  Under this new law, warrants are valid across all districts and across all states.  And, finally, the new legislation greatly enhances the penalties that will fall on terrorists or anyone who helps them. The project would scan the Internet and commercial databases for electronic evidence of terrorist preparations. Intelligence and law enforcement officials would check -- without warrants -- travel and credit card records, Internet mail and banking transactions, new driver's license records and more. Criticism The government may now spy on web surfing of innocent Americans, including terms entered into search engines, by merely telling a judge anywhere in the U.S. that the spying could lead to information that is &quot;relevant&quot; to an ongoing criminal investigation. The person spied on does not have to be the target of the investigation. This would create systematic surveillance of Americans on home soil. He is proposing to make government a peeper into lawful transactions among private citizens.
  • 15.
    Cookies A cookieis a mechanism that allows a web site to record your comings and goings, usually without your knowledge or consent. Cookies do provide outside sources with personal information, but only information that you give while on the website. Yes, it does violate personal privacy to a degree, but cookies can be turned off or restricted to specific websites.
  • 16.
    Cookies A servercannot set a cookie for a domain that it isn't a member of. How does a cookie work? Doubleclick This usage of cookies is the most controversial, and has led to the polarized opinions on cookies, privacy, and the Internet.
  • 17.
    Cookie Concerns SnoopingVirus carrier Hacking User profiling Fixing browser bugs eliminated cookie concerns EXCEPT for User Profiling > Briefly < And now … Super Cookies
  • 18.
    Have you beenspammed?
  • 19.
    Have you beenspammed? Junk mail … flooding the Internet (Usenet and/or e-mail) with many unsolicited copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it.
  • 20.
    Spam Spam isunsolicited commercial e-mail. Spammers get e-mail addresses in three ways: *by scavenging, the practice of automatically collecting e-mail addresses listed or posted on web pages and electronic bulletin boards * by guessing, where the spammer uses dictionary terms or randomly- generated strings to develop e-mail addresses *and by purchasing e-mail addresses through list brokers. Currently, there is no federal legislation regulating the transmission of spam. &quot;Remove me&quot; options
  • 21.
    Spambots are lookingfor you! Spambots are programs that search and automatically extract e-mail addresses, which are then used as targets for spam.
  • 22.
    Spam mail –printer toner # From Date Subject 1 [email_address] 20-JUN-1999 copier & laser printer supplies 2 [email protected] 27-JUN-1999 copier & laser printer supplies 3 [email protected] 12-JUL-1999 copier & laser printer supplies 4 [email protected] 23-AUG-1999 laser printer toner advertisement 5 [email protected] 30-AUG-1999 laser printer toner advertisement 6 [email protected] 30-AUG-1999 laser printer toner advertisement 7 [email protected] 26-SEP-1999 laser printer toner advertisement 8 [email protected] 3-OCT-1999 laser printer toner advertisement 9 [email protected] 19-OCT-1999 laser printer toner advertisement 10 [email protected] 19-OCT-1999 laser printer toner advertisement 11 [email protected] 20-OCT-1999 laser printer toner advertisement 12 [email_address] 27-NOV-1999 laser printer toner advertisement 13 [email_address] 27-NOV-1999 laser printer toner advertisement 14 bmark@atlantaoffice. com 28-NOV-1999 laser printer toner advertisement 15 [email protected] 13-DEC-1999 laser printer toner advertisement 16 [email protected] 28-FEB-2000 laser printer toner advertisement 17 [email protected] 28-FEB-2000 laser printer toner advertisement 18 [email protected] 28-MAR-2000 laser printer toner cartridges 19 [email protected] 28-MAR-2000 laser printer toner advertisement 20 [email protected] 20-JUN-2000 laser printer toner cartridges
  • 23.
    Spam Case study: One person, six years
  • 24.
    Software Excel WORDPowerPoint Contained (GUID) Globally Unique Identifier [Called a Microsoft System ID (MSID) by MS that included the NIC ethernet address] All searches (Yahoo…) routed through Microsoft Internet Explorer V5.0 (search feature) Windows Media Player ( super cookie ) Reports media use to Microsoft Contains unique ID serial number accessible by web http://www.computerbytesman.com/privacy/supercookiedemo.htm
  • 25.
    Spyware More than800 infested programs including: CuteFTP DigiCAM Ezforms GIF Animator Image Carousel JPEG Optimizer Netscape Smart Download Notepad + PKZIP Printshop Real Audioplayer Tucows uploader http://www.infoforce.qc.ca/spyware/
  • 26.
    Web Browsers Everytime you visit a site on the Internet you provide information about yourself.
  • 27.
    Verifications Publication renewalshave requested: Birth day Birth month Birth year Birth state Birth city Color of eyes Mother’s maiden name
  • 28.
    Web Bugs Doyou see the web bug?
  • 29.
    What is aWeb Bug? Graphic Usually transparent Usually 1-by-1 pixel size Represented as HTML IMG tag Retrieved from source other than message Found in web site or e-mail
  • 30.
    Why a WebBug? Monitor web site access Collect reader browser info No cookie needed When is e-mail read E-mail forwarding record Other readers Find anonymous e-mail source Check spam list for active e-mail addresses
  • 31.
    Specialized Privacy ProbesWiretap Web Bug + JAVA code Retrieve e-mail comments Retrieve mailing list Computer Triangulation Pinpoint physical location Country and City (90% accuracy) ZIP code (possible)
  • 32.
    Advertisement Competition Abrowser window &quot;plug-in&quot; comes bundled with software that hovers pop-ups over competitors advertisement banners Free, advertising supported application for filling in forms
  • 33.
    Hijackware Hidden applicationcould turn every computer running Kazaa into a node of a private network called Altnet and controlled by Brilliant Digital. http://news.com.com/2102-1023-875274.html SETI without the ethics! Free file sharing software
  • 34.
    What can LibrariansDo? Educate yourself so you can inform the patrons of the library
  • 35.
    Software Install system/applicationsecurity patches Upgrade Windows Media Player Change default (turn off Super Cookie) UNCHECK
  • 36.
    Anonymous web surfingInternet Explorer plug-in FREE – cannot visit secure sites Blocks IP address Blocks cookies http://www.anonymizer.com/
  • 37.
    Encrypted e-mail Pretty G ood P rivacy GPG (GNU Privacy Guard) is a PGP compatible alternative replacement based on the OpenPGP standard http://www.gnupg.org/
  • 38.
    P3P Platform forPrivacy Preferences Industry Standard ( 16 April 2002 ) Specify web site privacy policy Compare with user/browser privacy preference http://www.w3.org/P3P/
  • 39.
    P3P Tool PrivacyBird automatically searches for privacy policies at every website you visit http://www.privacybird.com/ The bird icon alerts you about Web site privacy policies with a visual symbol and optional sounds.
  • 40.
  • 41.
  • 42.
    Cookies are optionalNetscape v3 Options/Network Preferences/Protocols v4 Edit/Preferences/Advanced Internet Explorer v3 Internet Options/Advanced v4 View/Internet Options/Advanced v5 Tools/Internet Options/Security
  • 43.
    Cookie Rejection Default Preferred
  • 44.
    Check the cookiejar http://www.karenware.com/powertools/ptcookie.html
  • 45.
    Manage the CookieJar http://www.analogx.com/ contents/download/network/cookie.htm CookieWall
  • 46.
    Cookie Cop Plushttp://www.pcmag.com/print_article/0,3048,a=7719,00.asp
  • 47.
    What to doabout spam Ignore Delete Block Filter Change e-mail address
  • 48.
    What NOT to do about spam Do NOT forward Do NOT reply Do NOT send REMOVE request Verified e-mail address Verify messages read Show lack of anti-spam knowledge RESULTS – MORE SPAM
  • 49.
    Avoiding web spambotsUse a graphic Use a graphic @ symbol Use TABLE Spell out address hintz AT ifas.ufl.edu hintz AT ifas DOT ufl DOT edu [email protected] (remove NOJUNK) Do not use “ mailto: ” TAG unless encoded – mailto&#58;hintz&#64;ufl&#46;edu [email_address]
  • 50.
    Pop-Up Delete Pop-Upand Pop-Under windows that don’t have a close box can only be removed by using < A l t > - < F 4 >
  • 51.
    Specialized Privacy ProbesDisable JAVA Script In E-Mail Client Install Microsoft patch http://office.microsoft.com/Assistance/2000/Out2ksecFAQ.aspx
  • 52.
    Firewall Tiny PersonalFirewall 2.0 http://www.tinysoftware.com/
  • 53.
    Firewall http://www.agnitum.com/products/outpost/ OpenArchitecture Supports plug-ins Intrusion Detection Advertisement Blocking Content Filtering E-mail Guard Privacy Control
  • 54.
  • 55.
  • 56.
    Universal Web FilterProxomitron eliminate cyber-spam like pop-up windows, alerts, banners, animated GIFs, auto-play music, sounds, dynamic HTML, Java and more http://www.spamblocked.com/proxomitron/ transforms web pages on the fly turn off some of those fancy new HTML features that web browsers support
  • 57.
  • 58.
    Where is thesource? http://www.neoworx.com/products/ntx/default.asp
  • 59.
    Provide accurate personal information ONLY if appropriate for the services requested. Would you give personal information to strangers? 24% of users have supplied false information Create a Virtual User John Smith 7/7/77 blue eyes red hair
  • 60.
    How to protectyour privacy Web browsing Use only sites with privacy policy Use only secure on-line forms Reject unnecessary cookies Limit personal information entry Provide bogus info when appropriate Opt-out of 3 rd party info sharing Use anonymizers Clear cache after browsing
  • 61.
    Conclusion: Remember, theInternet is a public network If you are connected, protect yourself
  • 62.
    ANY QUESTIONS? Thankyou very much for listening!