Privacy and Security - Articles Archive
from October 11, 2004 to April 19, 2004

As an independent publisher or NewsMaster, you may spend a fair amount of your time away from your desk. There may be times when you're out and about that you need access to a computer. If you don't own a WiFi-enabled laptop PC, or simply haven't ... read more

Robin Good - October 11, 2004
Researchers live and breathe the maxim "the right information, in the right place, at the right time". But how often do researchers, when finally packaging up their findings, know exactly what the "right time" and "right place" are for their customer? Are they sitting at their desks, ... read more

Robin Good - September 23, 2004
"Today's fast-spreading worms and viruses can infect every vulnerable PC on the Internet within minutes. Some worms shut themselves down long before the Anti-Virus vendors have even had a chance to analyze how they spread. Many of those leave thousands of Trojans in their wake. ... read more

Robin Good - August 28, 2004

Researchers at the SANS Institute's Internet Storm Center estimate that an unprotected PC will be compromised within 20 minutes of being connected to the Internet, down from an estimated 40 minutes last year. The estimate is based on observations of vacant IP addresses, which received reports ... read more

Robin Good - CNET - August 19, 2004
Here is one more "enlightening journey into the dangers lurking out on the 'net for the unwary". Spyware and malicious ware of all kinds attempts to install itself on your PC and the more I look, the more I see people not even realizing what is ... read more

SANS - Internet Storm Center - [via Slashdot] - August 8, 2004
"More and more employers and universities are becoming aware of the amount of time their employees or students are spending using the Internet for personal reasons. Obviously employers want to discourage this behavior and may implement a number of different ways to do so. This guide ... read more

Robin Good - - August 3, 2004
Freenet, the brainchild of Ian Clarke while a student at the University of Edinburgh, is a free software which lets you publish and obtain information on the Internet without fear of censorship. Nobody controls Freenet, not even its creators, meaning that the system is not vulnerable ... read more

Robin Good - July 28, 2004
Anonymous proxy servers have become more and more abused and recently there has been a number of fake anonymous proxies services that have been setup FOR THE VERY PURPOSE OF capturing user names, passwords, credit card info and more. But more alternatives are springing up to ... read more

Robin Good Recommends - July 22, 2004

Fernanda Viégas, a PhD candidate working in the Sociable Media Group at the MIT Media Lab, has run an interesting survey to determine the expectations of privacy and accountability that authors have when they blog. Though this research approach still reflects a naive and superficial matching ... read more

Fernanda Viégas - MIT Media Lab - July 17, 2004
Want to be invisible online?Your Freedom is an application, which allows to bypass firewalls, content Filters and furthermore allows you to stay anonymous on the Internet by hiding your source IP address and encrpyting the data between your PC and the outside. In essence, "Your Freedom" ... read more

Robin Good - July 16, 2004
If you are a heavy user of Internet Explorer and have started to become aware of Microsoft Internet Explorer serious risks and vulnerabilities but are still in doubt on switching to a new more secure browser, here is a free little tool that can help you ... read more

Robin Good Recommends - June 29, 2004
"A new Internet virus has surfaced that allows hackers to steal passwords, credit card numbers and other personal information when someone merely visits an infected Web site, government computer security experts warned this week. Hundreds of Web sites have been targeted by the virus, which exploits ... read more

Brian Krebs - WashingtonPost - June 28, 2004
"What happens when RFID tags are placed on everything from your razor (as Gillette is already doing) to your tires (Michelin is experimenting with this) to your shirt (as Benetton planned, until swayed by consumer protest)? You will walk around virtually bugged. And if you paid ... read more

Lenore Skenazy - WhittierDailyNews - June 27, 2004
Software developers are designing some new file sharing networks that will make it harder for the music and file industry to prove cases of piracy. According to Reuters, three file sharing networks are being planned which its users think will make it a lot harder for ... read more

Robin Good - The Inquirer - May 15, 2004
Posting your email address on a website is a sure-fire way to get an Inbox full of unsolicited email advertisements. The Enkoder protects email addresses by converting them into encrypted JavaScript code, hiding them from email-harvesting robots while revealing them to real people. This tool is ... read more

Robin Good Recommends - [via Marc Freedman - FutureVision] - May 8, 2004
If you are looking for ways to navigate the Web in absolute anonimity GhostSurf is an effective shareware tool that allows you to utilize anonymous proxy servers. By itself, GhostSurf can check for the fastest and more available proxy servers available on the Internet and log ... read more

Robin Good Recommends - May 7, 2004
"Cameraphones could create an opportunity for the public to snoop on the snoops and watch the watchers. Now that millions of us walk the streets with cameras in our telephones while authorities and theorists freak out about the privacy implications, has anybody stopped to think that ... read more

Howard Reinghold - The Feature - [via Sepp Hasslberger] - May 4, 2004
"A future of smart mobs and self-organized media is plausible as long as the owners of tomorrow's communications devices remain free to use the emerging media in any way they choose. However, a war over control of innovation might change all that, and the attack is ... read more

CIO - Howard Reinghold - [via Sepp] - May 1, 2004
BeepCard is a technology company. They sell a sound authenticator for credit cards. The demo looks like a credit card -- an actual credit card that passes all the credit card specs for bendability and reliability and everything -- and contains a speaker and a sound ... read more

Bruce Schneier - April 20, 2004
"The potential privacy encroachments of an ID card system are far from minor. And the interruptions and delays caused by incessant ID checks could easily proliferate into a persistent traffic jam in office lobbies and airports and hospital waiting rooms and shopping malls. But my primary ... read more

Bruce Schneier - April 19, 2004

previous   1   2   3   4   5   6   7   8   next  


Subscribe to Robin Good's "Privacy and Security" News Feed
Subscribe to all of Robin Good's News Feeds


Creative Commons License
This work is licensed under a Creative Commons License.


Real Time Web Analytics