www.1001TopWords.com |
Is Your Email Private? Part 1 of 3
In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. Every birthday greeting or Dear John email, every complaint, rant or verbal purge we may have sent to our employers, credit companies, congressman or customer service rep is subject to delivery errors or outright interception. How can this be? To answer that we need to understand how email works. For the vast majority of email users today, the email system they use consists of two servers providing incoming and outgoing services, SMTP and POP3. The SMTP (Simple Mail Transfer Protocol) server handles the outgoing email. SMTP was designed years ago when plain ascii text was all there was to send via email. So, when you push the "Send" button in your email client, the SMTP server at your ISP (Internet Service Provider) connects with the incoming POP3 (Post Office Protocol ver. 3) server where you are sending the email. The servers have a short "chat" verifying that the email address you are trying to send to exists on the incoming POP3 server. Then the SMTP server passes the message to the POP3 server and the POP3 server puts the message into the recipient's email box. At no time during the process is your email encrypted to protect your privacy. The message could be intercepted at anytime during the process and read by anyone. On occasion, email sent to you or by you may even be delivered to the wrong inbox and your private message is no longer private. A single misdirected message could expose you to all kinds of trouble depending upon it's content. Well, no one wants to read your email right? Wrong! Have you ever heard of Carnivore? That's a system that the FBI uses to harvest all email traffic going through a network. How does this affect you? When the FBI hooks Carnivore up to your ISP's network because they suspect someone of dealing drugs or some other crime, Carnivore will filter through ALL email looking for keywords that relate to the crime in question. And because the search has to be intentionally vague, you may be sending a request for information about a prescription drug you take and Carnivore will harvest your email to be read by a human agent. Suddenly, the drugs you're taking are now public knowledge. Spammers have also been known to harvest email addresses via captured emails. OK - so now that you know the problem, what should you do about securing your privacy? It was hinted at earlier on... encryption! Learn how to use PGP (Pretty Good Privacy) to encrypt your email. PGP uses a Public/Private key method to encrypt email. First you create a "Public" key. This is the key that others will use to encrypt email sent to you. Send this key to everyone you want to receive encrypted email from. Then you create a "Private" key. This is the key you use to decrypt any encrypted email sent to you. Safeguard this key well. It is the only thing that can decrypt your messages. If you tell someone what it is or loose it, your privacy is again compromised. For more information on PGP and a free download visit: http://www.pgpi.org. Next Time: Incorporating PGP into your email... Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work. He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
|
RELATED ARTICLES
5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap! 6 Ways To Prevent Identity Theft These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.9 million Americans fell victim to many types of identity theft scams, costing them nearly $5 billion. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. At that moment, theVP of sales received a call from the company's broker stating that ACME Software Incstock fell 4 point due to lack of confidence. Several states away, spammers didn't like theidea of lower profit margins do to an easy to install spam blocking software so theythought they would fight back. Earlier that day, they took control of hundreds ofcompromised computers and used them as DoS zombies to attack ACME Software Inc'sInternet servers in a vicious act of cyber assault. During an emergency press conferencethe next morning, ACME Software Inc's CIO announced his resignation as a result of aseveral million dollar corporate loss. Protecting Your Children On The Internet If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800 The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. You must be diligent in your ability to detect and then protect your important computer data. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court. Identity Theft Article ? A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Using these two programs in conjunction will eliminate a vast majority of spyware problems from your computer. For the purposes of this article, "spyware" refers also to adware, malware, and other not-so-nice "features" of today's computing reality. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. You may not see it, but almost all of your company's information is in digital form somewhere in the system. These assets are critical because they describe everything about you; your products, customers, strategies, finances, and your future. They might be in a database, protected by data-center security controls, but more often than not, these assets reside on desktops, laptops, home computers, and more importantly in email or on some form of mobile computing device. We have been counting on our firewall to provide protection, but it has been estimated that at least fifty percent of any given organization's information is in email, traveling through the insecure cyberspace of the Internet. Spyware ? Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Ad-Aware was run, Spybot: Search and Destroy was as well. Nothing looked suspicious in the system's startup. All appeared well, but it wasn't. Viruses and Worms: The Problems and Their Solutions History and Background Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. A good firewall will help protect you from malicious attacks of spyware, adware, malware, worms, trojans, and hackers. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. It is extremely important to make sure this program is updated at least once a week, and all drives are scanned. Viruses usually are used to destroy your Data or Hardware. Where as Trojans are used to gain remote access into your system. Always scan any new files you receive as well, even if they are off a friend, you don't know where those files originated from. ALWAYS use a little common sense when on the Internet as well. Don't accept files from an entrusted source. Don't go to web sites you have received spam for, they can be infected with viruses or asking you to download files that are infected. Always go only to official sites (i.e... If you ask for a web address for Norton and someone says ww.nortfix.com, that is obviously not an official site). Keep in mind that an Antivirus will only detect known viruses. It is possible that someone can create a new virus or manipulate an existing Virus or Trojan to the point it will no longer be detected by an Antivirus. As each unknown virus is discovered it is then added into the Antivirus database. Always create rescue disks for your Antivirus program, these will enable you to access your computer through MS-DOS if you are unable to access it through windows. If you do not have an Antivirus program try the HouseCall free online virus scan the link if on the top right side of this page. Also never run 2 different Antivirus . By using two different Antivirus software, sometimes the rule sets can cause conflicts in each other.. or think the other is a virus.. which can also give false positives (meaning it detects a file as a Virus or Trojan, when it isn't one).. or not detect viruses as it should. Always delete files you do not remember downloading. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Spyware is extremely difficult to remove manually and should only be removed with spyware protection software. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips... Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? |
© Athifea Distribution LLC - 2013 |