|
|||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
![]() |
![]() |
![]() ![]() ![]() |
|||||||||||||||||||||||||||
Unsolicited E-mails and the Protection of Privacy The massive distribution of unsolicited messages by people or companies is a technique known as “spam” or “spamming”. Most of the time, these messages have an advertisement or pornographic content. To obtain lists of electronic addresses these people or companies consult newsgroups, purchase e-mail lists, and surf the Net. Even though this technique is deplorable, it is not illegal as such and it is extremely difficult to control. However, you can take some basic precautions.
![]() Phishing is the process of sending spam messages, the content of
which appears to come from a legitimate institution and asks you to
provide your personal account information.
Spyware is software that gathers information about people without their knowledge. Generally speaking, it tracks your movements and habits on the Web and sends the information to advertising companies. They use the information to create marketing profiles thus helping them to market their products better. Spyware is sometimes included in free software (also known as shareware) that is downloaded from the Internet. Often there are long licence agreements (which few people read) stating that you agree to the software gathering information about your habits and sending it back to the company's Web site. Spyware can also find its way onto your computer via a virus. Cookies also gather personal information about a user, but they are not considered spyware because they are not hidden. Users can disallow cookies at any time if they choose to do so. The use of spyware is common practice in informatics. Even though this practice is not highly appreciated, it is not illegal and software manufacturers do not, as a rule, have criminal intent. We suggest that you contact the manufacturer to express your apprehension and comments. If you are not satisfied with the manufacturer’s reply, you still have the option to not use the software. There still are basic precautions that you can take to avoid that your computer become infected by spyware.
Pop-up ads are those small windows containing advertisements that literally pop up during your Internet sessions. In some cases, closing the window results in the repeated opening of one or more advertisement boxes. These boxes often are generated when you are surfing a commercial site, but they can also be launched by spyware. As a rule, these windows are perfectly harmless. However, most Web users find them annoying because they hamper their Web sessions. It is possible to reduce and even to eliminate these pop-up ads.
Cookies are generally harmless pieces of information generated by a Web server and stored in the requesting user's computer. Cookies are stored to speed future access to the site making use of user-specific information transmitted to the Web to personalize a user's Web page. The storage and access of the cookies by servers are automatic and therefore generally unnoticed whenever a user requests a Web page. The information contained in a cookie is text containing the user's preferences. The cookies are generally stored in a cookie folder by the browser so that they can be called up by the Web server whenever the user returns to the site. Cookies are not a danger to your computer, they are information your Web browser uses to access Web sites. Cookies may, however, pose a threat to your privacy as they store your preferences and are accessible by all Web servers.
|
|||||||||||||||||||||||||||||
|