Advertisment

Privacy Under Attack!

author-image
DQC News Bureau
Updated On
New Update

According to Forrester Research figures, there are now 93 million

Internet-enabled computers and 407 million Internet users. It is expected that

by 2010, there would be 30 billion Internet-connected devices, including 663

million cars and 1.5 billion phones! (Source: IEEE Internet Computing)

Advertisment

It´s not difficult to imagine how important Internet-connected computers

would be in the near future. However, a computer connected to the Internet acts

as a double-edged sword. It can give you tremendous communication power and

place the largest collection of information in the world at your service. It can

also be a source of many problems in personal and professional life.

Targeting Internet users



Till now I had conveniently believed that hackers would be interested only

in big fish. Why would a hacker try to get into my computer system and steal

information? All that he would find in my system is some notes on marketing

strategies, some artworks for advertisements and brochures, content for my

clients´ web sites and of course the soft copies of the Channel Tech columns! I

am a negligible entity in this sea of 93 million Internet-enabled computers.

By using the IP

address a code can enable the software running on the server to pick

up some information from your system.

Advertisment

However, something recently happened to me that made me think again. When I

said that I am a negligible entity in the sea of 93 million computers, I

overlooked one important thing.

The same logic that made me look negligible makes me look very attractive.

Not to a hacker but to a marketing professional.

He thinks I am one of the 93 million strong group of potential customers for

a product that he is marketing.

Advertisment

I had reviewed the new trend of paid listings on search engines earlier in

these columns. This trend is picking up fast and there are many advertisers who

are taking advantage of this. In addition, paid pop-up advertisements on search

engines are also becoming popular.

How vulnerable are we?



While I was searching for some networking utilities on Google one day, a

pop-up advertisement came up in a new browser window. The advertisement

announced a new software product for protecting your online privacy.

As usual I closed the window, and to my surprise, another window opened, a

continuation of the earlier advertisement. It again talked about PC privacy, but

this time it gave me evidence of how online privacy can no longer be taken for

granted. It showed me the list of folders on my C drive!

Advertisment

The code that got downloaded into my browser when the advertisement window

opened was able to read the names of folders from my hard disk. Unbelievable?

Yes, even I wouldn´t like to believe this. Maybe I had fallen asleep for

sometime while working late and it was just a bad dream?

This is no bad dream at all. All this is possible and smart marketing

professionals would soon start building up profiles of Internet surfers and

target them with suitable products of their interests, which become very evident

from their surfing habits.

By using this IP address a code can enable the software

running on the server to pick up some information from your system–provided

some other necessary conditions are favorable for doing this.

Advertisment

Junk mail trauma



Techniques of extracting e-mail addresses from web pages have also become

very powerful. These web crawler applications run 24 hours a day and seven days

a week to extract millions of e-mail addresses. When they are able to build a

surfer´s profile and identify him with an e-mail ID, it will spell disaster for

the individual user.

Even now, millions of blind e-mail shots are flying

constantly in cyberspace. That is how you get so much of junk mail in your

mailbox. Advertising "profilers" can track your movements in

cyberspace and collect data on your shopping habits. All sorts of information

about you may be out on the Internet, ready for someone to use for his next

marketing campaign.

Another way of collecting information about you is a cookie.

A cookie is a small piece of information the site wants to store on your hard

drive. Sites can easily track what you do during one visit, but it gets more

complex when you go away and come back later. That’s where cookies prove very

useful.

Advertisment

Cookies allow sites to keep track of who you are even if you

haven’t visited that site for sometime. Most cookies simply make surfing more

convenient. However, when sites allow a different company, usually an

advertising service, to place its cookie on your computer from within their own

code and then use that cookie to track you from site to site, they can build a

profile of your surfing habits and use it to put targeted ads in front of you

when you are surfing.

Ensuring privacy



To protect yourself from the invasion of privacy, you can take a few

protective measures. Most involve a trade-off between convenience and privacy.

One way to keep away the profilers is to hide your browsing

habits from them. For this, some anonymous surfing service can be used. Dial-up

connection to your ISP assigns you a different IP address each time anyway.

Advertisment

Your next choice is to get wise about cookies. Current

versions of Microsoft Internet Explorer and Netscape Communicator have security

features that keep sites from obtaining your e-mail address or accessing your

files without your permission, and every browser offers you the ability to turn

off cookies. Turning off cookies is a good idea but not very practical. Because,

some e-commerce sites require cookies to keep track of what’s in your shopping

cart. If you turn cookies off, most browsers will beep at you repeatedly,

warning you that the site is trying to send a cookie and asking you to accept or

reject the cookie.

Another solution to get rid of aggressive advertisers is to

use utilities, which block not only cookies but also advertisements.

With these shareware utilities running, you see a box with a

plain text link in place of banner ads.

They can also block Java applets, Java-Scripts, and plug-ins,

which can create security problems. Of course, these are compromises and in

exchange for increased privacy, they bring in a reduction in convenience

features.

So happy browsing! And God save you from intruders.

Ashok Dongre

Advertisment