Internet Safety
Cost of convenience, Internet safety, the network of networks and the wild wild west. Internet privacy risks: hacks, viruses, spyware, web bugs, internet cookies, and logging. We do not need to live in fear of computers and the Internet, but we need to be aware and use discretion. As information technology grows, people become more comfortable with it, and we depend more upon it. Yet we still need to use with caution. Remember, anything private that enters the Internet can become public.
An innocent misunderstanding of misinformation:
The overwhelming amount of new information makes it difficult to evaluate. A rumor can turn into popular disinformation and over time can become an accepted fact inaccurately when there are numerous internet citings. The question the information's credibility is a problem. Just because something is published on the internet does not make that "virtual something" a real fact.
Sometimes we place various minor pieces of personal info in public. But these multiple small portions of personal data could be combined to create privacy issues over time. Even deletion does not ensure that all unknown copies of data are really irretrievable. There is a difference between deactivation and deletion. Websites usually archive former members' data for a reactivation option, so first clear profile data before deleting account.
Like many things, as our society becomes older, it becomes more complex, most websites are relatively easy to "delete account", the popular networking site facebook is not that easy to permanently leave. This link gives some help.
http://www.wikihow.com/Permanently-Delete-a-Facebook-Account
and
http://www.groovypost.com/howto/security/permanently-delete-your-facebook-profile-account/
and
http://www.facebook.com/help/contact.php?show_form=delete_account
Junk mail is not the biggest problem:
Email attachments are a potential problem because of the original created features of email that can be used to gain access to your computer and destroy, implant, or steal information. The action of clicking on an attachment assumes consent and malware can enter your computer bypassing your virus and firewall programs. An email might have a link to a fake site that asks for your user name and password, which in turn can be used for identity theft and possible financial loss.
Report and send phishing emails to:
reportphishing @antiphishing.com
Click with caution:
Visiting blogs, websites, and home pages, involves interaction with not only the main host site, but also the individual webmaster, they have access to all information you create or share, including your IP address and browser details.
check ur ip and details:
http://www.hideyouripaddress.net/what_is_my_ip/
Some of the cheif variables=
REMOTE_ADDR: , REMOTE_HOST: , HTTP_X_FORWARDED_FOR: , HTTP_USER_AGENT: , FORWARDED: , VIA: , CLIENT_IP: , HTTP_FROM: .
No free proxy lunch:
Through the use of a proxy server, users can hide their IP address and browser details from the web. But remember due to the questionable goals for wanting to hide or be anonymous attracts users that have caused more attention to this practice. Some free proxies are provide by hackers. Another risk is that everything will pass through the proxy software and server and is usually unsecure. Also be aware that anthing can be logged by proxy administrators. All connections need to use an https proxy, SSH or SSL encryption between the proxy server, websites and computers. Tunnel proxies and VPNs can provides more security than the standard proxy anonymizers. High browser settings can disable scripting from ActiveX and Java for example. Email and some some group forums post details that can be avoided by web and socks proxies.
http://anonymouse.org/
Computer protection:
Avoiding malware is not enough, we will get it and must be prepared how to deal with it. Daily virus and firewall updates and scans are a necessary routine.
Make your pass-word a nopass-word:
Your password is just as important as your sensitive material.
A common password is "password1", the average password length is 8 made of characters and/or numbers that include names and/or dates. Most people have 5 passwords.
Passwords should be long and random, not short and simple. Don't become attached to a good password, changed it periodically and keep several. Password should consist of upper and lower alphabet and numbers and even symbols if allowed. If you don't like random password at least use a cryptic phrase that is misspelled, like "one fruit tea for you and me" which could be, 1fruitT4UandME, 1fruitT4U+me, oneFT4youNme.
Conclusion:
After all this, anything you put on the net might be archived, monitored, analyzed, or even become public. Also don't forget to backup your important electronic material and physically protect it.
Free patch and no catch?
The price of freebies. Using cracks, patches, pirate registration codes or serial numbers, key generators and other hacks, from file sharing websites, are loaded with risk of infecting your computer with viruses, spyware, worms, Trojans, dialers and adware, that can also propagate through the network and at the very least slowing down your computer.
An email, phone call, or bank letter, states you owe money, but you know that you don't:
If anyone calls you or you get a letter or email from a bank and they give you a telephone number to call them back, don't do it! Because they will ask your personal information to verify to them who you are, and that could be used in the future for fraud if they are not really who they say they are, look up the number from the official website of the bank and call them.
Lists the top 500 common passwords, not considering character case. Some are offensive words.
An innocent misunderstanding of misinformation:
The overwhelming amount of new information makes it difficult to evaluate. A rumor can turn into popular disinformation and over time can become an accepted fact inaccurately when there are numerous internet citings. The question the information's credibility is a problem. Just because something is published on the internet does not make that "virtual something" a real fact.
Sometimes we place various minor pieces of personal info in public. But these multiple small portions of personal data could be combined to create privacy issues over time. Even deletion does not ensure that all unknown copies of data are really irretrievable. There is a difference between deactivation and deletion. Websites usually archive former members' data for a reactivation option, so first clear profile data before deleting account.
Like many things, as our society becomes older, it becomes more complex, most websites are relatively easy to "delete account", the popular networking site facebook is not that easy to permanently leave. This link gives some help.
http://www.wikihow.com/Permanently-Delete-a-Facebook-Account
and
http://www.groovypost.com/howto/security/permanently-delete-your-facebook-profile-account/
and
http://www.facebook.com/help/contact.php?show_form=delete_account
Junk mail is not the biggest problem:
Email attachments are a potential problem because of the original created features of email that can be used to gain access to your computer and destroy, implant, or steal information. The action of clicking on an attachment assumes consent and malware can enter your computer bypassing your virus and firewall programs. An email might have a link to a fake site that asks for your user name and password, which in turn can be used for identity theft and possible financial loss.
Report and send phishing emails to:
reportphishing @antiphishing.com
Click with caution:
Visiting blogs, websites, and home pages, involves interaction with not only the main host site, but also the individual webmaster, they have access to all information you create or share, including your IP address and browser details.
check ur ip and details:
http://www.hideyouripaddress.net/what_is_my_ip/
Some of the cheif variables=
REMOTE_ADDR: , REMOTE_HOST: , HTTP_X_FORWARDED_FOR: , HTTP_USER_AGENT: , FORWARDED: , VIA: , CLIENT_IP: , HTTP_FROM: .
No free proxy lunch:
Through the use of a proxy server, users can hide their IP address and browser details from the web. But remember due to the questionable goals for wanting to hide or be anonymous attracts users that have caused more attention to this practice. Some free proxies are provide by hackers. Another risk is that everything will pass through the proxy software and server and is usually unsecure. Also be aware that anthing can be logged by proxy administrators. All connections need to use an https proxy, SSH or SSL encryption between the proxy server, websites and computers. Tunnel proxies and VPNs can provides more security than the standard proxy anonymizers. High browser settings can disable scripting from ActiveX and Java for example. Email and some some group forums post details that can be avoided by web and socks proxies.
http://anonymouse.org/
Computer protection:
Avoiding malware is not enough, we will get it and must be prepared how to deal with it. Daily virus and firewall updates and scans are a necessary routine.
Make your pass-word a nopass-word:
Your password is just as important as your sensitive material.
A common password is "password1", the average password length is 8 made of characters and/or numbers that include names and/or dates. Most people have 5 passwords.
Passwords should be long and random, not short and simple. Don't become attached to a good password, changed it periodically and keep several. Password should consist of upper and lower alphabet and numbers and even symbols if allowed. If you don't like random password at least use a cryptic phrase that is misspelled, like "one fruit tea for you and me" which could be, 1fruitT4UandME, 1fruitT4U+me, oneFT4youNme.
Conclusion:
After all this, anything you put on the net might be archived, monitored, analyzed, or even become public. Also don't forget to backup your important electronic material and physically protect it.
Free patch and no catch?
The price of freebies. Using cracks, patches, pirate registration codes or serial numbers, key generators and other hacks, from file sharing websites, are loaded with risk of infecting your computer with viruses, spyware, worms, Trojans, dialers and adware, that can also propagate through the network and at the very least slowing down your computer.
An email, phone call, or bank letter, states you owe money, but you know that you don't:
If anyone calls you or you get a letter or email from a bank and they give you a telephone number to call them back, don't do it! Because they will ask your personal information to verify to them who you are, and that could be used in the future for fraud if they are not really who they say they are, look up the number from the official website of the bank and call them.
Lists the top 500 common passwords, not considering character case. Some are offensive words.
NO
|
Top 1-100
|
Top 101–200
|
Top 201–300
|
Top 301–400
|
Top 401–500
|
1
|
123456
|
porsche
|
firebird
|
prince
|
rosebud
|
2
|
password
|
guitar
|
butter
|
beach
|
jaguar
|
3
|
12345678
|
united
|
amateur
|
great
| |
4
|
1234
|
black
|
turtle
|
7777777
|
cool
|
5
|
pussy
|
diamond
|
steelers
|
muffin
|
cooper
|
6
|
12345
|
nascar
|
tiffany
|
redsox
|
1313
|
7
|
dragon
|
zxcvbn
|
star
|
scorpio
| |
8
|
qwerty
|
cameron
|
tomcat
|
testing
|
mountain
|
9
|
696969
|
654321
|
golf
| ||
10
|
mustang
|
computer
|
bond007
|
murphy
|
987654
|
11
|
letmein
|
amanda
|
bear
|
frank
| |
12
|
baseball
|
wizard
|
tiger
|
hannah
|
lauren
|
13
|
master
|
xxxxxxxx
|
doctor
|
dave
|
japan
|
14
|
michael
|
money
|
gateway
|
eagle1
|
naked
|
15
|
football
|
phoenix
|
gators
|
11111
|
squirt
|
16
|
shadow
|
mickey
|
angel
|
mother
|
stars
|
17
|
monkey
|
bailey
|
junior
|
nathan
|
apple
|
18
|
abc123
|
knight
|
thx1138
|
raiders
|
alexis
|
19
|
pass
|
iceman
|
porno
|
steve
|
aaaa
|
20
|
fuckme
|
tigers
|
badboy
|
forever
|
bonnie
|
21
|
6969
|
purple
|
debbie
|
angela
|
peaches
|
22
|
andrea
|
spider
|
viper
|
jasmine
| |
23
|
harley
|
horny
|
melissa
|
ou812
|
kevin
|
24
|
ranger
|
dakota
|
booger
|
jake
|
matt
|
25
|
iwantu
|
aaaaaa
|
1212
|
lovers
|
qwertyui
|
26
|
jennifer
|
player
|
flyers
|
suckit
|
danielle
|
27
|
hunter
|
sunshine
|
fish
|
gregory
|
beaver
|
28
|
fuck
|
morgan
|
porn
|
buddy
|
4321
|
29
|
2000
|
starwars
|
matrix
|
whatever
|
4128
|
30
|
test
|
boomer
|
teens
|
young
|
runner
|
31
|
batman
|
cowboys
|
scooby
|
nicholas
|
swimming
|
32
|
trustno1
|
edward
|
jason
|
lucky
|
dolphin
|
33
|
thomas
|
charles
|
walter
|
helpme
|
gordon
|
34
|
tigger
|
girls
|
cumshot
|
jackie
| |
35
|
robert
|
booboo
|
monica
|
stupid
| |
36
|
access
|
coffee
|
braves
|
midnight
|
shit
|
37
|
love
|
xxxxxx
|
yankee
|
college
|
saturn
|
38
|
buster
|
bulldog
|
lover
|
baby
|
gemini
|
39
|
1234567
|
ncc1701
|
barney
|
cunt
|
apples
|
40
|
soccer
|
rabbit
|
victor
|
brian
|
august
|
41
|
hockey
|
peanut
|
tucker
|
mark
|
3333
|
42
|
killer
|
john
|
princess
|
startrek
| |
43
|
george
|
johnny
|
mercedes
|
sierra
|
blazer
|
44
|
sexy
|
gandalf
|
5150
|
leather
|
cumming
|
45
|
andrew
|
spanky
|
doggie
|
232323
|
hunting
|
46
|
charlie
|
winter
|
zzzzzz
|
4444
|
kitty
|
47
|
superman
|
brandy
|
gunner
|
beavis
|
rainbow
|
48
|
asshole
|
compaq
|
horney
|
bigcock
|
112233
|
49
|
fuckyou
|
carlos
|
bubba
|
happy
|
arthur
|
50
|
tennis
|
2112
|
sophie
|
cream
| |
51
|
jessica
|
james
|
fred
|
ladies
|
calvin
|
52
|
panties
|
mike
|
johnson
|
naughty
|
shaved
|
53
|
pepper
|
xxxxx
|
giants
|
surfer
| |
54
|
1111
|
fender
|
tits
|
booty
|
samson
|
55
|
anthony
|
member
|
blonde
|
kelly
| |
56
|
william
|
blowme
|
boobs
|
fucked
|
paul
|
57
|
daniel
|
ferrari
|
donald
|
golden
|
mine
|
58
|
golfer
|
cookie
|
bigdaddy
|
0
|
king
|
59
|
summer
|
chicken
|
bronco
|
fire
|
racing
|
60
|
heather
|
maverick
|
penis
|
sandra
|
5555
|
61
|
hammer
|
voyager
|
pookie
|
eagle
| |
62
|
yankees
|
joseph
|
rangers
|
packers
|
hentai
|
63
|
joshua
|
diablo
|
birdie
|
einstein
|
newyork
|
64
|
maggie
|
sexsex
|
trouble
|
dolphins
|
little
|
65
|
biteme
|
hardcore
|
white
|
0
|
redwings
|
66
|
enter
|
666666
|
topgun
|
chevy
|
smith
|
67
|
ashley
|
willie
|
bigtits
|
winston
|
sticky
|
68
|
thunder
|
welcome
|
bitches
|
warrior
|
cocacola
|
69
|
cowboy
|
chris
|
green
|
sammy
|
animal
|
70
|
silver
|
panther
|
super
|
slut
|
broncos
|
71
|
richard
|
yamaha
|
qazwsx
|
8675309
|
private
|
72
|
fucker
|
justin
|
magic
|
zxcvbnm
|
skippy
|
73
|
orange
|
banana
|
lakers
|
nipples
|
marvin
|
74
|
merlin
|
driver
|
rachel
|
power
|
blondes
|
75
|
michelle
|
marine
|
slayer
|
victoria
|
enjoy
|
76
|
corvette
|
angels
|
scott
|
asdfgh
|
girl
|
77
|
bigdog
|
fishing
|
2222
|
vagina
|
apollo
|
78
|
cheese
|
david
|
asdf
|
parker
| |
79
|
matthew
|
maddog
|
video
|
travis
|
qwert
|
80
|
121212
|
hooters
|
hotdog
|
time
| |
81
|
patrick
|
7777
| |||
82
|
martin
|
butthead
|
marlboro
|
rock
|
women
|
83
|
freedom
|
dennis
|
srinivas
|
xxxx
|
voodoo
|
84
|
ginger
|
fucking
|
internet
|
extreme
|
magnum
|
85
|
blowjob
|
captain
|
action
|
redskins
|
juice
|
86
|
nicole
|
bigdick
|
carter
|
erotic
|
abgrtyu
|
87
|
sparky
|
chester
|
jasper
|
dirty
|
777777
|
88
|
yellow
|
smokey
|
monster
|
ford
|
dreams
|
89
|
camaro
|
xavier
|
teresa
|
freddy
|
maxwell
|
90
|
secret
|
steven
|
jeremy
|
arsenal
|
music
|
91
|
dick
|
viking
|
11111111
|
access14
|
rush2112
|
92
|
falcon
|
snoopy
|
bill
|
wolf
|
russia
|
93
|
taylor
|
blue
|
crystal
|
nipple
|
scorpion
|
94
|
111111
|
eagles
|
peter
|
iloveyou
|
rebecca
|
95
|
131313
|
winner
|
pussies
|
alex
|
tester
|
96
|
123123
|
samantha
|
cock
|
florida
|
mistress
|
97
|
bitch
|
house
|
beer
|
eric
|
phantom
|
98
|
hello
|
miller
|
rocket
|
legend
|
billy
|
99
|
scooter
|
flower
|
theman
|
movie
|
6666
|
100
|
please
|
jack
|
oliver
|
success
|
albert
|
Source: Perfect Passwords, Mark Burnett 2005