background preloader

Six Tips to Protect Your Search Privacy

Six Tips to Protect Your Search Privacy
By Peter Eckersley, Seth Schoen, Kevin Bankston, and Derek Slater. Google, MSN Search, Yahoo!, AOL, and most other search engines collect and store records of your search queries. Recent events highlight the danger that search logs pose. Disclosures like AOL's are not the only threats to your privacy. Search companies should limit data retention and make their logging practices more transparent to the public,4 while Congress ought to clarify and strengthen privacy protections for search data. The Electronic Frontier Foundation has developed the following search privacy tips. 1. Don't search for your name, address, credit card number, social security number, or other personal information. If you want to do a "vanity search" for your own name5 (and who isn't a little vain these days?) 2. Because your ISP knows who you are, it will be able to link your identity to your searches. 3. Search engines sometimes give you the opportunity to create a personal account and login. 4. 5. 6. Conclusion Related:  PRIVACY

The Future of Reputation View Professor Solove speaking about The Future of Reputation at Google, Inc. (Mountainview, CA) on YouTube: Click here to view the video on YouTube in a larger size. Professor Solove also spoke about The Future of Reputation at Google, Inc.'s New York City office. CSPAN -- The Communicators, Interview with Daniel Solove (Feb. 2, 2008) (watch on YouTube) January 2009: Italian Translation published. October 2008: A paperback edition of The Future of Reputation is now available. September 2008: Korean translation published. The following are interviews and stories mentioning the book. Newsweek -- Jessica Bennett, At Long Last, A Small Justice (Feb. 5, 2010) Il Recensore (Italy) -- Marianna Del Curto, "No Privacy" in Internet? Chronicle of Higher Education -- Jeffrey Young, They're Back, and They're Bad: Campus-Wide Gossip Websites (August 31, 2009) CNN -- John Sutter, The Coming-Out Stories of Anonymous Bloggers (August 21, 2009) Boston Globe -- Drake Bennett, Time For a Muzzle (Feb. 15, 2009)

5 free Android security apps: Keep your smartphone safe Review By Eric Geier February 21, 2012 06:00 AM ET Computerworld - There's been much controversy over mobile OS security, especially where Android is concerned. Its openness fuels adoption by smartphone manufacturers and wireless carriers, aids in mobile innovation, and helps bring more free apps. Android malware growth Depending on where you go, you'll find varying stats on the amount of Android malware we've seen thus far. One thing they all agree on is that the amount of malware targeting Android has been growing. But the vendors don't always agree. Meanwhile, Google has reported a 40% decrease in the number of potentially malicious downloads from the Android Market from the first to the second half of 2011. In addition, Google recently announced an internal malware scanner called Bouncer that scans apps submitted to the Android Market. Android malware in the wild However, all these varying statistics and countermeasures don't mean that there isn't bad stuff out there.

Scroogle, Privacy-First Search Engine, Shuts Down for Good Couldn't take the DDoS. By Adrianne Jeffries 2/21/12 8:52am Share this: (Gerard Paardekam via Virginia Mataix) Scroogle, the search engine operated by privacy militant and self-appointed Wikipedia watchdog Daniel Brandt, has folded for real. “These four domains had also been on the web for a long time — NameBase first went online in 1997, and before that had been available on telnet since 1995. “I no longer have any domains online,” Mr. Scroogle was a basic search engine that takes users to their Google results through a circuitous route that masks much of the data Google normally harvests. “Scroogle.org is gone forever,” Mr. The search engine had some die-hard fans. Scroogle.com, formerly a porn site and the cause of some embarrassing NSFW confusion, has also gone off the air. Follow Adrianne Jeffries on Twitter or via RSS. ajeffries@observer.com Tags: Deadpool, daniel brandt, scroogle by Taboolaby Taboola Sponsored ContentSponsored Content Promoted ContentPromoted Content Money Morning Undo

21 Ways to Buff Up Your Browser | PCWorld - StumbleUpon Whether you are at home, work, or school, odds are you spend a lot of time staring at your Web brows­­er. So why does it look—and run—like everyone else’s? This collection of our favorite browser secrets and extensions can make your browser safer and more efficient than ever—and help you figure out what’s wrong when things don’t work as you expect. Unless stated otherwise, our tips are for all of the four major browsers: Chrome, Firefox, Internet Explorer, and Safari. Editor's note: For an in-depth comparison of the latest versions of six browsers for PCs--Opera and RockMelt as well as the four covered by our tips here--see "Which Browser Should You Use?" Use These Essential Tips and Extensions 1. If you think auto-updating has been disabled, here’s how to reenable it: For Internet Explorer, go to Control Panel, Windows Update, Change settings, and set the drop-down menu to Install updates automatically. 2. 3. 4. 5. 6. 7. Lock Down Your Browser 8. 9. 10.

Q&A: Google Privacy Facts and Tips SAN FRANCISCO — If you're amazed — and maybe even a little alarmed — about how much Google seems to know about you, brace yourself. Beginning Thursday, Google will operate under a streamlined privacy policy that enables the Internet's most powerful company to dig even deeper into the lives of its more than 1 billion users. Google says the changes will make it easier for consumers to understand how it collects personal information, and allow the company to create more helpful and compelling services. Critics, including most of the country's state attorneys general and a top regulator in Europe, argue that Google is trampling on people's privacy rights in its relentless drive to sell more ads. Related story: Clear your Google search history now Here's a look at some of the key issues to consider as Google tries to learn about you. Q: How will Google's privacy changes affect users? Q: Why is Google making these changes? Q: Are all Google services covered by the privacy policy? A: The U.S.

Veritate et Virtute: Online Safety: Let us be safe, at home, onl This is a continuation of the expansion on the daily tweets I shared via my Twitter account, @BurgessCT, during National CyberSecurity Awareness Month (#NCSAM - October 2009). If you’re reading this blog, you and your family are connected to the internet; your entrée to the internet is via a laptop, desktop PC, smart-phone, or other such devices and you have one, two maybe three separate service providers. Your connected devices allow you and your family the opportunity to literally bring the world to your doorstep. And we want the world to come to our door via the internet – as the internet brings to us knowledge, enhances our ability to communicate, provides us opportunities to share and collaborate with others and of course enables us to conduct commerce and be entertained. So let’s begin to close those virtual doors and keep out the uninvited. In closing, the online world enabled by the internet is wondrous place. Thank you for your time.

Secret GPS tracker terrifies Ontario man - Canada An Ontario man says he's angry and frightened after discovering someone hid a GPS tracking device under his vehicle, apparently to secretly monitor his movements. "I was doing just a regular inspection on my truck and I found this black box under my truck … with flashing lights inside," Ben Ferrill of Warsaw, Ont., told Go Public. "I didn’t know what it was. I didn’t know if it was a bomb. After making the discovery last fall he reported it the next morning to the Ontario Provincial Police. "I feel powerless. Ferrill said he and his wife haven’t been able to sleep properly since, because they are worried someone is watching them. "We spent lots of nights up until three in the morning crying and talking about it — not sleeping and looking out the windows and being suspicious of vehicles that drive by," Ferrill said. Ferrill’s lawyer, Ian Wilson, said it is illegal to put a tracking device on someone else’s vehicle without their knowledge or consent unless there is a search warrant. U.S.

Not just Google: Facebook also bypasses privacy settings in IE Update: Facebook has responded. Facebook to Microsoft: P3P is outdated, what else ya got? Following the news that Google is tricking Apple's Safari browser by including privacy-circumventing code in its ads, Microsoft is now saying that Google bypassed privacy settings in Internet Explorer as well. The story goes deeper than that. Google isn't the only company to blame here: Facebook is doing the same thing, as are tens of thousands of other companies, according to TechPolicy. Internet Explorer blocks third-party cookies that don't come with a special code – the Platform for Privacy Preferences Project (P3P) is a protocol allowing websites to declare their intended use of information they collect about browsing users. By default, IE blocks cookies that have PP3 compact policies (CPs) deemed unsatisfactory from a privacy perspective (such as collecting anything identifiable).

FreeMyPDF.com - Removes passwords from viewable PDFs - StumbleUpon Block Chinese and Korean IP Addresses From Apache Based Servers with .htaccess Blocklist Compiled by Wizcrafts Computer Services (see website links in footer) We publish additional .htaccess blocklists to block spammers, scammers, hackers and exploited servers. See our other .htaccess blocklists: Exploited Servers Blocklist | Nigerian Blocklist | Russian Blocklist | South American Blocklist These IP blocklists are also available in iptables format, for use in Linux based firewalls. If you are just trying to block scams and spam from your email inbox, read this section. Apache web servers use a special access control file named .htaccess, which uses a combination of directives to allow or deny access to files or folders on the server. If you are running an Apache Server based website or forum that is plagued by Chinese or Korean spammers, or exploiters, adding this DENY FROM list to your .htaccess file, in the web-root of your server, will block access to any person (or spam server) covered by a CIDR in this list. Important Notice! And now, a word from one of our sponsors:

NetFamilyNews Why Deep Packet Inspection Is(n’t) Being Talked About

Related:  effsearch