Computers, How Safe is it to be Online?
Or at least it would be if all these things were actually true. Look more closely and you discover that many of these threats are exaggerations at best, and don't apply to most people. Learning to pick these out is very useful, because it enables you to concentrate on the real threats, and there are plenty of those.
Understanding which problems really are scary isn't the end of the matter, though - you need to know where to go for help. Unfortunately, there are plenty of sites with misleading security information, or others trying to sell you protection software based on promises that simply cannot be true. Picking fact from fiction can be difficult, so what should you do?
Networking Basics
All computers on the Internet have a unique IP address, represented by four numbers between 0 and 255 and separated by periods - for example, 217.46.129.21. When you enter a URL in your browser, it must be translated to an IP address before you can reach the site. It's not only big websites that have IP addresses, of course - you have one too. Whenever your browser requests a page from a website, it also tells that site what your IP address is, so the site can send the information back to you.
There's more to Internet identities than IP addresses. Let's take a web server as an example; as well as letting you view web pages, it might have FTP server software running so that you can browse for files to download. The same computer might even function as a mail server, sending and receiving messages. Information relating to any of these functions can arrive at any time - receiving a web page request right in the middle of being sent a large email, for example. So, how do you keep them organized?
The answer is ports (a port doesn't refer to a physical connection, like the serial port on your PC - it's purely a virtual thing). When your browser sends a command to a web server, it will use the default http port 80, while FTP commands go to port 21. On the server, each program is said to be ‘listening' to a particular port only, and will ignore commands from anywhere else.
Once again, this scheme applies just as much to the humble home based PC or Mac as a big web server. Both have these ports, and both may be giving out more information than you realize - unless you know how to close them down.
The Risks
Are you really at risk by other Internet computers using your IP address and ports? One measure of protection is provided by the way IP addresses are typically allocated. If you use a standard modem connection to dial up your ISP over a normal telephone line then you'll find most ISPs give you a different IP address every time you connect, making it very difficult for anyone to target you specifically.
On the other hand, anyone with an ‘always on' connection, perhaps via ADSL or a cable modem may have one IP address which stays the same (for a while anyway). And with the existence of programs called port scanners that can quickly check thousands of IP addresses for unsecured PCs, going online has to involve some level of risk, doesn't it?
Well, it depends on how your system is set up. Don't forget that while you can browse a web or FTP server freely; it's because that computer is running special software to make it possible, and PCs aren't set up this way by default.
Subscribe to Sandra Prior's Online Newsletter and get up to date Computer Technology News delivered right to your email box for free. See website for details http://usacomputers.rr.nu and http://sacomputers.rr.nu.
Related Tags: software, internet, online, security, ip, safe, scanning, port, threats, address
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Radio Controllers - Knowing The Basics
Radio controlled models are different in design and structure, but at their core are the same radio - The Fourth Decade Of Modern Stereology 1991-2001
Modern stereology introduced an entirely new set of rules for quantification of biological objects i - Science & Technology Articles - How to buy Wireless IP security cameras
Due to the increasing need for surveillance devices, camera's production become more increasingly. I - Science & Technology Articles - Sony Ericsson Hottest Phones
One of the best phones created by Sony Ericsson, is the G502 phone. Sony has established that phones - Entertainment Articles - It's What Is Behind The Scenes That Make Your Movie Viewing Pleasurable
Is there anything that can make or break your entertainment system at home and is something that no - Current Affairs Articles - 2012 Facts
Making sense How can we make sense of this? Each different theory or combination of theories will m - Science & Technology Articles - High-density PCIe Telephony Cards from Telesoft Technologies
With well over two decades of experience in the networking and media fields, Telesoft Technologies i - Science & Technology Articles - IVR Servers from Telesoft Technologies
The interactive voice response server (IVR Server) solution is perhaps one of the most important rec - Education Articles - Old Teachers Learning New Technological Tricks
As technology and teaching methods have progressed, many classrooms have found themselves brighten - Business Articles - A Guide To Streamlining Office Technology
Any modern office will likely have the following core contents: desks, chairs, networked computers
Most viewed articles in this category:
- The Bat in Bible and Quran
One of the inherited doctrines of mankind is that the Quran is quoted or borrowed from the Bible.The - The Rabbit in Bible and Quran
The Bible says that the Rabbit is a ruminant animal while the sciences say that the Rabbit is not a - The Semen in Bible and Quran
One of the expanded dogmas of mankind is that the Quran is quoted or borrowed from the Bible. This c - The Iron in Bible and Quran
Before dealing with the topic of the Iron in Quran versus Bible versus sciences, it is essential to - More and More, Scientists Recognize That Foods Can Heal
Folk remedies that used to be written off as old wives' tales are now being acknowledged by scientis - Streamlining the Management of Print Spooler Output in an Oracle Applications Environment
The customer associated with this case study is a large, multi-national manufacturer of product - Manapol: Why Should I Use It?
Manapol® Why Should I Use It? "Upon entry to the cells, mannans can activate the ma - The Sleep in Bible and Quran
Before dealing with the topic of the Fly in Quran versus Bible versus sciences, it is essential to r - What Types of Sharks Lived Millions of Years Ago?
The first cartilaginous sharks appeared 370 millions years ago. Their size, their appearance and the - How are Cinematography and Memorabilia Related to Sharks?
Sharks have influenced both cinematography and its memorabilia through the years. From Jaws the movi