How Safe is it to be Online?
Sometimes it seems that you can never be safe on the Internet. You update your antivirus program, then read some story about the dangers of cookies or something. You download a ‘cookie crusher' utility, then find out about port scanning. And spyware. And all the scary things hackers can do too your system. It's amazing that anyone has the courage to go online at all.
Or at least it would be if all these things were actually true. Look more closely and you discover that many of these threats are exaggerations at best, and don't apply to most people. Learning to pick these out is very useful, because it enables you to concentrate on the real threats, and there are plenty of those.
Understanding which problems really are scary isn't the end of the matter, though - you need to know where to go for help. Unfortunately, there are plenty of sites with misleading security information, or others trying to sell you protection software based on promises that simply cannot be true. Picking fact from fiction can be difficult, so what should you do?
Networking Basics
All computers on the Internet have a unique IP address, represented by four numbers between 0 and 255 and separated by periods - for example, 217.46.129.21. When you enter a URL in your browser, it must be translated to an IP address before you can reach the site. It's not only big websites that have IP addresses, of course - you have one too. Whenever your browser requests a page from a website, it also tells that site what your IP address is, so the site can send the information back to you.
There's more to Internet identities than IP addresses. Let's take a web server as an example; as well as letting you view web pages, it might have FTP server software running so that you can browse for files to download. The same computer might even function as a mail server, sending and receiving messages. Information relating to any of these functions can arrive at any time - receiving a web page request right in the middle of being sent a large email, for example. So, how do you keep them organized?
The answer is ports (a port doesn't refer to a physical connection, like the serial port on your PC - it's purely a virtual thing). When your browser sends a command to a web server, it will use the default http port 80, while FTP commands go to port 21. On the server, each program is said to be ‘listening' to a particular port only, and will ignore commands from anywhere else.
Once again, this scheme applies just as much to the humble home based PC or Mac as a big web server. Both have these ports, and both may be giving out more information than you realize - unless you know how to close them down.
The Risks
Are you really at risk by other Internet computers using your IP address and ports? One measure of protection is provided by the way IP addresses are typically allocated. If you use a standard modem connection to dial up your ISP over a normal telephone line then you'll find most ISPs give you a different IP address every time you connect, making it very difficult for anyone to target you specifically.
On the other hand, anyone with an ‘always on' connection, perhaps via ADSL or a cable modem may have one IP address which stays the same (for a while anyway). And with the existence of programs called port scanners that can quickly check thousands of IP addresses for unsecured PCs, going online has to involve some level of risk, doesn't it?
Well, it depends on how your system is set up. Don't forget that while you can browse a web or FTP server freely; it's because that computer is running special software to make it possible, and PCs aren't set up this way by default.
Related Tags: software, internet, online, security, ip, safe, scanning, port, threats, address
Subscribe to Sandra Prior's Online Newsletter
and get up to date Computer Technology
News delivered right to your email box for free.
See website for details http://usacomputers.rr.nu and http://sacomputers.rr.nu.
Recent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each