Over the last decade, internet privacy has being a hot topic. And also in many years to come, privacy online will continue to be a hot topic. The recent revelation by former CIA analyst Edward Snowden on how Government with the help of NSA is constantly snooping on our activities will add more controversy to this topic.
More of the confusion surrounding the issue of online privacy mostly arises from the fact that there is no general understanding as regards to what is private and what is not.
The Case of Google Street view
In 2007, Google added a new feature to its popular Google map product. The Street View works by posting real life images taken by Google satellite cameras at particular intervals and associating it with the current location on Google map. Privacy issues came up as these cameras caught pictures of men leaving strippers club, there are also pictures of men picking up prostitutes etc. Google was fined for these privacy breaches in some countries. At the end, Google has to blur these type of images in its Street view application to avoid further lawsuits.
Tuesday, February 24, 2015
Tuesday, February 17, 2015
Three most common mistakes of pC users
In this article, we are going to highlight three most common mistakes pc users make and how its going to affect the security of their PC.
1. User Account Password Settings
Most PC users fail to set password for their PC user account. The consequence of this is that anyone can access their file(private) by physically having access to the system. And most dangerously is the fact that anyone that access this computer can easily setup an admin account and lock the user out permanently from his/her PC.
Also most browsers allow the users to store their password in the browser and therefore such unauthorized user can easily can access passwords for various user accounts of the PC owner stored in the web browser.
Thursday, February 5, 2015
Privacy, How it was done in the olden days
Humans have developed several ways of hiding information from people they don't want access to such information. Such information can be religious, trade secrets etc. The Assyrians developed the Intaglio for protecting their trade secrets, the Egyptians developed Hieroglyphs as a way for the priests to communicate with the dead and writing down prayers, the Hebrews developed the ATBASH system, while the Greeks developed Wound Tape and unlocking key for hiding special information.
In this article, we are going to look into the Hieroglyphs and Atbash systems.
Subscribe to:
Posts (Atom)