Privacy in Computing

The conflict between personal privacy and company surveillance of e-mail communications and other computer activity was one of the most widely publicized computer-ethical controversies in the late 1990s and early 2000s. More on privacy Computer Ethics, Laws, Privacy Issues
Picture
The Computer Ethics Institute's Ten Commandments of Computer Ethics entreat computer users to treat each other with 'consideration and respect.'(Credit: Computer Ethics Institute)Read more: http://news.cnet.com/8301-13880_3-20018998-68.html#ixzz1Ec0LrkR4


The 9 Places, Where A Hacker Might Look To Know More About You

1. Index.dat File: The index.dat file functions as an active database, which runs as long as a user is logged on in Windows. It functions as a repository of redundant information, such as web URLs, search queries and recently opened files.

2. Temporary Internet files: It is a directory on Microsoft Windows computer systems. The directory is used by Internet Explorer and other web browsers to cache pages and other multimedia content, such as video and audio files, from websites visited by the user. This allows such websites to load more quickly the next time they are visited.

3. Web site cookies: Website Cookies are a small piece of text stored on a user’s computer by a web browser. A cookie consists of one or more name-value pairs containing bits of information such as user preferences, shopping cart contents, the identifier for a server-based session, or other data used by websites.

4. Browser History: The history in your browser is a useful feature. But it also tells a lot about you and your browsing habits.

5. Typed URL history: This features is used by most of the modern browsers to auto-complete or ‘guess’ the web site or page when you type the URL of a previously visited site. It add to the user convenience and make your web surfing a lot quicker. But it is privacy concern for your computer and a quick look at your Types URL History can tell a lot about your browsing habits.

6. Saved Passwords and AutoComplete Information: This is crucial. Most modern browsers allow you to save your passwords and private information through their AutoComplete feature. It saves a lot of time whenever you visit the website next time. As you do not have to remember your password and other information every time as it gets filled in the appropriate boxes automatically.

7. Recent Documents: Recent Documents feature of Windows gives you a quick access to the most recent documents you have used. it is nice features, but allows an unauthorized person also to quickly know, what you are upto.

8. Usage history of: Start/Run, Search: These things contain vital traces about how you use your computer and what are the things you usually do on your computer. These important bits pf private information is stored on your computer and you can tweak the windows registry keys to wipe them out.

9. Temporary Directories and Temporary Files: Windows temporary directory (Temp folders) stores Windows and other programs temporary files. This directory can contain files from programs you no longer have installed or files which may violate your privacy. If you know where these files are located in your computer, you can manually delete them through Windows Explorer. Otherwise there are lots of free tools available on Internet, which can do the job for you.

Reference:
http://thepcsecurity.com/computer-privacy-issues-search-private-data/

Privacy Quiz: http://www.quizrevolution.com/act137269/go/

Picture
Child Computer and Internet Safety
Disclaimer: This website is designed with material from different websites with the sole purpose of completing a class project on Mobile Learning. This is solely used for EDCT 793M class project. If you have questions any questions regarding this website please contact us at cipher1029@gmail.com or reuben.dlamini@gmail.com Once the project is complete the website will be accessed by log-in information.