Two of the pieces of computer jargon that often come up in the context of safe computing are Adware and Spyware. It is important to note that these are two separate items, but often contain overlap in terms of the risk they pose to the individual.
Adware is a piece of computer code that resides on your computer that is designed to display advertising to you. Adware can cause pop-ups, slow down your computer by increasing the number of programs running, and can generally be somewhat annoying. Adware is often bundled in with legitimate downloads.
Spyware is a piece of computer code that resides on your computer that monitors you. Spyware can collect information on your Internet browsing habits, including any information that you type into your computer while on the web (such as usernames and passwords). Spyware is generally seen as having greater potential harm to the individual than Adware. Spyware is commonly bundled with illegitimate downloads; it is often times seen in files found on file-sharing networks. To learn more about the risks that file-sharing has for safe computing and kids’ safety, watch Ari Schwartz on identifying Spyware Symptoms (Video in RealPlayer format)
Both Adware and Spyware are not good for safe computing. So how can you help protect yourself from Adware and Spyware? There are two ways. The first, preventative measures you can take to help keep your computer clean. Pre-ventative Tips:
• Know the symptoms of spyware: Before you can protect yourself from new spyware you have to make sure you do not currently have any on your computer. Learn more about spyware symptoms.
• Learn about examples of the most devious programs: The trickiest part of spyware is that there is not one clear-cut type. Knowing the many forms in which spyware may appear on your computer will help you remove or prevent it. View specific examples of spyware.
• Explore steps you can take to prevent spyware: Prevention is the key to a safe and secure computer. The tips to help you prevent spyware will also help keep viruses and hackers from taking advantage of your computer. Learn more about these prevention tips.
Secondly, there are many tools that will help you rid your computer of Spyware or Adware. You should know that each of the tool providers might define Spyware differently. You, the user, should be able to decide for yourself what you find annoying and want to uninstall or disable. GetNetWise offers a list of many different types of Spyware removal tools here: http://spotlight.getnetwise.org/spyware/tools/
Many parents respond affirmatively when asked in surveys whether they check up on where their children travel on the Internet. Research done by the Pew Internet & American Life Project indicates that 46% of parents monitor their child’s history (or “travels”) online. We suspect the vast majority of them likely monitor their children’s Internet usage by checking the History and Cache files within the Web browser that their child uses. At GetNetWise, we recommend that parents tell their children that they are keeping track of their online travels if they are doing so. Marian Merritt of Norton’s safety blog “Ask Marian” happens to agree. That conversation alone is a great opportunity to talk to your kids about online safety.
For younger children under 10 years old this is a moderately effective approach for parents to get a sense of the sites their kids are visiting. For instance, the browser History will show names and addresses of sites visited in recent days but very little detail about what the child did while there. Yet, this strategy has real limitations for older, savvier kids and teens.
Even though parents may make it a rule that children should not remove, alter, or delete browsing history, there are very simple workarounds to remove, alter, delete, or even never record a browsing history. One such work around is a simple function available in the Safari browser called “Private Browsing” that turns history recording off.
When Private Browsing is engaged the Web browser goes into stealth mode — no browsing history cookies or cache will be recorded. This feature can be switched on and off very easily, leading to a History and Cache that is incomplete. It is also relatively easy to altering a History to remove individual websites visited.
It is important for parents to keep these types of workarounds in mind when considering whether they are effectively keeping track of their kids’ footprints online. Children younger than eleven would seem less likely to “work-around” history, than teenaged users. It is vitally important that parents clearly define rules for appropriate browsing behavior and talk about Web safety with their kids. If you as a parent decide you want to monitor your child’s online used and are concerned that he or she is manipulating the browser’s history and cache files you may want to consider using a more a robust approach to keeping track of Internet usage. To supplement Internet usage monitoring, there are many monitoring tools available on the market [See GetNetWise Tools Database for a list]. Many of these tools help parents keep an active eye on a child’s footsteps through cyberspace.
The Internet often spawns its own language. Shorthand phrases like “LOL” (Laughing-Out-Loud) organically emerge as part of the Internet vernacular. Recently we’ve noticed a new, online shorthand phrase that is used to indicate that the content of the message or Web page is not appropriate because it is off-color at best or sexually explicit at worst. It is called “NSFW.”
Families and users should be on the look out for this phrase, which is actually an acronym that stands for “Not Safe For Work (NSFW).” This phrase is used as a “warning” about content. It is often used in the context in which a link, or piece of material is being categorized by someone as having qualities which may not make it suitable for a workplace environment. This can be because of language, sexual content, violence, or any number of other traits that may make it inappropriate. Of course, if it’s not safe for viewing in the workplace, it’s probably not safe to view in your home with children around.
You will most often see NSFW posted in email message subject lines, next to web link headers and on message boards. An example of how this might be seen on the Web follows: http://www.somepage.com/adultcontent.html (NSFW)
While this information may be typed out, sometimes it is additionally carried as computer code (“meta-data”) embedded within a link. Mozilla Firefox has a plug-in which allows you to avoid links tagged as being NSFW.
It is important to note that this is not a universal standard. It is up to the individual to “tag” content as NSFW. This means that the tag is entirely subjective; the tag is applied based on the perspective of the individual providing the link.
The lack of detail about the content of the link can be frustrating, but this tag may spawn widespread grassroots adoption. While traditional media is rated and tagged according to different trademarked ratings systems, there is no such assurance that trademarked systems will take root on the Net. In fact, according to sources from the tag’s Wikipedia entry, a trademark claim to NSFW was denied. Grassroots labels such as NSFW may become the new wave of ratings guides.
You face significant security risks online when you don’t regularly update your Web browser’s security patches. Using an un-patched browser can leave your computer open to exploits that range from becoming more vulnerable to ad-ware, spy-ware and viruses, to potentially leaving your entire computer vulnerable to being remotely accessed.
A recent Ars Technica news article indicated that a study conducted by Google, the Swiss Institute of Technology, and IBM found that up to 40% of Internet surfers are not using the most up-to-date version of their web browser.
Making sure that your web-browser is up to date is not as difficult as it used to be. Most browsers include a feature that allows the browser to check to see if it is the most current update. We recommend that you change your browser’s settings to automatically update its security software. Please view the new “How-To” video tutorials below to learn how to check to make sure you are using the most up to date version of your browser.
Cookies are small coded files that Web sites write onto your hard drive to keep track of the pages you’ve visited. They can only be read by the site that sent them to you, and they cannot search anything else on your computer. They also don’t give away your name or other personally identifiable information (PII). So, why are some people worried about cookies? Where you search and what you enter online can be very personal, sensitive information. If you’ve ever filled out a form or entered your name or password at the site, your personal information can be linked to your browsing habits there. So you’ll want to read the privacy policy of the Web site you’re visiting to see how cookies are handled.
At the same time, cookies can be useful tools. The “Google Privacy: A Look at Cookies” YouTube video provides some interesting information about how cookies can be useful. The Berkman Center at Harvard asked users to create their own YouTube videos to describe how cookies work and received some fairly decent descriptions. Many of the videos noted that much of the free content on the Internet is supported by cookie-enabled advertising.
It is important to note that not all cookies are the same. Some people have concerns about the different types of cookies that are out there. Let’s say that I’m browsing the homepage SomePortal.com, and the SomePortal.com allows the fictional Web site CookiePortal.com to place cookies on the browsers of visitors to SomePortal.com. This is type of cookie is a third party cookie. It is a cookie that does not originate from the webpage currently being browsed. Third party cookies are also used to facilitate the partnerships among websites. This can help websites to tailor content to the individual.
If you’d rather not have third parties tracking the Web pages you visit, you may want to consider blocking cookies from them. In a number of Web browsers, it is possible to change your privacy settings to block third-party cookies from being placed on your computer. The just-released Mozilla Firefox 3 browser now allows users to block third-party cookies (Note: Internet Explorer and Opera have allowed this for years) and there is a new video tutorial below. Check out the related video tutorials for blocking third-party cookies in IE and Opera if you use those browsers.
This summer social networking will be the primary way younger students stay in touch with friends. College-bound students will not only stay in touch but will use these sites to market themselves to potential new friends and roommates at their new school. GetNetWise reminds students again to be careful about what type of information they share about themselves and with whom. What you post online today may haunt you tomorrow.
GetNetWise hosts a number of How-To Video Tutorials illustrating the privacy settings offered on many popular social networking sites. Please click on one of the links below to find how to change your settings on your social network of choice.
With market share for Apple Macs climbing we get more and more questions about privacy and security settings for the Mac. A reporter recently asked how to password protect a Mac OSX computer. Click the start button below for a quick video tutorial (with audio) on password protecting your Mac. Follow the tutorial to password protect the computer. It also shows you how to have password access kick in after the machine goes to sleep or after the screen saver kicks in. Last night Erik Kennedy blogged “Mac users need to think about security, too” on ars technica with some great tips as well. If you have a Windows XP machine, we have a tutorial for you here.
Here are the text instructions:
1. Pull down the Apple Icon in the top left corner of the screen.
2. Select the System Preferences menu item.
3. After the window opens, select the Security button.
4. Check the box next to Require password to wake this computer from sleep or screensaver.
5. Next, below the heading For all accounts on this computer: check the box next to Disable automatic login.
6. Also, for good measure, check the box next to Require password to unlock each secure system preference.
7. Don’t forget to lock the padlock to prevent changes.