|
Post by Peterj on Sept 5, 2018 19:20:46 GMT
This is an important article to read!
Learn about the dark web, follow the advice at the end to protect yourself.
|
|
|
Post by Bailey on Sept 6, 2018 2:49:45 GMT
Personal security on my home computer is not the major concern for me. I have had it as tight as practical for a long time now and regularly monitor financial and other important accounts for irregularities. Luckily I haven't had any security incidences so far.
But coming from a web programming and database administration background I am very aware of how hackers can steal personal information while the information is in transit between your browser and the web server of the web site you are connected to and from the databases connected to and driving their web sites by hacking into company servers. Unfortunately we have no direct control over this.
When it comes to Internet security, this is a much bigger concern for me whenever I am asked to fill in an online form with my name, address, credit card details, date of birth etc.
Most reputable and large institutions will be very secure with your data but in the end, no-one can be expected to give an unconditional 100% guarantee that the data they hold in databases or other storage mediums cannot be stolen.
On the rare occasions I provide my personal details in an online form I first ensure the web page is using the https: protocol. The https: protocol (usually appearing in the url in the address bar of your browser and/or with a padlock icon next to the web address in the address bar) first encrypts all data before it is sent to the web site's server from your browser. The http protocol sends the data in plain text which can be intercepted and read by anyone who knows what they are doing.
So if you are ever asked to provide personal details in an online form and the web page you are connected to is not using https: I would strongly recommend not doing so. This doesn't mean the web page is necessarily created by scammers - it may or may not be. The web page could be legitimate but the creators just haven't bothered to secure it properly for some reason. But in any case I wouldn't send personal data across any http: connection.
As always, just some food for thought
|
|
|
Post by Sepiana on Sept 6, 2018 3:03:59 GMT
Pete, thanks so much for bringing this to the attention of our membership! Our members will undoubtedly benefit from this information, especially coming from someone with your professional background (a retired Internet Security Specialist). Keep up the good work!
|
|
|
Post by Peterj on Sept 6, 2018 4:03:31 GMT
Bailey what you posted as far as information related to the OP is correct, but falls far short of the 3 strong recommendations in the article.
Here's a summation in the form of an image for all.
|
|
|
Post by Bailey on Sept 6, 2018 6:08:49 GMT
Hi Peter, Bailey what you posted as far as information related to the OP is correct, but falls far short of the 3 strong recommendations in the article. I read the article just like anyone else who might be interested in the topic can do for themselves as well. For me personally, there wasn't anything really new in there. As I mentioned, I come from a web programming and database administration background so I have seen it all before. The intention of my post was to add and/or clarify information on Internet security (the subject of this thread) and it would have been a complete waste of my time to simply repeat what people interested in the topic can read for themselves. You chose to not elaborate/expand on the 3 recommendations (which, in my experience, are quite common btw) in your OP for whatever reason. I have stated my reasons for doing the same. I hope this clarifies my post
|
|
|
Post by hmca on Sept 6, 2018 14:07:19 GMT
Peterj and Bailey, both of you have given our readers good information to consider when using the internet. One should not be viewed as conflicting with the other. You are coming from different backgrounds and both have presented useful information.
|
|
|
Post by Peterj on Sept 7, 2018 0:09:43 GMT
When posting on a broad range subject such as the OP I choose not to insert my personal habits. Just like the saying "give a man a fish ....."I choose a different path as I'd rather provide information so folks can be educated and make up their own minds. Internet security & safety is such a broad topic there's no one size to fit all situations; and achieving a safe computing environment for oneself is certainly not a destination but rather an ongoing journey. Once an individual has established what they consider adequate for their situation periodic updates etc are required.
I want to raise awareness and will gladly help when asked. The two ends of the security/safety scale are both extreme and totally useless.
1) You may have heard that the only totally safe computer is the one in which there's not power plug [this was before the laptop invasion] or internet connection - certainly the computer would be secure and 100% useless.
2) The opposite end of the scale - bios level password to power on; passwords or pass phrases so complicated that they must be written down; screen savers kick in after 45 seconds inactivity and a new password is required to be entered; VPN for all internet transactions, or the use of TOR; passwords to launch each application; total disk encryption; operate only in a skiff ... and the list goes on - most folks would not use a computer that necessitated such stringent measures.
There's a goldilocks solution for most everyone and they're all a bit different. Here are some other trusted links
|
|