Information Technology Reference
In-Depth Information
Microsoft, Apple, and Linux) constantly monitor their products and
release periodic updates to resolve security risks and other errors.
Careful attention to these updates, with prompt installation of secu
rity updates, can help considerably in reducing risks, However, be
cause complex software almost always contains errors, and because
these errors might involve security, you take some risk that an out
sider could gain access to your computer whenever you attach it to
the Internet, either directly or through a modem or DSL link.
For wireless networks, risks can be higher—at least in some
common circumstances. In particular, Chapter 8 indicated that
wireless networks can work in two modes: either with or without a
password. Passwords, of course, control what other computers and
users can access the network, and thus directly control access to
your machine. However, directaccess connections without pass
words are in common use, and any computer connected to such a
wireless network may be open to snooping by outsiders. For exam
ple, recent folklore includes stories of people stopping on a street,
turning on their laptops, and immediately having full access to a lo
cal wireless network. Rarely do these tales discuss invasions of pri
vacy or malicious activities by the intruders, but the stories do sug
gest that wireless networks without password protection may
constitute a greater security risk than other networks.
Summary
When you work with a browser for the World Wide Web, you
typically begin by specifying an address or Uniform Resource
Locator (URL), and your browser uses this information to commu
nicate with a Web server that provides you with desired information.
Beyond URL information, however, this exchange between your
browser and the Web server also conveys data about your browser,
your machine, cookies, and the contents of forms and query strings.
Various methods are used to transmit this information, and many al
low limited privacy for your data. Ecommerce developers may uti
lize cookies, Web beacons, and Web bugs to help tabulate your be
havior on the Web, allowing them to promote their products, refine
their marketing, and adjust their interactions with you.
The use of a browser may not identify you individually, but de
velopers may be able to combine browser information with data
 
Search WWH ::




Custom Search