IP, Anyone?

Just as your street address is a pointer to you for the rest of the world, so is your Internet Protocol (IP) address. It is your identifier so that traffic can “find” you on the Internet. Without a way of finding you on the Internet, you would not be able to receive e-mail or set up a home network. But, there is always a trade-off between usability and security in the online environment. Yes, if the world can find your Internet presence, they can attempt to gain information about you or hack into your computer systems. However, without a place in the online world, you'd be secure, but you wouldn't be able to perform many valuable functions.

As was mentioned in earlier chapters, home users have the ability to set up their own domain names and home networks and become miniature e-commerce sites. Within 5 minutes, we were able to register our book's Web site domain name, www.privacydefended.com, for a $70, two-year registration fee. The Domain Name System (DNS) consists of a directory, organized hierarchically, of all the domain names and their corresponding computers registered to particular companies and persons using the Internet. When you register a domain name, it is associated with the computer on the Internet you designate. We own this domain name and have set up our Web site and mail server. After you have your domain registered and set up, you can add machines to your network; for example, we could add mail.privacydefended.com or ftpserver.privacydefended.com. But, by setting up and registering your domain, you are required to give up information about yourself. The disadvantage is that this information is then made public to the rest of the world.

Anonymity becomes harder to maintain with each new function you use in the online environment. If you connect more than one system or set up a mini-network, you are making available more targets that can be attacked and hacked. When using services such as free e-mail or signing up for game sites and contests, you are making personal information available. Any Web site you use can potentially capture your browsing preferences and search requests. Without securing your system and using applications that can hide your identity, you are injecting personal information into the online world that will never go away. Data mining on the Internet is a full-time job for many corporations.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset