web design
web design
web design
web design
web design
web design
web design
web design
Web design
web designing submitting propagating
 
Web designing
design
Do We Need Anonymity For Surfing Like The Laws For Phone Tapping?
The recent phone tapping issue not only closed UK’s paper, News of the World, and left its innocent workers at disarray, but it also incited a clash between the border disregarding merchants (Rupert Murdoch's empire) and the border defending politicians. Almost reminding one of Clash of civilizations, a Hindu could easily see a clash between Kchhetrias and Vaisyas. Although the paper died, after the clash, BSkyB suddenly survived. Although exposure through phone tapping has grabbed headlines in the surviving papers, ‘human nakedness’ during surfing the Net has never grabbed much. The biggest lie, ‘Surfing the Net in private’, still mimics Gospel truth. Although we cherish our privacy and the explosion of the Net and concepts emerging from it have partly come through the privacy that it offers us, it is essentially ‘pseudo privacy.' In fact, it is almost reminiscent of replacing God. Big Brother sees all that we do in that ‘private’ moment. Suddenly we have never been so much exposed in our entire history, even when primitive tribes are included - as a dismayed Pakistan has come to know. This Big Brother has octopus like tentacles: 1. The visited websites and their cookies 2. The Internet service provider 3. The Hackers 4. PC repairer or buyer. lthough our credit card details are secure, our IP addresses (the place from where you are surfing), personal emails, visited pages, the details in the filled forms, buying details, and the stuff downloaded in our PCs are all ‘captured.' Unprotected data transfer is a feast for hackers. Although downloaded data preserved in our PCs helps in catching law breakers, beyond exposing our hypocrisy, they damage us in more ways than one. Although these make us look so vulnerable, it is not that safeguarding factors aren’t available. 1.Proxy address use: In this method, surfers use proxy IP address instead of their own IPs. The visited site sees the proxy IP’s location and easily gets fooled. 2. Anonymous search: Although search engines keep our search data (that is how you get previously searched keywords in their pages), http://www.ixquick.com uniquely deletes data after 48 hours. 3. Encrypted data transfer: While use of a wired modem is safer than a wireless one, unprotected data from the latter is extremely dangerous - more so when bank transactions are done. While username and password protects data from routine offenders, a tunneled data transfer through the Net avoids prying eyes of both ISPs and hackers. Encryption of data offers the better protection. Credit cards use 28 bit encrypted data transfer and even a 3D system for added security. 4 . Hybrid system: Being a big company and with multiple computers all over the world, TorProject combines multiple IP addresses with channelized data transfer. This isn’t good news for data capturing sites and hackers. Although this travel through many computers makes downloading time long, the anonymity it provides has helped many journalists, scientists, politicians etc.
Articles on busines
Articles on S Asia
Articles on philosophy