Daily Archives: March 2, 2018
By Lon Maxwell, Reference Department
Being a ninja is synonymous with stealth. This lesson is all about online stealth.
In the last year or two, internet privacy has been in the news. Sites from credit report companies to the emails of our presidential candidates have been hit with online attacks. Our local governments and schools are regularly accosted for personal information. What can we do to protect ourselves? The average person is not going to receive the same volume of scrutiny from hackers as, for example, a candidate for senate, but you still want to make sure that you are protecting yourself as much as you can. Browsing the internet in the most private manner possible is a good start. Now I’m not talking about taking your laptop into the broom closet, I’m specifically referring to the way you surf the net.
Virus protection and firewalls
This may seem like a basic bit of information, but you’d be amazed at how many people need to hear it. ALWAYS use your virus check software. NEVER turn off your firewall. Antivirus software keeps incoming cyber-attacks from disrupting your computers functioning. Without it you could be giving people access to anything from your browser history to your credit card information and even every key stroke you make. It is the active defense system for your computer. The firewall is the passive defense. Just as a real firewall keeps blazes from reaching parts of a building and burning through property, a computer firewall keeps people on the outside from getting into your info and burning through your bank account.
Your Browser’s Privacy Feature
Almost every browser out there, for mobile or desktop devices, has a privacy feature. It may be called something else, but if you look you should be able to find it fairly easily. While this is not the same as going online incognito, it does offer a certain amount of protection. Here are the basics for the most common browsers:
- Internet Explorer: Here you’re looking for the In Private Browsing feature. It’s under the tools menu in the drop downs on the menu bar, or you can access it by hitting Control + Shift + p. InPrivate Browsing keeps your computer from storing information like cookies, temporary Internet files, and history.
- Firefox: In Firefox You can access the private browsing mode by clicking the hamburger button and then choosing the private icon that resembles a carnival mask. You can also use the same hot key combination as internet explorer. The Major difference with the Firefox protection is that it keeps sites from trying to track where you’ve been.
- Chrome: From the more menu click new incognito window. Chrome refers to their privacy mode as incognito mode. It opens in a separate window so there is no mistake about whether it is on or not. Incognito mode does not save your browser history of cookies, but what you did can still be tracked by your network provider, be that your ISP, work or school.
- Safari: When you open a new private browsing window from the file menu in the pull down bar of Safari, you are getting a fairly similar private browsing experience to the Chrome user. This hides your history from the people who use your computer but not from the provider of your internet service.
TOR Browsers and VPNs
For true internet privacy you need to be using a Virtual Private network (VPN), the TOR browser, or both. VPNs are a special private network used while on a public network. It allows communication from one source to another in a secure private manner. While private browsing features keep your computer from picking up information about what you do online, the TOR browser keeps everyone else from seeing it. This gives you the freedom to be online without leaving your IP footprints everywhere you go. Even using these in tandem, however, is not foolproof. Always make sure that you give out as little personal information as possible when going online.
The Throw Away Email
One final tool is the throw away email. This is an email you can set up with a company like gmail that allows you to create an email that does not have any of your actual personal information attached to it. With an email like this you can still sign up for those contests and newsletters that may pique your interests but might be a tool for spammers to get your information. The important part is making sure that when you set up the email you are using a service that does not ask for name, address or phone number. There are even services that will set you up with a temporary email, such as guerrilla mail.
The internet can make your everyday life great deal easier, but it can also make it easier for spammers and scammers to make your life miserable as well. Protect yourself according to your needs and never give them more information that you want them to have. Remember, the first weapon of the internet ninja is stealth.