<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1926563552124054268</atom:id><lastBuildDate>Fri, 01 Nov 2024 12:22:29 +0000</lastBuildDate><category>internet privacy</category><category>Facebook</category><category>internet</category><category>cookie</category><category>internet security</category><category>Google update</category><category>control internet privacy</category><category>track</category><category>trojan</category><category>Afghanistan</category><category>Censor</category><category>Court</category><category>FB</category><category>Freedom of Speech</category><category>Freshness</category><category>GPS</category><category>Google and internet privacy future</category><category>Google internet privacy</category><category>Google&#39;s New Privacy Policy</category><category>Google+</category><category>HTTP Sniffing</category><category>Indian</category><category>Manache</category><category>NATO</category><category>Privacy Policy</category><category>SEO</category><category>Safe Browsing</category><category>Session</category><category>Social Network</category><category>Social Networking</category><category>Suspicious Activity</category><category>Track Activity</category><category>Tzipora</category><category>We control Americans</category><category>ad blocking</category><category>algorithm</category><category>baltic sea</category><category>bittorrent</category><category>browsing history</category><category>bypass sophisticated tracking website</category><category>cache</category><category>ccleaner</category><category>cloud computing</category><category>curiousity</category><category>delete search history</category><category>disable cookies</category><category>discovery</category><category>do not track</category><category>do not track plus</category><category>firefox</category><category>fraud</category><category>get rich quick</category><category>hotmail</category><category>hotspot shield</category><category>how to be a millionaire</category><category>how to become a millionaire overnight</category><category>ignore internet privacy</category><category>news</category><category>online privacy</category><category>online spy</category><category>online tracking</category><category>plus</category><category>privacy</category><category>privacy leak</category><category>secure password</category><category>security</category><category>small business</category><category>smart phone</category><category>sophisticated</category><category>strong password</category><category>strong steps</category><category>toolbars</category><category>tracking website</category><category>turn javascript off</category><category>unexplainable</category><category>virus</category><category>web</category><category>web toolbars</category><category>website</category><category>what is internet security</category><category>white house</category><category>white house takes strong steps to control internet privacy</category><title>Internet Privacy Blog</title><description>Do not blame others for stealing your personal information on the Internet. Stay up to date and ready for any threats and potential privacy issues. This blog provides you with tools and techniques to Stay Safe and potentially save you from unintended privacy leaks. And well do not get worried once you see a News Alert Post. Current Affairs have my attention!</description><link>http://freewb.blogspot.com/</link><managingEditor>noreply@blogger.com (Free World)</managingEditor><generator>Blogger</generator><openSearch:totalResults>37</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-6418468051207247426</guid><pubDate>Thu, 12 Apr 2012 19:15:00 +0000</pubDate><atom:updated>2012-04-12T13:34:50.725-07:00</atom:updated><title>Are Facebook Privacy Disclosures Sufficient to Satisfy Users&#39; Concerns?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Facebook has been under intense criticism since last few months regarding privacy concerns all around the globe. Everyone is taking it quite seriously. And things are changing quite rapidly regarding company&#39;s control of user data and disclosure policies.&lt;br /&gt;
&lt;br /&gt;
There is a general sentiment about this social platform everywhere - people love it. But they have also started to get scared of it. Rightfully so! They have every reason to love it. And they have every reason to be afraid of it.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGbIAeMsZsg6x99jfW2gqkMcNA8OHtGpCsmLrDAwTXhCiJboKJV2OeaJpyqNIcWwqOZe1h7kVcfA-bLFO8pSzR-CZUvCmrPxOAKR8CSsSXLT1B6ci1cYaMPRtZl1dbjuJrwJBLnIuqZxt0/s1600/facebook-privacy-360.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGbIAeMsZsg6x99jfW2gqkMcNA8OHtGpCsmLrDAwTXhCiJboKJV2OeaJpyqNIcWwqOZe1h7kVcfA-bLFO8pSzR-CZUvCmrPxOAKR8CSsSXLT1B6ci1cYaMPRtZl1dbjuJrwJBLnIuqZxt0/s320/facebook-privacy-360.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Facebook Privacy: Image Courtesy of Mashable&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Facebook today resembles a friendly ghost!&lt;br /&gt;
&lt;br /&gt;
You know that it is your friend today. But you don&#39;t know when and how it will hurt you tomorrow. And you will not be able to do a single thing against a ghost who safeguards all your secrets and history.&lt;br /&gt;
&lt;br /&gt;
According to a recent New York times report,&lt;br /&gt;
&lt;br /&gt;
&quot;The archive Facebook published two years ago gave users a copy of their 
photos, posts, messages, list of friends and chat conversations. The new
 version, Facebook said, includes previous user names, friend requests 
and the Internet protocol addresses of the computers that users have 
logged in from. More categories of information will be made available in
 the future, Facebook said.&quot;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
So your ghost friend has been tracking you all the way along?What can you do when you have made a deal with the devil?&lt;br /&gt;
&lt;br /&gt;
“We welcome that Facebook users are now getting more access to their 
data, but Facebook is still not in line with the European Data 
Protection Law,” said Mr. Schrems, a student at the University of 
Vienna. “With the changes, Facebook will only offer access to 39 data 
categories, while it is holding at least 84 such data categories about 
every user.”        &lt;br /&gt;
&lt;br /&gt;
But there is a slight problem. I do not mind having a ghost friend traveling and tracking me. I only hate it lying to me.&lt;br /&gt;
&lt;br /&gt;
Here is another excerpt from the report:&lt;br /&gt;
&lt;br /&gt;
&quot;In 2011, Mr. Schrems (a student at German law student) requested his own data from Facebook and received 
files with information in 57 categories. The disclosure, Mr. Schrems 
said, showed that Facebook was keeping information he had previously 
deleted from the Web site, and was also storing information on his 
whereabouts, gleaned from his computer’s I.P. address.&quot;&lt;br /&gt;
&lt;br /&gt;
In the end, decision still remains yours. Either you keep dragging yourself with the dangers of being played by your ghost friend or you simply avoid it by saying Goodbye.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.nytimes.com/2012/04/13/technology/facebook-offers-more-disclosure-to-users.html?_r=1&quot; target=&quot;_blank&quot;&gt;Read more about the New York Times report on Facebook privacy&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/04/are-facebook-privacy-disclosures.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGbIAeMsZsg6x99jfW2gqkMcNA8OHtGpCsmLrDAwTXhCiJboKJV2OeaJpyqNIcWwqOZe1h7kVcfA-bLFO8pSzR-CZUvCmrPxOAKR8CSsSXLT1B6ci1cYaMPRtZl1dbjuJrwJBLnIuqZxt0/s72-c/facebook-privacy-360.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1494060349064012625</guid><pubDate>Sun, 18 Mar 2012 01:27:00 +0000</pubDate><atom:updated>2012-03-17T18:51:15.938-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet security</category><category domain="http://www.blogger.com/atom/ns#">what is internet security</category><title>What is Internet Security and Why it is Important for You to Know About it?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Internet security is a key phenomenon in modern day highly interlinked world. World&#39;s top organizations invest billions of dollars annually to protect their networks from malicious users and unauthorized access from around the globe. But with the increase of privacy issues with the advancements in today&#39;s internet, everyone, rather than techies need to have a basic knowledge about the concept so that you do not end up in loosing your personal information and important assets to someone you are not very much fond of.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhsZkJCW38FWbMf-vIto_I4PtsCU9x9rAg4rroUCF2o8aq_KhvFVQzUtQGQT3jcy5tJejb81Rg7whgQ8ylzI9rdbXqsFioi5eMFq1zGcOitCqaF_yJdKIRmJPXKy-XuTvZPkiMDReKJtv/s1600/internet-security-1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhsZkJCW38FWbMf-vIto_I4PtsCU9x9rAg4rroUCF2o8aq_KhvFVQzUtQGQT3jcy5tJejb81Rg7whgQ8ylzI9rdbXqsFioi5eMFq1zGcOitCqaF_yJdKIRmJPXKy-XuTvZPkiMDReKJtv/s1600/internet-security-1.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Internet Security&lt;/td&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
Wikipedia states as follows with reference to this concept:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Internet security&lt;/b&gt; is a branch of computer security&lt;sup class=&quot;reference&quot; id=&quot;cite_ref-0&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_security#cite_note-0&quot;&gt;&lt;/a&gt;&lt;/sup&gt; specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet.&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_security#cite_note-1&quot;&gt;&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Now, thinking about for a minute, you will understand the value of knowing a little bit about this phenomenon in your own general networked environment as you must would have heard about people loosing their hotmail accounts, facebook ids, twitter passwords to hackers&lt;i&gt;. &lt;/i&gt;Why? Simply because of their lack of knowledge of taking key steps of securing their computers or devices regarding internet usage. After all internet is the grand dady of all networks - a huge network of networks. And everyone else is in the network along with you. Therefore, you need to take steps to handle issues regarding your own safety.&lt;br /&gt;
&lt;br /&gt;
Read about very basic steps to how to break into a network through the following guide. You will find simple methods to hack into sessions and steal passwords (do not start impressing anyone as these tips are only of basic nature and include more information to increase your knowledge).&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://lifehacker.com/5853483/a-guide-to-sniffing-out-passwords-and-cookies-and-how-to-protect-yourself-against-it#&quot; target=&quot;_blank&quot;&gt;Internet Security and Your Own Privacy&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you are not actually interested in knowing in detail about the topic but want to know about the basic steps to tackle the problem, here is a simple set of tips:&lt;br /&gt;
&lt;br /&gt;
1- Make sure you use an updated antivirus software&lt;br /&gt;
2- There is nothing bad about using internet security suits.&lt;br /&gt;
3- Try to avoid browser toolbars&lt;br /&gt;
4- Malware removal tool should be a must as well&lt;br /&gt;
5- Never leave your sessions without logging out of any service&lt;br /&gt;
6- Wi-fis are dangerous. Make sure you password protect your networks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/what-is-internet-security-and-why-it-is.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHhsZkJCW38FWbMf-vIto_I4PtsCU9x9rAg4rroUCF2o8aq_KhvFVQzUtQGQT3jcy5tJejb81Rg7whgQ8ylzI9rdbXqsFioi5eMFq1zGcOitCqaF_yJdKIRmJPXKy-XuTvZPkiMDReKJtv/s72-c/internet-security-1.jpg" height="72" width="72"/><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1629866197410832649</guid><pubDate>Wed, 07 Mar 2012 01:12:00 +0000</pubDate><atom:updated>2012-03-06T18:36:29.653-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">online privacy</category><title>What is my definition of Internet Privacy?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Recent weeks have created huge spirals in the ocean of internet world regarding &lt;i&gt;internet privacy&lt;/i&gt;. Everyone has been talking about the issue and the way big giants collect and store user data in the online world.&lt;br /&gt;
&lt;br /&gt;
I recently stumbled upon the White House&#39;s new document regarding consumer privacy on internet and stopped upon reading that users had a right to “reasonable” limits on the personal data that companies collect and retain. I could not help myself on thinking about the unlimited possibilities originating from the word &quot;reasonable&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHP7eenO_qpX4AnFycTGsKSL-2dMuPX437tsePYpdyWm-195CRqXpOGu_nKT8dGqAMlZnWgs5eJLLpyWrs49WnpDp8fVCVv4oGDGGSXVgfBJl8ahRtUxTL_aQX8Ag6He2kLpy7NGeh9YdR/s1600/noir.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;244&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHP7eenO_qpX4AnFycTGsKSL-2dMuPX437tsePYpdyWm-195CRqXpOGu_nKT8dGqAMlZnWgs5eJLLpyWrs49WnpDp8fVCVv4oGDGGSXVgfBJl8ahRtUxTL_aQX8Ag6He2kLpy7NGeh9YdR/s320/noir.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;My Definition of Online Privacy. Image Courtesy of ZDNet.com&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For instance, it was reasonable if:&lt;br /&gt;
I was talking to a friend and no one was over hearing me.&lt;br /&gt;
I was in bed with my boyfriend and nobody was looking at me.&lt;br /&gt;
I was shopping and nobody was following me.&lt;br /&gt;
and much much more...&lt;br /&gt;
&lt;br /&gt;
On the other hand, when I thought of internet, I would treat my privacy intact if and only if I was able to share the information that I wanted to disclose. Rather, than being forced to accept an agreement upon browsing any website telling me that my personal information will be collected, retained, used and never sold to improve my online experience.&lt;br /&gt;
&lt;br /&gt;
It is my right to be asked before collecting any personal information from me regarding my location, interests and preferences and attempting to build my internet profile through collection of various browsing indicators originating from my source of usage. And if I do not want that information to be shared, I should be left alone. The way it genuinely happens in our everyday life. If I am not asked for that, that I consider as a breach of my privacy. &lt;br /&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_privacy&quot; target=&quot;_blank&quot;&gt;Click here to get Wikipedia&#39;s definition of Internet Privacy&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/what-is-my-definition-of-online-privacy.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHP7eenO_qpX4AnFycTGsKSL-2dMuPX437tsePYpdyWm-195CRqXpOGu_nKT8dGqAMlZnWgs5eJLLpyWrs49WnpDp8fVCVv4oGDGGSXVgfBJl8ahRtUxTL_aQX8Ag6He2kLpy7NGeh9YdR/s72-c/noir.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1972873168341254499</guid><pubDate>Tue, 06 Mar 2012 01:27:00 +0000</pubDate><atom:updated>2012-03-05T17:28:28.200-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">control internet privacy</category><category domain="http://www.blogger.com/atom/ns#">Google and internet privacy future</category><category domain="http://www.blogger.com/atom/ns#">Google internet privacy</category><category domain="http://www.blogger.com/atom/ns#">ignore internet privacy</category><title>Do You Expect Google to Ignore Internet Privacy in Future?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;How do you feel when the Chairman of the top internet company getting billions of user hits from across the world everyday talks about future and discusses his vision of telepresence, 1 Gbps internet, world peace, communication and skips internet privacy issue while addressing trade show attended by top industry professionals and leaders?&lt;br /&gt;
&lt;br /&gt;
Oops!&lt;br /&gt;
&lt;br /&gt;
Does a thing like this happen intentionally or did he miss out on the topic completely without knowing that his place of address had serious concerns about Google&#39;s privacy and data collection methods?&lt;br /&gt;
&lt;br /&gt;
While Google&#39;s policies were directly criticized by some of the leading speakers taking part in the trade show at Hanover, Germany, Shmidt, the Chairman of Google simply ignored others&#39; concerns over Google products and explained his vision of future technology without taking a defensive position on Google&#39;s privacy issues being raised in EU or Germany specifically.&lt;br /&gt;
&lt;br /&gt;
So my question is that do you expect Google to ignore internet privacy in the future to come? I am afraid that trends and the speed of the competition might drag the company that way. But let&#39;s hope not.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/do-you-expect-google-to-ignore-internet.html</link><author>noreply@blogger.com (Free World)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1290749026415087825</guid><pubDate>Tue, 06 Mar 2012 01:07:00 +0000</pubDate><atom:updated>2012-03-06T18:26:18.500-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">control internet privacy</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">strong steps</category><category domain="http://www.blogger.com/atom/ns#">white house</category><category domain="http://www.blogger.com/atom/ns#">white house takes strong steps to control internet privacy</category><title>White House takes Strong Steps to Control Internet Privacy</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Finally! It looks like White House is taking public concerns about internet privacy seriously and is eying towards taming down companies like Facebook, Google, Microsoft and other giants to keep ordinary people safe from their covert data collection techniques and taking benefits of users&#39; lack of choices on internet. &lt;br /&gt;
&lt;br /&gt;
The new proposal put forward by Obama administration enables FTC to deal with companies and implying &quot;direct enforcement authority&quot; to secure data privacy and consumer information.&lt;br /&gt;
&lt;br /&gt;
White House intends to have &quot;police power&quot; over internet companies and wants to implement an enforceable code of conduct, that these companies would have to comply with, otherwise facing litigation, or penalties, due to enhanced controls offered to FTC. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
FTC, currently operates with very less authority to tackle internet privacy issue.&lt;br /&gt;
&lt;br /&gt;
This proposal is informally being dubbed as &quot;Do Not Track&quot; measure. But according to some experts, it will still enable the advertisers to collect your personal information. However, they will not be able to use that personal information to serve you ads as they have been doing so since the mid 90s.&lt;br /&gt;
&lt;br /&gt;
However, future steps will let everyone know about the success of the measures taken by White House in order to control internet privacy issues prevailing currently in the market.&lt;br /&gt;
&lt;br /&gt;
We can only hope for the best and wish everyone pushing that proposal forward, luck with sincerity at the moment. But there is finally hope that our leaders have decided that its finally time that White House takes strong steps to control internet privacy right now or otherwise it will be too late to take any kind of action on that issue.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://techcrunch.com/2012/02/23/white-house-unveils-plans-for-consumer-privacy-bill-of-rights/&quot; target=&quot;_blank&quot;&gt;Read more about White House Steps to Control Internet Privacy at Tech Crunch&lt;/a&gt; &lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/white-house-takes-strong-steps-to.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-538029046336119901</guid><pubDate>Mon, 05 Mar 2012 02:46:00 +0000</pubDate><atom:updated>2012-03-04T18:49:02.740-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Google update</category><category domain="http://www.blogger.com/atom/ns#">Google&#39;s New Privacy Policy</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">Privacy Policy</category><title>Google&#39;s New Privacy Policy. What Happens Next?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Over the last month, all of us addicted to Gmail, Google Search, Google+ had been seeing those scary messages on top of our screens regarding Google&#39;s new privacy policy.&lt;br /&gt;
&lt;br /&gt;
On March 1, 2012, that new &quot;master&quot; policy took effect upon use of all the company&#39;s online products by the users worldwide.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ5XVyiFSTcpiz_UkdrweeG5GWswQu0h5gh3tpG2TQHEKLHXV7W_DjvfmBJrZfADBHEXH5W5d-eCpTGiPIj82LPzCtCGT0V02M44_zdBjG6wtnPUjSwvTUQf_znZPB4BmrSqnOqvnruqNe/s1600/google_logo2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ5XVyiFSTcpiz_UkdrweeG5GWswQu0h5gh3tpG2TQHEKLHXV7W_DjvfmBJrZfADBHEXH5W5d-eCpTGiPIj82LPzCtCGT0V02M44_zdBjG6wtnPUjSwvTUQf_znZPB4BmrSqnOqvnruqNe/s320/google_logo2.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Google&#39;s New Privacy Policy&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Upon quick glance, it looked like the new policy was more concentrated upon getting user data and streamlining it across all the products to maximize user experience.&lt;br /&gt;
&lt;br /&gt;
Primarily, as stated in the Google&#39;s official blog, the new policy emphasized upon data integration between Google search, YouTube and Docs.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;“So in the future, if you do frequent searches for Jamie Oliver, we  could recommend Jamie Oliver videos when you’re looking for recipes on  YouTube—or we might suggest ads for his cookbooks when you’re on other  Google properties,” &lt;/i&gt;blog mentioned.&lt;br /&gt;
&lt;br /&gt;
Which means Google will be using your searches to get you more relevant videos upon browsing YouTube in the future.&lt;br /&gt;
&lt;br /&gt;
While this technique mentions one of the many possible ways Google adopts to take benefit of global searches and user preferences, it also emphasizes upon the fact that company gathers search results and stores user preferences for its own uses, thus causing a privacy issue for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Announcement on March 1 also stated that if users were not comfortable with information sharing, they could simply turn it off through various options. But that would only stop cross-product data sharing, not the company from getting your preferences.&lt;br /&gt;
&lt;br /&gt;
Google will still be watching you!&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/googles-new-privacy-policy-what-happens.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ5XVyiFSTcpiz_UkdrweeG5GWswQu0h5gh3tpG2TQHEKLHXV7W_DjvfmBJrZfADBHEXH5W5d-eCpTGiPIj82LPzCtCGT0V02M44_zdBjG6wtnPUjSwvTUQf_znZPB4BmrSqnOqvnruqNe/s72-c/google_logo2.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-7397688745868805862</guid><pubDate>Sun, 04 Mar 2012 19:39:00 +0000</pubDate><atom:updated>2012-03-04T11:41:07.517-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">algorithm</category><category domain="http://www.blogger.com/atom/ns#">Freshness</category><category domain="http://www.blogger.com/atom/ns#">Google update</category><category domain="http://www.blogger.com/atom/ns#">SEO</category><title>Curiosity Alert: SEO Changes due to Google&#39;s Latest &quot;Freshness&quot; Update</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This is really off the topic but a new trouble for some of the people maintaining their blogs and sites on periodic basis. &lt;br /&gt;
&lt;br /&gt;
Not so recently, I noticed that this blog had lost its visibility in search results without me contributing much to it. I thought primarily that it was due to excessive ads displayed on the blog. So I removed all affiliate links to maintain the SEO visibility but still could not manage to improve the search rankings.&lt;br /&gt;
&lt;br /&gt;
Next thing I came to know was that Google had rolled out a fresh update called &quot;Freshness&quot; to increase the popularity of sites that contained more fresh content. Although it did not make sense to me but it had caused enough damage to my knowledge sharing efforts.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVf1aP9QzDyKRGeB0Xzy6GSwwXVcTS3p49yliQCin7Vk3n9661HodC4ULVjrprKjbgKOor3FD427AsXvxr1XAQTtRp0h28vxafSutbYmeOcjvg028zg0oRM7NfDw3KBbSDQMGLRj7ikmML/s1600/freshness-thumb3205327.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVf1aP9QzDyKRGeB0Xzy6GSwwXVcTS3p49yliQCin7Vk3n9661HodC4ULVjrprKjbgKOor3FD427AsXvxr1XAQTtRp0h28vxafSutbYmeOcjvg028zg0oRM7NfDw3KBbSDQMGLRj7ikmML/s320/freshness-thumb3205327.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&amp;nbsp;SEO and Freshness from Google&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tech Crunch stated as follows on the Freshness update:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;a href=&quot;http://techcrunch.com/2011/11/03/googles-new-algorithm-update-impacts-35-of-searches/&quot;&gt;&quot;Google’s most recent algorithm update&lt;/a&gt; was announced last week as an extension of &lt;a href=&quot;http://techcrunch.com/2010/06/08/google-caffeine/&quot;&gt;its previous “Caffeine” update&lt;/a&gt;.  The so-called “freshness update,” as it’s called, aims deliver more  current and relevant search results, specifically in areas where the  most recent content matters. This includes things like current events,  hot topics, reviews and breaking news items.&quot;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&amp;nbsp;&lt;/i&gt;This primarily means that niche sites that do not have much information to be updated on daily basis have lost their visibility in the Google&#39;s search rankings.&lt;br /&gt;
&lt;br /&gt;
So let&#39;s hope that Google does not boost search rankings for sites churning out garbage everyday and ignore quality sites for just the matter that they are not being updated on daily basis.&lt;br /&gt;
&lt;br /&gt;
Or least Google does some thing to boost Blogger.com rankings to keep bloggers motivated.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/curiosity-alert-seo-changes-due-to.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVf1aP9QzDyKRGeB0Xzy6GSwwXVcTS3p49yliQCin7Vk3n9661HodC4ULVjrprKjbgKOor3FD427AsXvxr1XAQTtRp0h28vxafSutbYmeOcjvg028zg0oRM7NfDw3KBbSDQMGLRj7ikmML/s72-c/freshness-thumb3205327.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-535326834397828735</guid><pubDate>Sat, 03 Mar 2012 22:58:00 +0000</pubDate><atom:updated>2012-03-03T14:58:13.069-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">GPS</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">privacy leak</category><category domain="http://www.blogger.com/atom/ns#">smart phone</category><category domain="http://www.blogger.com/atom/ns#">Social Network</category><title>Potential of Privacy Leak due to Social Networks on a Mobile Device</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Cell phones and wireless communication has evolved with light speed over the past few years. We have seen a shift of an era starting from Ericsson&#39;s giant walki talkies to Apple&#39;s iPhones. Cell phones and mobile devices today have changed from a mere communication devices used for simply calling your loved ones or communicating business deals to a medium used for sophisticated data transfer.&lt;br /&gt;
&lt;br /&gt;
However, this improvement in technology have brought an immense danger of privacy leak that can potentially happen due to a smart phone.&lt;br /&gt;
&lt;br /&gt;
Imagine, you are using Facebook or Twitter on your cell and your device also has GPS capabilities, which most of the devices have today. For some of you, who does not know what GPS stands for, it is a location tracking system which is called (Global Positioning System). Any GPS enabled device has the ability to send signals to another GPS device to communicate its exact location. I have already discussed the Facebook and Twitter tracking scenario in previous blog posts. What happens if Facebook or Twitter&#39;s mobile version has the ability to tap your exact location based upon your device&#39;s GPS signals? They would know where you are at a certain point of time. Won&#39;t they? Without you ever authorizing them to find you. Isn&#39;t it a privacy leak?&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTbZAAhICBRa9mLmFpNE81ZVKUc0NIeRwS5SvHhsCmTVeBqvNVDkGA9ueoon-kDwHivUfE5GYFn1YNZ6EG-3kieh88_FeTiNDcMC4wHwSvIDJtDXemZYtX9qNaH4W_ravgHDgeFiJ7TCy0/s1600/37363-400x300-OnlineSocialNetworksBusiness.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTbZAAhICBRa9mLmFpNE81ZVKUc0NIeRwS5SvHhsCmTVeBqvNVDkGA9ueoon-kDwHivUfE5GYFn1YNZ6EG-3kieh88_FeTiNDcMC4wHwSvIDJtDXemZYtX9qNaH4W_ravgHDgeFiJ7TCy0/s320/37363-400x300-OnlineSocialNetworksBusiness.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Social Networks and Privacy Leaks on Mobile Devices&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
And well, it does not only have to wait for GPS functionality. Normal data transfer over mobile social networks can even cause a user to leave traces for his/her friends so that they might know where he has been.&lt;br /&gt;
&lt;br /&gt;
Social network on a mobile device has an immense potential of unintended privacy leaks for any user. Question really matters as how the privacy changed in the internet age. Or do we have to redefine the definition of privacy in the internet age?&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/03/potential-of-privacy-leak-due-to-social.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTbZAAhICBRa9mLmFpNE81ZVKUc0NIeRwS5SvHhsCmTVeBqvNVDkGA9ueoon-kDwHivUfE5GYFn1YNZ6EG-3kieh88_FeTiNDcMC4wHwSvIDJtDXemZYtX9qNaH4W_ravgHDgeFiJ7TCy0/s72-c/37363-400x300-OnlineSocialNetworksBusiness.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-5342744017239487645</guid><pubDate>Sun, 05 Feb 2012 06:18:00 +0000</pubDate><atom:updated>2012-02-04T22:20:36.518-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">baltic sea</category><category domain="http://www.blogger.com/atom/ns#">curiousity</category><category domain="http://www.blogger.com/atom/ns#">discovery</category><category domain="http://www.blogger.com/atom/ns#">unexplainable</category><title>Curiosity Alert: What can you find at the bottom of Baltic sea?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;object class=&quot;BLOGGER-youtube-video&quot; classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; codebase=&quot;http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0&quot; data-thumbnail-src=&quot;http://3.gvt0.com/vi/K_wgMa3iils/0.jpg&quot; height=&quot;266&quot; width=&quot;320&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/K_wgMa3iils&amp;fs=1&amp;source=uds&quot; /&gt;&lt;param name=&quot;bgcolor&quot; value=&quot;#FFFFFF&quot; /&gt;&lt;embed width=&quot;320&quot; height=&quot;266&quot;  src=&quot;http://www.youtube.com/v/K_wgMa3iils&amp;fs=1&amp;source=uds&quot; type=&quot;application/x-shockwave-flash&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;What do you expect to be lying at the bottom of Baltic sea? A team of commercial divers is at the verge of an amazing discovery after finding an unexplainable object 60 meters across in size at the bottom of the Baltic sea.&lt;br /&gt;
&lt;a href=&quot;http://news.yahoo.com/blogs/sideshow/video-divers-large-unexplained-object-bottom-baltic-sea-161749619.html&quot; target=&quot;_blank&quot;&gt;Divers find a large unexplainable object below Baltic sea &lt;/a&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/02/curiosity-alert-what-can-you-find-at.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-6027536518533631751</guid><pubDate>Fri, 20 Jan 2012 23:22:00 +0000</pubDate><atom:updated>2012-01-20T15:25:54.108-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">HTTP Sniffing</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">Safe Browsing</category><category domain="http://www.blogger.com/atom/ns#">Session</category><category domain="http://www.blogger.com/atom/ns#">Suspicious Activity</category><category domain="http://www.blogger.com/atom/ns#">Track Activity</category><title>HTTP Sniffing - How to Track Suspicious Activity During Your Browsing Session</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Web 2.0 and 3.0 has changed the methods of corporations and agencies to track you during your online stay and browsing sessions. Large social media platforms have partnered with the world agencies to find if &quot;You&quot; want to talk about any certain topic. If &quot;You&quot; like or dislike certain issue. And they all do it with your consent. &quot;You&quot; deliberately allow them to build analytics based upon your internet usage and then later guess about your personality to keep you on their watchlist.&lt;br /&gt;
&lt;br /&gt;
Today&#39;s post discusses a simple method that can let you know about the data transfer between your computer and unintended audiences.&lt;br /&gt;
&lt;br /&gt;
Considering a scenario in which you are visiting a fictitious domain &quot;ABCD.com&quot;, you will naturally consider communication between your computer and &quot;ABCD.com&quot; to remain only between you two and not to any other third party domains, otherwise authorized by either &quot;You&quot; or &quot;ABCD.com&quot; and with mutual consent.&lt;br /&gt;
&lt;br /&gt;
For instance, upon typing the URL &quot;ABCD.com&quot; in the browser and hitting enter on they keyboard, you certainly do not expect to do anything else than land on the site&#39;s homepage, period. But, what if &quot;ABCD.com&quot; sends a message to &quot;EFGH.com&quot; and communicates your presence that hey! we have that buddy of ours back again who was very annoying to you last time. Or in another scenario, ads served by &quot;EFGH.com&quot; are also logging your behavior on &quot;ABCD.com&quot; and accordingly presenting you ads what they feel might be of some relevance to you.&lt;br /&gt;
&lt;br /&gt;
That&#39;s a breach of privacy. And it is taking place through HTTP protocol upon your visit to your desired website.&lt;br /&gt;
&lt;br /&gt;
Today&#39;s post provides you instructions about tracking suspicious activity that may originate through your browsing session and know if your desired website is also sending traffic to another website through you or their own servers at the time of your visit.&lt;br /&gt;
&lt;br /&gt;
This is also known as HTTP Sniffing. &lt;br /&gt;
&lt;br /&gt;
Instructions:&lt;br /&gt;
&lt;br /&gt;
1- Go to &lt;a href=&quot;http://www.cleanersoft.com/sniffer/free_http_sniffer.htm&quot;&gt;http://www.cleanersoft.com/sniffer/free_http_sniffer.htm&lt;/a&gt;&lt;br /&gt;
2- Download the application and install it on your windows platform&lt;br /&gt;
3- See the action live as it happens.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqMFowhJ2UnFtvNDEu7tEre1t3_dcK7MYps0RjFNYVJQULugG7y3uBNKmZdsmlXqlkBlN_Qan8ikYCsiEp1xTcmeMwmn7KD4ru9eTrOQGT2aDiHittlaekMTSFmZ2uWHYYQHGo2bEOL_U/s1600/maininterface.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqMFowhJ2UnFtvNDEu7tEre1t3_dcK7MYps0RjFNYVJQULugG7y3uBNKmZdsmlXqlkBlN_Qan8ikYCsiEp1xTcmeMwmn7KD4ru9eTrOQGT2aDiHittlaekMTSFmZ2uWHYYQHGo2bEOL_U/s320/maininterface.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;HTTP Sniffing - How to Track Suspicious Activity During Your Browsing Session&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/01/http-sniffing-how-to-track-suspicious.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoqMFowhJ2UnFtvNDEu7tEre1t3_dcK7MYps0RjFNYVJQULugG7y3uBNKmZdsmlXqlkBlN_Qan8ikYCsiEp1xTcmeMwmn7KD4ru9eTrOQGT2aDiHittlaekMTSFmZ2uWHYYQHGo2bEOL_U/s72-c/maininterface.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1838701174806980781</guid><pubDate>Mon, 02 Jan 2012 22:01:00 +0000</pubDate><atom:updated>2012-01-02T14:01:14.971-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Censor</category><category domain="http://www.blogger.com/atom/ns#">Court</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Freedom of Speech</category><category domain="http://www.blogger.com/atom/ns#">Google+</category><category domain="http://www.blogger.com/atom/ns#">Indian</category><category domain="http://www.blogger.com/atom/ns#">Social Networking</category><title>Indian Court orders to censor Anti-Religious Content on Facebook and Google+</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Are you advocating against SOPA and in favor of freedom of speech on internet? Here is another news for you. Indian court has ordered to censor religious content that can or may offend on social networking websites such as Google+ and Facebook.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;&quot;The order comes at a controversial time  as IT minister Kapil Sibal had recently discussed with representatives  of some of the companies ways to guarantee the offensive contents are  not posted.&quot; Mail Online Reported.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: 1.2em;&quot;&gt;&lt;a href=&quot;http://www.dailymail.co.uk/news/article-2081078/Facebook-Google-ordered-remove-anti-religious-content.html&quot; target=&quot;_blank&quot;&gt;Read the full article here...&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://freewb.blogspot.com/2012/01/indian-court-orders-to-censor-anti.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-8172054952253491234</guid><pubDate>Fri, 30 Dec 2011 02:02:00 +0000</pubDate><atom:updated>2011-12-29T18:03:13.347-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ad blocking</category><category domain="http://www.blogger.com/atom/ns#">do not track</category><category domain="http://www.blogger.com/atom/ns#">do not track plus</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">online spy</category><category domain="http://www.blogger.com/atom/ns#">online tracking</category><category domain="http://www.blogger.com/atom/ns#">plus</category><title>Do Not Track Plus: Getting Rid of Online Tracking Websites</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;I stumbled upon this little nifty firefox extension on USAToday.com and I must say that I am so impressed. It is a little piece of software that tracks and blocks every online website that can potentially follow you while browsing any web page, without hurting your browsing experience.&lt;br /&gt;
&lt;br /&gt;
As I have earlier discussed in my posts that users normally fall prey to social buttons and ad networks tracking mechanisms, this is a MUST USE extension to save yourself from those so-called online spies.&lt;br /&gt;
&lt;br /&gt;
Here is how to get it working:&lt;br /&gt;
1- Download the software from &lt;a href=&quot;http://www.donottrackplus.com/&quot;&gt;http://www.donottrackplus.com/&lt;/a&gt;&lt;br /&gt;
2- Simply install the software on your firefox and restart the browser.&lt;br /&gt;
3- It will be fully functional immediately after installation.&lt;br /&gt;
4- After successful installation visit any webpage and have a look at the green button next to your home icon in firefox.&lt;br /&gt;
&lt;br /&gt;
Just to test, I opened shoemoney.com and found that 6 online companies were actually tracking me while I was studying methods to make money online. Have a look at the image below.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5ogLi7yArIZ7IITHyj7MADoyypx04LHaLFuPhFz5hv62X7022aylFkmCENrmtggZ71w0RwqpCsacZkMPputXcJhi1o1_Yzlh6bl1aCBQBLZemtYbQsfZ2GEFGKBcOZkvOy7jLu6cNcwec/s1600/dnt1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;234&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5ogLi7yArIZ7IITHyj7MADoyypx04LHaLFuPhFz5hv62X7022aylFkmCENrmtggZ71w0RwqpCsacZkMPputXcJhi1o1_Yzlh6bl1aCBQBLZemtYbQsfZ2GEFGKBcOZkvOy7jLu6cNcwec/s320/dnt1.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Do Not Track Plus Notification for Online Tracking Websites&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
And once I clicked upon the green button, I got the details of who the culprits were. See below image for details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjacG4GdHtP-Kf-bQLjEm9CTE1H1GeNPn6TfPzv-hZZ9gVnDyL3o3M2mXXCUUD4T-CP2xBJqNjipbT1oGBc01aMyz92khFi1eEIhu0g0HnZWKbO1kQLaOS_Tl1mrNWHbETUhOKryFm8br4p/s1600/dnt2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;294&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjacG4GdHtP-Kf-bQLjEm9CTE1H1GeNPn6TfPzv-hZZ9gVnDyL3o3M2mXXCUUD4T-CP2xBJqNjipbT1oGBc01aMyz92khFi1eEIhu0g0HnZWKbO1kQLaOS_Tl1mrNWHbETUhOKryFm8br4p/s320/dnt2.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Do Not Track Plus Details of Online Tracking Websites&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I strongly recommend this software for any user extensively browsing or researching on internet for any reason to stay safe from potential privacy leaks.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/do-not-track-plus-getting-rid-of-online.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5ogLi7yArIZ7IITHyj7MADoyypx04LHaLFuPhFz5hv62X7022aylFkmCENrmtggZ71w0RwqpCsacZkMPputXcJhi1o1_Yzlh6bl1aCBQBLZemtYbQsfZ2GEFGKBcOZkvOy7jLu6cNcwec/s72-c/dnt1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-2732841602334773171</guid><pubDate>Sun, 25 Dec 2011 22:32:00 +0000</pubDate><atom:updated>2011-12-25T14:32:58.173-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">get rich quick</category><category domain="http://www.blogger.com/atom/ns#">how to be a millionaire</category><category domain="http://www.blogger.com/atom/ns#">how to become a millionaire overnight</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">internet security</category><category domain="http://www.blogger.com/atom/ns#">small business</category><title>How to Become a Millionaire Overnight - Don&#39;t Get Indulged!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;b&gt;How to Become a Millionaire Overnight&lt;/b&gt;&lt;br /&gt;
So, a catchy phrase for everyone, eh? and you surely did not expect this to be on a blog talking about internet privacy.&lt;br /&gt;
Well! you were correct in its whole entirety. I was not here to talk about my little secret today that would drive you a whole lot of money overnight. In fact, I was here to discuss the generic theory and the relation that it has with our natural instinct which later on creates room for losses and damage that we cannot afford.&lt;br /&gt;
&lt;br /&gt;
So, if I broke your heart, I apologize and you can leave the page. But for others who are more curious like me, I have something to discuss.&lt;br /&gt;
&lt;br /&gt;
We, humans, have an insatiable appetite for greed and voracity. And we constantly keep testing our limits throughout our lives while taking decisions and choosing roadmaps that sometimes hurt us to an extent we cannot afford.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBa6cwhWJJ8gHZloCqx7buCWh2KreFwpv79x6N4gaKegpdRaIb36Nel9fW_p9fnmJu0QCGNQ4UE-jw6xx2U8mdJNmlH5f2zvoZuO327tslp5nlMwHwKtk7_F5w2HZcGZr2e21Ek_M04ugB/s1600/fin_res.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBa6cwhWJJ8gHZloCqx7buCWh2KreFwpv79x6N4gaKegpdRaIb36Nel9fW_p9fnmJu0QCGNQ4UE-jw6xx2U8mdJNmlH5f2zvoZuO327tslp5nlMwHwKtk7_F5w2HZcGZr2e21Ek_M04ugB/s1600/fin_res.jpg&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;How to Become a Millionaire?&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
You must&#39;ve had heard and seen the phrase &quot;How to Become a Millionaire&quot; a billion times over the internet. And I can bet that you would have even tried a scheme offering such promise once till now. But let me put it simple and straight forward. There is nothing that can get you rich quickly (overnight) even on internet unless and until you are already enjoying some great revenue streams from multiple sources.&lt;br /&gt;
&lt;br /&gt;
Ideally speaking, there are multiple ways to generate income over the internet but none of them guarantees that you will be making thousands or even hundreds quickly enough to get off to a flying start.&lt;br /&gt;
&lt;br /&gt;
There is an old saying in the business world. &quot;Higher the risk, higher the profits&quot;. And same is the case with stock markets. But in stock markets, you loose your money. However, in get rich quickly ponzy schemes, you loose your money as well as your privacy.&lt;br /&gt;
&lt;br /&gt;
Every huge success starts with a small step! &lt;br /&gt;
&lt;br /&gt;
My advise will be that you take your time out for research. Ideally 2 to 3 hours a day. Look for freelancing and work from home opportunities according to your skills on the top websites. Start blogging at the same time on blogger or your own domain,&amp;nbsp; look for an adsense account or any other ad network that suits you, and tie yourself up with your newly built internet career to achieve a long term goal. &lt;br /&gt;
&lt;br /&gt;
Stay away from dreaming of becoming a millionaire overnight and do not attempt or invest in anything that promises unrealistic goals. Your internet career can be very lucrative but you will have to concentrate upon it rather than loosing it before even giving it a try.&lt;br /&gt;
&lt;br /&gt;
Importantly! if you are in blogging, read startup stories of top bloggers to get you motivated and started in the right direction. Only bear in mind that you are just 5 or 6 years late than their startups. You can catch up. But not through get rich quick schemes.&lt;br /&gt;
&lt;br /&gt;
Best of luck and stay safe.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-to-become-millionaire-overnight.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBa6cwhWJJ8gHZloCqx7buCWh2KreFwpv79x6N4gaKegpdRaIb36Nel9fW_p9fnmJu0QCGNQ4UE-jw6xx2U8mdJNmlH5f2zvoZuO327tslp5nlMwHwKtk7_F5w2HZcGZr2e21Ek_M04ugB/s72-c/fin_res.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-4906531925415526211</guid><pubDate>Wed, 21 Dec 2011 22:28:00 +0000</pubDate><atom:updated>2011-12-21T14:28:59.614-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bypass sophisticated tracking website</category><category domain="http://www.blogger.com/atom/ns#">disable cookies</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">sophisticated</category><category domain="http://www.blogger.com/atom/ns#">track</category><category domain="http://www.blogger.com/atom/ns#">tracking website</category><category domain="http://www.blogger.com/atom/ns#">turn javascript off</category><category domain="http://www.blogger.com/atom/ns#">website</category><title>How to Bypass Sophisticated Tracking Websites</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;There is a lot of evidence and noise about websites tracking you for several reasons. Some of them might be tracking you for ad serving, some for user behavior, some for your personal information, and some for covert reasons not generally known to anybody.&lt;br /&gt;
&lt;br /&gt;
However, one important thing that should be kept in mind regarding tracking websites is the way they obtain information about you.&lt;br /&gt;
&lt;br /&gt;
Type 1: Some will allure you to subscribe to a hot software deal. Or even getting your personal data like credit card number, social security number, name and address, etc. to give you a worthless software with a 60 days money back guarantee. When you will come for a refund, they will give your money back but eventually will have all your personal details.&lt;br /&gt;
&lt;br /&gt;
Type 2: Some will allure you to download a toolbar or other software with a hidden spy program that will eventually track your every move on internet and send data back to the server. &lt;br /&gt;
&lt;br /&gt;
Type 3: But, on the other hand some websites will track your web presence through Javascript and cookies as well.&lt;br /&gt;
&lt;br /&gt;
While you may already have established a plan to evade websites of Type 1 and Type 2, in order to stay safe from Type 3 websites, all you have to do is to turn your browser Javascript off and disable cookies for untrusted websites.&lt;br /&gt;
&lt;br /&gt;
You may notice that certain websites do not perform well once you turn Javascript off or disable cookies. If you encounter such a website and trust its contents and the usage, allow the website to perform its backend functions through turning on Javascript and cookies. If you are not satisfied, keep your Javascript off and cookies disabled.&lt;br /&gt;
&lt;br /&gt;
This is the simplest method to bypass sophisticated tracking websites.&lt;br /&gt;
&lt;br /&gt;
All of the modern browsers have the functionality of turning off Javascript and only allowing certain cookies to be downloaded on your PC for your safety.&lt;br /&gt;
&lt;br /&gt;
In my next post, I will be discussing as how you can track suspicious activity during your internet session and know if some other sophisticated website is tracking you for unknown reasons.&lt;br /&gt;
&lt;br /&gt;
Stay safe and give me some time to get back.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-to-bypass-sophisticated-tracking.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-899928724599431204</guid><pubDate>Sat, 17 Dec 2011 20:23:00 +0000</pubDate><atom:updated>2011-12-17T12:23:13.551-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">toolbars</category><category domain="http://www.blogger.com/atom/ns#">web</category><category domain="http://www.blogger.com/atom/ns#">web toolbars</category><title>How Browser Toolbars Kill Internet Privacy</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;If you are a fan of downloading free software from internet, you must have had come across those installers that seek permissions to make their web pages as default home page for your browser, install a browser toolbar and stuff like that.&lt;br /&gt;
&lt;br /&gt;
Those browser toolbars are nothing but a catchy piece of software to spy on you and send your browsing data back to their masters.&lt;br /&gt;
&lt;br /&gt;
Potentially web toolbars have the tendency to log your:&lt;br /&gt;
1- Clicks&lt;br /&gt;
2- URL Visits&lt;br /&gt;
3- Username/Passwords&lt;br /&gt;
4- Browsing Behavior&lt;br /&gt;
5- Chats&lt;br /&gt;
&lt;br /&gt;
And much much more (for the purpose they have been developed for)... Easily speaking browser toolbars provide you a little information but take a lot.from you in hidden form through backdoor channels and under extreme circumstances, even get you exposed to ads and spyware which can seriously damage your PC and privacy both.&lt;br /&gt;
&lt;br /&gt;
Therefore, whenever you run into a situation during which an installer requires you to install browser toolbar, deselect the option and proceed to installation. Best option would be even discontinue the installation to discourage the vendors and send them the message that no one is ready to fall into their trap.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-browser-toolbars-kill-internet.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-8458467201262172288</guid><pubDate>Fri, 16 Dec 2011 21:31:00 +0000</pubDate><atom:updated>2011-12-16T13:36:09.452-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bittorrent</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">track</category><title>How BitTorrent Tracking Kills Internet Privacy</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;If you are under impression that no one has any decent knowledge about what you have been downloading through torrents lately, you are highly mistaken about the fact.&lt;br /&gt;
&lt;br /&gt;
Lot of people among us have a very different delusion about internet privacy. Back in my college days, I used to hear guys chatting with girls on mIRC and telling them fake stories about their millionaire status and bank balances while using fake usernames and thought they were anonymous to everyone. Even if any girl believed upon those stories and finally decided to continue to the relationship in real world, the boy never used to meet her due to his original personality and condition against the one he had portrayed. Main theme was to remain anonymous and keep the privacy.&lt;br /&gt;
&lt;br /&gt;
But today&#39;s internet is changing the world as wee see it. This post is not about mIRC chatting, but it is about BitTorrent enjoyment.&lt;br /&gt;
&lt;br /&gt;
As users, we were exposed to peer to peer networking through torrents quite some while ago. And now torrents have become a major source of downloading videos, music, pirated software from internet. Everyone using those sites assumes that he/she is quite anonymous and enjoying the privacy he/she demands.&lt;br /&gt;
&lt;br /&gt;
However, recently a Russian website &lt;a href=&quot;http://youhavedownloaded.com/&quot;&gt;YouHaveDownloaded.com&lt;/a&gt; has displayed the records of couple of thousands of internet addresses and the titles that have been downloaded from those addresses. That really blows off any fantasies regarding torrent privacy.&lt;br /&gt;
&lt;br /&gt;
Although some wise people may argue that almost all of the current ISPs assign dynamic IP addresses to their clients in today&#39;s world and so there is very low probability of being traced through IP (internet addresses).&lt;br /&gt;
&lt;br /&gt;
But consider a scenario in which you were being hunted by government guys for downloading an illegitimate pirated video or audio track from any torrent. In order to get you, authorities would not have to do much. They would simply get your IP and timestamp of download and would ask your ISP to get information about that IP - say at 05:30 AM, 10th of December, 2011. And your ISP would digg up their records finding that it was you who was actually downloading that torrent and using that IP at the given time frame.&lt;br /&gt;
&lt;br /&gt;
Case Closed!!&lt;br /&gt;
&lt;br /&gt;
As simple as it can be.&lt;br /&gt;
&lt;br /&gt;
Fact of the matter is that internet is not a place to stay anonymous and private. Everything you do is monitored/recorded. Therefore, my suggestion is to stay away from trouble and do not do anything stupid when you have no technical clue about what is happening on the back end.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-bittorrent-tracking-kills-internet.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-167621728603762719</guid><pubDate>Wed, 14 Dec 2011 21:00:00 +0000</pubDate><atom:updated>2011-12-14T13:00:42.510-08:00</atom:updated><title>Ignore the Code</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This is only a test post for verification purposes. Please ignore it.&lt;br /&gt;
&lt;span class=&quot;status&quot;&gt;Z8S8F5V99QXM&lt;/span&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/ignore-code.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-9066089058976376979</guid><pubDate>Sun, 11 Dec 2011 23:59:00 +0000</pubDate><atom:updated>2011-12-11T18:45:55.693-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">internet security</category><category domain="http://www.blogger.com/atom/ns#">secure password</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">strong password</category><title>How to Create Strong and Secure Passwords for Your Online Accounts</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;NEWBIE GUIDE POST &lt;br /&gt;
&lt;br /&gt;
Of all the accounts hacked on internet, most of them get fallen into wrong hands due to the predictability of passwords by users.&lt;br /&gt;
So in order to secure your online privacy, you need to have secure and strong passwords to avoid being hacked by any potential charmer.&lt;br /&gt;
&lt;br /&gt;
Following tips will help you in creating secure and strong passwords for your online accounts.&lt;br /&gt;
&lt;br /&gt;
1- Never use same passwords for your social networks, financial applications and email accounts&lt;br /&gt;
2- Never use less than 8 characters while creating your passwords. Ideally you can make it up to 10-15 characters long. Remember longer is the password, harder it is to crack.&lt;br /&gt;
3- Always use a combination of special characters such as *&amp;amp;% etc for your passwords.&lt;br /&gt;
4- Always use Capital letters more than 2 times in your passwords.&lt;br /&gt;
5- Always use digits 0-9 while creating passwords.&lt;br /&gt;
&lt;br /&gt;
Finally concluding this newbie guide post, your password shall essentially be 10-15 characters long, not same as that of your social network account and must include a combination of capital letters, special characters, and digits to be considered as a secure and strong password.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/4AjPh&quot; target=&quot;_blank&quot;&gt;Click here to know how strong and secure is your password - A tool by Microsoft&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
Stay Safe during your online sessions and do not forget to logout of your critical web application before exiting your browser.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-to-create-strong-and-secure.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-2061521265468142837</guid><pubDate>Sun, 11 Dec 2011 23:29:00 +0000</pubDate><atom:updated>2011-12-11T15:30:15.545-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><category domain="http://www.blogger.com/atom/ns#">Manache</category><category domain="http://www.blogger.com/atom/ns#">trojan</category><category domain="http://www.blogger.com/atom/ns#">Tzipora</category><category domain="http://www.blogger.com/atom/ns#">We control Americans</category><title>Ignore the Web Links for &quot;We Control Americans&quot; by Tzipora Manache</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;While searching for the web link for quote &quot;We Control Americans&quot; on Google or any other search engine may get you exposed to a lethal virus that can cause serious damage to your personal data.&lt;br /&gt;
&lt;br /&gt;
A post on rense.com stated as follows:&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;The goal is to get people googling for Tzipora -- where     they will find a link that will download a virus.  The fake quote is like     the a doll attached as bait &amp;nbsp;to the trigger of a landmine -- those     investigating the influence of Israel will attempt to hunt down Tzipora     Manache and will fall into the trap.&quot;&lt;/i&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/ignore-web-links-for-we-control.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-8022562123542277894</guid><pubDate>Fri, 09 Dec 2011 02:49:00 +0000</pubDate><atom:updated>2011-12-08T18:58:11.364-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ccleaner</category><category domain="http://www.blogger.com/atom/ns#">delete search history</category><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><title>How to Effectively Delete Your Internet Search History?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This is a very simple and handy tutorial for web users and perhaps my third time mentioning of CCleaner for use of clearing unwanted data from your PC.&lt;br /&gt;
&lt;br /&gt;
I mention CCleaner because this is perhaps one of the first free tools to clear history and searches that I have come across in a long time and that looks quite impressive and equivalent to commercial grade software.&lt;br /&gt;
&lt;br /&gt;
Anyway, let us come down straight to the tutorial regarding how to delete your internet search history using the ccleaner tool.&lt;br /&gt;
&lt;br /&gt;
After you successfully install the software onto your system, follow the following steps:&lt;br /&gt;
&lt;br /&gt;
1- Fire up the software.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6owBaNPoAK1j9CVy6j_uG9klcO9X_iYASQo1Wp2HYbVocwv-qBYCosqFBlOvCTGyccYQOpBMwivyQTHa-XJ9YImOIfXc5Xlx-fhO6ahb4UmWWqZAz4zukCfpDcmEga7rARozj-BF6I-X/s1600/CCleaner+Software.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6owBaNPoAK1j9CVy6j_uG9klcO9X_iYASQo1Wp2HYbVocwv-qBYCosqFBlOvCTGyccYQOpBMwivyQTHa-XJ9YImOIfXc5Xlx-fhO6ahb4UmWWqZAz4zukCfpDcmEga7rARozj-BF6I-X/s320/CCleaner+Software.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;CCleaner Software Screen&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2- Press Analyze Button to allow the software to automatically check for your internet history, cookies and recently used temporary files.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: left; margin-right: 1em; text-align: left;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju9TbjqSxn3g2H6qM9iqve5IBCtLWelX4D5iB6Xf0GnDCdntATAheXw9eSz576apS6yIg3Z8BI0x9g-EX_oeVHqyes2BS_WuuetrIa3SYMEkuLypUlbltfK1YNM7d0es7Ao9wZnT0qfzep/s1600/SearchHistory.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEju9TbjqSxn3g2H6qM9iqve5IBCtLWelX4D5iB6Xf0GnDCdntATAheXw9eSz576apS6yIg3Z8BI0x9g-EX_oeVHqyes2BS_WuuetrIa3SYMEkuLypUlbltfK1YNM7d0es7Ao9wZnT0qfzep/s320/SearchHistory.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Analyze and Delete Search History&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you press &quot;Run Cleaner&quot; button, you will be able to get rid of all the unwanted cookies and search history as quickly as you can imagine.&lt;br /&gt;
&lt;br /&gt;
In order to delete your search history on firefox and internet explorer both, make sure you close your browsers before running that handy tool.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/how-to-delete-internet-search-history.html</link><author>noreply@blogger.com (Free World)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB6owBaNPoAK1j9CVy6j_uG9klcO9X_iYASQo1Wp2HYbVocwv-qBYCosqFBlOvCTGyccYQOpBMwivyQTHa-XJ9YImOIfXc5Xlx-fhO6ahb4UmWWqZAz4zukCfpDcmEga7rARozj-BF6I-X/s72-c/CCleaner+Software.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-3587628335591641289</guid><pubDate>Sun, 04 Dec 2011 23:36:00 +0000</pubDate><atom:updated>2011-12-04T15:36:49.042-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet privacy</category><title>5 Tips on How to Keep Your Privacy Safe from Unwanted Audience</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;There is an old concept about trust and mistrust in general. We always discuss with each other about being vigilant and cautious about people around us. We always tell our children to not to hang out with strangers. Not to exchange gifts. Not to even go close to them. And up to some extent, we also apply the same rules to ourselves.&lt;br /&gt;
&lt;br /&gt;
But what about people we know and show our trust in? It is a fact that people we know and stay with all the time can hurt our privacy to a lot more extent than people who don&#39;t know us but who keep on trying to get some hands on our private information.&lt;br /&gt;
&lt;br /&gt;
And while browsing internet, it even gets more critical. While we share our sensitive information like photos, SSNs, Credit Card Nos. Driving License Nos. Bank Accounts, etc. with third parties and with people whom we like to do so online, we sometimes forget the fact that our own machine can even be compromised and cause our privacy to be leaked effectively into unwanted hands.&lt;br /&gt;
&lt;br /&gt;
Therefore, I am very much confident about the fact that our privacy lies in our own hands. So, in general we can stay safe through:&lt;br /&gt;
&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Never ever sending sensitive information on public computers&lt;/li&gt;
&lt;li&gt;Making sure that website we are interacting with uses https (secure) protocol to communicate &lt;/li&gt;
&lt;li&gt;Keeping machine&#39;s antivirus updated.&lt;/li&gt;
&lt;li&gt;Deleting browsing history on computers&lt;/li&gt;
&lt;li&gt;Checking for malwares and keyloggers on computers to use&lt;/li&gt;
&lt;/ol&gt;So stay safe during your online sessions.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/12/5-tips-on-how-to-keep-your-privacy-safe.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-1032387170504721975</guid><pubDate>Sat, 26 Nov 2011 22:39:00 +0000</pubDate><atom:updated>2011-11-26T14:39:54.305-08:00</atom:updated><title>News Alert: Indians are Creating Jobs for Poor People of Baluchistan Province in Pakistan</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Indians are creating jobs for poor Balochs in Pakistan. That is how they helped in 1971 through the creation of Bangladesh.&lt;br /&gt;
&lt;span id=&quot;advenueINTEXT&quot; name=&quot;advenueINTEXT&quot;&gt;&quot;New Delhi had also made a  remarkable effort to help the people of Pakistan in 1971,&quot; an Indian  historian said. &quot;We are currently involved in providing vocational  training and jobs to a large number of unemployed poor men in the  Pakistani province of Balochistan.&quot;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;advenueINTEXT&quot; name=&quot;advenueINTEXT&quot;&gt;Source: &lt;a href=&quot;http://timesofindia.indiatimes.com/home/sunday-toi/all-that-matters/MFN-trade-off-Give-up-Krishna-and-we-drop-Khar/articleshow/10886928.cms&quot; target=&quot;_blank&quot;&gt;Times of India&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/11/news-alert-indians-are-creating-jobs.html</link><author>noreply@blogger.com (Free World)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-4191528324932145653</guid><pubDate>Sat, 26 Nov 2011 20:04:00 +0000</pubDate><atom:updated>2011-11-26T12:09:46.937-08:00</atom:updated><title>News Alert: NATO Attacks are a deliberate act of punishment of Pakistani army</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/1hZOM6sCU1c?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Ahmad Qureshi speaks loud about the NATO air strikes inside Pakistani territory.&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/11/news-alert-nato-attacks-are-deliberate.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-6271559426323820740</guid><pubDate>Sat, 26 Nov 2011 17:40:00 +0000</pubDate><atom:updated>2011-11-26T09:46:46.039-08:00</atom:updated><title>News Alert: Pakistan Responds to NATO Attacks</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Pakistani officials decide to ask Americans to evacuate Shamsi Airbase in Pakistan in 15 days.&lt;br /&gt;
Source: PTV&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/11/new-alert-pakistan-responds-to-nato.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1926563552124054268.post-3764535947112246824</guid><pubDate>Sat, 26 Nov 2011 16:09:00 +0000</pubDate><atom:updated>2011-11-26T08:09:42.316-08:00</atom:updated><title>News Alert: Pakistan stops NATO Supplies.</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Highest Pakistani officials are sitting in Islamabad to discuss about the reaction to NATO attack last night. Defense Committee has decided to stop all NATO supplies till further notice.&lt;/div&gt;</description><link>http://freewb.blogspot.com/2011/11/news-alert-pakistan-stops-nato-supplies.html</link><author>noreply@blogger.com (Free World)</author><thr:total>0</thr:total></item></channel></rss>