Business People Club

How to protect yourself when using public pc?

0 like 0 dislike
301 views
in Articles by Dragonig
How to protect yourself when using public pc?

Your comment

Your name to display :
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please log in or register.

1 Comment

0 like 0 dislike
commented by SnailMail

There's a guy in New York who may have got into your personal business. If he did, he probably looted your online bank account.

Juju Jiang is serving time now after pleading guilty. But for a couple years, he bugged public computers with software that logged keystrokes. He used it to capture usernames and passwords. Some he used to steal money; others he sold on the web.

He got caught when he manipulated a victim's home computer while she was present. She watched incredulously as he methodically searched her computer. He was using GoToMyPC, which allows travellers to manipulate their computers from afar. The victim had used GoToMyPC previously from a public machine. Jiang stole her username and password.

Spying software can easily be placed on public computers, such as those in Internet cafés, airports, libraries and other public places.

With spying software, a criminal can grab your passwords and usernames. Ultimately, you could lose your money or have your identity stolen. That should tell you enough to be wary of public PC terminals.

Software is Unobtrusive

Spies usually use software because it is invisible to the untutored eye. Hardware to do virtually the same thing also can be used, by placing it between the keyboard and computer. But using it is too obvious in a public place.

The software programs, however, can record a victim's every keystroke. The keystroke loggers can then e-mail the collected information on a set schedule. Or it can be downloaded. Other software programs take screen shots of places you go. These, too, send their collected information via e-mail.

The spying programs are inconspicuous. Unless you know how to look for them, you'll never see them.

But don't forget there are other threats besides spy programs. Here's how to stay safe:

Here are five things to consider when you sit down in front of a strange computer:

Check for Spy Programs

Download X-Cleaner Spyware Remover at spywareinfo.com. Put it on a floppy disk. If the public computer you use has a floppy drive, insert the disk and run X-Cleaner from the floppy to check the hard drive. You do not have to install X-Cleaner.

Erase Your Tracks

When you use an internet browser, it keeps records of where you went. When you finish surfing with Microsoft Internet Explorer, click Tools > Internet Options. On the General tab, click Delete Files and Delete Cookies. Then click Clear History.

If you're using Netscape Navigator, it's a little more complicated. Follow these steps.

• Check the settings before going online. Click Edit and Preferences. Click the arrow next to Navigator and select History. On the right, find Browsing History. Change "Remember visited pages" to 0.

• Click on the arrow next to Privacy and Security. Select Disable Cookies and Disable Cookies in Mail and Newsgroups.

• When you finish surfing, click Edit and Preferences. Click the arrow next to Navigator. Click Clear History and Clear Location Bar. Go to Privacy and Security on the left side and click the arrow. Select Cookies. Click Manage Stored Cookies. On the Stored Cookies tab, click Remove All Cookies.

• Now go to Advanced, in the left-hand panel. Click the Arrow and click Cache. Click Clear Memory Cache and Clear Disk Cache. Protect Your Passwords

Browsers also track passwords. Before going on the web, if you're using Internet Explorer, click Tools > Internet Options . On the Content tab, click AutoComplete. Clear the four boxes.

When you finish surfing, again click Tools > Internet Options . Go to the Content tab and click AutoComplete . Click Clear Forms and Clear Passwords.

If you're using Netscape, click Edit and Preferences . Click the arrow next to Privacy and Security . Click Passwords . Clear the box next to Remember Passwords . When you finish browsing, click Passwords again, under Privacy and Security. Click Manage Stored Passwords. Select the Passwords Saved tab and click Remove All.

Netscape has a feature similar to AutoComplete. It saves data entered into forms. To disable that, under Privacy and Security, click Forms. Uncheck "Save form data from Web pages when completing forms." When you finish browsing, return to the Forms page. Click Manage Stored Form Data. Click Remove All Saved Data.

Cleaning out the browser will ensure that no one can track your surfing or grab your passwords with saved data. But a keystroke-logging program will still catch your passwords.

Probably the best password protection is a temporary password. Use it while you're on the road, then discard it.

Don't Rely on Encryption

There are a number of encryption packages on the market. They can be used to encrypt email. However, they encrypt the mail when the Send button is clicked. That's too late if a key-logging program is on the computer. It will make a record of the password and message as it is being written.

Use Some Common Sense

Public computers may be secure. But you really have no way of being sure. You can secure your home or business computer, but you can't be certain of what has been done with a public machine.

Approach these machines with care. Don't do any banking or stock trading on them if you can avoid it. Avoid credit-card transactions. Use a temporary password if you must check your email. And ask your system administrator how to "expire page views."

If you're just surfing, that should not be a problem. But avoid sensitive business if you can. There might be a Juju Jiang watching.

Related posts

0 like 0 dislike
1 Comment 346 views
How to protect yourself online?

How to protect yourself online?

in Articles by FlamboyantChomper
0 like 0 dislike
0 comments 1,050 views
0 like 0 dislike
0 comments 1,044 views
0 like 0 dislike
0 comments 1,010 views
0 like 0 dislike
0 comments 227 views
How to password protect wordpress pages

In this video you will learn how to password protect wordpress pages.

in Tutorials by List
0 like 0 dislike
0 comments 142 views
How to password protect wordpress post

In this video you would learn how to to password protect your wordpress post.

in Tutorials by List
0 like 0 dislike
1 Comment 268 views
How to protect my customers?

As a business owner how should i protect my customers?

in Articles by Octopuppy
0 like 0 dislike
1 Comment 385 views
How to protect my computer from viruses?

What are the ways to protect my computer from viruses?

in Articles by GardenParrot
0 like 0 dislike
0 comments 1,219 views
0 like 0 dislike
0 comments 1,214 views
0 like 0 dislike
0 comments 1,207 views
0 like 0 dislike
0 comments 284 views
3 Ways To Protect Your Customers

Customer security is one of the prime considerations of any retail outlet today. Whilst implementing key marketing strategies in order to ... the more likely they are to spend money in your store.

image
in Articles by SwiftHeroine
0 like 0 dislike
0 comments 241 views
0 like 0 dislike
0 comments 1,027 views
0 like 0 dislike
0 comments 1,438 views
0 like 0 dislike
0 comments 1,391 views
0 like 0 dislike
0 comments 787 views
0 like 0 dislike
0 comments 1,021 views
0 like 0 dislike
0 comments 1,015 views
0 like 0 dislike
0 comments 998 views
0 like 0 dislike
0 comments 990 views
0 like 0 dislike
0 comments 985 views
0 like 0 dislike
0 comments 284 views
Scams: How to identify and avoid - List of the most known ,including Ebay Scams

Telephone lottery scams: These include the Canadian lottery scam and the El Gordo Spanish lottery scam, which deceptively uses the name of a ... free cheese in this world other than for your pets :)

image
in Articles by TrainedGuy
0 like 0 dislike
0 comments 296 views
Disaster Preparedness For Your Small Business: How To "Weather" Any Storm

In the event of a potential disaster, do you have a business continuity plan for your employees and your business? Are you backing up ... the right data is being copied and that it can be restored.

image
in Articles by MagicalCyborg
0 like 0 dislike
0 comments 267 views
Problems With Spam? Learn How To Treat It

The first step in your antispam campaign may well be to understand spam and how it works. Spam is usually defined as unsolicited e-mail ... ." Wrong! They're spammers and you're now on their list.

in Articles by AmazingKitty
0 like 0 dislike
0 comments 373 views
The Warning signs of Online Fraud and How to avoid it

The number may seem grim for Web-based commerce. In 2004 in the Unites States alone, computer users logged in more than 207,000 ... you're doing it in a mall or on the information superhighway.

in Articles by Dragonig
0 like 0 dislike
0 comments 989 views
Avoiding the Scams: How to Find a Business Opportunity That is Right for You

It is heartbreaking to me that so many women with big dreams get knocked down by ruthless business opportunists who take ... a business opportunity that will be both fulfilling and profitable.

in Articles by Finderpros
0 like 0 dislike
2 comments 413 views
How bad guys hack into websites?

How hackers hack websites? and how to protect my website?

in Articles by Octopixy
0 like 0 dislike
1 Comment 469 views
is my computer really safe? how to find out?

is my computer really safe? What should i know?

in Articles by HistoryYak
0 like 0 dislike
1 Comment 1,363 views
How And Why To Wipe Disk Drives ?

How And Why To Wipe Disk Drives ?

in Articles by Richard S.
Connect with us:
...