Cleophon

Posted on July 29, 2011 — by Robin

What to Do About Password Attacks


Password Attacks is the classic way to gain access to a computer system is to find out the password and log in. The growth of the Internet has created unlimited opportunity for these intruders to steal secrets, tinker with Web sites, abscond with credit card information, or just generally make mischief. A Password hackers approach their craft from a number of motivations. Continue reading “What to Do About Password Attacks” »

Posted on July 29, 2011 — by Robin

Private Browsing: Not enough to protect all your Internet activity


Internet Technology Tutorials

Most modern browsers have a private or incognito mode. “InPrivate Browsing” in Internet Explorer, “Incognito mode” in Chrome, and “Private Browsing” in Firefox and Safari all strive to do the same two things: make it impossible for users of the same computer to figure out which sites the browser has been used to visit, and make it impossible for sites to know whether or not a particular user has previously visited them. Continue reading “Private Browsing: Not enough to protect all your Internet activity” »

Posted on September 22, 2010 — by cleophon

Flash Cookies and Consumers Privacy


Internet Reviews Technology

A recent study called “Flash Cookies and Privacy” reports that, now days growing the number of consumers who are taking legal action against company that track computer users’ activity on the Internet. At issue is a little-known piece of computer code placed on hard drives by the Flash program from Adobe when users watch videos on popular Web sites like YouTube.

Continue reading “Flash Cookies and Consumers Privacy” »


Originally published at www.cleophon.com.