Friday, April 29, 2011

How to Avoid Weight Loss Spam

Do not be a victim of spam just because you want to lose weight fast. Do not join the group of users who lost money in those bogus offers. The spam trap is there, and it has been intended for you. Be smart enough not to say “yes” to the products that claim instant weight loss. Find a legitimate site offering legitimate products. Be wary of con artists who have mastered their craft and make their claims appear legitimate. Protect your privacy before they take it away from you.

Spam may be either of two types. First, there are those that are claiming that products such as pills, creams, patches, or others will guarantee weight loss even without diet or exercise. Second, those that claim to block fat absorption, calories or carbohydrates so you don’t gain weight.

The results of a New York-based research study have given additional light as to why overweight individuals are easily victimized by spam. For every five overweight people, one has been a victim of spam. Another result shows that 88% of overweight people say that they received spam. As to the opening of spam, 42% of overweight individuals say they have opened the emails, and a good 18% of people with weight problems say they bought the products offered in the mails.

Experts give an explanation to why more overweight people get spammed than other groups. According to them, these people visit more weight loss sites than others so they end up in the databases of these sites. With the hope of getting the easiest way out, they easily give in to the offers. It is easier for them to become targets of spammers than other groups. This is especially so when they provide their personal information to these websites, which then makes them become victims.

Spam will not work if users will not give the information that spammers need. Basic among all these is personal information, especially an email address that is uploaded online. Some seemingly simple posts such as “I want to lose weight” placed in social networking sites can trigger spam. Keep in mind the 42% open rate and 18% conversion rate of weight loss spam. Let us look at a “worst case” spam scenario. For example, a spammer will send email offering a bogus weight loss product to 1,000 targeted individuals. Count how many emails equals 1% of these. It is 10. If ten spam recipients finally decide to buy the “product” being offered, how much money would the spammer have? Assuming that the unit cost of the product is $50, the spammer gets $500.

Haste makes waste. Don’t get spammed! It will be a waste of money trying to lose weight instantly through bogus offers. Always hold tight to your personal information unless the site is trusted. Use the privacy settings of social networking sites to control your personal information. It would still be best to hold on to the experts’ advice on losing weight. There is no better way than increasing physical activity to burn more energy and eating fewer calories.

Image courtesy of:
Image: Patchareeya99 / FreeDigitalPhotos.net

does weight Watchers Work
ganar dinero facil

Tuesday, April 26, 2011

Flink12 and Privacy in Social Networks

There are many social networking platforms available today to share your public self. But where do you go to privately and safely share your personal, day-to-day thoughts and experiences? Flink12 was created as a safe and secure way to share your private life. It is playful, safe, extremely private and easy to use. A unique way of sharing and communicating, Flink12 allows you to share your life in a meaningful way with the people you know and care about the most.

What is a Flink? A Flink is a group of twelve cows. Flink12 allows you to create individual groups of twelve people or Flinks for your friends, family, or coworkers. These Flinks allow you to communicate in a discreet way, sharing professional information with coworkers and personal information with friends and family. These groups of twelve are ideal for sharing different information for different types of relationships.



To sign up for a free Flink12 account, you can visit www.flink12.com.

Monday, April 25, 2011

How to Stay Safe with HTTPS


The continuing increase in the number of malicious tools on the internet is taking its toll on web users. The online community is now beset with various security threats like identity theft, viruses, and other things that threaten online safety. For example, one of the latest malicious tools, Firesheep, is capable of stealing passwords for email and social networking accounts.

To address this disturbing situation, the Electronic Frontier Foundation (EFF) and Access are now campaigning for the international deployment of HTTPS through HTTPS Now. Its main objective is to improve security measures and make web surfing safer by calling on users to join them in their campaign. This includes, among other things, spreading the word about HTTPS Now and how to make full use of HTTPS security features by using it correctly.

HTTPS, or Hypertext Transfer Protocol Secure, uses encryption technology to provide optimal protection. Before a user’s request is sent by the browser to the server, it is first encrypted. In return, the resulting pages are also encrypted, making the data contained therein “unreadable” by anyone while it is being sent to the user’s computer. This makes HTTPS web surfing more secure as compared to HTTP (Hypertext Transfer Protocol) alone. Even now, many websites have still not moved away from HTTP, which is unencrypted and susceptible to several kinds of threats.

The HTTPS Now campaign has three major components. These are: web surfing protection, survey of the overall status of HTTPS deployment, and helping site operators implement HTTPS. A minor component of the campaign is the sharing of updated tools that users can use to guard their web browsing.

The installation of HTTPS Everywhere by web users is the first component of the campaign. The EFF and the Tor Project created this security tool for the Firefox browser. This is capable of automatically encrypting a user’s browsing, thus changing it from HTTP to the more secure HTTPS.

Many websites are still using HTTP and are still vulnerable to malicious attacks, as admitted by the EFF and Access. This is the focus of the second component of the campaign; calling on users to give feedback on whether the sites they visit are using HTTPS or not. They believe that a relatively accurate picture on the extent of internet security and HTTPS use can be provided by user-generated information.

The third element is providing support to website operators regarding existing resources in learning how to use HTTPS correctly. These detailed resources are especially made for the deployment of the HTTPS tool. The purpose of which is to give website operators a full understanding of the value of using HTTPS.

Web users are encouraged to work with the EFF and Access, who believe that web users can give a correct picture of HTTPS and its current deployment status. Taking all of these together, they will find it easier to target those web operators who need to modernize their sites. The partnership can help reduce, if not eliminate, privacy threats and lead to safer web surfing.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Saturday, April 23, 2011

Are You Ready to Give Up Your Privacy?


A new “geolocation information generator” has been launched on the internet. Its creator, Yiannis Kakavas, has given it the intriguing name of Creepy. Many privacy rights advocates have raised their fears about the possible impact of this application to individual privacy. What can this new application do and why should it stir such concern?

Creepy was created by Kakavas for Linux or Windows. The third package that is still in process is for Mac OS X. Basically, this app pinpoints a user’s location by making use of the user’s data in social networking services. It can do this by gathering bits of the user’s data that is uploaded to the network and putting together pieces of information. The software has just been launched but is already performing well.

Creepy has an integral search utility to locate any individual online. The user has only to input the Twitter or Flickr username of that individual then hit the “Geolocate Target” button. All photos or tweets that the individual has published or posted online will be downloaded by Creepy. From those materials, Creepy will pinpoint the user’s location at the time each of the materials was published.

The software then aggregates every piece of information on hand to find a meaning. After processing, the user’s different locations are presented by showing a map. Individually, these data on locations do not tell any significant information. But when aggregated as a whole, it has much to tell about the “target”. It shows his or her most frequented places or hang-outs, the vicinity around his or her house, and even his or her office. These bits of information are now enough to make him or her vulnerable to stalkers.

The program was completed by Kakavas in only three months. He was able to access and make use of publicly-available libraries like osmgpsmap, pyexif2, and tweepy. In his mind, Kakavas believes that he made available something that will make people value their privacy. He would like users to be more aware of the dangers of careless sharing of their personal information online.

He explains that small pieces of data can be put together in order to make bigger, more meaningful information. Users are often too late to realize that it would have been better if they kept that information to themselves. The common ones are address, place of work, the places they hang out most often, when they are not at home, and many others.

He added further that he created Creepy also for social engineers to have a means for information gathering. Particularly for security analysts, Creepy can be used to carry out penetration testing. The information that they gather now can be used for different purposes later.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Tuesday, April 19, 2011

A Cookie for Your Privacy


A cookie is text file that a browser sends to a web server when a user visits a website. This is stored on the user’s computer the first time he or she accesses the site. It is also known as a web cookie, browser cookie, or HTTP cookie. Once stored, the browser uses this file to navigate the website more easily. Some of its uses are for logins, themes, language settings, shopping cart contents and more features that use text data.

Some cookies have dates of expiry. These may be stored by the browser and deleted as the expiration date passes. Other cookies do not have expiry dates. They are automatically deleted as the browser is terminated. Cookies help a website to deliver better services, although cookies in themselves do not hold information.

Cookie files contain the name of the server, its duration, and the cookie value. The value that makes a cookie unique is a randomly generated number. This helps the server that created the cookie to remember the user when he or she comes back to the site or to navigate through pages. These cookie files are stored in the browser’s “cookie file”.

A cookie is not an executable file, meaning that it cannot replicate itself. It is different from a virus, but it can be a threat to privacy in some situations. Because a browser has a mechanism that sets and reads cookies, a cookie can be used as spyware. The most common cookie that can function like this is the “zombie cookie”. A cookie that is used as spyware can track computer activity. That is why it is up to the user if he or she will or will not accept cookies.

A cookie merely helps the website to identify the user and keeps a record of his or her information. It cannot do harm to the computer by itself because it cannot access the user’s hard drive. For example, a user does not need to input his name every time he or she visits the same site. The website may ask the user to input his or her name the first time he or she visits the site and the next time he or she visits the site, the cookie tells the server who he or she is. Automatically, as the website opens, it already contains his or her name.

Privacy issues to users are the most common threat among cookies. The cookie stores any personal information that a user provides to a website. This can make the user vulnerable to computer hacking or identity theft. This is the reason why some users would not accept cookies or would want to delete cookies stored in their computers.

There are various ways of deleting cookies, depending on the user’s browser, however, the process can generally be done in three steps for Internet Explorer.

First, on the browser, go to “Tools”.

Second, select “Internet Options” or “Options”.

Third, under the “General” tab, choose “Delete Cookies”. The rest may be a combination with other functions. The user may opt to delete all cookies or just select which ones to delete.

More information about how to delete cookies for other versions and browsers is available at http://www.aboutcookies.org/default.aspx

Image courtesy of:

Image: Arvind Balaraman / FreeDigitalPhotos.net

Thursday, April 14, 2011

Google is Set to Improve its Privacy Programs


There is no other way for Google but to try its best to improve its privacy programs. After being swarmed by numerous charges, it is now stepping up its efforts to review its existing policies. The issue started after the launching of its new networking service called the Buzz in February 2010. The charges all point to Google’s violation of its own privacy policies and for deceiving users.

The new networking service is integrated with Google’s email service, the Gmail. Buzz can identify the most frequently used contacts by Gmail users. These contacts are automatically loaded by Buzz into its so-called circle of friends and then made public. Some users found the technology amazing, but many considered it an invasion of privacy. Users asserted that they would not want all their contacts to be in the “circle” and open to everyone else. They found out that some contacts might have privacy considerations like ex-spouses, doctors, or recruiters.

Google and the Federal Trade Commission worked on the issue and reached a settlement agreement. The search giant laid down its plan to immediately study whether its services contained privacy risks. It has as well promised to implement stricter privacy risk elimination standards before launching any new service. Consequently, it would develop relevant policies that would address the risks that may be found.

The company has also agreed to be subjected to an independent audit. This will oversee and validate Google’s privacy program once every two years in the next twenty years. The settlement agreement also required Google to always obtain users’ consent before transacting business with any third party using their information. Unlike what happened with Gmail, any alteration on its services should always be checked against its existing privacy policies.

The FTC reiterated that Google failed to obtain users’ consent with its Buzz service. This is a clear violation of its own privacy policies. The policies explicitly explain its commitment to seek the user’s permission if collected information would be used in a different manner. FTC Chairman Jon Liebowitz called for companies to honor what they stated in their privacy pledges.

The Buzz missteps had prompted Google to be more serious with its privacy program. It is hopeful that with the settlement, the current issue would also die down. It also apologized for not coming up to the usual standards in terms of user control and transparency. On the FTC’s side, this settlement would hopefully stir up greater importance placed on better privacy standards for Google and for the whole internet community.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Tuesday, April 12, 2011

The LGBT Population Needs more than Privacy


A committee report pushed to take on lesbian, gay, bisexual and transgender (LGBT) populations in health studies. This is the gist of the report prepared by a committee at the Institute of Medicine. The details said that information on these populations should be collected beforehand. This means that these data should be readily accessible in the event that these people would need health services. This would help the health professionals and related personnel to serve them better. The most essential is that they were known so that it would be easier to understand specific health conditions that affect them.

There is very little complete data on LGBT population health status and needs as of the present. Although they are provided with medical services, the problem lies in the way they are being acknowledged. Still, these groups are not seen as different from one another. Due to the scarcity of comprehensive data, the report recommended the need for health researches that focus on how to bridge this gap. Specifically, these should give emphasis to the different stages of life among the LGBT populations. These should delineate the research strategy and data collection procedure should be put in place. The main purpose is to get a fuller grasp of these groups of population.

There should be a change of course in research from being too broad to more particular. Race and ethnic minorities used to be the concentration of health researches. It is just timely to input research efforts not only on usual collection of information. There should be more importance on the understanding of diverse health conditions that are widespread among various groups, or those that affect them in an unusual way.

When comes to health needs and services, personal privacy is not an issue. However, the shame placed by society on gender and sexual minorities can make them cautious to reveal their sexual orientation. While a few would openly demonstrate what they really are, others would think many times whether to do the same. Being a minority population is another problem that researches along this field would encounter. Extra hard work has to be done in order to come up with adequate number of individuals who would comprise the sample population.

Government should push through despite these perceived problems. These should not stop its efforts to collect demographic data on LGBT individuals. It should be supportive on finding ways to provide standardized measures of sexual orientation, at the same time gender individuality. The National Institutes of Health should provide trainings on how to conduct research with LGBT populations. In the end, the team recommends that these data should be produced by electronic means with due concern on individual privacy.

Image courtesy of:

Image: renjith krishnan / FreeDigitalPhotos.net

Thursday, April 7, 2011

A Little Less of Privacy Means Safety


The time has come for school bus drivers to let go of their personal privacy. This they have to do so that the safety of their passengers will be guaranteed. They have to reveal any mental and physical health issues prior to their employment. They also have to agree to undergo random drug testing and to list the medications they are on. These recommendations were written by Judge Bruce Fraser in the fatality inquiry report on the death of Kathelynn Occena in 2007.

The nine-year-old girl was killed and three others were hurt including her sister in a school bus accident on October 18, 2007. The vehicle driven by Louise Rogers swung over into a parked gravel truck then crashed into a power pole. All the four victims are studying at the Mountain View Academy, but were riding on the bus owned by the Third Academy at that time.

In his report, John Fraser also wrote that there was no hint that the driver did it on purpose. It cannot be explained why the bus driver drifted onto the shoulder. Later investigations revealed that Ms. Rogers had recently been hospitalized for mental health problems. She was then prescribed sleeping pills and antidepressants.

Fraser’s report also included the assessment of the design of the school bus that was involved in the accident. He wrote that the bus was designed such that the passenger section extends beyond the cab or engine section. This endangers passengers because they are exposed outside the “safe” area of the bus. This design flaw is often found in smaller buses and which has to be given consideration.

The recommendations presented by the judge received positive responses. In additon, he also wrote that bus drivers who went on leave due to mental or physical issues should be required to submit a report. This has to be issued by a health professional, stating therein whether the person is fit to resume work. This is one way of ensuring that drivers are physically and mentally prepared for the job.

There are proposals that urge bus drivers not to use hand-held devices. This includes, but not limited to, cellphones and musical devices while on duty, especially while driving. These devices affect the focus and concentration of drivers. A new legislation is being drafted banning all hand-held devices behind the wheel.

The lesson from this incident is that all schools should set stricter standards in the hiring of school bus drivers. There should be a pre-employment preparation that assesses the mental health of would-be drivers. It is very vital to determine whether these issues will affect their driving skills. At the end of all these, a little less of privacy would guarantee the safety of children.

Image courtesy of:

Image: Arvind Balaraman / FreeDigitalPhotos.net

Wednesday, April 6, 2011

Violate My Privacy at Your Own Risk


A 23-year-old man was accused of violating the online privacy of women. George Bronk pleaded guilty to charges including computer intrusion, false impersonation and possession of child pornography. He is about to serve a six-year sentence as promulgated by the state attorney general’s office. A probation officer recommended that he should serve four years instead.

With ample technical knowledge he was able to intrude into the Facebook accounts of some women. He then searched for nude or seminude photos and videos of his victims. After finding some of these materials, he forward the materials to the women’s contact lists.

According to the prosecutors, Bronk was "stalking the women". He changed the email passwords once he intruded their accounts. Having control over their accounts he was able to have some online exchanges with them. There were instances when he intimidated at least one woman to send him some more of similar photos. He also threatened his victims to distribute the pictures that he already had if they would not give in to his demand.

These women come from England, Washington, D.C., and 17 other states. Investigators were able to track them when they searched Bronk’s computer. They also found 172 email files containing nude and seminude photos in the same computer. The women said that their privacy rights were violated. They found out that their photos were distributed to co-workers, families, employees and friends.

Attorney Monica Lynch stood in defense to George Bronk. She gave explanation why her client was able to do such offense. She said that he was immature, unemployed and killing time as he took care of his ill parents. Having nothing else to do, he found trolling women’s Facebook pages as his way of “buying time”. He was able to look at their emails, gleaned enough personal information that he was able to answer basic internet questions to access their accounts.

The lawyer further added that Bronk was a naïve, young person who was into alcohol. He was not conscious that he was causing public embarrassment. His leisure time was spent sitting in front of his computer and doing these things. She also argued that the victims themselves should be blamed for what happened. They put themselves at risk by taking and uploading those explicit photos and videos.

Image courtesy of:

Image: Salvatore Vuono / FreeDigitalPhotos.net