Friday, April 29, 2011

How to Avoid Weight Loss Spam

Do not be a victim of spam just because you want to lose weight fast. Do not join the group of users who lost money in those bogus offers. The spam trap is there, and it has been intended for you. Be smart enough not to say “yes” to the products that claim instant weight loss. Find a legitimate site offering legitimate products. Be wary of con artists who have mastered their craft and make their claims appear legitimate. Protect your privacy before they take it away from you.

Spam may be either of two types. First, there are those that are claiming that products such as pills, creams, patches, or others will guarantee weight loss even without diet or exercise. Second, those that claim to block fat absorption, calories or carbohydrates so you don’t gain weight.

The results of a New York-based research study have given additional light as to why overweight individuals are easily victimized by spam. For every five overweight people, one has been a victim of spam. Another result shows that 88% of overweight people say that they received spam. As to the opening of spam, 42% of overweight individuals say they have opened the emails, and a good 18% of people with weight problems say they bought the products offered in the mails.

Experts give an explanation to why more overweight people get spammed than other groups. According to them, these people visit more weight loss sites than others so they end up in the databases of these sites. With the hope of getting the easiest way out, they easily give in to the offers. It is easier for them to become targets of spammers than other groups. This is especially so when they provide their personal information to these websites, which then makes them become victims.

Spam will not work if users will not give the information that spammers need. Basic among all these is personal information, especially an email address that is uploaded online. Some seemingly simple posts such as “I want to lose weight” placed in social networking sites can trigger spam. Keep in mind the 42% open rate and 18% conversion rate of weight loss spam. Let us look at a “worst case” spam scenario. For example, a spammer will send email offering a bogus weight loss product to 1,000 targeted individuals. Count how many emails equals 1% of these. It is 10. If ten spam recipients finally decide to buy the “product” being offered, how much money would the spammer have? Assuming that the unit cost of the product is $50, the spammer gets $500.

Haste makes waste. Don’t get spammed! It will be a waste of money trying to lose weight instantly through bogus offers. Always hold tight to your personal information unless the site is trusted. Use the privacy settings of social networking sites to control your personal information. It would still be best to hold on to the experts’ advice on losing weight. There is no better way than increasing physical activity to burn more energy and eating fewer calories.

Image courtesy of:
Image: Patchareeya99 / FreeDigitalPhotos.net

does weight Watchers Work
ganar dinero facil

Tuesday, April 26, 2011

Flink12 and Privacy in Social Networks

There are many social networking platforms available today to share your public self. But where do you go to privately and safely share your personal, day-to-day thoughts and experiences? Flink12 was created as a safe and secure way to share your private life. It is playful, safe, extremely private and easy to use. A unique way of sharing and communicating, Flink12 allows you to share your life in a meaningful way with the people you know and care about the most.

What is a Flink? A Flink is a group of twelve cows. Flink12 allows you to create individual groups of twelve people or Flinks for your friends, family, or coworkers. These Flinks allow you to communicate in a discreet way, sharing professional information with coworkers and personal information with friends and family. These groups of twelve are ideal for sharing different information for different types of relationships.



To sign up for a free Flink12 account, you can visit www.flink12.com.

Monday, April 25, 2011

How to Stay Safe with HTTPS


The continuing increase in the number of malicious tools on the internet is taking its toll on web users. The online community is now beset with various security threats like identity theft, viruses, and other things that threaten online safety. For example, one of the latest malicious tools, Firesheep, is capable of stealing passwords for email and social networking accounts.

To address this disturbing situation, the Electronic Frontier Foundation (EFF) and Access are now campaigning for the international deployment of HTTPS through HTTPS Now. Its main objective is to improve security measures and make web surfing safer by calling on users to join them in their campaign. This includes, among other things, spreading the word about HTTPS Now and how to make full use of HTTPS security features by using it correctly.

HTTPS, or Hypertext Transfer Protocol Secure, uses encryption technology to provide optimal protection. Before a user’s request is sent by the browser to the server, it is first encrypted. In return, the resulting pages are also encrypted, making the data contained therein “unreadable” by anyone while it is being sent to the user’s computer. This makes HTTPS web surfing more secure as compared to HTTP (Hypertext Transfer Protocol) alone. Even now, many websites have still not moved away from HTTP, which is unencrypted and susceptible to several kinds of threats.

The HTTPS Now campaign has three major components. These are: web surfing protection, survey of the overall status of HTTPS deployment, and helping site operators implement HTTPS. A minor component of the campaign is the sharing of updated tools that users can use to guard their web browsing.

The installation of HTTPS Everywhere by web users is the first component of the campaign. The EFF and the Tor Project created this security tool for the Firefox browser. This is capable of automatically encrypting a user’s browsing, thus changing it from HTTP to the more secure HTTPS.

Many websites are still using HTTP and are still vulnerable to malicious attacks, as admitted by the EFF and Access. This is the focus of the second component of the campaign; calling on users to give feedback on whether the sites they visit are using HTTPS or not. They believe that a relatively accurate picture on the extent of internet security and HTTPS use can be provided by user-generated information.

The third element is providing support to website operators regarding existing resources in learning how to use HTTPS correctly. These detailed resources are especially made for the deployment of the HTTPS tool. The purpose of which is to give website operators a full understanding of the value of using HTTPS.

Web users are encouraged to work with the EFF and Access, who believe that web users can give a correct picture of HTTPS and its current deployment status. Taking all of these together, they will find it easier to target those web operators who need to modernize their sites. The partnership can help reduce, if not eliminate, privacy threats and lead to safer web surfing.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Saturday, April 23, 2011

Are You Ready to Give Up Your Privacy?


A new “geolocation information generator” has been launched on the internet. Its creator, Yiannis Kakavas, has given it the intriguing name of Creepy. Many privacy rights advocates have raised their fears about the possible impact of this application to individual privacy. What can this new application do and why should it stir such concern?

Creepy was created by Kakavas for Linux or Windows. The third package that is still in process is for Mac OS X. Basically, this app pinpoints a user’s location by making use of the user’s data in social networking services. It can do this by gathering bits of the user’s data that is uploaded to the network and putting together pieces of information. The software has just been launched but is already performing well.

Creepy has an integral search utility to locate any individual online. The user has only to input the Twitter or Flickr username of that individual then hit the “Geolocate Target” button. All photos or tweets that the individual has published or posted online will be downloaded by Creepy. From those materials, Creepy will pinpoint the user’s location at the time each of the materials was published.

The software then aggregates every piece of information on hand to find a meaning. After processing, the user’s different locations are presented by showing a map. Individually, these data on locations do not tell any significant information. But when aggregated as a whole, it has much to tell about the “target”. It shows his or her most frequented places or hang-outs, the vicinity around his or her house, and even his or her office. These bits of information are now enough to make him or her vulnerable to stalkers.

The program was completed by Kakavas in only three months. He was able to access and make use of publicly-available libraries like osmgpsmap, pyexif2, and tweepy. In his mind, Kakavas believes that he made available something that will make people value their privacy. He would like users to be more aware of the dangers of careless sharing of their personal information online.

He explains that small pieces of data can be put together in order to make bigger, more meaningful information. Users are often too late to realize that it would have been better if they kept that information to themselves. The common ones are address, place of work, the places they hang out most often, when they are not at home, and many others.

He added further that he created Creepy also for social engineers to have a means for information gathering. Particularly for security analysts, Creepy can be used to carry out penetration testing. The information that they gather now can be used for different purposes later.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Tuesday, April 19, 2011

A Cookie for Your Privacy


A cookie is text file that a browser sends to a web server when a user visits a website. This is stored on the user’s computer the first time he or she accesses the site. It is also known as a web cookie, browser cookie, or HTTP cookie. Once stored, the browser uses this file to navigate the website more easily. Some of its uses are for logins, themes, language settings, shopping cart contents and more features that use text data.

Some cookies have dates of expiry. These may be stored by the browser and deleted as the expiration date passes. Other cookies do not have expiry dates. They are automatically deleted as the browser is terminated. Cookies help a website to deliver better services, although cookies in themselves do not hold information.

Cookie files contain the name of the server, its duration, and the cookie value. The value that makes a cookie unique is a randomly generated number. This helps the server that created the cookie to remember the user when he or she comes back to the site or to navigate through pages. These cookie files are stored in the browser’s “cookie file”.

A cookie is not an executable file, meaning that it cannot replicate itself. It is different from a virus, but it can be a threat to privacy in some situations. Because a browser has a mechanism that sets and reads cookies, a cookie can be used as spyware. The most common cookie that can function like this is the “zombie cookie”. A cookie that is used as spyware can track computer activity. That is why it is up to the user if he or she will or will not accept cookies.

A cookie merely helps the website to identify the user and keeps a record of his or her information. It cannot do harm to the computer by itself because it cannot access the user’s hard drive. For example, a user does not need to input his name every time he or she visits the same site. The website may ask the user to input his or her name the first time he or she visits the site and the next time he or she visits the site, the cookie tells the server who he or she is. Automatically, as the website opens, it already contains his or her name.

Privacy issues to users are the most common threat among cookies. The cookie stores any personal information that a user provides to a website. This can make the user vulnerable to computer hacking or identity theft. This is the reason why some users would not accept cookies or would want to delete cookies stored in their computers.

There are various ways of deleting cookies, depending on the user’s browser, however, the process can generally be done in three steps for Internet Explorer.

First, on the browser, go to “Tools”.

Second, select “Internet Options” or “Options”.

Third, under the “General” tab, choose “Delete Cookies”. The rest may be a combination with other functions. The user may opt to delete all cookies or just select which ones to delete.

More information about how to delete cookies for other versions and browsers is available at http://www.aboutcookies.org/default.aspx

Image courtesy of:

Image: Arvind Balaraman / FreeDigitalPhotos.net

Thursday, April 14, 2011

Google is Set to Improve its Privacy Programs


There is no other way for Google but to try its best to improve its privacy programs. After being swarmed by numerous charges, it is now stepping up its efforts to review its existing policies. The issue started after the launching of its new networking service called the Buzz in February 2010. The charges all point to Google’s violation of its own privacy policies and for deceiving users.

The new networking service is integrated with Google’s email service, the Gmail. Buzz can identify the most frequently used contacts by Gmail users. These contacts are automatically loaded by Buzz into its so-called circle of friends and then made public. Some users found the technology amazing, but many considered it an invasion of privacy. Users asserted that they would not want all their contacts to be in the “circle” and open to everyone else. They found out that some contacts might have privacy considerations like ex-spouses, doctors, or recruiters.

Google and the Federal Trade Commission worked on the issue and reached a settlement agreement. The search giant laid down its plan to immediately study whether its services contained privacy risks. It has as well promised to implement stricter privacy risk elimination standards before launching any new service. Consequently, it would develop relevant policies that would address the risks that may be found.

The company has also agreed to be subjected to an independent audit. This will oversee and validate Google’s privacy program once every two years in the next twenty years. The settlement agreement also required Google to always obtain users’ consent before transacting business with any third party using their information. Unlike what happened with Gmail, any alteration on its services should always be checked against its existing privacy policies.

The FTC reiterated that Google failed to obtain users’ consent with its Buzz service. This is a clear violation of its own privacy policies. The policies explicitly explain its commitment to seek the user’s permission if collected information would be used in a different manner. FTC Chairman Jon Liebowitz called for companies to honor what they stated in their privacy pledges.

The Buzz missteps had prompted Google to be more serious with its privacy program. It is hopeful that with the settlement, the current issue would also die down. It also apologized for not coming up to the usual standards in terms of user control and transparency. On the FTC’s side, this settlement would hopefully stir up greater importance placed on better privacy standards for Google and for the whole internet community.

Image courtesy of:

Image: jscreationzs / FreeDigitalPhotos.net

Tuesday, April 12, 2011

The LGBT Population Needs more than Privacy


A committee report pushed to take on lesbian, gay, bisexual and transgender (LGBT) populations in health studies. This is the gist of the report prepared by a committee at the Institute of Medicine. The details said that information on these populations should be collected beforehand. This means that these data should be readily accessible in the event that these people would need health services. This would help the health professionals and related personnel to serve them better. The most essential is that they were known so that it would be easier to understand specific health conditions that affect them.

There is very little complete data on LGBT population health status and needs as of the present. Although they are provided with medical services, the problem lies in the way they are being acknowledged. Still, these groups are not seen as different from one another. Due to the scarcity of comprehensive data, the report recommended the need for health researches that focus on how to bridge this gap. Specifically, these should give emphasis to the different stages of life among the LGBT populations. These should delineate the research strategy and data collection procedure should be put in place. The main purpose is to get a fuller grasp of these groups of population.

There should be a change of course in research from being too broad to more particular. Race and ethnic minorities used to be the concentration of health researches. It is just timely to input research efforts not only on usual collection of information. There should be more importance on the understanding of diverse health conditions that are widespread among various groups, or those that affect them in an unusual way.

When comes to health needs and services, personal privacy is not an issue. However, the shame placed by society on gender and sexual minorities can make them cautious to reveal their sexual orientation. While a few would openly demonstrate what they really are, others would think many times whether to do the same. Being a minority population is another problem that researches along this field would encounter. Extra hard work has to be done in order to come up with adequate number of individuals who would comprise the sample population.

Government should push through despite these perceived problems. These should not stop its efforts to collect demographic data on LGBT individuals. It should be supportive on finding ways to provide standardized measures of sexual orientation, at the same time gender individuality. The National Institutes of Health should provide trainings on how to conduct research with LGBT populations. In the end, the team recommends that these data should be produced by electronic means with due concern on individual privacy.

Image courtesy of:

Image: renjith krishnan / FreeDigitalPhotos.net