Showing posts with label avoid. Show all posts
Showing posts with label avoid. Show all posts

Thursday, 5 September 2013

Most Internet users take steps to avoid surveillance

IDG News Service - A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center's Internet Project and Carnegie Mellon University.

While 86 percent of the Internet users polled said they made some attempt hide what they do online, more than half of the Web users also said they have taken steps to avoid observation by organizations, specific people or the government, according to the survey.

The survey's findings are based on telephone interviews among a sample of 1,002 adults, age 18 or older in July, with 792 Internet users among the respondents.

People use a variety of measures to decrease their online visibility, the study showed. The most popular one is clearing cookie and browser history, which 64 percent of Internet users polled said they did. Forty-one percent said they deleted or edited something they had posted in the past and 41 percent said they disabled or turned off their browsers' use of cookies, Pew said.

Other measures taken to cloak online activity were not using websites that asked to disclose a user's real name (36 percent of users polled), using a temporary user name or email address (26 percent), posting comments without revealing who you are (25 percent). Twenty-one percent of the Internet users polled said they had asked others to remove something that was posted about them.

Some Internet users also use public computers to browse and give inaccurate information about themselves, while 14 percent said they at times encrypt email and 14 percent said they use services like virtual networks or proxy servers such as Tor anonymity software, which allow them to browse without being tied to a specific IP address, the survey found.

Beyond general measures taken to go online more or less anonymously, the majority of Internet users polled (55 percent) have tried to avoid observation by specific people or groups. "Hackers, criminals and advertisers are at the top of the list of groups people wish to avoid," Pew said.

But a minority of Web users said they tried to hide their online activities from certain friends, people form their past, family members or partners as well as their employers, coworkers, supervisors, companies, people that might want payment for downloaded files and to a lesser extent the government (5 percent) and law enforcement (4 percent).

However, despite these precautions 21 percent of the online adults polled said they have had an email or social media account hijacked and 11 percent said they have had vital information like Social Security numbers, bank account data, or credit cards stolen.

Reprinted with permission from IDG.net. Story copyright 2012 International Data Group. All rights reserved.

View the original article here

Most Internet users take steps to avoid surveillance

IDG News Service - A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center's Internet Project and Carnegie Mellon University.

While 86 percent of the Internet users polled said they made some attempt hide what they do online, more than half of the Web users also said they have taken steps to avoid observation by organizations, specific people or the government, according to the survey.

The survey's findings are based on telephone interviews among a sample of 1,002 adults, age 18 or older in July, with 792 Internet users among the respondents.

People use a variety of measures to decrease their online visibility, the study showed. The most popular one is clearing cookie and browser history, which 64 percent of Internet users polled said they did. Forty-one percent said they deleted or edited something they had posted in the past and 41 percent said they disabled or turned off their browsers' use of cookies, Pew said.

Other measures taken to cloak online activity were not using websites that asked to disclose a user's real name (36 percent of users polled), using a temporary user name or email address (26 percent), posting comments without revealing who you are (25 percent). Twenty-one percent of the Internet users polled said they had asked others to remove something that was posted about them.

Some Internet users also use public computers to browse and give inaccurate information about themselves, while 14 percent said they at times encrypt email and 14 percent said they use services like virtual networks or proxy servers such as Tor anonymity software, which allow them to browse without being tied to a specific IP address, the survey found.

Beyond general measures taken to go online more or less anonymously, the majority of Internet users polled (55 percent) have tried to avoid observation by specific people or groups. "Hackers, criminals and advertisers are at the top of the list of groups people wish to avoid," Pew said.

But a minority of Web users said they tried to hide their online activities from certain friends, people form their past, family members or partners as well as their employers, coworkers, supervisors, companies, people that might want payment for downloaded files and to a lesser extent the government (5 percent) and law enforcement (4 percent).

However, despite these precautions 21 percent of the online adults polled said they have had an email or social media account hijacked and 11 percent said they have had vital information like Social Security numbers, bank account data, or credit cards stolen.

Reprinted with permission from IDG.net. Story copyright 2012 International Data Group. All rights reserved.

View the original article here

Survey: Almost 90 percent of Internet users have taken steps to avoid surveillance

A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center’s Internet Project and Carnegie Mellon University.

While 86 percent of the Internet users polled said they made some attempt hide what they do online, more than half of the Web users also said they have taken steps to avoid observation by organizations, specific people or the government, according to the survey.

The survey’s findings are based on telephone interviews among a sample of 1002 adults, age 18 or older in July, with 792 Internet users among the respondents.

People use a variety of measures to decrease their online visibility, the study showed. The most popular one is clearing cookie and browser history, which 64 percent of Internet users polled said they did. Forty-one percent said they deleted or edited something they had posted in the past and 41 percent said they disabled or turned off their browsers’ use of cookies, Pew said.

Other measures taken to cloak online activity were not using websites that asked to disclose a user’s real name (36 percent of users polled), using a temporary user name or email address (26 percent), posting comments without revealing who you are (25 percent). Twenty-one percent of the Internet users polled said they had asked others to remove something that was posted about them.

Some Internet users also use public computers to browse and give inaccurate information about themselves, while 14 percent said they at times encrypt email and 14 percent said they use services like virtual networks or proxy servers such as Tor anonymity software, which allow them to browse without being tied to a specific IP address, the survey found.

Beyond general measures taken to go online more or less anonymously, the majority of Internet users polled (55 percent) have tried to avoid observation by specific people or groups. “Hackers, criminals and advertisers are at the top of the list of groups people wish to avoid,” Pew said.

But a minority of Web users said they tried to hide their online activities from certain friends, people form their past, family members or partners as well as their employers, coworkers, supervisors, companies, people that might want payment for downloaded files and to a lesser extent the government (5 percent) and law enforcement (4 percent).

However, despite these precautions 21 percent of the online adults polled said they have had an email or social media account hijacked and 11 percent said they have had vital information like Social Security numbers, bank account data, or credit cards stolen.

Discovering that many Internet users have tried to conceal their identity or their communications from others was the biggest surprise to the research team, they said in a news release. Not only hackers, but almost everyone has taken some action to avoid surveillance and despite their knowing that anonymity is virtually impossible, most Internet users think they should be able to avoid surveillance online, they said.

Most U.S. citizens would like to be anonymous and untracked online, at least every once in a while, but many think it is not possible to be completely anonymous online, Pew said. “This reinforces the notion that privacy is not an all-or-nothing proposition for internet users. People choose different strategies for different activities, for different content, to mask themselves from different people, at different times in their lives,” the researchers wrote.

One of the most revealing contradictions in the results of the survey is that those who have taken steps to try to avoid observation by others and those who have taken more general steps to be anonymous are more likely than others to have personal information posted online, the researchers said.

Internet users surveyed said they have a photo of themselves online (66 percent), while about half of those polled said their birth date was available online. A minority said that their email address, home address, mobile number or political affiliation was available.

A majority of Web users polled, 66 percent, said they think current privacy laws are not good enough to provide reasonable protections for people’s privacy on their online activities.

“Interestingly, there are not noteworthy differences in answers to this question associated with political or partisan points of view. Tea Party supporters, conservative Republicans, self-described moderates, and liberal Democrats are not statistically significantly different in their answers,” the researchers wrote.

Loek Essers focuses on online privacy, intellectual property, open-source and online payment issues.
More by Loek Essers, IDG News Service


View the original article here

Wednesday, 4 September 2013

6 mistakes to avoid when setting up your small business wireless network

Mobile devices are now as essential to workplaces as copy machines and coffee makers. That means a fast, reliable wireless network is essential as well. But building one isn’t as simple as plugging in your ISP-supplied router and connecting your smartphone. In fact if you’ve never done it before, putting together a Wi-Fi network robust enough to support your business can be pretty tricky. To shorten the learning curve, we’ve highlighted some common pitfalls and how to avoid them.

It’s common to start with an entry-level wireless router when setting up your network. But as the business grows and high-throughput appliances such as NAS or IP cameras get added into the mix, many consumer grade routers get overloaded by the heavy usage.

Unfortunately, there’s no easy way to tell ahead of time if an off-the-shelf wireless router is up to the task of running your small business network. If you do experience unexplained slowness, one solution is to set up a standalone network switch and wireless access point. Offloading some clients to the access point will reduce burden on your router’s processor, while a new gigabit ethernet switch will increase your local network’s speed.

Another mistake small businesses frequently make is relying on only one access point regardless of the network load. The ubiquity of smartphones, tablets and laptops in the workplace means you could easily have dozens of wireless devices with just 8 to 10 employees, so it’s best to err on the side of over-coverage. Installing multiple access points up front reduces the risk of productivity killing bottlenecks.

You can also reduce the burden on your wireless network by migrating ethernet-ready devices such as desktop PCs and printers to wired networking whenever feasible.

The physical location of a Wi-Fi access point is critical, as you will quickly find if you place one in an alcove, beside large metallic fixtures or cupboards, or next to thick concrete beams. “Line of sight” barriers like these will weaken your Wi-Fi signal.

Because there are generally more obstructions—such as cubicle walls and furniture—near the floor, an elevated location works better than a lower one. A simple way to assess possible locations is to visualize the wireless signals emanating from the access point in a straight line. Parts of the office that are blocked by three or more obstructions will likely experience weak or nonexistent signals.

It’s easy to be seduced by the 300Mbps or 450Mbps speeds 802.11n wireless routers promise. However, these are theoretical and don’t account for real-world conditions or the substantial protocol overheads inherent to wireless networks.

In our review of the Asus RT-N66U router, for example, the router offered a performance of just 226Mbps at 9 feet, dropping to 43.1Mbps at 65 feet. What’s more, the figures are applicable only for a single client–this bandwidth would be divided among any additional devices operating on the same frequency band. If you need to routinely transfer large files across your local network, consider setting up a wired Gigabit network.

When you need to get your network up and running quickly, it’s tempting to start using your router without bothering to change the default channel. But unless you live far from civilization, it’s likely this channel is already in use by a neighbor, which can cause interference that degrades your wireless performance.

To avoid this, change the channel on your device when you set it up. It’s not difficult as there are only three non-overlapping channels: 1, 6, and 11. Of course, locations that are swamped with multiple Wi-Fi networks may need to experiment with overlapping channels for the best results. Some wireless access points detect nearby Wi-Fi networks and offer information about the channels they use as well as their signal strengths, which helps tremendously.

If your router offers simultaneous dual band, make sure your 5GHz radio is enabled. This allows laptops that support 5GHz to be offloaded onto this less-cluttered band, freeing up the 2.4GHz band for other devices such as smartphones and tablets. Also, the 5GHz band’s shorter range allows for the use of additional APs in high-density deployments with less risk of interference.

Paul has a lifelong affinity for checking out all sorts of tech gadgets, enterprise gear, and everything in between. With half a decade in the IT industry under his belt, He is especially interested in how technology can be practically leveraged to help businesses do more.
More by Paul Mah


View the original article here