Invasion of Privacy! Big Brother and the Company Hackers

C

cable

convergence (advertising), 49 “51

dopplegangers, 32

cache, memory, 230 “231

caller ID, telemarketing (TSR), 73

cameras

ACLU, 88

aerial surveillance, 89 “91

CCTV, 87 “89, 252 “254

image stabilization technology, 89 “91

Wescam, 89 “91

CCS International Ltd. Web site, 59

CCTV (closed-circuit television), 87 “89

ACLU, 88

surveillance, 252 “254

CDT (Center for Democracy & Technology) Web site, 225, 229

Cell Phone Magic Web site, 59, 179

cell phones

dopplegangers, 32

presence awareness technology, 85

Center for Responsive Politics Web site, 42 “44

CEOs, White Hat Briefings seminars , 108

CERT (Computer Emergency Response Team)

hackers, 124 “125

Web site, 123

cheap-toothpick syndrome, 94 “97

Sprint, 153

TiVo, 154 “156

checkpoints, security (public zone), 248 “249

children, fax.com, 65 “66

China, cyber-terrorists, 115

Chrome, 145

chronology, Steve Kirsch/fax.com, 57 “59, 61

CIAC warnings Web site, 193

Clarke, Richard (Black Hat Briefings), 128 “129

class action lawsuits, fax.com, 56 “57, 63 “65, 68 “69, 233

cleanup, disks (Disk Defragment), 202

clipboards, spyware, 83

closed-circuit television.See CCTV

clothing (public zone), 246 “248

Coca Cola (advertising), 158 “159

common sense (public zone), 246

companies

cyber-terrorists, 117

security, 125 “127

complaints, filing (FTC), 73

Computer Emergency Response Team.See CERT

computer privacy zone.See computers

computers.See also hackers; Internet

administrator accounts

changing, 187 “188

dummy accounts, 189

private folders, 188 “189

troubleshooting, 189

antivirus programs, 211 “213

AutoComplete, 231

cookies, 228 “231

Disk Cleanup, 202

Disk Defragment, 203

EFS encryption, 203 “205

file/printer sharing, 195 “196

firewalls

installing, 213 “214

ZoneAlarm, 23, 210 “211, 213 “214

instant messagers, 236 “237

media (Internet), 133 “134

memory cache, 230 “231

Microsoft Error Reports, 193 “194

passwords

creating, 190 “191, 220 “221

Internet Explorer, 199 “200

privacy zone, 22

Recycle Bin, 200 “202

remote assistance, 196 “197

security

assessing, 186 “187

patches, 205 “207

spam

blockers, 233

deleting, 234

filters, 234 “236

Netscape, 234

Outlook, 234

preview panes, 234

security, 232 “233

spyware, 233

spyware.See spyware

SSL, 231 “232, 242

Start menu files/programs, 198 “199

startup, configuring, 219 “220

surveillance, 253

system restore, 191 “193, 210 “211

Tweak UI history, 199 “200

updating, 205 “207

user accounts

creating, 187 “188

restricting access, 188 “189

con men.See fraud

configuring startup, 219 “220

consumer profiling.See information brokers

Consumer Sentinel (FTC), 73, 242 “243

contractors, dopplegangers, 32

convergence

advertising, 46 “47

broadband, 49 “51

cable, 49 “51

coupons , 47 “48

discount cards, 48

do not call lists, 50 “52

low-tech, 49 “51

opting out, 50 “52

TCPA, 51

telemarketing, 49 “51

Microsoft, Xbox, 52 “54

overview, 46 “47

Cookie Central Web site, 229

cookies, 228 “231

Cordant, 85 “86

corporate political contributions, privacy agreements, 42 “44

coupons, convergence (advertising), 47 “48

Cox Business Services.See fax.com

crackers

Amsterdam Mafia, 111

crime syndicates, 111

Mitnick, Kevin, 111 “113

Russia, 111, 114 “115

Script, 115

stolen credit card auctions, 114 “115

Ukraine, 114 “115

warez, 139

Craig Ball's Sampler of Informal Discovery Links Web site, 59

creating dopplegangers, 33 “34

credit cards

dopplegangers, 32

fraud, 242

public zone, 249 “252

stolen, auctions, 114 “115

telemarketing, TSR, 73

credo, hackers, 110

crime syndicates, crackers, 111

Croatia, 122

Cult of the Dead Cow Web site, 123

cyber-terrorists

Al Qaeda, 116, 126 “127

China, 115

companies, 117

dams, 117

FBI, 116

gas, 117

Honker Union, 115

IDC, 116

missile guidance systems, 127

MSBlast worm, 116

Nachi worm, 116

nuclear reactors, 118 “119

oil, 117

power grids, 117 “119

satellites , 127

SCADA, 117 “118

Sobig.F virus, 116

U.S., 116

U.S. Navy, 127

water treatment, 117

Категории