™ There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application. The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share files between your desktop and laptop for example. But are these concerns grounded in truth? Is there really a privacy issue here? I downloaded and installed the new Desktop Search beta the other day. It has some interesting new features such as the ability to remove panels from the sidebar and dock them anywhere you like on your desktop. And there are several more panels available to let you do anything from manage what is indexed, to passing time by playing games. One of the coolest features is its ability to reach beyond the desktop it is on to do a variety of things. Now, I can play tic tac toe with co-workers, or even friends around the world. But the biggest, and most troubling update to some is the ability to remotely index files, as well as share them using Google servers to temporarily store the items. By turning this feature on you give Google the right to store your files for up to 30 days. Therein lies the crux of the issue there seems to be no way around this 30 day requirement. All I have to say is ‘so what?’ So what if you have to give Google this ability? Google will encrypt the data so that no one else can access it. And even if there is some sort of DOJ subpoena requiring access to these files I don’t think it would stand up in court. This is because Google has set up a network whereby all your Google activities are tied to one Google account. Your personalized home page, gmail, google analytics, adwords and adsense accounts all share the same Google account. Therefore, it would be difficult for anyone to get a subpoena to review information pertaining to only part of that account. Legalities aside, if you are that concerned about the privacy being surrendered to Google in order to use this system then don’t sign up for it. You can still download and use the new Desktop Search with most of its new features, but you don’t have to use the file sharing. But what if you want to share files between computers? Well, do what I did go to your favorite electronics store and buy a flash drive. I just bought a USB flash drive with over 2 gigs of storage for under $100. Now I can easily transfer anything between any computer with no worry of some government agency wanting to know what’s on it. As I said, I do have the new Google Desktop installed, and I did look at the settings for the search and file sharing, but I didn’t turn them on. I have no need to be able to search my home computer from work and vice versa, nor do I need to share files between the two computers. And if I did, I’ll simply use the FTP site I have set up on a 샌즈카지노 computer at home or the aforementioned flash drive. Really, when it comes to all the other ways that Google captures your personal data, from search history to Gmail, should we be all that concerned that some files may end up being stored on a Google server somewhere? I think we should have other concerns. For example, I think we should be concerned about what Google already knows about us via those services I mentioned earlier. I think business owners should be concerned that such a service would allow employees to easily steal and transfer data to and from work. I think if you are that scared of the US government infringing on your privacy then you shouldn’t have a Google account, nor Google Desktop Search nor a Gmail account. In fact I don’t think you should have any Internet accounts because quite honestly everyone is a target for the DOJ. Further, I can almost guarantee you that your local ISP will fold and hand over the data much easier than Google will. So before you start complaining about how Google could infringe your privacy, remember that YOU have the ability to stop it from happening. It’s just a matter of choosing to do so.
0 Comments
™ It is deniable that our works and lives are more convenient and easier when using wireless. We can work anywhere and that is why wireless networks are becoming so popular. Especially if you have broadband 코인카지노 Internet access, a wireless router can give you instant communication with the world. Imagine you are sitting by the pool and enjoying chatting through the Internet. Or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all. Unfortunately, many, or even most, wireless units don’t come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider. Identity theft seems to be the most serious problem. If your network is unsecured, the personal data on your wireless electronic equipment is also unsecured. The order you just placed for a book at Amazon may have given your contact and payment information to an unscrupulous hacker! Nearly every town in which “WiFi” is common will have “War Drivers” and “War Chalkers” at work. These are people who walk or drive around town with wireless equipment, searching for unsecured networks. The “Chalkers” then live up their name, marking curbs and other public items with chalk so that others can more easily find and exploit your network. In fact, not all “War Drivers” are hackers, of course. Many just want to use your network for free, but the risk is high if you don’t learn how to protect yourself. You can usually find quite a bit of free information as to how to secure your network at the website of your router’s manufacturer, or by doing a search in a search engine for a phrase like “secure home wireless.” In addition, there are also your neighbors who may find your network by accident and enjoy nosing into your activities and using your Internet access at will, slowing down your network speed in the process. Even many businesses use cheap, home-use quality equipment for their company networks. With the poor security often found on small business networks, anyone with a basic knowledge of wireless can access sensitive company and customer data. It is highly recommended that you hire service companies to secure your network for you, or else you will have to bear with a risk of being exploited. A search of your local yellow pages or an inquiry at your neighborhood computer store should yield professional help and get your private data private again. ™ Wireless networks use radio waves instead of wires to transmit data between computers. Here’s how: The Binary Code: 1s and 0s It’s well known that computers transmit information digitally, using binary code: ones and zeros. This translates well to radio waves, since those 1s and 0s can be represented by different kinds of beeps. These beeps are so fast that they’re outside the hearing range of humans. Morse Code: Dots And Dashes It works like Morse code, which is a way to transmit the alphabet over radio waves using dots (short beeps) and dashes (long beeps). Morse code was used manually for years via telegraph to get information from 1 place to another very quickly. More importantly for this example, though, it is a binary system, just as a computer system is. Wireless networking, then, can be thought of as a Morse code for computers. You plug in a combined radio receiver and transmitter, and the computer is able to send out its equivalent of dots 메리트카지노 and dashes (bits, in computer-speak) to get your data from here to there. Wavelengths And Frequencies You might wonder how the computer can send and receive data at high speed without becoming garbled nonsense. The key to wireless networking is how it gets around this problem. First, wireless transmissions are sent at very high frequencies, which allows more data to be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) — a frequency similar to mobile phones and microwave ovens. However, this high frequency produces a wavelength that is very short, which is why wireless networking is effective only over short distances. Wireless networks also use a technique called “frequency hopping.” They use dozens of frequencies, and constantly switch among them. This makes wireless networks more immune to interference from other radio signals than if they transmitted on a single frequency. Internet Access Points The final step for a wireless network is to provide internet access for every computer on the network. This is done by a special piece of wireless equipment called an access point. An access point is more expensive than a wireless card for 1 computer, because it contains radios capable of communicating with around 100 computers, sharing internet access among them. Dedicated access points are necessary only for larger networks. With only a few computers, it is possible to use 1 of them as the access point, or to use a wireless router. Industry Standards Wireless equipment from different manufacturers can work together to handle these complex communications because there are standards which guide the production of all wireless devices. These standards are technically called the 802.11. Because of industry compliance with these standards, wireless networking is both easy to use and affordable today. Wireless Is Simple To Use If all this talk of frequencies has you worried — relax. Wireless networking hardware and software handle all of this automatically, without need for user intervention. Wireless networking, for all its complicated ability, is far simpler to use than you might expect. |
Archives
January 2023
Categories |