few people have a text file labeled "secret personal information and
credit card numbers" on their system, but these things are often hanging
around in cache files or ram, even after an application quits.  they may
also be on the drive in files that have been deleted, but the data is
still on the drive.  "deleting" a file on most systems only marks the
space it used as available, it doesn't erase the data, that's how
"unerase" works, it finds the data and puts entries for it back into the
file system.  if someone can break into the system they can also plant
spy ware on the machine, which can send all your keystrokes, and even
data from web pages you view or simply links to them to an unknown spy
somewhere on the net.  

there are several keystroke monitoring programs i have a copy of,
intended to let a systems owner know if people are using it.  they
aren't detected by virus scans, and are usually invisible extensions put
in the system folder, and even if not invisible it's easy enough to make
them that way.  the collected data files may also be invisible.  it's
very hard to detect spyware on your machine, particularly for the
average user but even for an advanced user.  any of these programs can
infiltrate a system just like a virus or through a weakness in the
operating system or an application, sometimes even an application the
user doesn't think of as being web based but which includes some web
functionality.  even the automatic checking for newer software versions
and their downloading provides an ideal way to infest a system with
spyware, by wrapping the virus in a fake software update along with the
current version of the software they think they are getting.

then there's the password security problem, some are easy to guess, some
people use software to automatically keep track of all their user names
and passwords for various sites.  if this data base is broken into the
spy can then impersonate you on websites and order things in your name,
either on your open account, or on your credit card which some
e-business sites insist on keeping track of for you, to make it easier
for you to buy, but it means that once someone has your password and
user name they immediately have access to your credit card info. 
depending on the site they might just be able to use it with the one
vendor, or if the vendor is careless the full credit card info may be
available to them which they can then use anywhere.

the problem is it's easy to know, in most cases, if your house has been
broken into and someone has stolen or used your computer (especially if
you're home).  it can be very, very difficult to know that someone has
broken into your system from some remote location, possibly in another
country or on another continent.  even if you do detect it, someone
hiding behind a keyboard can be very difficult to track down and arrest
or stop, particularly when it becomes an international problem.  and if
you do detect an intrusion, it's difficult to be sure you know the full
extent of the incursion.

Eagle wrote:
> 
> On Monday, July 15, 2002, at 04:09 , Eric D. wrote:
> > on 15/7/02 12:02, Brian L. Matthews at [EMAIL PROTECTED] wrote:
-----------
> > This is one argument I do not understand -- who in their right mind
> > leaves
> > credit card info on a PC where anyone can have easy access. I'd be much
> > more
> > worried about someone walking in and using a computer directly than
> > having
> > them hack it from farther afield.
------------------

-- 
Philip Stortz, mad scientist at large. --Every 13 seconds an American
gun owner uses a firearm in defense against a criminal.  gun ownership
deters crime, it doesn't increase it.  gun control increases crime and
cost lives.  <http://www.pulpless.com/gunclock/framedex.html>


-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Macintosh? Get free email and more at Applelinks! 
<http://www.applelinks.com>

Reply via email to