Online Privacy and Anonymity


  • A more common means of getting infected, especially with the “MySpace” generation, originates through the use of peer to peer (P2P) networks.  While peer to peer networks were first drafted as a place to collaborate and share documents with other users, they soon grew into massive online communities in which practically every song, movie, television show, and computer software can be found and downloaded free of charge.  I have to admit, that does sound pretty appealing and I can understand why so many people are drawn toward P2P networks, despite the illegality of sharing copyrighted files.  As the popularity of P2P networks soared, hackers, crackers, and malicious software writers realized there was a whole new medium available to “work” with.   Nowadays, there are many things to watch out for security wise when dealing with peer to peer networks, including the P2P software itself.  Just like in the case of warez, which is mentioned above, distributors of media on P2P networks have begun adding malicious software into the files they make available for download.  So, not only are you legally pushing the limits of obtaining music and movies, you are putting your online privacy at risk.  For example, you are searching for a download of song X and the first download you see available matches the description of the song.  You download it and go to play it through your media player when you are greeted with a handsome warning stating that the file might be corrupted.  Accepting defeat, you try again and the second file you download plays normally.  At the end of the day, you’re a happy camper because you found the file you wanted, and at this point you probably haven’t even given that “corrupted” file a second thought.  Now, there always is a chance that song X might have actually been corrupted, but there’s probably a greater chance that the file you downloaded is spyware and it was only disguised as song X so unsuspecting P2P-ers would download it.  Whilst listening to the coveted song X, that “corrupted” file might be sending information gathered from your computer to a remote location.  Another infamous scenario deals more with the peer to peer software than the service it offers.  For whatever the reason (usually to cover the cost of developing and running the P2P network), programmers have hidden away spyware and adware into their peer to peer programs (Kazaa users, is this sounding familiar?).  Whether it’s an increase in pop-up advertisements, spam email, or reduced system productivity due to spyware, getting involved with peer to peer networks is dirty business.  My advice is to steer clear of the peer to peer networks; with the current state of online security, very little good can come from P2P.


  • Opening and downloading files from spam email is another wonderful way to develop a nice collection of spyware and viruses.   In all honesty, I have no idea what spam email attachments might contain, but I can assure you that whatever the file might be, if it’s spam, it’s nothing good.  In addition to downloading possibly malicious packages, you are also filling you hard disk drive with junk files that you have no need for.  Again, exercise a little common sense.  Not only are spam email attachments futile, downloading them puts your online privacy at risk.


  • Nowadays, virus and spyware coders have turned to alternative resources to distribute their malicious software.  Popular applications like AIM and MSN now function as another means of spreading malware, spyware, and more.  As described in Tyler’s AIM Virus Removal and Prevention article, some viruses are now able to hijack one’s contact list and disguise themselves as a friend who is recommending a cool site or download from the internet.  As most people assume their “friend” is telling them about something interesting, they will visit the site and download the file.  Unbeknownst to the user, they have just downloaded the same virus (or Trojan), which will begin sending more links all the users on their contact list.  The amount of infected computers increases exponentially in a relatively short amount of time because nobody suspects their friends will try to link them to a virus.  Similar trickery occurs when a virus sends itself to all the contacts in one’s email address book.  Before downloading anything, verify that your friend actually linked you to the download.


  • Another variety of the previously described Trojan Horse appears in the form of a pop-up “warning”.  Generally, these “warnings” notify the computer user that their computer is infected with a virus or they are missing critical system updates, when, in fact, this is not the case.  After falsely informing users that there is something wrong with their personal computer, the “warning” will prompt the user to download a specific program that will restore what is supposedly erroneous.  These hoaxes are designed to target novice computer users who, amongst the hype of computer security, will do anything to remain virus and spyware free.  Sadly, falling for these “warnings” and downloading said applications is often quite destructive.  Hidden with the downloaded program might be a bundle of adware or spyware, mostly generated by marketing and advertising agencies.  At the end of the day, the user is actually worse off than before; now their computer actually does have an infection.  Fortunately, there is an easy solution: do no open nor download any programs or pop-up advertisements which claim your computer is infected with a virus or requires critical system updates.  By using a little common sense we know that there is no way a pop-up advertisement could have scanned our computer’s hard disk drive and detected a virus; that’s just not possible.

To summarize this section, getting infected with malicious, privacy invading, software pretty much boils down to two things; common sense and awareness.  By taking a moment to think before downloading a file from a questionable web site or by pondering over the integrity of a peer to peer download, you’re chances of getting infected can diminish drastically.  As I commonly advice my friends and family, it’s always better to think twice and not click at all, than not think and click twice.

Opt In Image
Free Weekly PCMech Newsletter
Almost 500 Issues So Far, Received By Thousands Every Week.

The PCMech.com weekly newsletter has been running strong for over 8 years. Sign up to get tech news, updates and exclusive content - right in your inbox. Also get (several) free gifts.

Pages: 1 2 3 4 5 6 7 8 9 10 11 12

Leave a Reply

PCMech Insider Cover Images - Subscribe To Get Your Copies!
Learn More
Tech Information you can use, sent to your inbox each and every week. Check out PCMech's digital e-zine...