AskEssays.com - Discover essay samples

Privacy on the internet

4.9 of 5.0 (84 reviews)

Contains
834 words
Category
Other

Privacy on the internet Page 1
Privacy on the internet Page 2
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Privacy on the internet


Privacy on the Internet



Ever feel like you are being watched? How about having the feeling like some one is following you home from school? Well that is what it will be like if users do not have the privacy on the Internet they deserve. EPIC (Electronic Privacy Information Center), a advocacy group that has been fighting the Clinton Administration for tougher online consumer protection laws, and other privacy protection agencies have formed to protect the rights and privileges of the Internet user. With the U.S. Government, EPIC has had to step in and help small companies and Internet users with their own privacy problems, hackers getting into their systems and ruining the networks, and crackers stealing and decrypting private information. They have also helped with trying to stop the ?IPv6?, an every day occurring problem from eventually taking over the already used widely IP addressing system. Intel also has had a feud with the government about privacy issues. When their new chip came out, the Pentium III it had skeptic problems with its serial number feature. That is why I strongly agree with EPIC and what they are representing, privacy on the Internet.



Say you were on the Internet surfing around, would you want every site that you have visited to know who you are and almost every thing about you? No. That is why Intel had to disable their serial number feature in the new Pentium III. With this feature, each site on the Internet that you have visited could use this number to look you up and see who you are and almost every thing about you. Before released Intel told the U.S. Senate that they had disabled this function on every chip, but when these chips where out on the market for a while, programming companies found a way to go back in and enable this function without the computer user knowing it. So when the Senate heard this, Intel had yet another feud with its little problem. When the dust all settled Intel was to put this now option into the BIOS of every computer that had the PIII (Pentium III) installed on them. When the user opened up the BIOS there was now an option to either enable or disable the serial number on the chip. But since not many people know how to get into the BIOS of a computer it is hard for this option to be accessed. And once again Intel was back in the courts trying to explain their reason for yet another problem. The government finally ruled that when a new PIII chip is to be installed into a computer the serial number option is to automatically be turned off. Yes, Intel had some very good reasons for this 'security feature? but the public did not think so. They tried to argue that if a chip was ever to be stolen they could track them down when the thief accessed the Internet (PC Computing 105). But how often do you hear of computer chips being stolen? Not at all. So why did Intel want to fight for this feature so much? They say because of the security over the widely growing Internet (107), but what it seems like to me and the public is mostly an invasion of the users privacy when companies get to greedy and want to know every thing about you, and your life. If it weren't for EPIC, and the government getting involved in privacy issues, Intel would have its way on what ever they want, and we would have internet sites looking us up every day breaking our personal privacy.



Almost every one that has been on the Internet or that uses e-mail has heard of hacking. Hacking is very serious in some cases. How would you like a hacker to intercept your credit card number and start using it to buy his or her own stuff? A lot of us would not like that, because the hacker is stealing from us. When the Internet first started to develop, hackers could get into anything and do anything. They could change what ever they wanted and do what ever they please on any network. Since those days are long over, we now know how to keep hackers out of our networks and from stealing private stuff. Microsoft has now come up with the 128-bit secure line that makes it impossible for anyone to read anything on that secure line. Once you could not even dream of putting your credit card on the Internet, but now with the invention of the secure line and encryption capabilities people or now using the internet to buy more than ever. You can now bank online or buy stocks online if you want to, but with all of these new privacy inventions there are always the hackers inventions. Hackers have invaded the privacy of the ...

You are currently seeing 50% of this paper.

You're seeing 834 words of 1667.

Similar essays


Meaning of illusions

The True Meaning of Our Illusions Every human being has illusions. Unfortunately, the majority of the time, we are unable to uncover their true meaning. This does not mean that our precious visionary images have no answer or meaning and that they make no sense. Our illusions are based and composed with the daily interaction that we have w...

153 reviews
Download
Gender Projects

Gender biases are prevalent in today's scientific world, although they are not always seen by society. To increase awareness on gender biases, Suzanne Kessler and Emily Martin write two independent articles on how gender stereotypes permeate the scientific community. Suzanne Kessler's article looks at how society sees gender as either male or...

198 reviews
Download
Kinship

There are individuals in a society that are divided into names, identities, roles, interests, and statuses. is one of the universal ways of making and maintaining such groups. This system has three principles which are marriage, residence, and descent. The first step to kinship is marriage because it brings individuals together from different kin...

21 reviews
Download
Psychopathology Assignment - M

In order for one to fully understand the term ?madness?, we first need to show what the word really means. After looking through numerous definitions and asking others on their views, the definition from the oxford dictionary seemed to sum up the general thoughts of my family and friends. ??a departure from what is normal or accepted, a moral or me...

211 reviews
Download
The Importance Of A College Ed

The Importance of a College Education You make a living by what you get. You make a life by what you give" (Winston Churchill, circa 1940) Learning the importance of getting a good college education did not come to me until I was 31 years old. Many of my friends, and colleagues and I were of the same age, however they were far beyond...

154 reviews
Download
Stereotypes Are The Psychologi

To adequately investigate the question as to whether cal lubricant on intergroup behaviour, several areas need to be considered. In the context of this essay the concept of stereotypes needs to be defined. Although Lippmann (1922) is credited with first using the term ?stereotype? in this context it is perhaps Brown (1995) who offers the most appli...

155 reviews
Download
Undocumented in l

.a. Undocumented In L.A. The whole book is basically written to describe the life of an undocumented immigrant in United States. The life of Yamileth L\pez, who came to US from Nicaragua. The hardships and risks that they had to go through before they arrive to US. Before coming to US she had a dream of the US which a picture was painted...

105 reviews
Download
Why safety belts

Why Safety Belts? Experts say Princess Diana would have lived had she been wearing a seat belt. The same holds true for countless others who die needlessly in car accidents every day. In the Highway Patrol findings, motor vehicle crashes are the leading cause of death for every age from 5-32. In 1997, 70,676 people were killed in motor vehicl...

139 reviews
Download
Sex education 2

Sex education -- 2 Sex Education is Ineffective Perhaps one of the most controversial issues arising today is that of sex education in America's public school system. In today's world, where information travels at the speed of light and mass media is part of our everyday lives, teenagers are more exposed to this world than ever before. In...

61 reviews
Download
Simpsons Vs Wells

The advent of new technology has been a source of trepidation throughout history. Just as with any change, fear is often the pervasive response to new technology and developments, especially amongst those who do not fully comprehend the changes. It seems, however, that people ignorant of the true meaning and extent of technology are the most likely...

201 reviews
Download
Why Teams Dont Work

I undertook this study to prove the legendary story about the Camelot?An historic example of team, effort gone awry. In the legendary story, a few events transformed Camelot from a utopia kingdom into wasteland. This isn?t just idle meandering. There are corporate Camelot?s, too, (such as my company MobileComm); those companies that started with...

184 reviews
Download
Comparson of Mouse and Trackba

Computers incorporate various pieces of equipment that allow the user to interact with the software. Since the idea of a Graphical User Interface (GUI) has been accepted, people rely on a mouse to move the "cursor" around the screen. Most of the time the "cursor" is simply an arrow that lets the user know where its position is on the screen....

62 reviews
Download
Record industry

Time For More On The CD The music business is experiencing a recession where record sales are reaching all-time lows. All record companies have in the last few years experienced a considerable decrease in sales. Finding the cause or causes of this has naturally become a major concern for all of them. Some blame the recession in...

116 reviews
Download
Djibouti

Despite 1992 constitutional changes that permitted the creation of four political parties, President Hassan Gouled Aptidon and the People's Rally for Progress (RPP), in power since independence in 1977, continued to rule the country. 's two main ethnic groups are the politically predominant Issa (the tribe of the President, which is of Somali...

1 reviews
Download
Atsisiųsti šį darbą