AskEssays.com - Discover essay samples

Privacy on the internet

4.9 of 5.0 (84 reviews)

Contains
834 words
Category
Other

Privacy on the internet Page 1
Privacy on the internet Page 2
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Privacy on the internet


Privacy on the Internet



Ever feel like you are being watched? How about having the feeling like some one is following you home from school? Well that is what it will be like if users do not have the privacy on the Internet they deserve. EPIC (Electronic Privacy Information Center), a advocacy group that has been fighting the Clinton Administration for tougher online consumer protection laws, and other privacy protection agencies have formed to protect the rights and privileges of the Internet user. With the U.S. Government, EPIC has had to step in and help small companies and Internet users with their own privacy problems, hackers getting into their systems and ruining the networks, and crackers stealing and decrypting private information. They have also helped with trying to stop the ?IPv6?, an every day occurring problem from eventually taking over the already used widely IP addressing system. Intel also has had a feud with the government about privacy issues. When their new chip came out, the Pentium III it had skeptic problems with its serial number feature. That is why I strongly agree with EPIC and what they are representing, privacy on the Internet.



Say you were on the Internet surfing around, would you want every site that you have visited to know who you are and almost every thing about you? No. That is why Intel had to disable their serial number feature in the new Pentium III. With this feature, each site on the Internet that you have visited could use this number to look you up and see who you are and almost every thing about you. Before released Intel told the U.S. Senate that they had disabled this function on every chip, but when these chips where out on the market for a while, programming companies found a way to go back in and enable this function without the computer user knowing it. So when the Senate heard this, Intel had yet another feud with its little problem. When the dust all settled Intel was to put this now option into the BIOS of every computer that had the PIII (Pentium III) installed on them. When the user opened up the BIOS there was now an option to either enable or disable the serial number on the chip. But since not many people know how to get into the BIOS of a computer it is hard for this option to be accessed. And once again Intel was back in the courts trying to explain their reason for yet another problem. The government finally ruled that when a new PIII chip is to be installed into a computer the serial number option is to automatically be turned off. Yes, Intel had some very good reasons for this 'security feature? but the public did not think so. They tried to argue that if a chip was ever to be stolen they could track them down when the thief accessed the Internet (PC Computing 105). But how often do you hear of computer chips being stolen? Not at all. So why did Intel want to fight for this feature so much? They say because of the security over the widely growing Internet (107), but what it seems like to me and the public is mostly an invasion of the users privacy when companies get to greedy and want to know every thing about you, and your life. If it weren't for EPIC, and the government getting involved in privacy issues, Intel would have its way on what ever they want, and we would have internet sites looking us up every day breaking our personal privacy.



Almost every one that has been on the Internet or that uses e-mail has heard of hacking. Hacking is very serious in some cases. How would you like a hacker to intercept your credit card number and start using it to buy his or her own stuff? A lot of us would not like that, because the hacker is stealing from us. When the Internet first started to develop, hackers could get into anything and do anything. They could change what ever they wanted and do what ever they please on any network. Since those days are long over, we now know how to keep hackers out of our networks and from stealing private stuff. Microsoft has now come up with the 128-bit secure line that makes it impossible for anyone to read anything on that secure line. Once you could not even dream of putting your credit card on the Internet, but now with the invention of the secure line and encryption capabilities people or now using the internet to buy more than ever. You can now bank online or buy stocks online if you want to, but with all of these new privacy inventions there are always the hackers inventions. Hackers have invaded the privacy of the ...

You are currently seeing 50% of this paper.

You're seeing 834 words of 1667.

Similar essays


Motivation Theories In Relatio

Motivation and Performance Theories in Relation to New Zealand Post "B-12, G-47, I-24, O-51, I-5, N-36''''.'BINGO'!!!!!!" A simple game of bingo, if analysed closely, can be shown to be a tedious task consisting of a repetitive action that occurs after being prompted by a repetitive stimulus. The skill level needed to make that action is low, and...

32 reviews
Download
Drugs and Raves

The Association Between Raves and Drugs Generally people associate raves(Underground Techno parties) with designer drugs like Ecstasy(MDMA), Speed(amphetamine) and other acids like LSD. These drugs are called the Techno Drugs for that reason and most of the time have uplifting and sensatory effects. To understand more clearly the relationsh...

2 reviews
Download
A critical look at the foster care system

A Critical Look At The Foster Care System THE GROUP HOMES OVERVIEW Children entering the shadowy world of foster care are often assigned labels arbitrarily and on a bed-available basis. They may end up spending some time in conventional foster homes, only to find themselves shuffled through group homes, residential treatment facilit...

193 reviews
Download
Internet censorship

Speech II Outline Intro: Censorship is when a third party makes decisions about what can be communicated between two people; even if the two agree that the censorship is okay, it is still censorship. Although the Internet was created in the 1960s as a communications tool of the U.S. military that would withstand even the most severe nucle...

10 reviews
Download
Marriage

When two people plan to join forces and begin that arrangement called , they are generally getting into something that is, to say the least, adventurous. Historically was looked upon as the main purpose of beginning, and maintaining a home and family. Today people marry for different reasons, like love, which may be based on physical attraction...

72 reviews
Download
Atsisiųsti šį darbą