Skip to main content

Main menu

  • Home
  • COVID-19
    • Articles & podcasts
    • Blog posts
    • Collection
    • News
  • Content
    • Current issue
    • Past issues
    • Early releases
    • Collections
    • Sections
    • Blog
    • Infographics & illustrations
    • Podcasts
    • Classified ads
  • Authors
    • Overview for authors
    • Submission guidelines
    • Submit a manuscript
    • Forms
    • Editorial process
    • Editorial policies
    • Peer review process
    • Publication fees
    • Reprint requests
  • CMA Members
    • Overview for members
    • Earn CPD Credits
    • Print copies of CMAJ
    • Career Ad Discount
  • Subscribers
    • General information
    • View prices
  • Alerts
    • Email alerts
    • RSS
  • JAMC
    • À propos
    • Numéro en cours
    • Archives
    • Sections
    • Abonnement
    • Alertes
  • CMAJ JOURNALS
    • CMAJ Open
    • CJS
    • JAMC
    • JPN

User menu

Search

  • Advanced search
CMAJ
  • CMAJ JOURNALS
    • CMAJ Open
    • CJS
    • JAMC
    • JPN
CMAJ

Advanced Search

  • Home
  • COVID-19
    • Articles & podcasts
    • Blog posts
    • Collection
    • News
  • Content
    • Current issue
    • Past issues
    • Early releases
    • Collections
    • Sections
    • Blog
    • Infographics & illustrations
    • Podcasts
    • Classified ads
  • Authors
    • Overview for authors
    • Submission guidelines
    • Submit a manuscript
    • Forms
    • Editorial process
    • Editorial policies
    • Peer review process
    • Publication fees
    • Reprint requests
  • CMA Members
    • Overview for members
    • Earn CPD Credits
    • Print copies of CMAJ
    • Career Ad Discount
  • Subscribers
    • General information
    • View prices
  • Alerts
    • Email alerts
    • RSS
  • JAMC
    • À propos
    • Numéro en cours
    • Archives
    • Sections
    • Abonnement
    • Alertes
  • Visit CMAJ on Facebook
  • Follow CMAJ on Twitter
  • Follow CMAJ on Pinterest
  • Follow CMAJ on Youtube
  • Follow CMAJ on Instagram
On_the_Net@cma.ca

Pulling the shades on Internet data thieves

Michael OReilly
CMAJ August 24, 1999 161 (4) 423;
Michael OReilly
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
  • Article
  • Figures & Tables
  • Responses
  • Metrics
  • PDF
Loading

Starting your Web browser is like opening a window to the world - a 2-way window. As you scan the latest medical news or check out vacation spots, someone may be recording your name and your email address. They could even be poking around in your PC, determining which sites you've visited recently. They may even be storing information on your computer to keep track of you in the future.

In a recent survey of commercial Web sites - they have the suffix ".com" - the Online Privacy Alliance (www.privacyalliance.org/) determined that 92.9% of sites collected at least 1 type of personal or demographic information, such as name, email address, postal address, sex and personal preferences. This is often done without the user's knowledge or consent.

I came face to face with the issue while doing research for an upcoming CMAJ column about online drug sales. I visited a Viagra site as part of the research, but provided it with no information. Within a half-hour the first spam email arrived, coaxing me to "BUY, BUY, BUY!!"

The Web site had automatically extracted my email address and added me to its hit list. But that's not the only thing Web sites can get from your computer without you knowing about it. To get a sense of how this works, visit the Snoop Report (www.anonymizer.com/3.0/snoop.cgi). It does the snooping and then shows you what it can find out about you.

Luckily, there are plenty of ways to pull down the shades on cyber data thieves. The best solution will depend on how you use the Internet. When it comes to email, the simplest way to ensure security is to use encryption, and some free services help users do this. One is a Web-based tool called ZipLip (www.ziplip.com) and another is an emailer add-on that is aptly named Pretty Good Privacy (Web.mit.edu/network/pgp.html).

Both take your message and convert it into gobbledygook. The only way to make sense of it is to have the right digital key. With ZipLip this is a pre-arranged password, while PGP uses electronic signatures to ensure authenticity. In both cases the message remains unreadable until decoded by the recipient.

Web browsing presents greater challenges, because there are many ways an unscrupulous Web designer can get information about you, or otherwise use the 2-way connection to his own ends. Probably the most talked-about security threat has the most benign name - cookies. These small files are inserted onto your computer by a Web site and are typically used as tracers. By using cookies, a site can "remember" who you are, what services you like to use and what your local passwords are. Cookies are tremendously useful when used scrupulously. Unfortunately, not all Web sites fall into this category. Figure 1

Figure1
  • Download figure
  • Open in new tab
  • Download powerpoint

Figure 1.

The easiest way to protect yourself against cookies is to disable them completely. In both Netscape Navigator/Communicator or Microsoft Explorer you do this within the Preferences section.

You can also determine which cookies already exist within your computer. For Explorer, go to Preferences/Receiving Files/Cookies. For Navigator/Communicator, cookie information is stored in a file called "cookies.txt". Use your computer's Find File tool to search out this item.

While you're at it, find your "history file." This contains a list of all the sites you've visited. Deleting this every few days will keep it away from unethical eyes.

If all this seems too much, take a look at the Cookie Crusher for PCS (www.thelimitsoft.com/cookie.html) or the Cookie Cutter for Mac (idirect.allmacintosh.com/files/tucows_cookiecut.hqx). Both programs will help you manage your cookies.

Aside from cookies, the biggest security problem is posed by Java and Javascript. These are small programs that run on sites to produce moving images and tally prices in e-malls. Generally, they make the Web a more interesting place to be.

Unfortunately, these little programs can also be written to access sensitive information. Some of them can read your name, email address and even get a history of where you've been visiting. Even worse, some thieves have been known to use Java to intercept private information on Web forms. This could include credit card numbers or sensitive personal information.

The solution is either to disable Java and Javascript in your Web browser's Preferences, or to use a software shield. One type of shield, a proxy server, acts as a filter and blocks prying eyes. ByProxy (www.besiex.org/ByProxy/) and the Lucent Personalized Web Assistant (lpwa.com:8000/) offer proxy servers for use on a PC.

Another option is to use the Anonymizer Web site (www.anonymizer.com/). The creators of this service let you surf through their Web site, essentially acting as your own personal proxy server.-Michael OReilly, moreilly@cancom.net

PreviousNext
Back to top

In this issue

CMAJ
Vol. 161, Issue 4
24 Aug 1999
  • Table of Contents
  • Index by author

Article tools

Respond to this article
Print
Download PDF
Article Alerts
To sign up for email alerts or to access your current email alerts, enter your email address below:
Email Article

Thank you for your interest in spreading the word on CMAJ.

NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Pulling the shades on Internet data thieves
(Your Name) has sent you a message from CMAJ
(Your Name) thought you would like to see the CMAJ web site.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
Citation Tools
Pulling the shades on Internet data thieves
Michael OReilly
CMAJ Aug 1999, 161 (4) 423;

Citation Manager Formats

  • BibTeX
  • Bookends
  • EasyBib
  • EndNote (tagged)
  • EndNote 8 (xml)
  • Medlars
  • Mendeley
  • Papers
  • RefWorks Tagged
  • Ref Manager
  • RIS
  • Zotero
‍ Request Permissions
Share
Pulling the shades on Internet data thieves
Michael OReilly
CMAJ Aug 1999, 161 (4) 423;
Digg logo Reddit logo Twitter logo Facebook logo Google logo Mendeley logo
  • Tweet Widget
  • Facebook Like
  • Google Plus One

Jump to section

  • Article
  • Figures & Tables
  • Responses
  • Metrics
  • PDF

Related Articles

  • No related articles found.
  • Google Scholar

Cited By...

  • No citing articles found.
  • Google Scholar

More in this TOC Section

  • MCC readies a new, computerized medical qualifying exam
  • Developing a code of conduct for the Web
  • Broadcasting comes to the Internet
Show more On_the_Net@cma.ca

Similar Articles

Collections

  • Topics
    • Health technology

Content

  • Current issue
  • Past issues
  • Collections
  • Sections
  • Blog
  • Podcasts
  • Alerts
  • RSS
  • Early releases

Information for

  • Advertisers
  • Authors
  • Reviewers
  • CMA Members
  • Media
  • Reprint requests
  • Subscribers

About

  • General Information
  • Journal staff
  • Editorial Board
  • Governance Council
  • Journal Oversight
  • Careers
  • Contact
  • Copyright and Permissions

Copyright 2021, Joule Inc. or its licensors. All rights reserved. ISSN 1488-2329 (e) 0820-3946 (p)

All editorial matter in CMAJ represents the opinions of the authors and not necessarily those of the Canadian Medical Association or its subsidiaries.

Powered by HighWire