[Previous] [Next] [Index] [Thread]

Re: What's the deal ?



>>ONLINE SPYING
>>While you're connected to your favorite Web page, it's also connected
                                          ^^^^^^^^
>>to you, and could be copying all sorts of information off your hard
>>drive, say industry experts. In fact, it happened last year when
             ^^^^^^^^^^^^^^^^ a.k.a. quacks

>>Central Point Software used registration software developed by
                             ^^^^^^^^^^^^^^^^^^^^^^^
                             it's _not_ a web browser!

>>Pipeline Communications, and inadvertently also gathered descriptions
                               ^^^^^^^^^^^^^
                           intentionally! don't tell me the programmers
                           put the scanning feature there inadvertently.

>>of the users' systems -- the type of microprocessor, the version of
>>DOS and Windows, the type of display and mouse, and the amount of free
>>space available on the hard drive. Customers squawked, and Central
>>Point had Pipeline change the software. However, Pipeline reports that
>>at least one of its clients is using the scanning feature now -- but
                                           ^^^^^^^^^^^^^^^^
           by honor the scanning feature requested by the other end
           of the network, this software is acting like a informatiion
           server.

>>only after getting the owner's permission. The lesson? "If you can't
                                                          ^^^^^^^^^^^^
>>trust it, don't connect to it." (Forbes 2/13/95 p.186)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
If you can't trust the software you're using, don't use it!  In other
words, stay away from Pipeline Comm.  It might as well clobber you hard
drive.

If a web _browser(client)_ does not volunteer the information, server will
have no way to know it.  A computer is perfectly safe on the network if you
don't run _any kind_ of server software, unless of course a lightning or
some other high voltage source strikes your phone/power line (assuming
you're not using a wireless connection and batteries :) Any
writer/distributer of a network software who does not document its server
feature and/or _secretly_ volunteers info of a client environment is
considered abusing the computer/network, and subject to relavent criminal
prosecution.

__Luke



References: