Warding off PC spies
More than 400 software programs are believed to be infected with 'spyware,' malicious code that hides on your computer and watches what you do
More than 400 software programs are believed to be infected with "spyware,"
malicious code that hides on your computer and watches what you do, without
your knowledge or explicit permission, and collects personal information
about you and your use of the Internet.
Often, companies are the ones collecting this information for the purposes
of targeting their advertising. Such information is valuable because getting
the seller's message to the people who are the most likely to buy a product
increases the value of advertising dollars.
Any program that uses HTML — including e-mail programs, word processors,
Internet Relay Chat software and so forth — can be infected with spyware.
When used with e-mail, spyware allows the linking of addresses with profiles
of individual users.
In this way, Internet surfing patterns can be linked to e-mail addresses.
Technology is intent-independent, and thus spyware could be used to collect
information for less wholesome activities than targeting advertising. Or
the information collected for targeting advertising could be appropriated
for nefarious uses.
Although each individual transaction may offer access to only a small
amount of information, it can be dangerous if it is your password or personal
identification number that is collected. Information could also be accumulated
to produce a dossier on you that you might wish were not in other hands.
The public outcry over RealNetworks Inc.'s monitoring of users through
a unique identifier assigned to copies of its software and DoubleClick Inc.'s
ability to correlate user profiles with user identities illustrates peoples'
displeasure and concern with invasive tactics.
Among the most insidious spyware are graphics called "Web bugs" that
are placed on Web pages. These tiny graphic images are only one pixel in
size, a mere dot on the screen, and are often the same color as the background
of the Web page, which effectively renders the bugs invisible.
When you request a Web page, these tiny spies come back along with all
the other graphics associated with the page. Code linked with the images
then collects your Internet Protocol address, operating system type and
version, browser type and version, and the last Web page you visited. It
also looks at the cookies stored on your workstation to ascertain your surfing
patterns.
Other Web bugs use Java-Script to collect information on applications
and devices installed on your computer. Unfortunately, simply turning off
cookies won't protect you. You have to turn off all graphics to prevent
the introduction of Web bugs. For most of us, that price is too high.
However, you can be selective about which companies you allow to place
cookies on your computer. You can delete junk e-mail without opening it.
You can use a proxy server. You should have a firewall; today, they are
inexpensive, easy to install and very effective. You can't protect yourself
100 percent, but you can take reasonable steps to control the information
that is captured by spyware.
—Ryan is an attorney, businessman and member of the George Washington University
faculty.
NEXT STORY: Report: Income, not ethnicity, determines access