Dennis Faas's picture

Surveillance Software: record chat logs and more?

Have you ever wondered what your loved one is doing online? Infopackets Reader Lisa E. addressed a few of her concerns over the weekend: " Dear Dennis, I have Windows XP. I have several people using this computer and would like to know how to access ... chat files. Everyone has their logon password protected, and my children do a lot of chatting on Yahoo and MSN Messenger. Can you tell me how to find and access these files?" My response: I only use MSN Messenger on my Windows XP system, so I downloaded and installed the latest versions of Yahoo Messenger, ICQ Pro 2003, ICQ Lite, and AOL ... (view more)

Dennis Faas's picture

Infopackets Email Newsletter Format

It's been two weeks since the newsletter format has been changed to include "teaser" feature articles and a link to the rest of the story online. Over the weekend, I received a few disheartening emails with regard to the format change. Gan Soon B. ... in South East Asia writes: " Dear Dennis, I am writing to you to register my concern with the new format of your newsletter. Recently, I noticed that you have switched to a format which require users to go online to view the full contents of the newsletter. I figured that you have a valid concern for using that format, and so I didn't ... (view more)

Dennis Faas's picture

Kazaa Bandwidth Capped Downloads

If you share files online the Internet (trading MP3s, movies, software), you have undoubtedly already heard of Kazaa -- maybe even Kazaa Lite . In a nutshell Kazaa uses its own P2P (peer to peer) technology which allow users across the Internet to ... share files online. The last time I checked, there were about 2.2 million users online Kazaa, sharing some 5 million files. That's a lot of files. I'm not going to get into the complexities of how things work, because I've already discussed that in a previous issue of the Infopackets Gazette. Kazaa is free software which gets its funding from the ... (view more)

Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)


Subscribe to RSS - online