posted by Howard Fosdick on Thu 1st May 2008 01:55 UTC

"4. Wisdom"

If you use Windows, Microsoft Office, and Internet Explorer, you need to be aware of how these products could compromise your security and privacy. You can minimize these issues by following this guide's recommendations. Anyone can achieve sufficient security and privacy when using Windows. But you must follow safe practices and download and install a number of programs. Your privacy is not a design goal of Windows. It is up to you to make Windows secure and private.

Appendix: Further Information and Links

PDF and Appendix: For a printable and archivable version of this article, please download the PDF version. It is released under the OPL (Open Publication License) and may be freely reproduced and distributed but not altered prior to redistribution. This product is distributed at no cost under the terms of the Open Publication License with License Option A -- "Distribution of modified versions of this document is prohibited without the explicit permission of the copyright holder."

The PDF document also has a detailed Appendix with links to much more online information.

Feedback: Please send recommendations for improving this guide to the author at email address "ContactFCI" at the domain name "sbcglobal.net".

Disclaimer: This paper is provided without warranty. Fosdick Consulting Inc. and the author accept no responsibility for any use of the data contained herein.

Trademarks: All trademarks included in this document are the property of their respective owners.

About the Author: Howard Fosdick is an independent consultant who works hands-on with databases and operating systems. He's written a couple hundred articles and several books. He's presented at conferences, founded software users groups, and invented concepts like hype curves and open consulting.

Acknowledgments: Thank you to the reviewers without whose expert feedback this guide could not have been developed: Bill Backs, Huw Collingbourne, Rich Kurtz, Scott Nemec, Priscilla Polk, Janet Rizner, Kate Robinson, and others who prefer anonymity. Thank you also to the Association of PC Users (APCU), Better Software Association, BitWise Magazine, IBM Database Magazine, and UniForum.

Table of contents
  1. 'Introduction'
  2. "1. How to Defend Against Penetration Attempts"
  3. "2. How Windows Tracks Your Behavior"
  4. "3. How to Protect Your Privacy When Using the Internet"
  5. "4. Wisdom"
e p (9)    33 Comment(s)

Technology White Papers

See More