You are on page 1of 5

Andres G.

Cuevas COMM 265G

How to Stop Others from Obtaining Your Information I. Introduction


A. Attention Getter

(Place laptop and cell phone on table). What if the internet died ho! "uch !ould #ou have to ad$ust #our life to acco""odate such an event% We&ve beco"e virtual entities placin' our thou'hts our feelin's our activates so"eti"es our entire lives into the internet. Co"panies have learned to thrive in this oversi'ht the a"ount of infor"ation the# have access too is fri'htenin'.

B.

Credibility:

( a" obsessed !ith the latest soft!are and technolo'# and currentl# !or)in' to obtain "# bachelor&s on co"puter science ( a" al!a#s on the loo)out for the best !a# to )eep "# privac# as best as a ( can. *6+ of internet users !ant to protect their identit#.

C.

Significance

(f #ou are !orried of the a"ount of infor"ation that is bein' used to tar'et #ou !ith specific products or services or $ust tired of all the ads ever# clic) of the !a# ( !ill help #ou )eep #our privac#. After all as of toda# Goo'le !ill actuall# use #our na"e and face to pro"ote an# product #ou plus one li)ed or $ust rated.

D.

Thesis Statement

,ere are so"e 'ood useful tips on ho! to prevent sp#in' bloc) ads stop internet profilin' and avoid privac# invasion.

E.

Pre ie!
". '. #no! the Enemy$%o! Analytics !or&s Choosing the right Bro!ser a) (. Firefox over Chrome

)irefo* +lugins you should and shouldn,t ha e a) b) c) HTTPS Everywhere Ghostery AdB oc! P "s

d) #ava a$d a$ythi$% yo" do$&t "se o$ a re%" ar basis -. Com+uter maintenance and a!areness

II.

Body
A. #no! the Enemy$%o! Analytics .or&s

Web anal#tics is one of "an# pro'ra"s co"panies such as Goo'le use in order to find stud# !hat the public are searchin' usin' or vie!in' tr#in' to find -trends. the# can use to adapt their sites for the purpose of increasin' !eb traffic and sales. (t sounds beni'n !ithout the finer details. /uch as !hat infor"ation e0actl# do the# 'ain fro" such pro'ra"s. 1he# have access to the !ebsites #ou have 'one throu'h and !ill 'o to ne0t ho! lon' #ou&ve been there and !hat #ou have done in it. (t lo's )e# !ords #ou have used as !ell as an# re'istrations #ou&ve "ade. (t 'ains access to the ti"es #ou visit those sites and fro" !here do!n to the street #ou&re in. ". Transition

/ounds fri'htenin' but )no! !e&ll learn ho! to fi'ht it.

B.

Choosing the right Bro!ser

2itch Chro"e it is built pri"aril# to obtain infor"ation about #our use. 3irefo0 or 4on2o3o0 !or) !onderfull# and have 'reat plu'ins that help #ou )eep #our privac#. ". Transition

5o! that #ou have the ri'ht bro!ser lets 'et the ri'ht plu'ins.

C.

)irefo* Plugins you should and shouldn,t ha e

HTTPS Everywhere fro" the 6lectronic 3rontier 3oundation is a clever little device that helps #ou use encr#pted sites that are offered b# several !ebsite but hard to utili7e since it can default into the unencr#pted version of their site "a)in' #our !eb histor# accessible to an#one !ho !ants to see it. 6ncr#pted sites help "aintain a little bit of #our privac# b# tellin' others that #ou are not sharin' #our infor"ation and si"pl# 'ivin' the" a -5ot Provided. "essa'e of #our !eb histor# usa'e. Ghostery is another 'reat add on to 3irefo0 than)s its abilit# to bloc) and sho! #ou a list of )no!n trac)ers hidden in "an# !ebsites. (t is than)s to these trac)ers that others have the abilit# to )no! !hat #ou do ho! #ou do it !hen and !here #ou do it. (t 'ives #ou a list of those trac)ers and the abilit# to allo! or bloc) the" at !ill. AdB o!" P us !hich in si"ple ter"s a"a7in' a"ount of advertise"ents and trac)ers nu"berin' in the "illions and is popular !ith over 89 "illion do!nloads 'ivin' a little hint of $ust 'ood it is. 5o! #ou can surf the internet !ithout those pes)# ads follo!in' #ou. (As a personal advice if #ou have $ava installed in #our 3irefo0 or an# bro!ser for that "atter ( !ould stron'l# su''est to disable it too "an# have used its securit# holes to attac) peoples co"puters co"pared to the fe! !ebsites that absolutel# re:uire 4ava to function properl#.) ". Transition

Althou'h #ou have the best operatin' s#ste" to use the best bro!ser !ith the best plu'ins none of it !ill "ean a thin' if #ou allo! $un);!are to slo! and endan'er #our co"puters health.

D.

Com+uter A!areness

## eaner ( personall# li)e because of previous e0perience !ith it. (t allo!s "e to custo"i7e !here and !hat it cleans it sho!s "e ho! "uch it cleans and has e0tra features that 'ives "e control of !hat is on "# co"puter fi0es bro)en e0tensions and can help bloc) un!anted pro'ra"s that run at startup. #omodo is free has 'ood a reputation a descent antivirus and a 'ood fire!all that provides a bro!ser that can )eep #ou safe fro" "an# nast# pro'ra"s that roa" the internet. (t has features that help #ou to )eep #ou stealth# on the net. Safe pra!ti!e$be aware of what you up oad< "a)e sure !hat #ou post can&t be used a'ainst #ou.

".

Transition

5o! that !e )no! so"e of the tools that !e can use to )eep our virtual life private let us see ho! read# !e are to ta)e that first anon#"ous step.

III.

Conclusion
A. /e ie! Points
". '. (. -. #no! the Enemy$%o! Analytics !or&s Choosing the right Bro!ser )irefo* +lugins you should and shouldn,t ha e Com+uter maintenance and a!areness

B.

0asting Im+ression:

=ou are no! read# surf the net !ith the added )no!led'e of ho! to )eep #our privac# fro" people #ou don&t )no! and in turn )eep #our sanit# )no!in' that those fat cats in suits our no! at ba#. > and if ( find #our picture on an ad for breast "il) in A"a7on #ou&ll )no! that anon#"ous post on #our 3aceboo) than)in' #ou is "ine or the person sittin' ne0t to #ou.

I1.

/eferences

Goo'le (5ove"ber 88 2?8@) Shared Endorsements. Aetrieved 5ove"ber 9 2?8@ fro" https<BBplus.'oo'le.co"Bsettin'sBendorse"ents%hlCen. Aainie ,arrison (/epte"ber 5 2?8@) Anonymity, Privacy, and Security Online. Aetrieved 5ove"ber 8? 2?8@ fro" Pe! (nternet D A"erican Eife Pro$ect< http<BBpe!internet.or'BAeportsB2?8@BAnon#"it#;online.asp0

You might also like