Study On Personal Privacy On The Internet Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

People can communicate with each other and make new friends on the internet. When they meet someone on network they exchange information about themselves. Personal information used in determining person identity and contact details such as: name, address and phone number via the internet should not be disclosed. In order to preserve your privacy, you should understand how your information may be used. The identity can be determined in accordance with various information you provide, for example: school name, sports club, a place where you live, and so on.

People should be careful about disclosing contact information or other personal information or sending pictures. Unfamiliar persons can disclose personal information on the Internet. Blogs can be published publicly for many years on the Internet for others to read. As soon as you publish on the Internet text or image, you can't manage it. It can be easily copied to many different places, so you can not completely eliminate it.

In order to participate in online discussions, users usually have to create personal profile or identity. Profile or identity - is a user profile, for example ID or nickname used in discussions. Profiles are usually password-protected so that other people would not be able to use your identity. It would be wise to always keep your password secret.


A "cookie" - is a small text document, containing a unique identification number that is transferred from a website visitor to site administrator computer hard disk so that the website administrator differentiate between visitors' computers and view visitors activity on the Internet. A unique number identifies a visitor's browser each time users visit websites. Cookies do not allow websites to store any personal visitor information (such as the visitor's name and address) that visitors can forget the secret

Cookies started receiving tremendous media attention back in 2000 because of Internet privacy concerns, and the debate still rages. Cookies provide capabilities that make the Web much easier to navigate. The designers of almost every major site use them because they provide a better user experience and make it much easier to gather accurate information about the site's visitors.


Virus is a computer program that can copy itself and infect computer.

Typically a computer virus infects other programs, turning them into the program - the virus code. The virus multiplies and connects to other programs or files, and then "hides", "travels" from one computer to another. Viruses are created to perform various malicious actions: delete, rigid disk information, to change or delete certain files and so on.

Viruses can hide in a floppy disk, hard disk or even a computer network.

There are three types of major viruses, and many subcategories of each group.

Boot Sector Infectors: sometimes called boot record infectors, system viruses, or boot viruses.These programs attack the vulnerable boot program that is stored on every bootable disk, for example: floppy disk, hard disk. This code is executed by the system when the PC is started up. By installing themselves here they guarantee that their code will be executed whenever the system is started up, giving them full control over the system to do what they wish. They are spread most commonly through infected bootable floppy disks.

File Infectors: These viruses directly attack and modify program files, which are usually .EXE or .COM files. When the program is run, the virus executes and does whatever it wants to do. Usually it loads itself into memory and waits for a trigger to find and infect other program files. These viruses are commonly spread through infected floppy disks, over networks, and over the Internet.

Macro Viruses: The newest type of virus, these clever programs make use of the built-in programming languages in popular programs such as Microsoft Word and Microsoft Excel. These programs allow users to create programs that automate tasks, called macros.These programs can cause just as much damage as regular viruses, despite the fact that they are very different: regular viruses are low-level machine language programs, while macro viruses are actually high-level interpreted BASIC programs! The most common type of macro virus right now infects Microsoft Word documents.

Viruses harm

• The level of harmful viruses are divided into non-hazardous, dangerous and very dangerous.

Nepavojingieji computer viruses work extremely friendly, but the screen prints various reports, imitates various sounds and so on. Dangerous viruses can significantly interfere with your work, and very dangerous viruses destroy programs and data needed to erase the systematic information (such as file layout tables).

Viruses infecting the system may affect it in different ways:

and reduce system operation speed;

and refuse to perform certain operations (for example, boot);

and undetected modification of data (such as switching the number of places);

and to delete some files;

and destroy the file system;

and modify the file system data (such as directories, file layout of the tables);

physically damaged and some equipment (for example, constantly writing to the same disk track, wear layers of magnetic material).

According to the method of infection viruses are divided into resident and transient. By resident viruses as part of its program in the main memory and are active until the computer off. Non-resident viruses infect the computer's memory and are active only for a certain period of time.


Firewall is the most common way to let your PC just what you choose. This is a program that helps protect against unwanted guests and blocks suspicious files input and output.They monitor your computer ports to notify if any program tries to connect to internet and asks your permission to allow it or not.

There are hardware and software type firewalls. If your firewall is used in conjunction with the antivirus program, you are using the best combination of protection.

There are just a few firewalls functions but each firewall has its advantages and disadvantages.

the most popular firewall software programs available on the market today.

ZoneAlarm Pro

Symantic Norton Personal Firewall

BlackICE PC ProtectioN

McAfee Personal Firewall Plus

.With any of these programs, you are getting solid firewall protection to keep your computer and data safe from hackers.