Although the paper died, following the clash, BSkyB suddenly survived.
- Proxy address use: In this method surfers use proxy IP address instead of their own IPs. The visited site sees the proxy IP’s location and easily gets fooled.
5. Data destruction: Data are like precious diamonds. However, they can bring disaster if placed in the wrong hands. They need deleting.
The truth is that, when we use proxies, even if the data aren’t available to the websites, they are available to the proxies. This only makes it look like a simple shift of data from one company to another. This date needs deletion. While ISP gets the transit data, our HDs store all the received data. Remember, CIA agents dint torture Al qaeda’s agents to get information. They were lucky to get hold of its chief Bin Laden’s computer. No wonder, learning about Al qaeda’s weaknesses, financially weakened USA gleefully got an opportunity to withdraw its troupes from Afghanistan. Although wrong data- pedophile pics, in the right hands - computer repairer, can nab pedophiles, right data – bank details, in the wrong hands can bring disaster - more so, when the gadget is negligently thrown away or sold.
Anonymous browser Hide my IP address, that uses Tor destroys data once the browser is closed.
3. At HD level:
With deleting data not making much difference but flourishing data recovering software alone, as done by Jetico, data needs rewriting – that too thrice for a permanent deletion
In addition, unlike circulation of just the stories in the past, now many of our actions are recorded. They can be rewound and brought forward just like that. In this scenario, above methods can help one avoid future financial, if not, a social ruin.
Thanks for reading!
Was the article helpful?
Freely comment; for it can bring you reader’s praise, & if best will BRING FREE 3D animation icons.
Spam isn’t tolerated but freely enter YOUR site link in genuine comment.
In addition, our following three sites will empower you in three ways:
Women’s Power Hub,
Women’s Power Book