Stay Private on the Web

Wawro, Alex
September 2011
PCWorld;Sep2011, Vol. 29 Issue 9, p97
The article offers tips for maintaining privacy and anonymity on the Web which include using a Web-proxy page such as Proxify and using the Tor Network.


Related Articles

  • The World Needs Anonymity. Coleman, Gabriella // MIT Technology Review;Jan/Feb2015, Vol. 118 Issue 1, p11 

    The author defends the right of people to express themselves anonymously online. She cites the "Federalist Papers" written during the U.S. colonial era during the 18th century as an example of a useful exchange of ideas conducted anonymously. Without anonymity, she says, whistleblowers might be...

  • Privacy-Preserving Data Mining based on Integrated Customer Databases from Different Enterprises. SZŰCS, Gábor; KISS, Attila // Economy Informatics;2014, Vol. 14 Issue 1, p14 

    The paper is about data mining projects in real applications, where preserving the users' privacy is important. The aim was to build a secure multiparty computation (SMC) data mining system with SMC data mining algorithm that would be able to solve the task of classification in a horizontally...

  • Publius Blogs. Balko, Radley // Reason;Nov2008, Vol. 40 Issue 6, p18 

    The article focuses on the protection of blogs or online anonymity in the U.S. Blogs are being likened to pamphleteering which ignites the American Revolution. It notes that some anonymous blogs aim to crack down on their Internet critics with vengeance. For instance, the police department of...

  • Anonymity vs. Security: The Right Balance for the Smart Grid. Goel, Sanjay // Communications of the Association for Information Systems;Jan2015, Vol. 36, p23 

    This paper examines the conflict between anonymity and security in the context of new innovations that leverage the Internet. Anonymity affords an opportunity for the marginalized to express opinions without fear of persecution or discrimination; however, anonymity also facilitates crime and...

  • Can data ever be deleted? Adee, Sally // New Scientist;8/1/2015, Vol. 227 Issue 3032, p17 

    The article discusses discrepancies between what websites and online companies claim they do with user data and reality. Topics include the discovery of remaining data for users of the adultery social network Ashley Madison by a hacker collective called Impact Team, the ambiguity of data...

  • Grandma Party Hotline.  // Makeshift;Spring2013, Issue 5, p8 

    The article reviews the web site Grandma Party Hotline, located at grandmapartyhotline.com, which has a blank space with privacy for hotline where callers are asked to leave their creative message after the elderly woman's voice ends.

  • Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection. Kumar, Rajeev; Gopal, Ram; Garfinkel, Robert // INFORMS Journal on Computing;Summer2010, Vol. 22 Issue 3, p471 

    The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. Existing data collection techniques have serious...

  • Cyber Security and Individual Rights, Striking the Right Balance. Taddeo, Mariarosaria // Philosophy & Technology;Dec2013, Vol. 26 Issue 4, p353 

    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the...

  • Google expands transparency. Investor's Business Daily // Investors Business Daily;12/23/2014, pA02 

    The Internet search engine said in its latest "Transparency Report," which is more in-depth than before and covers June-Dec. '13, that it fielded 3,105 requests to remove 14,637 pieces of content. That's less than the 3,846 received in the 1st half of '13. During the most recent reporting...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics