Ghostery lets you spy on the spies in your computer. For each web page you visit, this extension uncloaks some - but not all - of the invisible tracking software that is working behind the scenes.
Sentiment: NEGATIVE
It is interesting to come across people who feel that a ghost communicating via a spell-checker is less far-fetched than a software glitch.
NoScript is probably the most important privacy tool, but it costs you in convenience.
In the U.S., we are free to speak our minds and to spend money without being forced to reveal our identities - except when using the Web. Browsing the Web leaves digital tracks everywhere in the form of log files, and anyone who hosts a Web site can be easily traced.
Slightly embarrassing admission: Even when I was a kid, I used to have these little spy books, and I would, like, see what everybody was doing in my neighborhood and log it down.
What is the government doing or not doing in terms of tracking you, following you, investigating you? And if you're suspicionless, it should be none of the above.
I continue to meet people who have had their Web pages hijacked, their browsers corrupted, in some cases, their children exposed to inappropriate material from these dangerous programs hidden in their family computers.
A ghost is someone who hasn't made it - in other words, who died, and they don't know they're dead. So they keep walking around and thinking that you're inhabiting their - let's say, their domain. So they're aggravated with you.
Somebody could send you an office document or a PDF file, and as soon as you open it, it's a booby trap and the hacker has complete control of your computer. Another major problem is password management. People use the same password on multiple sites, so when the hacker compromises one site, they have your password for everywhere else.
Scaremongering is an age-old political ritual. There are public officials who have benefited by playing up the 'hacker threat' so that they can win approval by cracking down on it.
The Spy Act prohibits keystroke logging, hijacking, and phishing.