Showing posts with label web browsing. Show all posts
Showing posts with label web browsing. Show all posts

Wednesday, June 27, 2001

,

What's the deal with all those pay as your surf programs?

Well, for those of you who have been living on the planet Zog for the last few years, pay as you surf companies offer you the opportunity to earn money simply for viewing adverts displayed in an 'adbar'. The premise is that these banner ads will captivate your attention to such an extent that you will feel compelled to visit various web sites and buy whatever unmissable offer is available at the time. Nevertheless, it isn't compulsory that you purchase anything at all if you don't want to.

Since many people do visit and spend money at these sites, all sorts of people are willing to pay companies such as Valuepay and Cash Surfers in order to have their adverts displayed. A small chunk of the income generated from affiliated advertisers is shared with the members as a reward for keeping the adbar visible on their desktop.

In addition to being paid for the hours that you surf, you also have the opportunity to refer other people to sign up using your ID reference so that you can earn money while they surf.

...Or at least this is how the pay as you surf system used to work before the bottom fell out of the internet advertising model and the dot com bubble burst. These days you'd be lucky to see a single penny in return for the time you invest in these programs. If you want my advice, give them a wide berth; they're not worth the hassle.

Tuesday, June 12, 2001

, , ,

Why do some sites hide the URLs of their files or pages?

If you hover your mouse pointer over one of the text links on this page you will notice that the name of the page or file linked to and its location will be displayed in the bottom left corner of your browser. Some webmasters choose to insert javascript code into their pages in order to mask this information. This may be done to display important information or for misguided aesthetic reasons, but can also be used to conceal links to dangerous files or pages designed to redirect you to the site's sponsor or malevolently coded web sites.

If you are in any doubt you can right-click on a link, select 'properties' and assess the URL for authenticity. If it contains a CGI or PHP reference with an ID code you should be wary of rushing into clicking on it. This is generally a good rule of thumb, however, there are some exceptions that you should be aware of - when the site is using an anti-leech system, for instance, to prevent people from harvesting the entire contents of the site using an automated download tool.

Firefox users can prevent web sites from tampering with the status bar like so: open up the 'preferences' menu, select the 'web features' tab and click on the 'advanced' button adjacent to the 'enable javascript' check box. Now untick the (allow scripts to) 'hide the status bar' and 'change status bar text' check boxes and click 'OK'.

Saturday, May 26, 2001

,

What is a PM?

PM stands for private message. These are used whenever you want to communicate with another board member without anyone else being able to see your message. The PM system is much like email in that no-one can gain access to your messages unless they know your password. The method used to send a PM to another member is very similar no matter which type of bulletin board you are using. You can either browse through the members list to find the person you want to contact and then click on the adjacent PM button, or even easier than that, you can locate the PM button in the member's replies on the board and click on the link from there.

Whenever you click on the PM button, analogously to email, you will be presented with several empty information fields, which must be filled in before you can proceed. These include a 'to', 'from', 'topic' and a message box. Providing you are already logged into the board, the first two fields will be entered automatically, leaving you to give your message a topic title, type the text of your message into the large empty space and press the send button.

Saturday, May 19, 2001

, , , ,

How can I stop all that irritating web site music from playing?

Just wait for the page to finish loading and press your browser's stop button (the red circle with the x in the middle). It is also possible to prevent web site music from initiating to begin with - at least it is if you happen to be using Internet Explorer.

The procedure is as follows: click on 'tools' and then select 'internet options' from the drop down menu. Now click on the 'advanced' tab and locate the 'play sounds in web pages' option from within the 'multimedia' group of preferences. If you untick the checkbox adjacent to it, never again will you have to suffer from such auditory intrusion.

Tuesday, March 27, 2001

, ,

Why does my browser crash when I use the right-click button several times in a row?

Not content with preventing you from using the right mouse button, some webmasters also code their pages in a such a way so as to cause your browser to freeze by creating a stack overflow error. Sometimes you will be warned to stop right-clicking, and at other times your browser will just lock up with no such admonition.

Wednesday, November 15, 2000

,

Why when I post a message on some bulletin boards do they not show up straight away?

This happens because your browser is not set to automatically refresh the page after you post. When you are returned to the forum index you are presented with an old version of the page which has been retrieved from your internet cache (the area of your hard drive web pages are downloaded to) rather than the web server.

To check that your posts have been added successfully, you can hit the 'refresh' button or press the F5 key, yet to make sure that you are always viewing the newest versions of web pages in future, you will have to change the settings of your browser. This way, pressing the refresh button manually will not be necessary.

Here's the procedure: select 'internet options' from the 'tools' menu of your browser and prod the 'general' tab. Now click on the 'settings' button in the 'temporary internet files' section, and finally make sure that the 'every visit to the page' option is checked within the 'check for newer versions of stored pages' area.

Wednesday, September 13, 2000

Quickie dot coms

Here's a really nifty web browsing, time-saving tip for you: whenever you type the address of a web site you wish to visit into Internet Explorer's address bar, try omitting the Ws and the .com. Just type the bit in between, press the control and enter key simultaneously and the rest will be filled in for you automatically before your browser attempts to load the site. This shortcut also works in Firefox if you lay off the control key. Note that this only works with .com addresses, but still, that's a hefty chunk of them, right?

Sunday, July 09, 2000

,

One search engine or ten? Why settle for half measures?

When searching for software, clip art, MP3s, or anything for that matter, use a 'meta' search engine. Meta search engines take a query and submit it to a multitude of diverse search engines simultaneously, amalgamate the results and then present them to you in a logical, standardised format.

A single search engine cannot possibly index everything the web has to offer and as a result they miss many relevant hits. Because meta search engines have access to the leading search engines they are able to offer much more comprehensive results than any single search engine.

The number of search engines utilised by meta search engines varies considerably, but obviously try to find one which searches the highest number of portals and will therefore harvest the most results. Metacrawler crawls metas like no other if you're open to suggestions.

Saturday, April 29, 2000

, , , , , , ,

Web media divining - tools of the trade

The advent of the widespread availability of fast internet connections, coupled with an abundance of cheap web space has allowed artists, musicians, movie directors and software programmers to distribute their respective works online rather than via more traditional hard-copy mediums. To take full advantage of all the web has to offer it is necessary to seek out and get to grips with a number of essential tools. Amongst these are decompression programs, a download manager, an FTP client and a firewall.

In the realm of computing you are never short of software options; there are literally thousands of equivalent programs available in every category you could possibly imagine, and they're all a mere click of the mouse away. What I've attempted to do here is to narrow down this vast range of options into a more manageable selection. The ones I've chosen are considered the staple diet of the digerati, but they're not everyone's cup of char. If you find that you don't agree with my choices you don't have to stick with them, just pop along to your favourite shareware site, find the search box, tap in a few relevant keywords and take your pick. The world's your lobster... or something.

Getting X from A to B

The first item on the check list is known as a download manager. These go synonymously with internet foraging and are vital in that they allow you to resume broken downloads of bulky files and can handle large numbers of files unsupervised. Assuming you're not completely new to the internet you've probably become accustomed to downloading files using the built-in download manager (if you can call it that) of your internet browser. This is fine for small, single file downloads, but is about as much use as an inflatable dart board for transferring anything else. As an example, imagine trying to download a series of weekly, or even daily, podcasts. You would begin by clicking on the first file (hands slap foreheads across the globe in astonishment!), your browser would then open a dialog box to allow you to choose a suitable location to store your downloaded file and then it would begin transferring.

If this process is interrupted due to a failed connection you would have to begin downloading the file again from the first byte - unfortunately internet browsers have very short memories so can't remember what they were doing just a few seconds ago! Some servers are so flaky you could find yourself caught up in an aeonian start-error-restart loop. Not much fun to put it lightly!

Once the first file has downloaded successfully you would then have to click on the next one and wait for that to begin transferring and so on and so forth for each of the remaining files. I don't think you need me to tell you how infuriatingly slow this whole task can be. This is where download managers step into the breach to save you from slipping into a download induced state of insanity. What these do is allow you to queue a series of files and transfer them sequentially, freeing you from your former computer baby-sitting purgatory to do something more interesting, safe in the knowledge that when you return, your computer will still be happily chugging away without the need for any further intervention from you.

Instead of getting caught up in a mind-numbing click-wait-click loop you can set your download manager to transfer a specific number of files simultaneously (two is a sensible number if you have a slow connection). Once the first file has safely landed in your downloads directory, the next file in the queue will begin transferring automatically until the entire list has been purged. Best of all though, if the connection with the server you are downloading from is broken you won't have to begin again from square one. Your download manager will simply reconnect, erase the last few bytes which have been downloaded (because they may have become corrupt) and will resume the transfer without even breaking into a sweat.

As you know, dial-up modem connections are very fickle things and can spontaneously be broken for a multitude of different reasons. Not to worry though, this problem has also been anticipated and can be counteracted with the help of your download manager's auto reconnect system. Assuming you have informed your download manager which dial-up account you wish to reconnect to should your connection be lost, it will automatically attempt to dial into the service in the event of any problems. But that's not all they can do. When your download task is complete, providing you have ticked the relevant boxes, your computer will automatically disconnect from the internet and shutdown - now that's what I call hands-free computing!

For a long time, amongst people in the know, Gozilla and Getright were ubiquitously assumed to be the cream of the crop, but now the download manager market is no longer a two horse race. Hot on their heels, Flashget has overnight managed to claw back a substantial proportion of the user base shared by Getright and Gozilla. While Flashget takes all the usual duties of a download manager in its stride, where it really starts to break down the boundaries is in the speed department. Whereas most download managers will open a single connection to a file and keep on plugging away at it until it is complete regardless of the server's transfer rate, Flashget will open multiple connections to various servers allowing a single file to be downloaded much quicker. These multiple connections, known as 'jets' in Flashget Land, are assigned with a particular portion of a file to download. Jet 1 for example, could be downloading the first third of a file while jet 2 downloads the second third and jet 3 downloads the final third.

Flashget attempts to locate the fastest servers, known as mirrors, where the files are stored and will subsequently connect to a selection of them to maximise the bandwidth utilisation of your connection. When all the segments have been transferred they are automatically glued back together to form the whole file. In fact, Flashget is so good at its job that using it leads paradoxically to a situation where trying to surf the web while simultaneously downloading feels like treading treacle, but then it would be ridiculous to complain that the transfer speeds are too fast! Incidentally, your download speeds can be restricted so as to prevent Flashget from interfering with your surfing habits. I'm sure the circularity of this compromise is obvious by now. Nonetheless, the option is always there if you want it.

Another area where Flashget makes new ground is its file tracking logs. These are so comprehensive you are always kept informed of what is happening as it happens. If a particular file is causing problems, by taking a swift glance at the server logs you can diagnose the error instantly and take remedial action. This is especially useful if you have left your computer downloading while you get on with something else or go out for the night. If you were using a lesser download manager you would be left completely in the dark as to where the problem lies, but with Flashget the logs are always available for viewing after the event.

Almost unique to Flashget is the ability to download all the files linked from a specific web page with a few measly clicks of the mouse. Subsequent to installing Flashget a new context sensitive item is added to your right click menu. This 'download all by Flashget' option does exactly what it says on the tin. When selected, a menu pops up in front of the web page you are currently browsing allowing you to deselect the files you don't want to download. These will include images which make up the design of the page, amongst other nonessential elements. In a similar vein, where Flashget really comes into its own is when transferring files from web space accounts that have been opened for the sole purpose of hosting downloads. Under these circumstances these will be the only files stored in this location so there is no need to separate the wheat from the chaff, making Flashget's incredibly efficient 'download all' option an even more impressive time saver!

Like Getright and Gozilla, Flashget has its own FTP client built-in to the program. The difference, however, lies in the intuitive nature of Flashget's FTP browser interface which makes navigating FTP sites a breeze. For instance, if you are browsing through several FTP sites consecutively Flashget keeps a record of where you've been so that you can return to these sites with a single click. This hierarchical treelike structure is implemented throughout the client so that you can always see whereabouts in the FTP site you are currently situated. It's a simple arrangement, yet one which makes all the difference. Moreover, Flashget's reconnect system is the most reliable I've used to date. Nearly all modern download managers support this function, nevertheless, many of them tend to crash if asked to reconnect to the internet more than a handful of times. Luckily for us, Flashget's redial feature works time after time. Ultimately, the one and only thing to let the side down is the spyware which automatically plants itself into your system when you first install Flashget. Fortunately this can be swept clear using a spyware removal utility such as Ad-Aware (see the anonymity tutorial for further info).

So there's my top download manager tip. Whether you choose to use it is up to you of course. Other people will tell you that Flashget is awful and will stick to their guns no matter what. Because you will hear so many contradictory predilections, it is advisable to try all of these programs and then choose the one that suits you best, as using lots of them concurrently is likely to be a source of conflict. If none of these programs appeal, consider trying Forty Software's Download Wonder or Download Accelerator Plus from Speedbit to investigate some of the alternatives.

Alternative pathways

Next in the lineup is the humble FTP (File Transfer Protocol) client. An FTP client is used to gain access to remote computers known as FTP sites - another excellent source of freeware, graphics, movies, music, you name it! You can think of these as segregated chunks of space on the other people's hard drives which have been designated as a kind of 'share zone'. If you want to keep things simple you can use your download manager's built-in FTP browser to see what's on offer. These will allow you to download files from FTP sites, but not return the favour - that is upload files. For this task you need a fully functional, standalone FTP client.

All the ins and outs of FTP clients will be explained in much greater detail in a later tutorial so I won't delve any deeper into the topic here. For now it will suffice to say that an FTP client is an invaluable addition to your software arsenal so go and find one now even if you don't plan to use it immediately. In my humble opinion the best FTP client available is Bullet Proof FTP - it's reliable, intuitive and looks good to boot.

The decompression chamber

Thirdly, several decompression tools will be necessary to 'unzip' your archive files. Two of the best and most widely used of these are Winzip and Winace.

Winzip deals almost exclusively with files that have a zip extension. It can handle many other obscure formats, though the majority of these you are very unlikely to ever encounter during your net traversals. Winace on the other hand is capable of decompressing ace, rar and zip files in addition to all the other common compression formats.

Winrar is another indispensable archiving tool every file seeker should equip him or herself with. Although Winace can handle rar archives as well as its own homegrown format, it cannot create new rar archives; for this task you will need Winrar. Apart from this fairly obvious impasse, Winrar is much better at handling rar archives as you would expect seeing as this is precisely what the program was designed for.

It isn't absolutely imperative to install all three of these programs - you could get by with Winrar alone for example, however, each program has its own strengths and weaknesses and to get the best of both worlds (well three worlds actually) it makes sense to use different programs for different tasks. As you would expect, Winzip's most impressive party trick is opening, extracting and creating zip archives so if you are planning to take advantage of all three programs you should associate zip files with Winzip exclusively. The same goes for Winace and Winrar, so associate ace files with Winace and rar files with Winrar. You will be guided through this very simple process by fool-proof wizards following the installation of each program so don't worry about locating the relevant options yourself.

You may be wondering at this stage why three different programs are necessary in the first place. Well this is due to the fact that there is no single, standard format for compressing computer files; some people swear by rar, while others favour zip - you haven't a snowball's chance in hell of getting everyone to agree on a de facto standard, and so to keep our options open we must equip ourselves with as many programs as it takes to process each kind of file.

All three of the most popular compression formats can be spanned across a designated number of archives. This used to be common practice when it was impossible to shoehorn complete archives onto individual, removable media such as floppy disks, or freebie web space accounts. Nowadays this feature is less useful seeing as DVD writer ownership is rapidly becoming the norm. Nevertheless, for historical purposes if nothing else, I'll explain how the various data chunks comprising a spanned archive can be glued back together and decompressed below.

Baffled by data squishing and de-squishing be you not young Jedi. Read on and the compression pool will become much less murky as we go along. You now have the necessary kit in your itinerary so that's a good start.

The finer details


I take it you've downloaded one of these mysterious 'zip' file creatures and are wondering what on earth do you do with it now. Well first you need to understand a little bit about compression. You can think of a zip file, for instance, as an empty beer can (stay with me on this one, all will become clear). While the can is intact you can store the full capacity of liquid in it, however, it takes up a lot of space and is awkward to carry around (it's a king-size specimen, OK?). Now if you put on your size twelve Doc Martins and crush it under your foot, you can no longer store the same amount of liquid in it, yet it is much smaller and easier to carry around. When you want to pour the liquid back into it again, the can is stretched back to its former shape (I'm well aware that you're likely to shred your hands into a bloody pulp in the attempt, but you get the gist I'm sure).

This, in essence is what a compressed archive does. Zip files can consist of a cornucopia of file formats numbering anywhere between one and thousands. If these files were not all held together in a compressed format you would have to click on each one individually in order to download them - this is inconvenient and time consuming to say the least! Also, because the files would be in their expanded, ready to use state they would inevitably take much longer to download. This is where Winzip, Winrar and Winace come in very handy:

If a file has a zip extension I would normally advise using Winzip to extract it since this is the task the program was primarily designed for, but this is far from convenient when you have a large set of files to decompress sequentially. This is why I'd recommend using Winrar to extract the whole shebang simultaneously instead. To get started, open the folder containing the files you have just downloaded, drag a box around all the zip files (using the control key if you need to single out particular files), and then right-click one of them. Select 'extract here' from the context menu and wait while all the files are decompressed.

If when you installed Winrar you didn't agree to have the 'extract here' et al commands added to your context menu, you can achieve the same goal by opening Winrar and browsing for the files that way instead. Once you've located them, drag a box around the whole set and click on the 'extract' button, choose a place to put them and click 'OK'. It is best to choose a separate folder to store the files contained in each archive set otherwise you will soon find yourself swimming in a chaotic sea of orphan files, not knowing which ones belong to which program (or whatever you happen to have downloaded).

Quite often zip archives contain identically named .diz (short for description) text files designed to be read by FTP server software to establish the contents of compressed archives - the information harvested is used to create easily searchable catalogues. These files are far less useful to the end user at this stage, so if prompted to overwrite them click 'yes' to proceed (if your archives are part of a set they will likely be duplicates in any case).

Spanned archives

To complicate matters these can take any one of the following forms...

1. An ace file followed by a series of c?? files.

2. A rar file followed by a series of r?? files.

3. A series of files with sequentially numbered extensions without an initial ace or rar file i.e. .001 followed by .002, .003 and so on.

4. A rar file followed by a series of sequentially numbered files as in the case above.

5. A series of files all with the identical extension, rar. In this case it is the body of the filename which differentiates the files in the set. For example, the first file will be labelled volname.part001.rar, the second file will be labelled volname.part002.rar and so on.

The question marks in the first two file formats represent a series of sequentially ascending numbers, which form a mutually dependent set of files. C?? files are associated with ace archives, whereas 0?? and r?? files are associated with rar archives. These files cannot be decompressed with Winzip so you can close that down for the time being.

If after unzipping, what you are presented with is an ace file followed by a series of c?? files you will need to use Winace to extract them. On the other hand, if you are faced with scenario 2, 3, 4 or 5 from the list above you are best advised to use Winrar to extract them. Although, in theory, Winace can handle both ace and rar formats, sometimes it reports pseudo CRC errors when processing the latter file type. Very often these CRC errors are actually Winace errors rather than real errors within your archive set and are due to a mishandling of the compression format.

Scenario 5 represents Winrar's latest default volume naming scheme (as of version 3.xx). Archives compressed using versions of Winrar prior to 2.9 will take the format presented in scenarios 1 - 4. This isn't to say that you have to worry about keeping an old version of Winrar handy for processing older archives, as the latest build is capable of decompressing past and present formats.

Somehow I've managed to make all this sound much more complicated than it really is, but trust me, there's no need to panic. After opening a couple of archives you will be able to recognise and extract these two different file formats as though you're flying on autopilot. All you have to keep in mind is to use Winace for opening ace files and Winrar for opening rar, r01 or 001 files - note that if there is no rar file you will have to open either the 001 or r01 file instead. These function in exactly the same way as any other rar archive, minus the initial double-clickable rar file.

Unless you have specifically associated 001 and r01 files with Winrar they will not open automatically, in which case you will have to open the program first, browse for the file and double-click on it yourself. You may even want to modify your file association settings to allow you to simply double-click on these files to open them in future. The procedure goes a lot like this: browse for the file you want to associate with Winrar and right-click on it. Now choose 'open with' and select Winrar from the list in the ensuing dialog box, tick the "always use the selected program to open this kind of file" check box and click 'OK'. The icon representing your newly associated file will change to the default one used by rar archives and you will then be able to double-click it to delve inside. Even I'm not sure if any of that makes sense anymore, but we'll carry on regardless. I'm doing my best, honestly!

The initial rar, 001 or ace file actually represents the first file of a compressed, spanned archive. You have probably already noticed that double-clicking on a c??, r?? or a 0?? file will achieve absolutely nothing unless you have previously modified your file association settings. This is because they are not designed to be opened individually (with the exception of 001 files). Instead they will automatically be processed when you double-click on the rar or ace file.

Similarly, when you choose to extract an ace or a rar archive, all the dependent files will be extracted in one go without any further intervention from you. Whenever you do this, depending on the way in which your file associations have been configured, either Winace or Winrar will spring into action and open the archive set in a new window. All you have to do now is choose 'extract' from the menu and select a folder to store the files in, remembering to tick the 'extract with full path' option to ensure that the files end up in the correct folders.

If when you decompress these files you encounter CRC errors it means that one or more of the files have become corrupt during the transfer process. This is usually because they have been transferred too slowly, because they have been resumed too many times or because you are downloading too many files at once and this is causing bytes to be lost or to be incorrectly allocated. It is also possible, however, that the way in which you downloaded them had absolutely nothing to do with the corruption - the files could have been damaged during the initial upload stage instead, in which case there isn't a great deal you can do about it.

If your files are corrupt they will need to be either repaired or downloaded again. You can attempt to repair a corrupt archive using the built-in repair tools of Winrar or Winace (click on 'archive' and then 'repair'), but be warned, the majority of damaged archives are beyond help and will need to be re-downloaded instead. If on your second download attempt the files still don't work it is likely that they were damaged to begin with, in which case you are best advised to delete them and start afresh downloading from an alternative location.

Digital safety nets

Finally you will need a firewall to protect yourself from malicious net intruders. Having your computer hacked into and trashed by a bored, spotty thirteen year old living on the other side of the world can be a tad frustrating - especially if you discover after the event that it is easily avoided. You don't have to lurk in undesirable areas of the web to fall prey to such attacks. It could happen while you're emailing your granny, searching for a job or chatting to a friend using Yahoo messenger.

Inevitably the more time you spend online, the greater is the likelihood of you becoming a target. Well, 'target' is perhaps too strong a word. If someone hacks into your computer it's unlikely that their motivation stems from a personal vendetta. More likely they're just scanning a range of online computers to see whose 'door' has been left wide open to intruders. If you don't install an efficient firewall this is tantamount to leaving a welcome mat on your porch as an open invitation to whatever malevolent forces may be skulking in the vicinity. To discover more about firewalls try searching my blog for the key phrase 'Zone Alarm'.

Friday, January 14, 2000

, , , , ,

The whys and wherefores of e-groups

An e-group is a bit like a bulletin board in that, once registered, anyone can post messages and upload attachments. At regular intervals - usually daily or weekly depending on the activity level of the group - all the subscriber's contributions are compiled in an easy to read format and made available as one long e-mail for your convenience (this is known as 'digest mode'). They key difference between an e-group and a mailing list is that mailing lists are designed to be a one-way form of communication. The role of the latter is simply to keep you abreast of any important changes made to a particular web site, not to give you a platform to voice your own opinion.

One advantage of joining an e-group is that your subscription is very quick and effortless to set up - more likely than not you will already have the necessary software installed on your computer; an email client such as Mozilla Thunderbird or simply a web browser. Besides, if you have a pop 3 or web based e-mail address you are already half way there. To find some interesting groups to join you can begin by visiting an e-group search engine - Yahoo Groups, Google Groups, Your Mailing List Provider, and Topica are particularly good ones to try.

All you have to do is type in your search criteria, select the group you wish to join and submit your e-mail address. Note that with most e-group providers you will first have to register with the company themselves before being allowed to join any of the communities they host. This involves some obligatory form filling, but should not take any longer than a couple of minutes in any case. Once you have completed this initial registration procedure you will never again have to repeat the process should you decide to join additional groups managed by the same company. In future subscribing to a new group merely involves typing your e-mail address into a dialog box and prodding the 'join group' button. The number and scope of e-group communities available to join is only limited by the range of topics comprising life, the universe and everything. So quite a few to explore then!

Monday, November 29, 1999

, , , , , , ,

Anonymity - a healthy dose of paranoia

I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit online. The sort of information gathered by these logs and made available to the webmasters of the sites you visit includes the address of the referring web site, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin or surreptitiously tracking your every move to gather information on consumer trends, you wouldn't be too chuffed would you? Well the web is no different - it's still an invasion of privacy and a threat to security and you don't have to put up with it.

Proxy servers

Every time you visit a web site, detailed information about your system is automatically supplied to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of corporations, who by tracking your activities on the internet are better equipped to pelt more relevant spam at you. Your best defence against such chicanery is to use what is known as a 'proxy server'. These are designed to conceal revealing information from the web sites you visit, allowing you to surf the web anonymously.

Proxy servers work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you ask your browser to fetch a web page, the request is first channelled through an external server - one that is completely independent of your ISP's servers. This third party server then does the requesting on your behalf making it appear that the request came from them rather than you. The upshot of this manoeuvre is that your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.

There are two different ways you can use proxy servers. The first method is to use a web based service. This involves visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you wish to visit. Each time you surf the net in this manner, your personal identifying information is encrypted making it indecipherable to its recipient allowing you to preserve your anonymity. Two of the best examples of this type of web based proxy service are Proxify and W3 Privacy.

Clearly one disadvantage of using a web based service is that you have to visit the proxy's home page each time you want to surf anonymously. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted by the proxy script - they have to pay for the service somehow after all. Note that more sophisticated and convenient solutions are usually made available by free web based proxy server providers if you don't mind paying a premium.

The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser. This will allow you to surf anonymously without having to visit the home page of your proxy at all. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. To achieve this with Internet Explorer, for example, once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now choose 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port it uses in the 'port' box and go forth and surf anonymously.

Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can leave a lot to be desired. One work-around would be to set off in pursuit of a public proxy server list and select an alternative from it. To locate such a list you can investigate dmoz's hand-picked selection of proxy collation sites.

Not that this strategy is caveat-free either - before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that like the proxy servers provided by Rewebber et al, free, public proxy servers are nearly all oversubscribed and so can slow down web browsing considerably. Unearthing fast, reliable proxy servers is an art form in itself - one which takes considerable practice to perfect. If you have abundant time and patience you could find a list of public proxy servers and then experiment with each one until you strike gold.

Instead, your search would be much more efficient if you arranged for a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs available capable of doing just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers and test them for speed and anonymity (not all of them are truly anonymous, even if they claim to be!). Once you find one to match your requirements you can select it as your default proxy with the click of a button.

The best thing about using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '127.0.0.1' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious, 'localhost' and the IP address '127.0.0.1' are the names by which every computer on the internet refers to itself.

Free proxies are fine for a quick and dirty shoehorn into the world of online anonymity, but if you're really serious about protecting your privacy and aren't ecstatic about continuously having to switch servers you'd be best advised to invest in a dedicated, stable proxy such as the ones offered by Ultimate Anonymity.

Before splashing out though it may be worth checking if your current ISP has a proxy server of its own you can use. These aren't there to help you to commit cyber crimes and get away with it; they actually have a legitimate purpose as well - otherwise they wouldn't exist. Let me explain: proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages that have been requested by anyone utilising the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being relayed to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.

One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Firefox as explained earlier in this tutorial, but this will only affect your web browser. If you then used Flash FXP to transfer your web site from one server to another or to distribute your latest home brew movie, you wouldn't benefit from the potential speed boost engineered by the proxy server. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a 'use proxy server' option available.

Cookies

You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members-only areas of web sites without having to re-type login details, or to retain your customised preferences for future use. If you're using a shared computer, anyone who visits the same site that you have previously logged into can access your accounts. This can be particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.

The solution is to delete any cookies containing sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\Documents and Settings\Kylie Minogue\Cookies' directory (that is if your name is Kylie Minogue. Mine isn't in case you're wondering). If you peer into this directory, in some cases it is easy to identify which cookie is associated with which web site.

In other cases it's not so obvious. The cookie created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if you're really struggling to find your cookie jar, you could delete them via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' > 'Internet Options' menu items. In Firefox cookies can be managed by navigating through the following menus: 'Preferences' > 'Privacy' > 'Cookies'.

If all this sounds like too much hassle you can always find a labour saving application which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place.

Email

Nope, that's not safe either! Each time you send an email, an ID header is attached to it and sent along with your message. This header contains your IP address, your computer's name (did you even know it had one?), the name of the client used to send the message amongst other less crucial information. If you sent a nasty email to someone, all they would have to do to track you down and get their revenge is find out your IP address from the header of your email and then launch an attack. The moral of this story is obvious - don't send nasty emails to people! Or if you really must, make sure you use a proxy server. If you've already arranged for Internet Explorer to connect to the net via a proxy server, Outlook Express will also be protected because they share the same settings. However, if you're using a different browser and/or email client you may have to set your proxy options independently for each application - so using IE does have some advantages after all!

Another way to protect yourself when sending email is to use an anonymous email address rather than the one provided by your ISP. In fact, this isn't just a recommendation, it's a necessity. What you should do is sign up for an account at Yahoo or Hotmail and then have all your mail forwarded to your real address, or simply check your free account using the web interface provided. So what's wrong with giving out your real address? Well, if you tell someone to get in touch with you using the address yourname@freeserve.net for example, they will instantly know that your ISP is Freeserve. They could then go along to the Freeserve home page and look you up in the user database to find out your full name and address. Worse still is the fact that many ISPs will pass their user's contact information onto independent database listing companies such as Info Space, Big Foot and Who Where. If possible it would be wise to have these entries removed altogether. Otherwise you will just have to make do with just using your anonymous email account.

Even if you're using a free pop 3 email account, your real IP address will still be included in the headers of every message you send. If you're very security conscious you may want to prevent people from seeing these headers by making use of what is known as a remailer. Whenever you send an email through a remailer, it is first sent to various random mail servers before being dispatched to the final recipient using the anonymous Mixmaster remailer system. Although the process can take up to 12 hours, your messages will be encrypted and all trace of your IP address and computer ID will be removed from the headers granting you complete anonymity.

While you can send anonymous messages in this way using your email client, it is much simpler to go along to a web based remailer and relay your message from there. If you wanted to send an email which requires a reply while maintaining your anonymity, what you would do is type your Yahoo or Hotmail email address into the 'from' box. On the other hand, if you do not require a reply you can enter any address here and the message will still arrive safely. Some remailers will even allow you to enter fake information into the header section to confuse the recipients of your messages even further! A similar service is offered by Advice Box who also provide the means to receive anonymous replies without revealing an email address of any kind.

If you suspect that miscreants might be able to intercept your email, a good way to bring the shutters down on their prying eyes is to use a Pretty Good Privacy (PGP) key. This is fundamentally a ridiculously long password no-one could possibly decipher in a million years (well not without a NASA ninja PC anyway!). To make use of PGP you would encrypt any messages you wish to send and then (in a separate email) selectively forward the PGP key used to decrypt the message to anyone who is on your 'trusted' list. Unless the recipients of your messages have this key in their possession they will not be able to make sense of your correspondence - all they will see is gobbledegook ascii characters.

Yet another option is to sign up for a free email account with Hush Mail. Hush Mail supports both web mail and the pop 3 protocol used for sending mail via your email client, and protects your anonymity by scrambling the headers of all the messages you send so as to ensure that they cannot be traced back to your computer.

Spyware

Fairly recently it came to light that certain shareware and freeware programs contain modules capable of monitoring your activities on the net and then sending the information they gather back to the producer of the software! Many of the programs you assume are completely free are actually being funded by the revenue generated from the sale of your personal information to market research companies.

As if that wasn't bad enough, there are also rumours circulating to suggest that it is this spyware causing many of the operating system crashes experienced whilst surfing the net. Obviously we're not going to take this lying down. The solution is to use a spyware remover to eradicate the dubious files responsible for this invasion of privacy. More often than not this causes the programs utilising these files to cease functioning. Who cares? Why would you want to use software made by such unscrupulous snoopers anyway when there are plenty of 'clean' alternatives available? People are literally falling over themselves to create anti-spyware programs at the moment so they shouldn't be too difficult to locate. Some do nothing aside from look pretty. Others are actually spyware or malware delivery mechanisms masquerading as anti-spyware tools. One you can certainly trust unreservedly is Ad-Aware. This is the number one spyware removal tool recommended by those in the know.

Another option is to make sure that whatever software you install contains no spyware before you download and run it. You can do this by typing the name of the software into the spyware lookup database at Spy Checker.

If clean file sharing clients are what you seek, try searching Google using the keywords "Dr Damn" and "clean clients".

The full Monty

I can't promise you naked men, sorry. I'm talking about all-in-one utilities used to cover your tracks both on and offline. Typically if someone comes up with a great idea it's replicated many times over until you become completely lost in an ocean of seemingly identical products. Well fear not, I'm here to separate the wheat from the chaff, to steer you towards those worthy of a closer look. Window Washer is one program which stands head and shoulders above the competition. It excels at both preserving your privacy and conserving disk space by automatically cleaning up your browser's cache, cookies and history. It also spruces up the Windows document menu, temp directory, recycle bin, ICQ history, and much more. You can even define your own list of files, folders and registry entries and then have them swept clean at periodic intervals.

Another exceptional program that springs to mind is Evidence Eliminator. This security tool eliminates all evidence (you'd never have guessed would you?) from your PC in a single click of a button. According to the web site blurb, "in tests, Evidence Eliminator defeats forensic analysis software as used by investigators, law-enforcement etc." and what's more, "it protects you from unwanted data becoming permanently hidden in your PC."

Furthermore it includes 'Stealth Mode' invisibility and securely under-writes your existing files to defeat forensic hardware analysis. I'd dread to think what you might have been using your computer for if you have to go to these lengths to cover your tracks, but nevertheless this program seems to be the best of the breed so if you can find a use for it, go fetch! You won't be disappointed.

I suppose I should really conclude this tutorial by saying something mature and responsible. OK, well I'll give it my best shot - cyber crime isn't big and it's not clever girls and boys so don't do it. Do you think that covers it? Seriously though, all this information isn't intended to provide the means to allow you to get away with hacking into other people's computers. In fact it's here to serve as the antithesis to such malicious activities - to reveal the ways in which you could be hacked so that you are better prepared to counteract other people's attempts to hack you.