Avoiding Harassment and Phishing

The safer something is, the less freedom/liberty/rights you have.
Nice touch throwing in "victim blaming is bad" though, that's a quick way to get people to agree with you.

However, such a password can be difficult to remember.

These suggestions are like installing high-security deadbolt lockson doors of an office or home.

Of course, you don't need to limit yourself to official languages.

Of course, when there is an epidemic of a new virus reported inthe news media (particularly a virus spread by attachments in e-mail),it would be wise to update your virus definition filesas soon as the developer of your anti-virus software revises their virusdefinition files to recognize the new virus, and daily thereafter untilvariants (copycats) of the new virus stop appearing.

I have seen estimates that, as of the year 2001, there areonly about 80 known viruses or worms that are specific to the Macintosh operating system.

You can invent your own words, e.g., .

(Compare this to more than 61000 viruses and worms for Microsoft Windowsknown in May 2002.)An exact number of viruses and worms is not possible,because of uncertainty about how to count variants of a virus or worm.


However, wireless networks have an obvious security problem.

(A file extension is a three-letter code at the end of a filename [e.g., , , , , etc.], that indicates the type of file.) Examples of dangerous double file extensions are: where "" can be sequence of letters and numbers.

If you want to use a wireless network, at least:

Files with such dangerous double file extensions are executable programs (perhaps malicious programs) that are pretending to be a picture, a document, text, or a webpage.

7 hours ago — Susana Martinez-Conde

This list of dangerous double file extensions is because there are many different permutations of a nonexecutable file extension on the left with an executable file extension on the right, and because there are more than sixty executable file extensions in Microsoft Windows.

12 hours ago — Ian Towle and The Conversation US


Note: the text of e-mail containing malicious programsoften contains ungrammatical text,punctuation errors, or misspelled words,because the author is a non-native speaker of English.

The e-mail invites you to click on a link in the e-mail.

There is no harm done in waiting a few hours or a few days to contact the person who sent the e-mail and learn the contents and source of the attachment.

There is also an industry working group.

The Melissa and ILOVEYOU incidents, on March 1999 and May 2000, emphasize that you can receive malicious programs from a person who you know and trust, since that person could be a victim of a malicious program that automatically sent e-mail in his/her name.

For detailed instructions on how to disable some of these parts, see:

How often you should update your virus definition file is a complicatedquestion: the answer depends upon your tolerance for risk,how you use your computer (i.e., receiving e-mail or downloadingsoftware from bulletin boards is risky),and which operating system you use.