{"id":192,"date":"2004-11-09T17:22:04","date_gmt":"2004-11-09T21:22:04","guid":{"rendered":""},"modified":"2005-06-19T17:25:21","modified_gmt":"2005-06-19T21:25:21","slug":"urban_legends_on_security_what_technolog","status":"publish","type":"post","link":"https:\/\/fgiasson.com\/blog\/index.php\/2004\/11\/09\/urban_legends_on_security_what_technolog\/","title":{"rendered":"Urban Legends on security &#8211; What technology neophytes can think"},"content":{"rendered":"<p><center><br \/>\n<strong>Urban Legends on security<\/strong><br \/>\n<em>What technology neophytes can think<\/em><br \/>\n<\/center><\/p>\n<p>Last week a came around an interesting &#8220;<a href=\"http:\/\/www.securecomputing.com\/news_display.cfm?nid=492\">study<\/a>&#8221; done by Secure Computing. What is interesting is to see what people can think about things that they don&#8217;t really understand. In many cases it&#8217;s probably the Arabic telephone effect that create such monstrosity. If I have one suggestion to say; it&#8217;s to read them and discuss about them with persons in your entourage that may think that these urban legends can be true. Remind that one of the best security practice is education; anybody can do it.<br \/>\nThere is the list published by Secure Computing:<\/p>\n<ol>\n<li>\u201cHackers can legally break into web sites that lack &#8220;warning&#8221; notices.\u201d <\/li>\n<li>\n\u201cSome Windows system files are really malicious and should be deleted.\u201d <\/li>\n<li>\u201cHotel card keys secretly record personal information, which could be maliciously taken advantage of without the person knowing.\u201d <\/li>\n<li>\u201cIncluding a fake entry in your e-mail address book will prevent e-mail Trojans.\u201d <\/li>\n<li>\u201cA digital cell phone can be infected with a virus merely by answering a phone call.\u201d <\/li>\n<li>\u201cSearch engine &#8220;crawlers&#8221; perform security checks and notify you of vulnerabilities.\u201d<\/li>\n<li>\u201cThieves are using lists of &#8220;out of office&#8221; auto-replies to target homes for burglary.\u201d <\/li>\n<li>\u201cFree patches e-mailed to you will protect your PC from the latest worm or viruses.\u201d <\/li>\n<li>\u201cSigning up with a &#8220;Do Not Spam Registry&#8221; will stop you from getting spam.\u201d <\/li>\n<li>\u201cElf Bowling and Blue Mountain Greeting Cards contain viruses.\u201d <\/li>\n<\/ol>\n<p>Enjoy them, laugh at yourself and think that many people can think that they are real possible treats. Just keep in mind that the situation is normal, otherwise urban legend wouldn&#8217;t exists.  Then if you&#8217;re not sure about a thing that a person tell you; just do some research on a trusted web site and you&#8217;ll be able to assess the treat by yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Urban Legends on security What technology neophytes can think Last week a came around an interesting &#8220;study&#8221; done by Secure Computing. What is interesting is to see what people can think about things that they don&#8217;t really understand. In many cases it&#8217;s probably the Arabic telephone effect that create such monstrosity. If I have one [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[56],"tags":[],"class_list":["post-192","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":0,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"wp:attachment":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}