My old TinHat
"It won't stop a bullet, but I still feel safer wearing it"
Home
Usability References Download speed and splitting pages Colours and contrast For Web editors UK usability links US usability links
Other pages Contact Search Republishing Privacy Policy HCI links
UK accessibility Intro Site reviews Simple WAI level A checklist WAI Standard 'AAA' Tips for site editors Non-HTML files (PDFs) The author
UK government accessibility guidelines UK guidelines intro Overlap with WAI Guidelines Other First Half Elements Guide to the Second Half Questionable Elements Overview for Managers Using Gov sites as Templates WAI Standard 'A' WAI Standard 'AA
Archived material from 2000
Email As private as a postcard Safe procedures for email How to avoid junk (spam) Privacy through encryption Monitoring by authorities Monitoring at work Viruses in email attachments Reading email headers Reading attachment file extensions
Hacking What hackers do Hacker site links
Viruses An introduction In Email and attachments On Web sites and in software downloads Protection software Interpreting file extensions of email attachments Displaying file extensions in Windows Assess your risk In Word documents On Macs Short glossary Links
Cookies An introduction to cookies More details on cookie contents Inspecting cookies Deleting cookies Deleting cookies in IE6 Allow or disallow? Disallow/ switch off cookies
Personal data Your intimate friend the Network manager Records at your Internet Service Provider What every Web site can find out about you Good and bad passwords Links and further information Corporate collection of personal data
Children Internet access Teenagers Abuse of trust Report child pornography
The authorities (police and intelligence services) Monitoring your Internet activity Code-breaking encrypted messages "Echelon" world-wide surveillance Eavesdropping mobile calls Links and more information
Computer bugs & holes Security holes Improving your security Examples of holes Security tips Aureate and Radiate
Shopping How safe is it to shop online? Personal data - who knows about you? Security tips Links and more information
Sexual harassment online Avoiding harassment Dealing with harassment Reading full email headers Complaining to an ISP about harassment How safe is it to bank online?
Mobile phones Your personal tracking beacon Tracking examples
Other pages Security and Privacy News Introduction to Internet Privacy About TihHat Contact Search Republishing Privacy Policy HCI links Computers as a threat (Bill Joy) Computers as a threat (Links) How the Internet works ("Jellybeans in the Park") Tips on Using Search Engines
copyright Foxglove Media Ltd 2003. See disclaimer and republishing guidelines.